KMODE_EXCEPTION_NOT_HANDLED mavi ekran hatası

İşletim sistemi
Windows 10
Katılım
8 Mayıs 2023
Mesajlar
57
Daha fazla  
Cinsiyet
Erkek
Evet bu hatayı bir sürü bilgisayarcı gezdim. Eskiden farklı kodlarda bir sürü mavi ekran hatası sıklıkla alıyordum ancak bir bilgisayarcı HDD değişimi yaptıktan sonra geçeceğini söyledi ve değiştirdik. Sonrasında hata hala veriyor ancak tek bir hata olarak veriyor. KMODE_EXCEPTION_NOT_HANDLED ayrıca ilgilenebilecekler için.

Minidump:Minidump - Google Drive

Kod:
Module 0:

DDR4, 8192 MB, 64-bit, 2133 MHz.

DIMM 0 P0 channel a unknown F4-3200C16-8gvkb

Module 1:

DDR4, 8192 MB, 64-bit, 2133 MHz.

DIMM 0 P0 channel b unknown F4-3200C16-8gvkb

0.000: Detecting usable Memory (14261 MB theoretical Max)...

24.359: 13312 MB test starting on 4 cpus...

24.359: Allocating Memory...

37.765: Memory locking failed (might be reserved by other apps/kernel)

44.547: Test finished with no errors detected.

C:\Windows\system32>sfc /scannow

Beginning System scan. This process will take some time.

Beginning verification phase of System scan.

Verification 100% Complete.

Windows resource protection found corrupt files and successfully repaired them.

For Online repairs, details are included in the cbs log file located at.

windir\Logs\CBS\CBS.log. for example C:\Windows\Logs\CBS\CBS.log. for offline.

Repairs, details are included in the log file provided by the /offlogfıle flag.

1.minidump:
NT! Kebugcheckex:
Fffff803'2C7FC0C0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff870e'D6900060 = 000000000000001E.
3: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a Very common bugcheck. Usually the exception address pinpoints.
The driver/function that caused the problem. Always Note this address.
As well as the link date of the driver/image that contains this address.
Arguments:
Arg1: FffffffFC0000005, the exception code that was not handled.
Arg2: Fffffc8dEB4763A6, the address that the exception occurred at.
Arg3: 0000000000000000, parameter 0 of the exception.
Arg4: Ffffffffffffffff, parameter 1 of the exception.

Debugging details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** Doesn't have Full symbol information. Unqualified symbol ***
*** Resolution is turned off by default. Please either specify a ***
*** Fully qualified symbol module! Symbolname, or enable resolution ***
*** Of unqualified symbols by typing ".symopt- 100". Note that ***
*** Enabling unqualified symbol resolution with network symbol ***
*** Server shares in the symbol path may cause the debugger to ***
*** Appear to hang for long periods of time when an incorrect ***
*** Symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** Must point to. Pdb files that have Full type information. ***
*** ***
*** Certain. Pdb files (such as the public OS symbols) do not ***
*** Contain the required information. Contact the group that ***
*** Provided you with these symbols if you need this command to ***
*** Work. ***
*** ***
*** Type referenced: Exceptionrecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** Doesn't have Full symbol information. Unqualified symbol ***
*** Resolution is turned off by default. Please either specify a ***
*** Fully qualified symbol module! Symbolname, or enable resolution ***
*** Of unqualified symbols by typing ".symopt- 100". Note that ***
*** Enabling unqualified symbol resolution with network symbol ***
*** Server shares in the symbol path may cause the debugger to ***
*** Appear to hang for long periods of time when an incorrect ***
*** Symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** Must point to. Pdb files that have Full type information. ***
*** ***
*** Certain. Pdb files (such as the public OS symbols) do not ***
*** Contain the required information. Contact the group that ***
*** Provided you with these symbols if you need this command to ***
*** Work. ***
*** ***
*** Type referenced: Contextrecord ***
*** ***
*************************************************************************

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4733.

Key: Analysis. Elapsed. Msec.
Value: 6221.

Key: Analysis. IO. Other. MB.
Value: 0

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 0

Key: Analysis. Init. CPU. Msec.
Value: 546.

Key: Analysis. Init. Elapsed. Msec.
Value: 3577.

Key: Analysis. Memory.commitpeak. MB.
Value: 92.

Key: Bugcheck. Code. Legacyapı.
Value: 0x1e.

Key: Failure. Bucket.
Value: Av_r_wIN32KBASe! Ntdcompositionbeginframe

Key: Failure. Hash.
Value: {05267455-18CD-2AE4-0687-D1C2a6D58788}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 1E.

Bugcheck_p1: FffffffFC0000005.

Bugcheck_p2: Fffffc8dEB4763A6.

Bugcheck_p3: 0

Bugcheck_p4: Ffffffffffffffff.

Fıle_ın_cab: 071923-5328-01.dmp

Exceptıon_parameter1: 0000000000000000.

Exceptıon_parameter2: Ffffffffffffffff.

Read_address: FffFF8032D0fb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
Ffffffffffffffff.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: dwm.exe

Stack_text:
Ffff870e'D6900058 fffff803'2C860D23: 00000000'0000001E ffffffff'C0000005 fffffc8D'EB4763A6 00000000'00000000: NT! Kebugcheckex.
Ffff870e'D6900060 fffff803'2C81026C: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kidispatchexception+0x1793A3
Ffff870e'D6900720 fffff803'2C80B85A: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kiexceptiondispatch+0x12C
Ffff870e'D6900900 fffffc8D'EB4763A6: 00000000'00000000 ffffc002'17e830b0 ffffffff'FD050F80 00000000'00000000: NT! Kigeneralprotectionfault+0x31a
Ffff870e'D6900A98 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: WIN32KBASe! Ntdcompositionbeginframe+0x26

Symbol_name: WIN32KBASe! Ntdcompositionbeginframe+26

Module_name: WIN32KBASe.

Image_name: win32kbase.sys

Image_versıon: 10.0.19041.3205

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: 26.

Faılure_bucket_ıd: Av_r_wIN32KBASe! Ntdcompositionbeginframe

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {05267455-18CD-2AE4-0687-D1C2a6D58788}

Followup: Machineowner.
---------

2.minidump:
NT! Kebugcheckex:
Fffff801'0effc0C0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffff801'11A89160 = 000000000000001E.
0: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a Very common bugcheck. Usually the exception address pinpoints.
The driver/function that caused the problem. Always Note this address.
As well as the link date of the driver/image that contains this address.
Arguments:
Arg1: FffffffFC0000005, the exception code that was not handled.
Arg2: FffFF80113533F87, the address that the exception occurred at.
Arg3: 0000000000000001, parameter 0 of the exception.
Arg4: Ffff8F829B53abf0, parameter 1 of the exception.

Debugging details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** Doesn't have Full symbol information. Unqualified symbol ***
*** Resolution is turned off by default. Please either specify a ***
*** Fully qualified symbol module! Symbolname, or enable resolution ***
*** Of unqualified symbols by typing ".symopt- 100". Note that ***
*** Enabling unqualified symbol resolution with network symbol ***
*** Server shares in the symbol path may cause the debugger to ***
*** Appear to hang for long periods of time when an incorrect ***
*** Symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** Must point to. Pdb files that have Full type information. ***
*** ***
*** Certain. Pdb files (such as the public OS symbols) do not ***
*** Contain the required information. Contact the group that ***
*** Provided you with these symbols if you need this command to ***
*** Work. ***
*** ***
*** Type referenced: Exceptionrecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** Doesn't have Full symbol information. Unqualified symbol ***
*** Resolution is turned off by default. Please either specify a ***
*** Fully qualified symbol module! Symbolname, or enable resolution ***
*** Of unqualified symbols by typing ".symopt- 100". Note that ***
*** Enabling unqualified symbol resolution with network symbol ***
*** Server shares in the symbol path may cause the debugger to ***
*** Appear to hang for long periods of time when an incorrect ***
*** Symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** Must point to. Pdb files that have Full type information. ***
*** ***
*** Certain. Pdb files (such as the public OS symbols) do not ***
*** Contain the required information. Contact the group that ***
*** Provided you with these symbols if you need this command to ***
*** Work. ***
*** ***
*** Type referenced: Contextrecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** Doesn't have Full symbol information. Unqualified symbol ***
*** Resolution is turned off by default. Please either specify a ***
*** Fully qualified symbol module! Symbolname, or enable resolution ***
*** Of unqualified symbols by typing ".symopt- 100". Note that ***
*** Enabling unqualified symbol resolution with network symbol ***
*** Server shares in the symbol path may cause the debugger to ***
*** Appear to hang for long periods of time when an incorrect ***
*** Symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** Must point to. Pdb files that have Full type information. ***
*** ***
*** Certain. Pdb files (such as the public OS symbols) do not ***
*** Contain the required information. Contact the group that ***
*** Provided you with these symbols if you need this command to ***
*** Work. ***
*** ***
*** Type referenced: Exceptionrecord ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** Doesn't have Full symbol information. Unqualified symbol ***
*** Resolution is turned off by default. Please either specify a ***
*** Fully qualified symbol module! Symbolname, or enable resolution ***
*** Of unqualified symbols by typing ".symopt- 100". Note that ***
*** Enabling unqualified symbol resolution with network symbol ***
*** Server shares in the symbol path may cause the debugger to ***
*** Appear to hang for long periods of time when an incorrect ***
*** Symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** Must point to. Pdb files that have Full type information. ***
*** ***
*** Certain. Pdb files (such as the public OS symbols) do not ***
*** Contain the required information. Contact the group that ***
*** Provided you with these symbols if you need this command to ***
*** Work. ***
*** ***
*** Type referenced: Contextrecord ***
*** ***
*************************************************************************

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 6468.

Key: Analysis. Elapsed. Msec.
Value: 21872.

Key: Analysis. IO. Other. MB.
Value: 1

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 2

Key: Analysis. Init. CPU. Msec.
Value: 562.

Key: Analysis. Init. Elapsed. Msec.
Value: 4704.

Key: Analysis. Memory.commitpeak. MB.
Value: 100.

Key: Bugcheck. Code. Legacyapı.
Value: 0x1e.

Key: Failure. Bucket.
Value: Av_w_dxgmms2! Vidschireferencedisplayingallocationsforthisentry

Key: Failure. Hash.
Value: {9ED796B4-3C4F-02EB-4424-b5DE0202FA45}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 1E.

Bugcheck_p1: FffffffFC0000005.

Bugcheck_p2: FFFFF80113533F87.

Bugcheck_p3: 1

Bugcheck_p4: Ffff8F829B53abf0.

Fıle_ın_cab: 071923-5453-01.dmp

Exceptıon_parameter1: 0000000000000001.

Exceptıon_parameter2: Ffff8F829B53abf0.

Wrıte_address: FffFF8010F8fb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
Ffff8F829B53abf0.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: System.

Stack_text:
Fffff801'11A89158 fffff801'0F0F917e: 00000000'0000001E ffffffff'C0000005 fffff801'13533F87 00000000'00000001: NT! Kebugcheckex.
Fffff801'11A89160 fffff801'0F0067B2: Fffff801'0F0F915C 00000000'00000000 00000000'00000000 00000000'00000000: NT! Hvlpvtlcallexceptionhandler+0x22
Fffff801'11A891a0 fffff801'0eee5b37: Fffff801'11A89710 00000000'00000000 fffff801'11A74C60 fffff801'0F0009BE: NT! Rtlpexecutehandlerforexception+0x12
Fffff801'11A891D0 fffff801'0eee7b06: Fffff801'11A73F68 fffff801'11A89e20 fffff801'11A73F68 00000000'00000000: NT! Rtldispatchexception+0x297
Fffff801'11A898F0 fffff801'0effd1D2: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kidispatchexception+0x186
Fffff801'11A89fb0 fffff801'0effd1a0: Fffff801'0F010265 ffff8F82'9B53ABF0 fffff801'11A73F30 00000000'00000004: NT! Kxexceptiondispatchonexceptionstack+0x12
Fffff801'11A73e28 fffff801'0F010265: Ffff8F82'9B53ABF0 fffff801'11A73F30 00000000'00000004 00000000'00000000: NT! Kiexceptiondispatchonexceptionstackcontinue
Fffff801'11A73e30 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kiexceptiondispatch+0x125

Symbol_name: Dxgmms2! Vidschireferencedisplayingallocationsforthisentry+167

Module_name: Dxgmms2.

Image_name: dxgmms2.sys

Image_versıon: 10.0.19041.3205

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: 167.

Faılure_bucket_ıd: Av_w_dxgmms2! Vidschireferencedisplayingallocationsforthisentry

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {9ED796B4-3C4F-02EB-4424-b5DE0202FA45}

Followup: Machineowner.
---------

3.minidump:
NT! Kebugcheckex:
Fffff800'5F1FC0C0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff8088'22C5be50 = 000000000000007E.
2: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a Very common bugcheck. Usually the exception address pinpoints.
The driver/function that caused the problem. Always Note this address.
As well as the link date of the driver/image that contains this address.
Arguments:
Arg1: FffffffFC0000005, the exception code that was not handled.
Arg2: FffFF8005F021cac, the address that the exception occurred at.
Arg3: FfFF808822C5CE48, exception record address.
Arg4: FfFF808822C5C680, context record address.

Debugging details:
------------------

Key_values_strıng: 1

Key: Av. Fault.
Value: Read.

Key: Analysis. CPU. Msec.
Value: 3437.

Key: Analysis. Elapsed. Msec.
Value: 27003.

Key: Analysis. IO. Other. MB.
Value: 9

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 11.

Key: Analysis. Init. CPU. Msec.
Value: 467.

Key: Analysis. Init. Elapsed. Msec.
Value: 1820.

Key: Analysis. Memory.commitpeak. MB.
Value: 102.

Key: Bugcheck. Code. Legacyapı.
Value: 0x1000007e.

Key: Failure. Bucket.
Value: Av_dxgkrnl! Unknown_function.

Key: Failure. Hash.
Value: {FA21B66F-FC18-71CB-000b-EB2b0bb02607}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 7E.

Bugcheck_p1: FffffffFC0000005.

Bugcheck_p2: FffFF8005F021cac.

Bugcheck_p3: FFFF808822C5CE48.

Bugcheck_p4: FFFF808822C5C680.

Fıle_ın_cab: 071923-5625-01.dmp

Exceptıon_record: FFFF808822C5CE48 -- (.exr 0xffff808822c5ce48)
Exceptionaddress: FffFF8005F021cac (NT! Exacquireresourceexclusivelite+0x000000000000001C)
Exceptioncode: C0000005 (Access violation)
Exceptionflags: 00000000.
Numberparameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: FfFF8387324AC3AA.
Attempt to read from address ffFF8387324AC3AA.

Context: FFFF808822C5C680 -- (.cxr 0xffff808822c5c680)
Rax = ffFF8387C1571080 rbx = ffFF8387324AC390 rcx = ffFF8387324AC302.
Rdx = 0000000000000000 rsi = 0000000000000000 rdi = ffffdd0ff1e85470.
Rip = fffFF8005F021cac rsp = ffFF808822C5D080 rbp = ffFF808822C5D210.
R8 = 00000000ffffffff R9 = 7fffdd0FF179BEB0 R10 = fffFF8005F021C90.
R11 = ffFF808822C5D738 R12 = ffffdd0ff1F4C2a0 R13 = ffffdd0FF179BDE0.
R14 = 0000000000000000 R15 = ffffffffffffffff.
İopl = 0 nv up ei pl nzna pe nc.
CS = 0010 SS = 0018 DS = 002b es = 002b fs = 0053 GS = 002b efl = 00050202.
NT! Exacquireresourceexclusivelite+0x1C:
Fffff800'5F021CAC 0fb7431a movzx eax, Word ptr [rbx+1Ah] DS:002b:ffff8387'324AC3AA=?
Resetting default scope.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: csrss.exe

Read_address: FffFF8005FAfb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
FfFF8387324AC3AA.

Error_code: (ntstatus) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

Exceptıon_code_str: C0000005.

Exceptıon_parameter1: 0000000000000000.

Exceptıon_parameter2: FfFF8387324AC3AA.

Exceptıon_str: 0xc0000005.

Stack_text:
Ffff8088'22C5D080 fffff800'65539DC4: Ffffdd0F'F1e85470 ffff8387'00000000 ffff8387'00000000 ffff8387'C21df050: NT! Exacquireresourceexclusivelite+0x1C
Ffff8088'22C5D110 ffffdd0F'F1e85470: Ffff8387'00000000 ffff8387'00000000 ffff8387'C21df050 00000000'00000000: Dxgkrnl+0Xe9DC4
Ffff8088'22C5D118 ffff8387'00000000: Ffff8387'00000000 ffff8387'C21df050 00000000'00000000 ffff8387'C24AC3F0: 0xffffdd0f`f1e85470
Ffff8088'22C5D120 ffff8387'00000000: Ffff8387'C21df050 00000000'00000000 ffff8387'C24AC3F0 00000000'00000000: 0xffff8387`00000000
Ffff8088'22C5D128 ffff8387'C21df050: 00000000'00000000 ffff8387'C24AC3F0 00000000'00000000 ffff8088'22C5D840: 0xffff8387`00000000
Ffff8088'22C5D130 00000000'00000000: Ffff8387'C24AC3F0 00000000'00000000 ffff8088'22C5D840 ffff8088'00000001: 0xffff8387`c21df050

Symbol_name: Dxgkrnl+e9DC4

Module_name: Dxgkrnl.

Image_name: dxgkrnl.sys

Stack_command: Cxr 0xffff808822c5c680; KB.

Bucket_ıd_func_offset: E9DC4.

Faılure_bucket_ıd: Av_dxgkrnl! Unknown_function.

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {FA21B66F-FC18-71CB-000b-EB2b0bb02607}

Followup: Machineowner.
---------

4.minidump:
NT! Kebugcheckex:
Fffff802'34dfc0C0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffffa88b'E09584E0 = 0000000000000050.
0: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid System Memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed Memory.
Arguments:
Arg1: FffFF802A4Edf518, Memory referenced.
Arg2: 0000000000000000, X64: Bit 0 set if the fault was due to a not-present pte.
Bit 1 is set if the fault was due to a write, clear if a read.
Bit 3 is set if the Processor decided the fault was due to a corrupted pte.
Bit 4 is set if the fault was due to attempted execute of a no-execute pte.
- ARM64: Bit 1 is set if the fault was due to a write, clear if a read.
Bit 3 is set if the fault was due to attempted execute of a no-execute pte.
Arg3: FffFF80239Da3D53, ıf non-Zero, the instruction address which referenced the bad Memory.
Address.
Arg4: 0000000000000000, (reserved)

Debugging details:
------------------

Key_values_strıng: 1

Key: Av. Type.
Value: Read.

Key: Analysis. CPU. Msec.
Value: 3280.

Key: Analysis. Elapsed. Msec.
Value: 5178.

Key: Analysis. IO. Other. MB.
Value: 0

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 0

Key: Analysis. Init. CPU. Msec.
Value: 452.

Key: Analysis. Init. Elapsed. Msec.
Value: 2026.

Key: Analysis. Memory.commitpeak. MB.
Value: 83.

Key: Bugcheck. Code. Legacyapı.
Value: 0x50.

Key: Failure. Bucket.
Value: Av_r_(null)_dxgkrnl! Unknown_function.

Key: Failure. Hash.
Value: {749B1D99-0328-14D4-1B07-AC069C133952}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 50.

Bugcheck_p1: FFFFF802A4EDF518.

Bugcheck_p2: 0

Bugcheck_p3: FFFFF80239DA3D53.

Bugcheck_p4: 0

Fıle_ın_cab: 071923-5765-01.dmp

Read_address: FffFF802356fb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
FFFFF802A4EDF518.

Mm_ınternal_code: 0

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: csrss.exe

Trap_frame: FFFFA88BE0958780 -- (.trap 0xffffa88be0958780)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFC70D7D4FFB90 rbx = 0000000000000000 rcx = fffFC70D7D9ee000.
Rdx = 0000000000000001 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF80239Da3D53 rsp = fffFA88BE0958910 rbp = fffFA88BE09589D0.
R8 = fffFF802A4Edf4D0 R9 = fffFA88BE0958ad0 R10 = fffFF80234Cff7e0.
R11 = fffFA88BE09589D0 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
Dxgkrnl+0x3D53:
Fffff802'39da3D53 498B4048 mov rax, qword ptr [r8+48h] DS: Fffff802'a4edf518=?
Resetting default scope.

Stack_text:
Ffffa88b'E09584D8 fffff802'34e4b2F5: 00000000'00000050 fffff802'a4edf518 00000000'00000000 ffffa88b'E0958780: NT! Kebugcheckex.
Ffffa88b'E09584E0 fffff802'34C6e7b0: 00000000'00010100 00000000'00000000 ffffa88b'E0958800 00000000'00000000: NT! Misystemfault+0x1b2905
Ffffa88b'E09585E0 fffff802'34e0bbd8: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Mmaccessfault+0x400
Ffffa88b'E0958780 fffff802'39da3D53: 00000000'0000139B fffff802'39da616F ffffa88b'E0958970 ffffc70D'7dB36008: NT! Kipagefault+0x358
Ffffa88b'E0958910 00000000'0000139B: Fffff802'39da616F ffffa88b'E0958970 ffffc70D'7dB36008 00000000'00000000: Dxgkrnl+0x3D53
Ffffa88b'E0958918 fffff802'39da616F: Ffffa88b'E0958970 ffffc70D'7dB36008 00000000'00000000 fffff802'00000000: 0x139b.
Ffffa88b'E0958920 ffffa88b'E0958970: Ffffc70D'7dB36008 00000000'00000000 fffff802'00000000 ffffc70D'7D118B20: Dxgkrnl+0x616F
Ffffa88b'E0958928 ffffc70D'7dB36008: 00000000'00000000 fffff802'00000000 ffffc70D'7D118B20 fffff802'39efd1b0: 0xffffa88b`e0958970
Ffffa88b'E0958930 00000000'00000000: Fffff802'00000000 ffffc70D'7D118B20 fffff802'39efd1b0 00000000'0000139B: 0xffffc70d`7db36008

Symbol_name: Dxgkrnl+3D53

Module_name: Dxgkrnl.

Image_name: dxgkrnl.sys

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: 3D53.

Faılure_bucket_ıd: Av_r_(null)_dxgkrnl! Unknown_function.

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {749B1D99-0328-14D4-1B07-AC069C133952}

Followup: Machineowner.
---------

5.minidump:

NT! Kebugcheckex:
Fffff803'21dfc0C0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff838D'991bde90 = 000000000000003B.
2: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C000001D, exception code that caused the bugcheck.
Arg2: FffFF80321C40582, address of the instruction which caused the bugcheck.
Arg3: FfFF838D991be790, address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Zero.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 3577.

Key: Analysis. Elapsed. Msec.
Value: 11160.

Key: Analysis. IO. Other. MB.
Value: 3

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 5

Key: Analysis. Init. CPU. Msec.
Value: 546.

Key: Analysis. Init. Elapsed. Msec.
Value: 7393.

Key: Analysis. Memory.commitpeak. MB.
Value: 91.

Key: Bugcheck. Code. Legacyapı.
Value: 0x3b.

Key: Failure. Bucket.
Value: 0x3B_C000001D_nt!FsRtlReleaseEofLock

Key: Failure. Hash.
Value: {C2D3F7B3-3E06-A982-52D1-8424E2330dd7}

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 3B.

Bugcheck_p1: C000001D.

Bugcheck_p2: FFFFF80321C40582.

Bugcheck_p3: FfFF838D991be790.

Bugcheck_p4: 0

Fıle_ın_cab: 071923-5781-01.dmp

Context: FfFF838D991be790 -- (.cxr 0xffff838d991be790)
Rax = 000000000000003C rbx = ffffDE0344BE2080 rcx = 0000000000000001.
Rdx = 000000000000003E rsi = ffffDE0348CC32A8 rdi = fffFA709C47961D8.
Rip = fffFF80321C40582 rsp = ffFF838D991BF190 rbp = ffffDE0344BE2730.
R8 = 0000000000000000 R9 = 0000000000000000 R10 = fffFF80321C404D0.
R11 = ffFF838D991BF218 R12 = 0000000000000000 R13 = ffFF838D991BF5D0.
R14 = 0000000000000001 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
CS = 0010 SS = 0018 DS = 002b es = 002b fs = 0053 GS = 002b efl = 00050286.
NT! Fsrtlreleaseeoflock+0xb2:
Fffff803'21C40582 0F84DC031F00 je NT! Fsrtlreleaseeoflock+0x1F0494 (fffff803'21e30964) [br=0]
Resetting default scope.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: MsMpEng.exe

Stack_text:
Ffff838D'991BF190 fffff803'2618B15E: Ffff838D'00000000 ffffa709'C4796200 ffffde03'00000001 fffff803'00000000: NT! Fsrtlreleaseeoflock+0xb2
Ffff838D'991BF220 fffff803'2618ACE4: 00000000'00000000 fffff803'00000001 ffff838D'991BF530 fffff803'2618A932: NTFS! Ntfscleanupırpcontext+0x33e
Ffff838D'991BF280 fffff803'2626E80E: Ffff838D'991BF530 00000000'00000000 ffffde03'462D2010 00000000'00000000: NTFS! Ntfsextendedcompleterequestınternal+0x134
Ffff838D'991BF2e0 fffff803'2626CF16: Ffff838D'991BF530 ffffde03'462D2010 00000000'00000001 00000000'00000001: NTFS! Ntfscommonqueryınformation+0Xfce
Ffff838D'991BF3e0 fffff803'2626CDA0: Ffff838D'991BF530 ffffde03'462D2010 ffffde03'462D2010 00000000'00000000: NTFS! Ntfsfsddispatchswitch+0x156
Ffff838D'991BF510 fffff803'21C113A5: Ffffde03'462D2010 ffff838D'991BF880 00000000'00000000 fffff803'20225021: NTFS! Ntfsfsddispatchwait+0x40
Ffff838D'991BF7b0 fffff803'2022710F: 00000000'00000005 00000000'00000000 00000000'00000000 00000000'00000020: NT! Iofcalldriver+0x55
Ffff838D'991BF7F0 fffff803'20224A43: Ffff838D'991BF880 00000064'E637BD01 00000000'0000000A 00000000'00000000: Fltmgr! Fltplegacyprocessingafterprecallbackscompleted+0x28F
Ffff838D'991BF860 fffff803'21C113A5: Ffffde03'462D2010 00000000'00000208 00000000'0000003E fffff803'00000000: Fltmgr! Fltpdispatch+0xa3
Ffff838D'991BF8C0 fffff803'21C0A920: 00000064'E637BDA0 00000000'0000003E 00000000'00000000 00000000'00000016: NT! Iofcalldriver+0x55
Ffff838D'991BF900 fffff803'21ffbece: Ffff838D'991bfb80 ffffde03'462D2010 00000000'0000003E 00000000'00000000: NT! Iopcalldriverreference+0xd0
Ffff838D'991BF970 fffff803'21e0F8F8: 00000000'00000000 00000064'E637BDA0 00000064'E637BDB8 ffffde03'0000003E: NT! Ntqueryınformationfile+0x7'de
Ffff838D'991bfa90 00007FF8'0BF0D204: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000064'E637BD58 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ff8`0bf0d204

Symbol_name: NT! Fsrtlreleaseeoflock+b2

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.19041.3208

Stack_command: Cxr 0xffff838d991be790; KB.

Bucket_ıd_func_offset: B2.

Faılure_bucket_ıd: 0x3B_C000001D_nt!FsRtlReleaseEofLock

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {C2D3F7B3-3E06-A982-52D1-8424E2330dd7}

Followup: Machineowner.
---------

Minidump:Minidump - Google Drive
 
Son düzenleyen: Moderatör:

Geri
Yukarı