Sinful
Kilopat
- Katılım
- 11 Aralık 2018
- Mesajlar
- 525
- Çözümler
- 4
- RAM
- GSKILL 3600MHz CL17 2x8GB
- SSD veya HDD modeli
- Corsair Force MP510
- Ekran kartı
- RTX 3080
- Anakart
- MSI X570 A-PRO
- İşlemci
- R7 5800X
Merhaba,
Uzun zaman olmuştu mavi ekran almayalı. Hata mesajından da pek bir şey anlamayınca dump dosyasını analiz edeyim dedim.
Tecrübeli arkadaşlar yardımcı olursa sevinirim. Hatayı aldığım sırada oyun oynuyordum. Yan ekranda da Twitch. TV açıktı.
Uzun zaman olmuştu mavi ekran almayalı. Hata mesajından da pek bir şey anlamayınca dump dosyasını analiz edeyim dedim.
Tecrübeli arkadaşlar yardımcı olursa sevinirim. Hatayı aldığım sırada oyun oynuyordum. Yan ekranda da Twitch. TV açıktı.
Kod:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\121722-18328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff804`71a00000 PsLoadedModuleList = 0xfffff804`72612fe0
Debug session time: Sat Dec 17 21:51:04.979 2022 (UTC + 3:00)
System Uptime: 8 days 4:18:06.469
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`71e288f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9301`0748a3c0=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff8ffe000003e8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80471d44d5a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6507
Key : Analysis.IO.Other.Mb
Value: 26
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 32
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 52987
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 121722-18328-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffff8ffe000003e8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80471d44d5a
READ_ADDRESS: fffff8047271c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8ffe000003e8
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff93010748a500 -- (.trap 0xffff93010748a500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8ffe00000000 rbx=0000000000000000 rcx=00000000003ed645
rdx=fffff8047266eee8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80471d44d5a rsp=ffff93010748a698 rbp=ffffaa05392d3c10
r8=0000000000001f6b r9=fffff8047266eee8 r10=0000003fffffffff
r11=ffffff3fffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiCheckSlabPfnBitmap+0x5a:
fffff804`71d44d5a 4c0fa300 bt qword ptr [rax],r8 ds:ffff8ffe`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff9301`0748a3b8 fffff804`71e3dfa9 : 00000000`0000000a ffff8ffe`000003e8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9301`0748a3c0 fffff804`71e39634 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9301`0748a500 fffff804`71d44d5a : fffff804`71c63cf7 00000000`00000000 00000000`00000000 ffffaa05`392d3c10 : nt!KiPageFault+0x474
ffff9301`0748a698 fffff804`71c63cf7 : 00000000`00000000 00000000`00000000 ffffaa05`392d3c10 00000000`00000001 : nt!MiCheckSlabPfnBitmap+0x5a
ffff9301`0748a6a0 fffff804`71c607ef : 00000000`003ed645 ffffe69e`00000001 ffff9c80`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x2f7
ffff9301`0748a7f0 fffff804`71c5f3b5 : ffffe271`39a78b30 00000000`00000001 00000000`00000000 ffffaa05`392e83d0 : nt!MiZeroPage+0xbaf
ffff9301`0748a9f0 fffff804`71dc479f : ffffaa05`392e83d0 00000000`00000000 ffffe69e`2cc9b000 00000000`00000003 : nt!MiZeroLocalPages+0x715
ffff9301`0748ab60 fffff804`71d089b7 : ffffaa05`394de300 00000000`00000080 fffff804`71dc46c0 00000000`00000000 : nt!MiZeroNodePages+0xdf
ffff9301`0748abb0 fffff804`71e2d854 : ffff8001`049c1180 ffffaa05`394de300 fffff804`71d08960 00000000`00000000 : nt!PspSystemThreadStartup+0x57
ffff9301`0748ac00 00000000`00000000 : ffff9301`0748b000 ffff9301`07484000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: nt!MiCheckSlabPfnBitmap+5a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22621.900
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5a
FAILURE_BUCKET_ID: AV_nt!MiCheckSlabPfnBitmap
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {68e836f3-60ff-39d2-01cc-a42b3aa5a168}
Followup: MachineOwner
---------