Memory.DMP hatası nasıl çözülür?

thesunset

Hectopat
Katılım
29 Mayıs 2020
Mesajlar
859
Çözümler
3
Yer
unknown
Daha önce sistemim bir kez Memory.DMP hatası vermişti, onun içeriğini kontrol edip not etmiştim. Şimdi ikinci kez verdi onun da içeriğine baktım. İkisinin 'de farklı sebeplerden kaynaklı gibi duruyor.

1. Memory.DMP dosya içeriği;

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\emana\OneDrive\Masaüstü\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`2f600000 PsLoadedModuleList = 0xfffff803`2fa48150
Debug session time: Wed Aug 12 02:24:33.380 2020 (UTC + 3:00)
System Uptime: 0 days 20:51:59.053
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................

Loading User Symbols
PEB address is NULL !
Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2f7c23c0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffa8c`5fc6e740=000000000000007e
7: kd> !analyze -v

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)

This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.

Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8032f745b44, The address that the exception occurred at
Arg3: fffffa8c5fc6f758, Exception Record Address
Arg4: fffffa8c5fc6efa0, Context Record Address

Debugging Details:

------------------

KEY_VALUES_STRING: 1
    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-9IGTL22

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6223

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8032f745b44

BUGCHECK_P3: fffffa8c5fc6f758

BUGCHECK_P4: fffffa8c5fc6efa0

EXCEPTION_RECORD:  fffffa8c5fc6f758 -- (.exr 0xfffffa8c5fc6f758)

ExceptionAddress: fffff8032f745b44 (nt!RtlCompressBufferXpressLzStandard+0x0000000000000144)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000

NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff


CONTEXT:  fffffa8c5fc6efa0 -- (.cxr 0xfffffa8c5fc6efa0)
rax=00000000000008fc rbx=ffffaf04b24d59cc rcx=0000000000000073
rdx=ffffaf04b24c63c0 rsi=0000000000100000 rdi=000000000000047e
rip=fffff8032f745b44 rsp=fffffa8c5fc6f990 rbp=ffffaf04b42f5c20
r8=3abed0cbb24d4f4f  r9=ffffaf04b24d5f29 r10=ffffaf04b42f5c20
r11=ffffaf04b42f6000 r12=ffffaf04b24d5f29 r13=ffffaf04b42f5fd7
r14=ffffaf04b42f5c38 r15=ffffaf04b24c6028
iopl=0         nv up ei pl nz ac po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050216

nt!RtlCompressBufferXpressLzStandard+0x144:
fffff803`2f745b44 413808          cmp     byte ptr [r8],cl ds:002b:3abed0cb`b24d4f4f=??
Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME:  MemCompression

READ_ADDRESS:  ffffffffffffffff

ERRR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT:

fffffa8c`5fc6f990 fffff803`2f7459f1     : ffffaf04`b24d5f29 fffff803`2f6ecee9 ffffaf04`b42f5070 ffffaf04`b24d4f4f : nt!RtlCompressBufferXpressLzStandard+0x144
fffffa8c`5fc6fa40 fffff803`2f71667f     : fffff803`2fb8df10 fffff803`2fb8df20 00000000`00000000 ffffd269`349a4af0 : nt!RtlCompressBufferXpressLz+0x61
fffffa8c`5fc6faa0 fffff803`2f7495cd     : fffff803`2fb8deb0 ffffaf04`a46c20e0 ffffaf04`b37d1028 ffffaf04`b24d4f4f : nt!RtlCompressBuffer+0x6f
fffffa8c`5fc6fb00 fffff803`2f7493ed     : fffff803`2fb8deb0 fffff803`2fb8d9c0 ffffaf04`b42f5028 fffff803`2fb8de00 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxProcessEntry+0x91
fffffa8c`5fc6fb90 fffff803`2f71e155     : ffffffff`fd050f80 ffffaf04`ad1f2540 fffff803`2f749280 ffffffff`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxWorkerThread+0x16d
fffffa8c`5fc6fc10 fffff803`2f7c99c8     : ffff8281`14679180 ffffaf04`ad1f2540 fffff803`2f71e100 fffffa8c`5fc6fcd0 : nt!PspSystemThreadStartup+0x55
fffffa8c`5fc6fc60 00000000`00000000     : fffffa8c`5fc70000 fffffa8c`5fc6a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlCompressBufferXpressLzStandard+144

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

STACK_COMMAND:  .cxr 0xfffffa8c5fc6efa0 ; kb

BUCKET_ID_FUNC_OFFSET:  144

FAILURE_BUCKET_ID:  AV_nt!RtlCompressBufferXpressLzStandard

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ecd29322-2063-7ed6-1d71-1cd65a0a5eee}

Followup:     MachineOwner

---------

2. Memory.DMP dosya içeriği;

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff805`5aa00000 PsLoadedModuleList = 0xfffff805`5ae480f0
Debug session time: Thu Aug 13 21:25:14.791 2020 (UTC + 3:00)
System Uptime: 0 days 1:02:02.462
Loading Kernel Symbols
...............................................................
................................................................
..............Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details
..................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000010`f6fb6018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`5abc23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9b0f`a6725740=0000000000000192
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc48a997b3080, The address of the thread.
Arg2: ffffc48a8b4f78c0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3265

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9IGTL22

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3359

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 192

BUGCHECK_P1: ffffc48a997b3080

BUGCHECK_P2: ffffc48a8b4f78c0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: ModernWarfare.exe

STACK_TEXT:
ffff9b0f`a6725738 fffff805`5aaa163d : 00000000`00000192 ffffc48a`997b3080 ffffc48a`8b4f78c0 00000000`00000000 : nt!KeBugCheckEx
ffff9b0f`a6725740 fffff805`5d6e4b95 : ffffc48a`8b4f78c0 ffffc48a`00000000 ffffc48a`8f53fb30 ffffc48a`99fb8c40 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14d
ffff9b0f`a6725780 fffff805`5d6e2f5c : ffff9b0f`a6725920 ffff9b0f`a6725900 00000000`00000003 fffff805`5d6e6400 : FLTMGR!FltpPerformPreCallbacks+0x435
ffff9b0f`a6725890 fffff805`5d71c7c5 : ffff9b0f`a67259f8 ffff9b0f`a6725b80 ffffc48a`997b3080 ffffc48a`97d816c0 : FLTMGR!FltpPassThroughFastIo+0x8c
ffff9b0f`a67258f0 fffff805`5b00407f : ffffc48a`97d816c0 00000000`00000000 00000000`00000000 ffffc48a`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff9b0f`a67259a0 fffff805`5abd3c18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000010`f7dfd718 : nt!NtReadFile+0x39f
ffff9b0f`a6725a90 00007ff9`a62fc134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000010`f7dfd658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a62fc134


SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14d

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14d

FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}

Followup: MachineOwner
---------
Adsız.jpg


İlkini hatırlamıyorum ama, ikinci olan oyun içerisinde iken oldu şimdi. Diğeri de belki oyunda iken olmuş olabilir. Oyun: Call Of Duty: Warzone.
Memtest86 İle RAM'larımı test ettim bir sorun çıkmadı. Yardımlarınızı bekliyorum...

* Oyun daha önce DEV ERROR 6328 hatası ve çeşitli hatalar veriyordu, dün akşam bazı ayarlamalar yaptım oyun için internet'den araştırıp uyguladığım.
* .DMP dosyalarının ilki 1.5 GB, ikincisi 1 GB, kimse indirmek istemeyeceği için muhtemelen kendim açıp paylaştım. Dosyaları WinDbg Preview ile açıp, analiz ettim. Kimse DMP dosyası nasıl paylaşılır diye boşuna link atmasın lütfen. Yine de indirmek istiyen var ise, yükleyebilirim.
up
 
Gördüğüm kadarıyla donanımsal arıza var, işlemci veya RAM sorunlu.

İlk dump da Windows'un kendi programında mavi ekran vermiş ama ikinci dump da Modern Warfare'de mavi ekran vermiş.

Hatalar da farklı, aynı değil.

Bilgisayarı formatlaman sorunu belki çözebilir.
 
Gördüğüm kadarıyla donanımsal arıza var, işlemci veya RAM sorunlu.

İlk dump da Windows'un kendi programında mavi ekran vermiş ama ikinci dump da Modern Warfare'de mavi ekran vermiş.

Hatalar da farklı, aynı değil.

Bilgisayarı formatlaman sorunu belki çözebilir.
Yeni formatladım zaten 1909 sürümünü yükledik, 2004 cok sıkıntı yarattı ..
Modern Warfare'nin de kendisi cok sıkıntılı bir oyun sürekli DEV ERROR 6328 hatası veriyor..
 
Yeni formatladım zaten 1909 sürümünü yükledik, 2004 cok sıkıntı yarattı ..
Modern Warfare'nin de kendisi cok sıkıntılı bir oyun sürekli DEV ERROR 6328 hatası veriyor..
Bir daha mavi ekran gelirse bize başvur takipteyim bu konuyu. İlk defa bir mavi ekran hatasına yardım da bulundum. O yüzden her zaman takipteyim.
 
Daha önce sistemim bir kez Memory.DMP hatası vermişti, onun içeriğini kontrol edip not etmiştim. Şimdi ikinci kez verdi onun da içeriğine baktım. İkisinin 'de farklı sebeplerden kaynaklı gibi duruyor.

1. Memory.DMP dosya içeriği;

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\emana\OneDrive\Masaüstü\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`2f600000 PsLoadedModuleList = 0xfffff803`2fa48150
Debug session time: Wed Aug 12 02:24:33.380 2020 (UTC + 3:00)
System Uptime: 0 days 20:51:59.053
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................

Loading User Symbols
PEB address is NULL !
Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2f7c23c0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffa8c`5fc6e740=000000000000007e
7: kd> !analyze -v

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)

This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.

Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8032f745b44, The address that the exception occurred at
Arg3: fffffa8c5fc6f758, Exception Record Address
Arg4: fffffa8c5fc6efa0, Context Record Address

Debugging Details:

------------------

KEY_VALUES_STRING: 1
    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2687

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-9IGTL22

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6223

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8032f745b44

BUGCHECK_P3: fffffa8c5fc6f758

BUGCHECK_P4: fffffa8c5fc6efa0

EXCEPTION_RECORD:  fffffa8c5fc6f758 -- (.exr 0xfffffa8c5fc6f758)

ExceptionAddress: fffff8032f745b44 (nt!RtlCompressBufferXpressLzStandard+0x0000000000000144)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000

NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff


CONTEXT:  fffffa8c5fc6efa0 -- (.cxr 0xfffffa8c5fc6efa0)
rax=00000000000008fc rbx=ffffaf04b24d59cc rcx=0000000000000073
rdx=ffffaf04b24c63c0 rsi=0000000000100000 rdi=000000000000047e
rip=fffff8032f745b44 rsp=fffffa8c5fc6f990 rbp=ffffaf04b42f5c20
r8=3abed0cbb24d4f4f  r9=ffffaf04b24d5f29 r10=ffffaf04b42f5c20
r11=ffffaf04b42f6000 r12=ffffaf04b24d5f29 r13=ffffaf04b42f5fd7
r14=ffffaf04b42f5c38 r15=ffffaf04b24c6028
iopl=0         nv up ei pl nz ac po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050216

nt!RtlCompressBufferXpressLzStandard+0x144:
fffff803`2f745b44 413808          cmp     byte ptr [r8],cl ds:002b:3abed0cb`b24d4f4f=??
Resetting default scope



BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME:  MemCompression

READ_ADDRESS:  ffffffffffffffff

ERRR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT:

fffffa8c`5fc6f990 fffff803`2f7459f1     : ffffaf04`b24d5f29 fffff803`2f6ecee9 ffffaf04`b42f5070 ffffaf04`b24d4f4f : nt!RtlCompressBufferXpressLzStandard+0x144
fffffa8c`5fc6fa40 fffff803`2f71667f     : fffff803`2fb8df10 fffff803`2fb8df20 00000000`00000000 ffffd269`349a4af0 : nt!RtlCompressBufferXpressLz+0x61
fffffa8c`5fc6faa0 fffff803`2f7495cd     : fffff803`2fb8deb0 ffffaf04`a46c20e0 ffffaf04`b37d1028 ffffaf04`b24d4f4f : nt!RtlCompressBuffer+0x6f
fffffa8c`5fc6fb00 fffff803`2f7493ed     : fffff803`2fb8deb0 fffff803`2fb8d9c0 ffffaf04`b42f5028 fffff803`2fb8de00 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxProcessEntry+0x91
fffffa8c`5fc6fb90 fffff803`2f71e155     : ffffffff`fd050f80 ffffaf04`ad1f2540 fffff803`2f749280 ffffffff`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxWorkerThread+0x16d
fffffa8c`5fc6fc10 fffff803`2f7c99c8     : ffff8281`14679180 ffffaf04`ad1f2540 fffff803`2f71e100 fffffa8c`5fc6fcd0 : nt!PspSystemThreadStartup+0x55
fffffa8c`5fc6fc60 00000000`00000000     : fffffa8c`5fc70000 fffffa8c`5fc6a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!RtlCompressBufferXpressLzStandard+144

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

STACK_COMMAND:  .cxr 0xfffffa8c5fc6efa0 ; kb

BUCKET_ID_FUNC_OFFSET:  144

FAILURE_BUCKET_ID:  AV_nt!RtlCompressBufferXpressLzStandard

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ecd29322-2063-7ed6-1d71-1cd65a0a5eee}

Followup:     MachineOwner

---------

2. Memory.DMP dosya içeriği;

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff805`5aa00000 PsLoadedModuleList = 0xfffff805`5ae480f0
Debug session time: Thu Aug 13 21:25:14.791 2020 (UTC + 3:00)
System Uptime: 0 days 1:02:02.462
Loading Kernel Symbols
...............................................................
................................................................
..............Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details
..................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000010`f6fb6018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`5abc23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9b0f`a6725740=0000000000000192
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc48a997b3080, The address of the thread.
Arg2: ffffc48a8b4f78c0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3265

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9IGTL22

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 3359

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 192

BUGCHECK_P1: ffffc48a997b3080

BUGCHECK_P2: ffffc48a8b4f78c0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: ModernWarfare.exe

STACK_TEXT:
ffff9b0f`a6725738 fffff805`5aaa163d : 00000000`00000192 ffffc48a`997b3080 ffffc48a`8b4f78c0 00000000`00000000 : nt!KeBugCheckEx
ffff9b0f`a6725740 fffff805`5d6e4b95 : ffffc48a`8b4f78c0 ffffc48a`00000000 ffffc48a`8f53fb30 ffffc48a`99fb8c40 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14d
ffff9b0f`a6725780 fffff805`5d6e2f5c : ffff9b0f`a6725920 ffff9b0f`a6725900 00000000`00000003 fffff805`5d6e6400 : FLTMGR!FltpPerformPreCallbacks+0x435
ffff9b0f`a6725890 fffff805`5d71c7c5 : ffff9b0f`a67259f8 ffff9b0f`a6725b80 ffffc48a`997b3080 ffffc48a`97d816c0 : FLTMGR!FltpPassThroughFastIo+0x8c
ffff9b0f`a67258f0 fffff805`5b00407f : ffffc48a`97d816c0 00000000`00000000 00000000`00000000 ffffc48a`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff9b0f`a67259a0 fffff805`5abd3c18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000010`f7dfd718 : nt!NtReadFile+0x39f
ffff9b0f`a6725a90 00007ff9`a62fc134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000010`f7dfd658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a62fc134


SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14d

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14d

FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}

Followup: MachineOwner
---------
Eki Görüntüle 638431

İlkini hatırlamıyorum ama, ikinci olan oyun içerisinde iken oldu şimdi. Diğeri de belki oyunda iken olmuş olabilir. Oyun: Call Of Duty: Warzone.
Memtest86 İle RAM'larımı test ettim bir sorun çıkmadı. Yardımlarınızı bekliyorum...

* Oyun daha önce DEV ERROR 6328 hatası ve çeşitli hatalar veriyordu, dün akşam bazı ayarlamalar yaptım oyun için internet'den araştırıp uyguladığım.
* .DMP dosyalarının ilki 1.5 GB, ikincisi 1 GB, kimse indirmek istemeyeceği için muhtemelen kendim açıp paylaştım. Dosyaları WinDbg Preview ile açıp, analiz ettim. Kimse DMP dosyası nasıl paylaşılır diye boşuna link atmasın lütfen. Yine de indirmek istiyen var ise, yükleyebilirim.
up
Ben de bu hatayı alıyorum, çözemedim. :(
 
Hocam ben de az önce bir donma sorunu ile karşılaştım 15 gb diyor MEMORY.DMP dosyasına.

Yüklemek ile uğraşmayın derim. Sorununuz varsa minidump paylaşıp konu açarsanız yardımcı oluruz :)
 

Yeni konular

Geri
Yukarı