KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL hatası

Hatalardan sadece biri dosya sistemiyle ilgili. Ayrıntılı sistem özelliklerini yazar mısın?

Belleklerin kit mi? Kaç MHz? XMP açık mı?

Kod:
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802452fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 82937

    Key  : Analysis.Init.CPU.mSec
    Value: 468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 203634

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff802452fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffffd0c1da227e0 -- (.trap 0xfffffd0c1da227e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060081 rbx=0000000000000000 rcx=ffffd601cba80180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80244864a04 rsp=fffffd0c1da22970 rbp=fffffd0c1da22a01
 r8=0000000000000001  r9=00000003e6b83e98 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KeWaitForSingleObject+0x614:
fffff802`44864a04 84c0            test    al,al
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT:  
ffffd601`cbad2e18 fffff802`44a3ac52     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`452fb320 : nt!KeBugCheckEx
ffffd601`cbad2e20 fffff802`4486f9a3     : 000005ec`1b406713 ffffd601`cba80180 00000000`00000000 ffffd601`cba80180 : nt!KeAccumulateTicks+0x1c8a52
ffffd601`cbad2e80 fffff802`4486f48a     : ffff8a8b`f2acb780 fffffd0c`1da22860 ffff8a8c`00f6c100 ffffd601`cba80180 : nt!KeClockInterruptNotify+0x453
ffffd601`cbad2f30 fffff802`44927f55     : ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 ffff5cd7`5023a1b8 : nt!HalpTimerClockIpiRoutine+0x1a
ffffd601`cbad2f60 fffff802`449f76fa     : fffffd0c`1da22860 ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffd601`cbad2fb0 fffff802`449f7c67     : ffff8a8c`00f6c080 ffff77da`862ca818 00000000`00000000 ffff8a8c`00f6c180 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd0c`1da227e0 fffff802`44864a04     : ffff8a8c`000000ad fffff802`44c2b3e1 00000000`00000001 ffff8a8c`00f6c1c0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd0c`1da22970 fffff802`44c2cb01     : ffff8a8c`0105eb60 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x614
fffffd0c`1da22a60 fffff802`44c2cbaa     : ffff8a8c`00f6c080 000000a6`6685fca8 00000000`00000000 fffff802`44a07418 : nt!ObWaitForSingleObject+0x91
fffffd0c`1da22ac0 fffff802`44a075b8     : 000001fa`c64ce9e0 00000000`00000000 fffffd0c`1da22b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffd0c`1da22b00 00007fff`cf2ecc94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a6`6685fc78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`cf2ecc94


SYMBOL_NAME:  nt!KeAccumulateTicks+1c8a52

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c8a52

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80559a10d80, Address of the instruction which caused the bugcheck
Arg3: ffff9984bb628c60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3859

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 48887

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 110665

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80559a10d80

BUGCHECK_P3: ffff9984bb628c60

BUGCHECK_P4: 0

CONTEXT:  ffff9984bb628c60 -- (.cxr 0xffff9984bb628c60)
rax=0000000000000000 rbx=ffff880fa2c57a20 rcx=0000000000000002
rdx=fffffffffffffdaa rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559a10d80 rsp=ffff9984bb629660 rbp=ffff9984bb629719
 r8=ffff880f9ac1cc80  r9=fffffffffffffdac r10=ffff880f9accdcb0
r11=0000000000000001 r12=ffff880fa2c57b08 r13=ffff9984bb629890
r14=ffff880f98824cf0 r15=ffff880f98824a60
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
FLTMGR!FltpPerformPreCallbacksWorker+0xb060:
fffff805`59a10d80 488b4038        mov     rax,qword ptr [rax+38h] ds:002b:00000000`00000038=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT:  
ffff9984`bb629660 fffff805`59a05b37     : ffff9984`bb629890 ffffaf01`af1c0103 ffff880f`aa948300 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0xb060
ffff9984`bb629780 fffff805`59a04b46     : ffff9984`bb62a000 ffff9984`bb624000 00000000`00000000 ffff9984`bb6298a0 : FLTMGR!FltpPassThroughInternal+0xc7
ffff9984`bb6297d0 fffff805`59a048bb     : 00000001`00000002 00000000`00000000 00000000`00000000 fffff805`5bc2b3c1 : FLTMGR!FltpPassThrough+0x1d6
ffff9984`bb629870 fffff805`5b852f55     : ffff880f`a8d6e4f0 000001ed`38e33c70 ffff9984`bb629b80 00000000`00000000 : FLTMGR!FltpDispatch+0x8b
ffff9984`bb6298d0 fffff805`5bbfd878     : ffff880f`a8d6e4f0 00000000`00000000 ffff880f`a8d6e4f0 00000000`00000000 : nt!IofCallDriver+0x55
ffff9984`bb629910 fffff805`5bbe59b9     : ffff880f`00000000 ffff9984`bb629b80 00000000`00000000 ffff9984`bb629b80 : nt!IopSynchronousServiceTail+0x1a8
ffff9984`bb6299b0 fffff805`5ba074b8     : ffff880f`00000000 00000000`00000000 00000000`00000000 000001ed`38e33c70 : nt!NtReadFile+0x599
ffff9984`bb629a90 00007ffe`8b3ec6e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000dd`585ff7e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8b3ec6e4


SYMBOL_NAME:  FLTMGR!FltpPerformPreCallbacksWorker+b060

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .cxr 0xffff9984bb628c60 ; kb

BUCKET_ID_FUNC_OFFSET:  b060

FAILURE_BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacksWorker

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8c1dd5a6-b42f-d6ff-4bb6-2f415b42874f}

Followup:     MachineOwner
---------

9: kd> lmvm FLTMGR
Browse full module list
start             end                 module name
fffff805`59a00000 fffff805`59a6f000   FLTMGR     (pdb symbols)          C:\ProgramData\Dbg\sym\fltMgr.pdb\C3CA0BC721B145FE4F45FF7F65B7C5AD1\fltMgr.pdb
    Loaded symbol image file: FLTMGR.SYS
    Mapped memory image file: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS
    Image path: \SystemRoot\System32\drivers\FLTMGR.SYS
    Image name: FLTMGR.SYS
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        02839B66 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00072E12
    ImageSize:        0006F000
    File version:     10.0.19041.264
    Product version:  10.0.19041.264
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     fltMgr.sys
        OriginalFilename: fltMgr.sys
        ProductVersion:   10.0.19041.264
        FileVersion:      10.0.19041.264 (WinBuild.160101.0800)
        FileDescription:  Microsoft Filesystem Filter Manager
        LegalCopyright:   © Microsoft Corporation. All rights reserved.

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80651b5a266, Address of the instruction which caused the bugcheck
Arg3: ffff8381e70d9920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 75966

    Key  : Analysis.Init.CPU.mSec
    Value: 531

    Key  : Analysis.Init.Elapsed.mSec
    Value: 206635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80651b5a266

BUGCHECK_P3: ffff8381e70d9920

BUGCHECK_P4: 0

CONTEXT:  ffff8381e70d9920 -- (.cxr 0xffff8381e70d9920)
rax=ffffd786e9c175e8 rbx=ffffd786e75c7080 rcx=d786e9c175b00000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffd786e9c175e0
rip=fffff80651b5a266 rsp=fffffe0a03b10940 rbp=fffffe0a03b10a01
 r8=0000000000000000  r9=00000029f85d7fee r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=d786e9c175b00000
r14=0000000000000000 r15=ffffd786e75c71c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff806`51b5a266 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:d786e9c1`75b00020=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

STACK_TEXT:  
fffffe0a`03b10940 fffff806`51c34951     : 00000000`00000000 fffff806`51e2b3e1 00000000`00000000 00000000`00000000 : nt!KeAbPreWait+0x6
fffffe0a`03b10970 fffff806`51e2cb01     : ffffd786`e9c175e0 00000000`00000006 ffffd786`00000001 00000000`00000200 : nt!KeWaitForSingleObject+0x1d0561
fffffe0a`03b10a60 fffff806`51e2cbaa     : ffffd786`e75c7080 00000060`a0dff288 00000000`00000000 00000199`a419ab10 : nt!ObWaitForSingleObject+0x91
fffffe0a`03b10ac0 fffff806`51c075b8     : 00000000`00000000 ffffd786`e751c080 fffffe0a`03b10b18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
fffffe0a`03b10b00 00007ff8`836ccc94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`a0dff258 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`836ccc94


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .cxr 0xffff8381e70d9920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9ca4a719-6b4f-fb47-f634-e80e5eda3be8}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 68635

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 201199

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff802526fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

PROCESS_NAME:  System

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffffa78aaa48b670 -- (.trap 0xffffa78aaa48b670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffd501c71c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffa78aaa48b800 rbp=ffffa78aaa48b8a9
 r8=ffffbf0b7d9efbd0  r9=ffffbf0b7d9efbd0 r10=fffff80252631dc0
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

FAILED_INSTRUCTION_ADDRESS:
+0
STACK_TEXT:  
ffffa78a`aa48b528 fffff802`51e07b69     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffa78a`aa48b530 fffff802`51e03e69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffa78a`aa48b670 00000000`00000000     : ffffbf0b`78d3ee68 ffffa78a`aa48bb10 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup:     MachineOwner
---------


KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffa48785932080, The address of the thread.
Arg2: fffff303c4b29a20, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17517

    Key  : Analysis.Init.CPU.mSec
    Value: 671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 108054

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  192

BUGCHECK_P1: ffffa48785932080

BUGCHECK_P2: fffff303c4b29a20

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT:  
ffffdf8f`3a556a18 fffff806`74a60b2b     : 00000000`00000192 ffffa487`85932080 fffff303`c4b29a20 00000000`00000000 : nt!KeBugCheckEx
ffffdf8f`3a556a20 fffff35b`86c88c05     : fffff303`c4b29a20 ffffd346`8764c43f ffffa487`00000000 ffffa487`85932080 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffdf8f`3a556a60 fffff35b`86fc6163     : 00000052`190bf4c0 ffffdf8f`3a556b80 ffffa487`85932080 00000052`190becc0 : win32kbase!tagObjLock::LockExclusive+0x35
ffffdf8f`3a556a90 fffff35b`87ba48b5     : ffffa487`85932080 ffffdf8f`3a556b80 00000200`be35bf60 00000000`00000020 : win32kfull!NtUserGetQueueStatus+0xd3
ffffdf8f`3a556ad0 fffff806`74c074b8     : 00000200`be39b7a0 00000000`00000000 ffffdf8f`3a556b80 ffffa487`00000000 : win32k!NtUserGetQueueStatus+0x15
ffffdf8f`3a556b00 00007ffa`3aa69684     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`190bf488 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3aa69684


SYMBOL_NAME:  win32kbase!tagObjLock::LockExclusive+35

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1136

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  35

FAILURE_BUCKET_ID:  0x192_win32kbase!tagObjLock::LockExclusive

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1e430623-dc7a-ea23-8d90-2dc51253b6d1}

Followup:     MachineOwner
---------




KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff8b82dc430040, The address of the thread.
Arg2: ffff8b82d0fe3270, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2733

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11579

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 105544

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  192

BUGCHECK_P1: ffff8b82dc430040

BUGCHECK_P2: ffff8b82d0fe3270

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  sppsvc.exe

STACK_TEXT: 
fffffe8b`7dfbf178 fffff807`4f86058f     : 00000000`00000192 ffff8b82`dc430040 ffff8b82`d0fe3270 00000000`00000000 : nt!KeBugCheckEx
fffffe8b`7dfbf180 fffff807`4c1a61cd     : ffff8b82`de9905e0 00000000`00000001 ffff8b82`00000000 00000000`00000000 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14f
fffffe8b`7dfbf1c0 fffff807`4c1a2801     : 00000000`00000000 00000000`000000ff fffffe8b`7dfbf400 fffffe8b`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4ad
fffffe8b`7dfbf2e0 fffff807`4f882147     : fffffe8b`7dfc0000 00000000`00000000 fffffe8b`7dfba000 fffff807`4fdc5a90 : FLTMGR!FltpPreFsFilterOperation+0x181
fffffe8b`7dfbf390 fffff807`4fc30fc1     : fffff807`4c1a8a20 00000000`00000000 00000000`00000001 fffff807`4c1a2680 : nt!FsFilterPerformCallbacks+0xe7
fffffe8b`7dfbf400 fffff807`4fc30cb7     : 00000000`00000000 ffff8b82`d67e5010 00000000`000ac000 80000002`000800a0 : nt!FsRtlAcquireFileExclusiveCommon+0x121
fffffe8b`7dfbf6f0 fffff807`4f881919     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlAcquireFileExclusive+0x17
fffffe8b`7dfbf730 fffff807`4fc2fe2a     : ffff8b82`d5021e70 00000000`11000000 ffffde86`754a42d0 00000000`00000002 : nt!CcZeroEndOfLastPage+0x45
fffffe8b`7dfbf780 fffff807`4fc2fbbc     : fffffe8b`7dfbf910 fffff807`00000005 fffffe8b`7dfbf960 ffff8b82`cf014cc0 : nt!MiCreateSectionCommon+0x25a
fffffe8b`7dfbf860 fffff807`4fc3a0f8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c
fffffe8b`7dfbf8d0 fffff807`4fc39c25     : 00000000`0000006c fffffe8b`7dfbfb00 ffffde86`76fafb78 ffffde86`00000000 : nt!PfSnGetSectionObject+0x250
fffffe8b`7dfbfa00 fffff807`4f825975     : ffff8b82`dc430040 ffff8b82`dc430040 ffff8b82`ce86f520 00000000`00000700 : nt!PfSnPopulateReadList+0x2b5
fffffe8b`7dfbfb70 fffff807`4f917e25     : ffff8b82`dc430040 00000000`00000080 ffff8b82`ce878040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe8b`7dfbfc10 fffff807`4f9fd0d8     : ffffa081`01a80180 ffff8b82`dc430040 fffff807`4f917dd0 00007ffe`7bae2570 : nt!PspSystemThreadStartup+0x55
fffffe8b`7dfbfc60 00000000`00000000     : fffffe8b`7dfc0000 fffffe8b`7dfba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExAcquireCacheAwarePushLockSharedEx+14f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14f

FAILURE_BUCKET_ID:  0x192_nt!ExAcquireCacheAwarePushLockSharedEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}

Followup:     MachineOwner
---------

8: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2085]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5603
BiosReleaseDate = 10/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-K
BaseBoardVersion = Rev X.0x
 
Hatalardan sadece biri dosya sistemiyle ilgili. Ayrıntılı sistem özelliklerini yazar mısın?

Belleklerin kit mi? Kaç MHz? XMP açık mı?

Kod:
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802452fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 82937

    Key  : Analysis.Init.CPU.mSec
    Value: 468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 203634

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff802452fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffffd0c1da227e0 -- (.trap 0xfffffd0c1da227e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060081 rbx=0000000000000000 rcx=ffffd601cba80180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80244864a04 rsp=fffffd0c1da22970 rbp=fffffd0c1da22a01
r8=0000000000000001  r9=00000003e6b83e98 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KeWaitForSingleObject+0x614:
fffff802`44864a04 84c0            test    al,al
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT: 
ffffd601`cbad2e18 fffff802`44a3ac52     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`452fb320 : nt!KeBugCheckEx
ffffd601`cbad2e20 fffff802`4486f9a3     : 000005ec`1b406713 ffffd601`cba80180 00000000`00000000 ffffd601`cba80180 : nt!KeAccumulateTicks+0x1c8a52
ffffd601`cbad2e80 fffff802`4486f48a     : ffff8a8b`f2acb780 fffffd0c`1da22860 ffff8a8c`00f6c100 ffffd601`cba80180 : nt!KeClockInterruptNotify+0x453
ffffd601`cbad2f30 fffff802`44927f55     : ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 ffff5cd7`5023a1b8 : nt!HalpTimerClockIpiRoutine+0x1a
ffffd601`cbad2f60 fffff802`449f76fa     : fffffd0c`1da22860 ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffd601`cbad2fb0 fffff802`449f7c67     : ffff8a8c`00f6c080 ffff77da`862ca818 00000000`00000000 ffff8a8c`00f6c180 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd0c`1da227e0 fffff802`44864a04     : ffff8a8c`000000ad fffff802`44c2b3e1 00000000`00000001 ffff8a8c`00f6c1c0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd0c`1da22970 fffff802`44c2cb01     : ffff8a8c`0105eb60 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x614
fffffd0c`1da22a60 fffff802`44c2cbaa     : ffff8a8c`00f6c080 000000a6`6685fca8 00000000`00000000 fffff802`44a07418 : nt!ObWaitForSingleObject+0x91
fffffd0c`1da22ac0 fffff802`44a075b8     : 000001fa`c64ce9e0 00000000`00000000 fffffd0c`1da22b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffd0c`1da22b00 00007fff`cf2ecc94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a6`6685fc78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`cf2ecc94


SYMBOL_NAME:  nt!KeAccumulateTicks+1c8a52

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c8a52

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80559a10d80, Address of the instruction which caused the bugcheck
Arg3: ffff9984bb628c60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3859

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 48887

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 110665

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80559a10d80

BUGCHECK_P3: ffff9984bb628c60

BUGCHECK_P4: 0

CONTEXT:  ffff9984bb628c60 -- (.cxr 0xffff9984bb628c60)
rax=0000000000000000 rbx=ffff880fa2c57a20 rcx=0000000000000002
rdx=fffffffffffffdaa rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559a10d80 rsp=ffff9984bb629660 rbp=ffff9984bb629719
r8=ffff880f9ac1cc80  r9=fffffffffffffdac r10=ffff880f9accdcb0
r11=0000000000000001 r12=ffff880fa2c57b08 r13=ffff9984bb629890
r14=ffff880f98824cf0 r15=ffff880f98824a60
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
FLTMGR!FltpPerformPreCallbacksWorker+0xb060:
fffff805`59a10d80 488b4038        mov     rax,qword ptr [rax+38h] ds:002b:00000000`00000038=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT: 
ffff9984`bb629660 fffff805`59a05b37     : ffff9984`bb629890 ffffaf01`af1c0103 ffff880f`aa948300 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0xb060
ffff9984`bb629780 fffff805`59a04b46     : ffff9984`bb62a000 ffff9984`bb624000 00000000`00000000 ffff9984`bb6298a0 : FLTMGR!FltpPassThroughInternal+0xc7
ffff9984`bb6297d0 fffff805`59a048bb     : 00000001`00000002 00000000`00000000 00000000`00000000 fffff805`5bc2b3c1 : FLTMGR!FltpPassThrough+0x1d6
ffff9984`bb629870 fffff805`5b852f55     : ffff880f`a8d6e4f0 000001ed`38e33c70 ffff9984`bb629b80 00000000`00000000 : FLTMGR!FltpDispatch+0x8b
ffff9984`bb6298d0 fffff805`5bbfd878     : ffff880f`a8d6e4f0 00000000`00000000 ffff880f`a8d6e4f0 00000000`00000000 : nt!IofCallDriver+0x55
ffff9984`bb629910 fffff805`5bbe59b9     : ffff880f`00000000 ffff9984`bb629b80 00000000`00000000 ffff9984`bb629b80 : nt!IopSynchronousServiceTail+0x1a8
ffff9984`bb6299b0 fffff805`5ba074b8     : ffff880f`00000000 00000000`00000000 00000000`00000000 000001ed`38e33c70 : nt!NtReadFile+0x599
ffff9984`bb629a90 00007ffe`8b3ec6e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000dd`585ff7e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8b3ec6e4


SYMBOL_NAME:  FLTMGR!FltpPerformPreCallbacksWorker+b060

MODULE_NAME: FLTMGR

IMAGE_NAME:  FLTMGR.SYS

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .cxr 0xffff9984bb628c60 ; kb

BUCKET_ID_FUNC_OFFSET:  b060

FAILURE_BUCKET_ID:  0x3B_c0000005_FLTMGR!FltpPerformPreCallbacksWorker

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8c1dd5a6-b42f-d6ff-4bb6-2f415b42874f}

Followup:     MachineOwner
---------

9: kd> lmvm FLTMGR
Browse full module list
start             end                 module name
fffff805`59a00000 fffff805`59a6f000   FLTMGR     (pdb symbols)          C:\ProgramData\Dbg\sym\fltMgr.pdb\C3CA0BC721B145FE4F45FF7F65B7C5AD1\fltMgr.pdb
    Loaded symbol image file: FLTMGR.SYS
    Mapped memory image file: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS
    Image path: \SystemRoot\System32\drivers\FLTMGR.SYS
    Image name: FLTMGR.SYS
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        02839B66 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00072E12
    ImageSize:        0006F000
    File version:     10.0.19041.264
    Product version:  10.0.19041.264
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     fltMgr.sys
        OriginalFilename: fltMgr.sys
        ProductVersion:   10.0.19041.264
        FileVersion:      10.0.19041.264 (WinBuild.160101.0800)
        FileDescription:  Microsoft Filesystem Filter Manager
        LegalCopyright:   © Microsoft Corporation. All rights reserved.

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80651b5a266, Address of the instruction which caused the bugcheck
Arg3: ffff8381e70d9920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 75966

    Key  : Analysis.Init.CPU.mSec
    Value: 531

    Key  : Analysis.Init.Elapsed.mSec
    Value: 206635

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80651b5a266

BUGCHECK_P3: ffff8381e70d9920

BUGCHECK_P4: 0

CONTEXT:  ffff8381e70d9920 -- (.cxr 0xffff8381e70d9920)
rax=ffffd786e9c175e8 rbx=ffffd786e75c7080 rcx=d786e9c175b00000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffd786e9c175e0
rip=fffff80651b5a266 rsp=fffffe0a03b10940 rbp=fffffe0a03b10a01
r8=0000000000000000  r9=00000029f85d7fee r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=d786e9c175b00000
r14=0000000000000000 r15=ffffd786e75c71c0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!KeAbPreWait+0x6:
fffff806`51b5a266 0fb64120        movzx   eax,byte ptr [rcx+20h] ds:002b:d786e9c1`75b00020=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

STACK_TEXT: 
fffffe0a`03b10940 fffff806`51c34951     : 00000000`00000000 fffff806`51e2b3e1 00000000`00000000 00000000`00000000 : nt!KeAbPreWait+0x6
fffffe0a`03b10970 fffff806`51e2cb01     : ffffd786`e9c175e0 00000000`00000006 ffffd786`00000001 00000000`00000200 : nt!KeWaitForSingleObject+0x1d0561
fffffe0a`03b10a60 fffff806`51e2cbaa     : ffffd786`e75c7080 00000060`a0dff288 00000000`00000000 00000199`a419ab10 : nt!ObWaitForSingleObject+0x91
fffffe0a`03b10ac0 fffff806`51c075b8     : 00000000`00000000 ffffd786`e751c080 fffffe0a`03b10b18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
fffffe0a`03b10b00 00007ff8`836ccc94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`a0dff258 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`836ccc94


SYMBOL_NAME:  nt!KeAbPreWait+6

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .cxr 0xffff8381e70d9920 ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KeAbPreWait

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9ca4a719-6b4f-fb47-f634-e80e5eda3be8}

Followup:     MachineOwner
---------


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3218

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 68635

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 201199

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff802526fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000

PROCESS_NAME:  System

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffffa78aaa48b670 -- (.trap 0xffffa78aaa48b670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffd501c71c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffa78aaa48b800 rbp=ffffa78aaa48b8a9
r8=ffffbf0b7d9efbd0  r9=ffffbf0b7d9efbd0 r10=fffff80252631dc0
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

FAILED_INSTRUCTION_ADDRESS:
+0
STACK_TEXT: 
ffffa78a`aa48b528 fffff802`51e07b69     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffa78a`aa48b530 fffff802`51e03e69     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffa78a`aa48b670 00000000`00000000     : ffffbf0b`78d3ee68 ffffa78a`aa48bb10 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup:     MachineOwner
---------


KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffa48785932080, The address of the thread.
Arg2: fffff303c4b29a20, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 17517

    Key  : Analysis.Init.CPU.mSec
    Value: 671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 108054

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  192

BUGCHECK_P1: ffffa48785932080

BUGCHECK_P2: fffff303c4b29a20

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA Share.exe

STACK_TEXT: 
ffffdf8f`3a556a18 fffff806`74a60b2b     : 00000000`00000192 ffffa487`85932080 fffff303`c4b29a20 00000000`00000000 : nt!KeBugCheckEx
ffffdf8f`3a556a20 fffff35b`86c88c05     : fffff303`c4b29a20 ffffd346`8764c43f ffffa487`00000000 ffffa487`85932080 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffdf8f`3a556a60 fffff35b`86fc6163     : 00000052`190bf4c0 ffffdf8f`3a556b80 ffffa487`85932080 00000052`190becc0 : win32kbase!tagObjLock::LockExclusive+0x35
ffffdf8f`3a556a90 fffff35b`87ba48b5     : ffffa487`85932080 ffffdf8f`3a556b80 00000200`be35bf60 00000000`00000020 : win32kfull!NtUserGetQueueStatus+0xd3
ffffdf8f`3a556ad0 fffff806`74c074b8     : 00000200`be39b7a0 00000000`00000000 ffffdf8f`3a556b80 ffffa487`00000000 : win32k!NtUserGetQueueStatus+0x15
ffffdf8f`3a556b00 00007ffa`3aa69684     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`190bf488 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3aa69684


SYMBOL_NAME:  win32kbase!tagObjLock::LockExclusive+35

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1136

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  35

FAILURE_BUCKET_ID:  0x192_win32kbase!tagObjLock::LockExclusive

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1e430623-dc7a-ea23-8d90-2dc51253b6d1}

Followup:     MachineOwner
---------




KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff8b82dc430040, The address of the thread.
Arg2: ffff8b82d0fe3270, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2733

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11579

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 105544

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  192

BUGCHECK_P1: ffff8b82dc430040

BUGCHECK_P2: ffff8b82d0fe3270

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  sppsvc.exe

STACK_TEXT:
fffffe8b`7dfbf178 fffff807`4f86058f     : 00000000`00000192 ffff8b82`dc430040 ffff8b82`d0fe3270 00000000`00000000 : nt!KeBugCheckEx
fffffe8b`7dfbf180 fffff807`4c1a61cd     : ffff8b82`de9905e0 00000000`00000001 ffff8b82`00000000 00000000`00000000 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14f
fffffe8b`7dfbf1c0 fffff807`4c1a2801     : 00000000`00000000 00000000`000000ff fffffe8b`7dfbf400 fffffe8b`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4ad
fffffe8b`7dfbf2e0 fffff807`4f882147     : fffffe8b`7dfc0000 00000000`00000000 fffffe8b`7dfba000 fffff807`4fdc5a90 : FLTMGR!FltpPreFsFilterOperation+0x181
fffffe8b`7dfbf390 fffff807`4fc30fc1     : fffff807`4c1a8a20 00000000`00000000 00000000`00000001 fffff807`4c1a2680 : nt!FsFilterPerformCallbacks+0xe7
fffffe8b`7dfbf400 fffff807`4fc30cb7     : 00000000`00000000 ffff8b82`d67e5010 00000000`000ac000 80000002`000800a0 : nt!FsRtlAcquireFileExclusiveCommon+0x121
fffffe8b`7dfbf6f0 fffff807`4f881919     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlAcquireFileExclusive+0x17
fffffe8b`7dfbf730 fffff807`4fc2fe2a     : ffff8b82`d5021e70 00000000`11000000 ffffde86`754a42d0 00000000`00000002 : nt!CcZeroEndOfLastPage+0x45
fffffe8b`7dfbf780 fffff807`4fc2fbbc     : fffffe8b`7dfbf910 fffff807`00000005 fffffe8b`7dfbf960 ffff8b82`cf014cc0 : nt!MiCreateSectionCommon+0x25a
fffffe8b`7dfbf860 fffff807`4fc3a0f8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c
fffffe8b`7dfbf8d0 fffff807`4fc39c25     : 00000000`0000006c fffffe8b`7dfbfb00 ffffde86`76fafb78 ffffde86`00000000 : nt!PfSnGetSectionObject+0x250
fffffe8b`7dfbfa00 fffff807`4f825975     : ffff8b82`dc430040 ffff8b82`dc430040 ffff8b82`ce86f520 00000000`00000700 : nt!PfSnPopulateReadList+0x2b5
fffffe8b`7dfbfb70 fffff807`4f917e25     : ffff8b82`dc430040 00000000`00000080 ffff8b82`ce878040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe8b`7dfbfc10 fffff807`4f9fd0d8     : ffffa081`01a80180 ffff8b82`dc430040 fffff807`4f917dd0 00007ffe`7bae2570 : nt!PspSystemThreadStartup+0x55
fffffe8b`7dfbfc60 00000000`00000000     : fffffe8b`7dfc0000 fffffe8b`7dfba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExAcquireCacheAwarePushLockSharedEx+14f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14f

FAILURE_BUCKET_ID:  0x192_nt!ExAcquireCacheAwarePushLockSharedEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}

Followup:     MachineOwner
---------

8: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2085]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5603
BiosReleaseDate = 10/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-K
BaseBoardVersion = Rev X.0x
Belleklerim kit ve 3200MHz. XMP açık. Memtest86 sonuçlarım da aşağıdaki gibi.
 

Dosya Ekleri

  • memtest2.jpg
    memtest2.jpg
    74,7 KB · Görüntüleme: 17
  • memtest 1.jpg
    memtest 1.jpg
    96,6 KB · Görüntüleme: 23
@Recep Baltaş dediğinizi yaptım fakat bellekler 3200MHz yerine 2133MHz ile çalışıyor. Elimle 3200MHz yapsam sorun olur mu? Çünkü bu şekilde 100FPS'e kadar performans kaybı yaşıyorum.
XMP kapatın bir süre. BIOS güncellemelerini de takip edin.
Normalde şu ana kadar mavi ekran verirdi bilgisayar. Sanırım sorun XMP ayarıyla alakalı. Yukarıda dediğimi yapsam sorun olur mu?
 
Son düzenleme:
Depolama aygıtınız nedir?

Kod:
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2085]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5603
BiosReleaseDate = 10/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-K
BaseBoardVersion = Rev X.0x

Kod:
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff8014c39cc60, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9263

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6770

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1

    Key  : Bugcheck.Code.Register
    Value: 0x1

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  032521-37500-01.dmp

BUGCHECK_CODE:  1

BUGCHECK_P1: fffff8014c39cc60

BUGCHECK_P2: 0

BUGCHECK_P3: ffff

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff181`e6637b68 fffff801`4881c70f     : 00000000`00000001 fffff801`4c39cc60 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff181`e6637b70 fffff801`48717e85     : ffffe10e`7b9a5080 00000000`00000080 ffffe10e`7b876040 00000000`00000000 : nt!ExpWorkerThread+0x1f6e9f
fffff181`e6637c10 fffff801`487fd2a8     : ffff9701`e22a1180 ffffe10e`7b9a5080 fffff801`48717e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff181`e6637c60 00000000`00000000     : fffff181`e6638000 fffff181`e6632000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  Ntfs!NtfsFlushLsnStreamsWorker+0

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.870

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  0

FAILURE_BUCKET_ID:  0x1_SysCallNum_0_Ntfs!NtfsFlushLsnStreamsWorker

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e296b7e4-981e-2d0b-7f1b-d108f490c7fb}

Followup:     MachineOwner
---------
 

Geri
Yukarı