Tuna0zkan
Hectopat
- Katılım
- 26 Temmuz 2020
- Mesajlar
- 112
Daha fazla
- Cinsiyet
- Erkek
Minidump: minidump 2
Birilerinin bu konuya pek bakıcağını sanmam özellikle mavi ekran hatası başlığının altında bir konu açmanız daha iyi olabilir.Minidump: minidump 2
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802452fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 82937
Key : Analysis.Init.CPU.mSec
Value: 468
Key : Analysis.Init.Elapsed.mSec
Value: 203634
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff802452fb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffffd0c1da227e0 -- (.trap 0xfffffd0c1da227e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000060081 rbx=0000000000000000 rcx=ffffd601cba80180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80244864a04 rsp=fffffd0c1da22970 rbp=fffffd0c1da22a01
r8=0000000000000001 r9=00000003e6b83e98 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KeWaitForSingleObject+0x614:
fffff802`44864a04 84c0 test al,al
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
STACK_TEXT:
ffffd601`cbad2e18 fffff802`44a3ac52 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`452fb320 : nt!KeBugCheckEx
ffffd601`cbad2e20 fffff802`4486f9a3 : 000005ec`1b406713 ffffd601`cba80180 00000000`00000000 ffffd601`cba80180 : nt!KeAccumulateTicks+0x1c8a52
ffffd601`cbad2e80 fffff802`4486f48a : ffff8a8b`f2acb780 fffffd0c`1da22860 ffff8a8c`00f6c100 ffffd601`cba80180 : nt!KeClockInterruptNotify+0x453
ffffd601`cbad2f30 fffff802`44927f55 : ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 ffff5cd7`5023a1b8 : nt!HalpTimerClockIpiRoutine+0x1a
ffffd601`cbad2f60 fffff802`449f76fa : fffffd0c`1da22860 ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffd601`cbad2fb0 fffff802`449f7c67 : ffff8a8c`00f6c080 ffff77da`862ca818 00000000`00000000 ffff8a8c`00f6c180 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd0c`1da227e0 fffff802`44864a04 : ffff8a8c`000000ad fffff802`44c2b3e1 00000000`00000001 ffff8a8c`00f6c1c0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd0c`1da22970 fffff802`44c2cb01 : ffff8a8c`0105eb60 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x614
fffffd0c`1da22a60 fffff802`44c2cbaa : ffff8a8c`00f6c080 000000a6`6685fca8 00000000`00000000 fffff802`44a07418 : nt!ObWaitForSingleObject+0x91
fffffd0c`1da22ac0 fffff802`44a075b8 : 000001fa`c64ce9e0 00000000`00000000 fffffd0c`1da22b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffd0c`1da22b00 00007fff`cf2ecc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a6`6685fc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`cf2ecc94
SYMBOL_NAME: nt!KeAccumulateTicks+1c8a52
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c8a52
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80559a10d80, Address of the instruction which caused the bugcheck
Arg3: ffff9984bb628c60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3859
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 48887
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 110665
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80559a10d80
BUGCHECK_P3: ffff9984bb628c60
BUGCHECK_P4: 0
CONTEXT: ffff9984bb628c60 -- (.cxr 0xffff9984bb628c60)
rax=0000000000000000 rbx=ffff880fa2c57a20 rcx=0000000000000002
rdx=fffffffffffffdaa rsi=0000000000000000 rdi=0000000000000000
rip=fffff80559a10d80 rsp=ffff9984bb629660 rbp=ffff9984bb629719
r8=ffff880f9ac1cc80 r9=fffffffffffffdac r10=ffff880f9accdcb0
r11=0000000000000001 r12=ffff880fa2c57b08 r13=ffff9984bb629890
r14=ffff880f98824cf0 r15=ffff880f98824a60
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
FLTMGR!FltpPerformPreCallbacksWorker+0xb060:
fffff805`59a10d80 488b4038 mov rax,qword ptr [rax+38h] ds:002b:00000000`00000038=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffff9984`bb629660 fffff805`59a05b37 : ffff9984`bb629890 ffffaf01`af1c0103 ffff880f`aa948300 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0xb060
ffff9984`bb629780 fffff805`59a04b46 : ffff9984`bb62a000 ffff9984`bb624000 00000000`00000000 ffff9984`bb6298a0 : FLTMGR!FltpPassThroughInternal+0xc7
ffff9984`bb6297d0 fffff805`59a048bb : 00000001`00000002 00000000`00000000 00000000`00000000 fffff805`5bc2b3c1 : FLTMGR!FltpPassThrough+0x1d6
ffff9984`bb629870 fffff805`5b852f55 : ffff880f`a8d6e4f0 000001ed`38e33c70 ffff9984`bb629b80 00000000`00000000 : FLTMGR!FltpDispatch+0x8b
ffff9984`bb6298d0 fffff805`5bbfd878 : ffff880f`a8d6e4f0 00000000`00000000 ffff880f`a8d6e4f0 00000000`00000000 : nt!IofCallDriver+0x55
ffff9984`bb629910 fffff805`5bbe59b9 : ffff880f`00000000 ffff9984`bb629b80 00000000`00000000 ffff9984`bb629b80 : nt!IopSynchronousServiceTail+0x1a8
ffff9984`bb6299b0 fffff805`5ba074b8 : ffff880f`00000000 00000000`00000000 00000000`00000000 000001ed`38e33c70 : nt!NtReadFile+0x599
ffff9984`bb629a90 00007ffe`8b3ec6e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000dd`585ff7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8b3ec6e4
SYMBOL_NAME: FLTMGR!FltpPerformPreCallbacksWorker+b060
MODULE_NAME: FLTMGR
IMAGE_NAME: FLTMGR.SYS
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr 0xffff9984bb628c60 ; kb
BUCKET_ID_FUNC_OFFSET: b060
FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpPerformPreCallbacksWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8c1dd5a6-b42f-d6ff-4bb6-2f415b42874f}
Followup: MachineOwner
---------
9: kd> lmvm FLTMGR
Browse full module list
start end module name
fffff805`59a00000 fffff805`59a6f000 FLTMGR (pdb symbols) C:\ProgramData\Dbg\sym\fltMgr.pdb\C3CA0BC721B145FE4F45FF7F65B7C5AD1\fltMgr.pdb
Loaded symbol image file: FLTMGR.SYS
Mapped memory image file: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS
Image path: \SystemRoot\System32\drivers\FLTMGR.SYS
Image name: FLTMGR.SYS
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 02839B66 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00072E12
ImageSize: 0006F000
File version: 10.0.19041.264
Product version: 10.0.19041.264
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: fltMgr.sys
OriginalFilename: fltMgr.sys
ProductVersion: 10.0.19041.264
FileVersion: 10.0.19041.264 (WinBuild.160101.0800)
FileDescription: Microsoft Filesystem Filter Manager
LegalCopyright: © Microsoft Corporation. All rights reserved.
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80651b5a266, Address of the instruction which caused the bugcheck
Arg3: ffff8381e70d9920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 75966
Key : Analysis.Init.CPU.mSec
Value: 531
Key : Analysis.Init.Elapsed.mSec
Value: 206635
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80651b5a266
BUGCHECK_P3: ffff8381e70d9920
BUGCHECK_P4: 0
CONTEXT: ffff8381e70d9920 -- (.cxr 0xffff8381e70d9920)
rax=ffffd786e9c175e8 rbx=ffffd786e75c7080 rcx=d786e9c175b00000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffd786e9c175e0
rip=fffff80651b5a266 rsp=fffffe0a03b10940 rbp=fffffe0a03b10a01
r8=0000000000000000 r9=00000029f85d7fee r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=d786e9c175b00000
r14=0000000000000000 r15=ffffd786e75c71c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff806`51b5a266 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:d786e9c1`75b00020=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
STACK_TEXT:
fffffe0a`03b10940 fffff806`51c34951 : 00000000`00000000 fffff806`51e2b3e1 00000000`00000000 00000000`00000000 : nt!KeAbPreWait+0x6
fffffe0a`03b10970 fffff806`51e2cb01 : ffffd786`e9c175e0 00000000`00000006 ffffd786`00000001 00000000`00000200 : nt!KeWaitForSingleObject+0x1d0561
fffffe0a`03b10a60 fffff806`51e2cbaa : ffffd786`e75c7080 00000060`a0dff288 00000000`00000000 00000199`a419ab10 : nt!ObWaitForSingleObject+0x91
fffffe0a`03b10ac0 fffff806`51c075b8 : 00000000`00000000 ffffd786`e751c080 fffffe0a`03b10b18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
fffffe0a`03b10b00 00007ff8`836ccc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`a0dff258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`836ccc94
SYMBOL_NAME: nt!KeAbPreWait+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .cxr 0xffff8381e70d9920 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KeAbPreWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9ca4a719-6b4f-fb47-f634-e80e5eda3be8}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3218
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 68635
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 201199
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 0
READ_ADDRESS: fffff802526fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
PROCESS_NAME: System
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffffa78aaa48b670 -- (.trap 0xffffa78aaa48b670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffd501c71c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffffa78aaa48b800 rbp=ffffa78aaa48b8a9
r8=ffffbf0b7d9efbd0 r9=ffffbf0b7d9efbd0 r10=fffff80252631dc0
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
FAILED_INSTRUCTION_ADDRESS:
+0
STACK_TEXT:
ffffa78a`aa48b528 fffff802`51e07b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffa78a`aa48b530 fffff802`51e03e69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffa78a`aa48b670 00000000`00000000 : ffffbf0b`78d3ee68 ffffa78a`aa48bb10 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.867
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
Followup: MachineOwner
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffa48785932080, The address of the thread.
Arg2: fffff303c4b29a20, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17517
Key : Analysis.Init.CPU.mSec
Value: 671
Key : Analysis.Init.Elapsed.mSec
Value: 108054
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffffa48785932080
BUGCHECK_P2: fffff303c4b29a20
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
STACK_TEXT:
ffffdf8f`3a556a18 fffff806`74a60b2b : 00000000`00000192 ffffa487`85932080 fffff303`c4b29a20 00000000`00000000 : nt!KeBugCheckEx
ffffdf8f`3a556a20 fffff35b`86c88c05 : fffff303`c4b29a20 ffffd346`8764c43f ffffa487`00000000 ffffa487`85932080 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffdf8f`3a556a60 fffff35b`86fc6163 : 00000052`190bf4c0 ffffdf8f`3a556b80 ffffa487`85932080 00000052`190becc0 : win32kbase!tagObjLock::LockExclusive+0x35
ffffdf8f`3a556a90 fffff35b`87ba48b5 : ffffa487`85932080 ffffdf8f`3a556b80 00000200`be35bf60 00000000`00000020 : win32kfull!NtUserGetQueueStatus+0xd3
ffffdf8f`3a556ad0 fffff806`74c074b8 : 00000200`be39b7a0 00000000`00000000 ffffdf8f`3a556b80 ffffa487`00000000 : win32k!NtUserGetQueueStatus+0x15
ffffdf8f`3a556b00 00007ffa`3aa69684 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`190bf488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3aa69684
SYMBOL_NAME: win32kbase!tagObjLock::LockExclusive+35
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1136
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 35
FAILURE_BUCKET_ID: 0x192_win32kbase!tagObjLock::LockExclusive
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1e430623-dc7a-ea23-8d90-2dc51253b6d1}
Followup: MachineOwner
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff8b82dc430040, The address of the thread.
Arg2: ffff8b82d0fe3270, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2733
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11579
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 105544
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffff8b82dc430040
BUGCHECK_P2: ffff8b82d0fe3270
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: sppsvc.exe
STACK_TEXT:
fffffe8b`7dfbf178 fffff807`4f86058f : 00000000`00000192 ffff8b82`dc430040 ffff8b82`d0fe3270 00000000`00000000 : nt!KeBugCheckEx
fffffe8b`7dfbf180 fffff807`4c1a61cd : ffff8b82`de9905e0 00000000`00000001 ffff8b82`00000000 00000000`00000000 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14f
fffffe8b`7dfbf1c0 fffff807`4c1a2801 : 00000000`00000000 00000000`000000ff fffffe8b`7dfbf400 fffffe8b`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4ad
fffffe8b`7dfbf2e0 fffff807`4f882147 : fffffe8b`7dfc0000 00000000`00000000 fffffe8b`7dfba000 fffff807`4fdc5a90 : FLTMGR!FltpPreFsFilterOperation+0x181
fffffe8b`7dfbf390 fffff807`4fc30fc1 : fffff807`4c1a8a20 00000000`00000000 00000000`00000001 fffff807`4c1a2680 : nt!FsFilterPerformCallbacks+0xe7
fffffe8b`7dfbf400 fffff807`4fc30cb7 : 00000000`00000000 ffff8b82`d67e5010 00000000`000ac000 80000002`000800a0 : nt!FsRtlAcquireFileExclusiveCommon+0x121
fffffe8b`7dfbf6f0 fffff807`4f881919 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlAcquireFileExclusive+0x17
fffffe8b`7dfbf730 fffff807`4fc2fe2a : ffff8b82`d5021e70 00000000`11000000 ffffde86`754a42d0 00000000`00000002 : nt!CcZeroEndOfLastPage+0x45
fffffe8b`7dfbf780 fffff807`4fc2fbbc : fffffe8b`7dfbf910 fffff807`00000005 fffffe8b`7dfbf960 ffff8b82`cf014cc0 : nt!MiCreateSectionCommon+0x25a
fffffe8b`7dfbf860 fffff807`4fc3a0f8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c
fffffe8b`7dfbf8d0 fffff807`4fc39c25 : 00000000`0000006c fffffe8b`7dfbfb00 ffffde86`76fafb78 ffffde86`00000000 : nt!PfSnGetSectionObject+0x250
fffffe8b`7dfbfa00 fffff807`4f825975 : ffff8b82`dc430040 ffff8b82`dc430040 ffff8b82`ce86f520 00000000`00000700 : nt!PfSnPopulateReadList+0x2b5
fffffe8b`7dfbfb70 fffff807`4f917e25 : ffff8b82`dc430040 00000000`00000080 ffff8b82`ce878040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe8b`7dfbfc10 fffff807`4f9fd0d8 : ffffa081`01a80180 ffff8b82`dc430040 fffff807`4f917dd0 00007ffe`7bae2570 : nt!PspSystemThreadStartup+0x55
fffffe8b`7dfbfc60 00000000`00000000 : fffffe8b`7dfc0000 fffffe8b`7dfba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14f
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.804
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14f
FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}
Followup: MachineOwner
---------
8: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2085]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5603
BiosReleaseDate = 10/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-K
BaseBoardVersion = Rev X.0x
Belleklerim kit ve 3200MHz. XMP açık. Memtest86 sonuçlarım da aşağıdaki gibi.Hatalardan sadece biri dosya sistemiyle ilgili. Ayrıntılı sistem özelliklerini yazar mısın?
Belleklerin kit mi? Kaç MHz? XMP açık mı?
Kod:DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff802452fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3499 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 82937 Key : Analysis.Init.CPU.mSec Value: 468 Key : Analysis.Init.Elapsed.mSec Value: 203634 Key : Analysis.Memory.CommitPeak.Mb Value: 73 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff802452fb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffffd0c1da227e0 -- (.trap 0xfffffd0c1da227e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000060081 rbx=0000000000000000 rcx=ffffd601cba80180 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80244864a04 rsp=fffffd0c1da22970 rbp=fffffd0c1da22a01 r8=0000000000000001 r9=00000003e6b83e98 r10=0000000000000000 r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KeWaitForSingleObject+0x614: fffff802`44864a04 84c0 test al,al Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: EpicGamesLauncher.exe STACK_TEXT: ffffd601`cbad2e18 fffff802`44a3ac52 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`452fb320 : nt!KeBugCheckEx ffffd601`cbad2e20 fffff802`4486f9a3 : 000005ec`1b406713 ffffd601`cba80180 00000000`00000000 ffffd601`cba80180 : nt!KeAccumulateTicks+0x1c8a52 ffffd601`cbad2e80 fffff802`4486f48a : ffff8a8b`f2acb780 fffffd0c`1da22860 ffff8a8c`00f6c100 ffffd601`cba80180 : nt!KeClockInterruptNotify+0x453 ffffd601`cbad2f30 fffff802`44927f55 : ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 ffff5cd7`5023a1b8 : nt!HalpTimerClockIpiRoutine+0x1a ffffd601`cbad2f60 fffff802`449f76fa : fffffd0c`1da22860 ffff8a8b`f2acb780 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5 ffffd601`cbad2fb0 fffff802`449f7c67 : ffff8a8c`00f6c080 ffff77da`862ca818 00000000`00000000 ffff8a8c`00f6c180 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa fffffd0c`1da227e0 fffff802`44864a04 : ffff8a8c`000000ad fffff802`44c2b3e1 00000000`00000001 ffff8a8c`00f6c1c0 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffffd0c`1da22970 fffff802`44c2cb01 : ffff8a8c`0105eb60 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x614 fffffd0c`1da22a60 fffff802`44c2cbaa : ffff8a8c`00f6c080 000000a6`6685fca8 00000000`00000000 fffff802`44a07418 : nt!ObWaitForSingleObject+0x91 fffffd0c`1da22ac0 fffff802`44a075b8 : 000001fa`c64ce9e0 00000000`00000000 fffffd0c`1da22b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a fffffd0c`1da22b00 00007fff`cf2ecc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000a6`6685fc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`cf2ecc94 SYMBOL_NAME: nt!KeAccumulateTicks+1c8a52 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.867 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1c8a52 FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80559a10d80, Address of the instruction which caused the bugcheck Arg3: ffff9984bb628c60, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3859 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 48887 Key : Analysis.Init.CPU.mSec Value: 483 Key : Analysis.Init.Elapsed.mSec Value: 110665 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80559a10d80 BUGCHECK_P3: ffff9984bb628c60 BUGCHECK_P4: 0 CONTEXT: ffff9984bb628c60 -- (.cxr 0xffff9984bb628c60) rax=0000000000000000 rbx=ffff880fa2c57a20 rcx=0000000000000002 rdx=fffffffffffffdaa rsi=0000000000000000 rdi=0000000000000000 rip=fffff80559a10d80 rsp=ffff9984bb629660 rbp=ffff9984bb629719 r8=ffff880f9ac1cc80 r9=fffffffffffffdac r10=ffff880f9accdcb0 r11=0000000000000001 r12=ffff880fa2c57b08 r13=ffff9984bb629890 r14=ffff880f98824cf0 r15=ffff880f98824a60 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286 FLTMGR!FltpPerformPreCallbacksWorker+0xb060: fffff805`59a10d80 488b4038 mov rax,qword ptr [rax+38h] ds:002b:00000000`00000038=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe STACK_TEXT: ffff9984`bb629660 fffff805`59a05b37 : ffff9984`bb629890 ffffaf01`af1c0103 ffff880f`aa948300 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0xb060 ffff9984`bb629780 fffff805`59a04b46 : ffff9984`bb62a000 ffff9984`bb624000 00000000`00000000 ffff9984`bb6298a0 : FLTMGR!FltpPassThroughInternal+0xc7 ffff9984`bb6297d0 fffff805`59a048bb : 00000001`00000002 00000000`00000000 00000000`00000000 fffff805`5bc2b3c1 : FLTMGR!FltpPassThrough+0x1d6 ffff9984`bb629870 fffff805`5b852f55 : ffff880f`a8d6e4f0 000001ed`38e33c70 ffff9984`bb629b80 00000000`00000000 : FLTMGR!FltpDispatch+0x8b ffff9984`bb6298d0 fffff805`5bbfd878 : ffff880f`a8d6e4f0 00000000`00000000 ffff880f`a8d6e4f0 00000000`00000000 : nt!IofCallDriver+0x55 ffff9984`bb629910 fffff805`5bbe59b9 : ffff880f`00000000 ffff9984`bb629b80 00000000`00000000 ffff9984`bb629b80 : nt!IopSynchronousServiceTail+0x1a8 ffff9984`bb6299b0 fffff805`5ba074b8 : ffff880f`00000000 00000000`00000000 00000000`00000000 000001ed`38e33c70 : nt!NtReadFile+0x599 ffff9984`bb629a90 00007ffe`8b3ec6e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 000000dd`585ff7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8b3ec6e4 SYMBOL_NAME: FLTMGR!FltpPerformPreCallbacksWorker+b060 MODULE_NAME: FLTMGR IMAGE_NAME: FLTMGR.SYS IMAGE_VERSION: 10.0.19041.264 STACK_COMMAND: .cxr 0xffff9984bb628c60 ; kb BUCKET_ID_FUNC_OFFSET: b060 FAILURE_BUCKET_ID: 0x3B_c0000005_FLTMGR!FltpPerformPreCallbacksWorker OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8c1dd5a6-b42f-d6ff-4bb6-2f415b42874f} Followup: MachineOwner --------- 9: kd> lmvm FLTMGR Browse full module list start end module name fffff805`59a00000 fffff805`59a6f000 FLTMGR (pdb symbols) C:\ProgramData\Dbg\sym\fltMgr.pdb\C3CA0BC721B145FE4F45FF7F65B7C5AD1\fltMgr.pdb Loaded symbol image file: FLTMGR.SYS Mapped memory image file: C:\ProgramData\Dbg\sym\FLTMGR.SYS\02839B666f000\FLTMGR.SYS Image path: \SystemRoot\System32\drivers\FLTMGR.SYS Image name: FLTMGR.SYS Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 02839B66 (This is a reproducible build file hash, not a timestamp) CheckSum: 00072E12 ImageSize: 0006F000 File version: 10.0.19041.264 Product version: 10.0.19041.264 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 3.7 Driver File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: fltMgr.sys OriginalFilename: fltMgr.sys ProductVersion: 10.0.19041.264 FileVersion: 10.0.19041.264 (WinBuild.160101.0800) FileDescription: Microsoft Filesystem Filter Manager LegalCopyright: © Microsoft Corporation. All rights reserved. SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80651b5a266, Address of the instruction which caused the bugcheck Arg3: ffff8381e70d9920, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2530 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 75966 Key : Analysis.Init.CPU.mSec Value: 531 Key : Analysis.Init.Elapsed.mSec Value: 206635 Key : Analysis.Memory.CommitPeak.Mb Value: 73 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80651b5a266 BUGCHECK_P3: ffff8381e70d9920 BUGCHECK_P4: 0 CONTEXT: ffff8381e70d9920 -- (.cxr 0xffff8381e70d9920) rax=ffffd786e9c175e8 rbx=ffffd786e75c7080 rcx=d786e9c175b00000 rdx=0000000000000000 rsi=0000000000000000 rdi=ffffd786e9c175e0 rip=fffff80651b5a266 rsp=fffffe0a03b10940 rbp=fffffe0a03b10a01 r8=0000000000000000 r9=00000029f85d7fee r10=0000000000000002 r11=fffff780000003b0 r12=0000000000000000 r13=d786e9c175b00000 r14=0000000000000000 r15=ffffd786e75c71c0 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282 nt!KeAbPreWait+0x6: fffff806`51b5a266 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:d786e9c1`75b00020=?? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: nvcontainer.exe STACK_TEXT: fffffe0a`03b10940 fffff806`51c34951 : 00000000`00000000 fffff806`51e2b3e1 00000000`00000000 00000000`00000000 : nt!KeAbPreWait+0x6 fffffe0a`03b10970 fffff806`51e2cb01 : ffffd786`e9c175e0 00000000`00000006 ffffd786`00000001 00000000`00000200 : nt!KeWaitForSingleObject+0x1d0561 fffffe0a`03b10a60 fffff806`51e2cbaa : ffffd786`e75c7080 00000060`a0dff288 00000000`00000000 00000199`a419ab10 : nt!ObWaitForSingleObject+0x91 fffffe0a`03b10ac0 fffff806`51c075b8 : 00000000`00000000 ffffd786`e751c080 fffffe0a`03b10b18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a fffffe0a`03b10b00 00007ff8`836ccc94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000060`a0dff258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`836ccc94 SYMBOL_NAME: nt!KeAbPreWait+6 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.867 STACK_COMMAND: .cxr 0xffff8381e70d9920 ; kb BUCKET_ID_FUNC_OFFSET: 6 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!KeAbPreWait OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {9ca4a719-6b4f-fb47-f634-e80e5eda3be8} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3218 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 68635 Key : Analysis.Init.CPU.mSec Value: 609 Key : Analysis.Init.Elapsed.mSec Value: 201199 Key : Analysis.Memory.CommitPeak.Mb Value: 81 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: d1 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 8 BUGCHECK_P4: 0 READ_ADDRESS: fffff802526fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000 PROCESS_NAME: System BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 TRAP_FRAME: ffffa78aaa48b670 -- (.trap 0xffffa78aaa48b670) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=ffffd501c71c0180 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=ffffa78aaa48b800 rbp=ffffa78aaa48b8a9 r8=ffffbf0b7d9efbd0 r9=ffffbf0b7d9efbd0 r10=fffff80252631dc0 r11=0000000000000001 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc 00000000`00000000 ?? ??? Resetting default scope IP_IN_FREE_BLOCK: 0 FAILED_INSTRUCTION_ADDRESS: +0 STACK_TEXT: ffffa78a`aa48b528 fffff802`51e07b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx ffffa78a`aa48b530 fffff802`51e03e69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69 ffffa78a`aa48b670 00000000`00000000 : ffffbf0b`78d3ee68 ffffa78a`aa48bb10 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469 SYMBOL_NAME: nt!KiPageFault+469 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.867 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 469 FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692} Followup: MachineOwner --------- KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192) A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or above. Arguments: Arg1: ffffa48785932080, The address of the thread. Arg2: fffff303c4b29a20, The lock address. Arg3: 0000000000000000, The IRQL at which the lock was acquired. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3530 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 17517 Key : Analysis.Init.CPU.mSec Value: 671 Key : Analysis.Init.Elapsed.mSec Value: 108054 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 192 BUGCHECK_P1: ffffa48785932080 BUGCHECK_P2: fffff303c4b29a20 BUGCHECK_P3: 0 BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: NVIDIA Share.exe STACK_TEXT: ffffdf8f`3a556a18 fffff806`74a60b2b : 00000000`00000192 ffffa487`85932080 fffff303`c4b29a20 00000000`00000000 : nt!KeBugCheckEx ffffdf8f`3a556a20 fffff35b`86c88c05 : fffff303`c4b29a20 ffffd346`8764c43f ffffa487`00000000 ffffa487`85932080 : nt!ExAcquirePushLockExclusiveEx+0x14b ffffdf8f`3a556a60 fffff35b`86fc6163 : 00000052`190bf4c0 ffffdf8f`3a556b80 ffffa487`85932080 00000052`190becc0 : win32kbase!tagObjLock::LockExclusive+0x35 ffffdf8f`3a556a90 fffff35b`87ba48b5 : ffffa487`85932080 ffffdf8f`3a556b80 00000200`be35bf60 00000000`00000020 : win32kfull!NtUserGetQueueStatus+0xd3 ffffdf8f`3a556ad0 fffff806`74c074b8 : 00000200`be39b7a0 00000000`00000000 ffffdf8f`3a556b80 ffffa487`00000000 : win32k!NtUserGetQueueStatus+0x15 ffffdf8f`3a556b00 00007ffa`3aa69684 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000052`190bf488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`3aa69684 SYMBOL_NAME: win32kbase!tagObjLock::LockExclusive+35 MODULE_NAME: win32kbase IMAGE_NAME: win32kbase.sys IMAGE_VERSION: 10.0.19041.1136 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 35 FAILURE_BUCKET_ID: 0x192_win32kbase!tagObjLock::LockExclusive OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {1e430623-dc7a-ea23-8d90-2dc51253b6d1} Followup: MachineOwner --------- KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192) A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or above. Arguments: Arg1: ffff8b82dc430040, The address of the thread. Arg2: ffff8b82d0fe3270, The lock address. Arg3: 0000000000000000, The IRQL at which the lock was acquired. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2733 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 11579 Key : Analysis.Init.CPU.mSec Value: 546 Key : Analysis.Init.Elapsed.mSec Value: 105544 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 192 BUGCHECK_P1: ffff8b82dc430040 BUGCHECK_P2: ffff8b82d0fe3270 BUGCHECK_P3: 0 BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: sppsvc.exe STACK_TEXT: fffffe8b`7dfbf178 fffff807`4f86058f : 00000000`00000192 ffff8b82`dc430040 ffff8b82`d0fe3270 00000000`00000000 : nt!KeBugCheckEx fffffe8b`7dfbf180 fffff807`4c1a61cd : ffff8b82`de9905e0 00000000`00000001 ffff8b82`00000000 00000000`00000000 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14f fffffe8b`7dfbf1c0 fffff807`4c1a2801 : 00000000`00000000 00000000`000000ff fffffe8b`7dfbf400 fffffe8b`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4ad fffffe8b`7dfbf2e0 fffff807`4f882147 : fffffe8b`7dfc0000 00000000`00000000 fffffe8b`7dfba000 fffff807`4fdc5a90 : FLTMGR!FltpPreFsFilterOperation+0x181 fffffe8b`7dfbf390 fffff807`4fc30fc1 : fffff807`4c1a8a20 00000000`00000000 00000000`00000001 fffff807`4c1a2680 : nt!FsFilterPerformCallbacks+0xe7 fffffe8b`7dfbf400 fffff807`4fc30cb7 : 00000000`00000000 ffff8b82`d67e5010 00000000`000ac000 80000002`000800a0 : nt!FsRtlAcquireFileExclusiveCommon+0x121 fffffe8b`7dfbf6f0 fffff807`4f881919 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!FsRtlAcquireFileExclusive+0x17 fffffe8b`7dfbf730 fffff807`4fc2fe2a : ffff8b82`d5021e70 00000000`11000000 ffffde86`754a42d0 00000000`00000002 : nt!CcZeroEndOfLastPage+0x45 fffffe8b`7dfbf780 fffff807`4fc2fbbc : fffffe8b`7dfbf910 fffff807`00000005 fffffe8b`7dfbf960 ffff8b82`cf014cc0 : nt!MiCreateSectionCommon+0x25a fffffe8b`7dfbf860 fffff807`4fc3a0f8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x5c fffffe8b`7dfbf8d0 fffff807`4fc39c25 : 00000000`0000006c fffffe8b`7dfbfb00 ffffde86`76fafb78 ffffde86`00000000 : nt!PfSnGetSectionObject+0x250 fffffe8b`7dfbfa00 fffff807`4f825975 : ffff8b82`dc430040 ffff8b82`dc430040 ffff8b82`ce86f520 00000000`00000700 : nt!PfSnPopulateReadList+0x2b5 fffffe8b`7dfbfb70 fffff807`4f917e25 : ffff8b82`dc430040 00000000`00000080 ffff8b82`ce878040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105 fffffe8b`7dfbfc10 fffff807`4f9fd0d8 : ffffa081`01a80180 ffff8b82`dc430040 fffff807`4f917dd0 00007ffe`7bae2570 : nt!PspSystemThreadStartup+0x55 fffffe8b`7dfbfc60 00000000`00000000 : fffffe8b`7dfc0000 fffffe8b`7dfba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14f MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.804 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 14f FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e} Followup: MachineOwner --------- 8: kd> !sysinfo machineid Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2085] BiosMajorRelease = 5 BiosMinorRelease = 13 BiosVendor = American Megatrends Inc. BiosVersion = 5603 BiosReleaseDate = 10/14/2020 SystemManufacturer = System manufacturer SystemProductName = System Product Name SystemFamily = To be filled by O.E.M. SystemVersion = System Version SystemSKU = SKU BaseBoardManufacturer = ASUSTeK COMPUTER INC. BaseBoardProduct = PRIME A320M-K BaseBoardVersion = Rev X.0x
Normalde şu ana kadar mavi ekran verirdi bilgisayar. Sanırım sorun XMP ayarıyla alakalı. Yukarıda dediğimi yapsam sorun olur mu?XMP kapatın bir süre. BIOS güncellemelerini de takip edin.
Bilgisayarım, 10 gün boyunca hata vermedi fakat bugün tekrar mavi ekran hatası verdi.Bellekler 100 FPS fark ettirmez. Elle 3200 MHz almak yetmez. Voltaj ve gecikme değerini de değiştirmek gerekir. BIOS güncellemelerini de takip edin.
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2085]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 5603
BiosReleaseDate = 10/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME A320M-K
BaseBoardVersion = Rev X.0x
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff8014c39cc60, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2171
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9263
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 6770
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Bugcheck.Code.DumpHeader
Value: 0x1
Key : Bugcheck.Code.Register
Value: 0x1
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 032521-37500-01.dmp
BUGCHECK_CODE: 1
BUGCHECK_P1: fffff8014c39cc60
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff181`e6637b68 fffff801`4881c70f : 00000000`00000001 fffff801`4c39cc60 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
fffff181`e6637b70 fffff801`48717e85 : ffffe10e`7b9a5080 00000000`00000080 ffffe10e`7b876040 00000000`00000000 : nt!ExpWorkerThread+0x1f6e9f
fffff181`e6637c10 fffff801`487fd2a8 : ffff9701`e22a1180 ffffe10e`7b9a5080 fffff801`48717e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff181`e6637c60 00000000`00000000 : fffff181`e6638000 fffff181`e6632000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: Ntfs!NtfsFlushLsnStreamsWorker+0
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
IMAGE_VERSION: 10.0.19041.870
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: 0x1_SysCallNum_0_Ntfs!NtfsFlushLsnStreamsWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e296b7e4-981e-2d0b-7f1b-d108f490c7fb}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.