Daha önce sistemim bir kez Memory.DMP hatası vermişti, onun içeriğini kontrol edip not etmiştim. Şimdi ikinci kez verdi onun da içeriğine baktım. İkisinin 'de farklı sebeplerden kaynaklı gibi duruyor.
1. Memory.DMP dosya içeriği;
2. Memory.DMP dosya içeriği;
İlkini hatırlamıyorum ama, ikinci olan oyun içerisinde iken oldu şimdi. Diğeri de belki oyunda iken olmuş olabilir. Oyun: Call Of Duty: Warzone.
Memtest86 İle RAM'larımı test ettim bir sorun çıkmadı. Yardımlarınızı bekliyorum...
* Oyun daha önce DEV ERROR 6328 hatası ve çeşitli hatalar veriyordu, dün akşam bazı ayarlamalar yaptım oyun için internet'den araştırıp uyguladığım.
* .DMP dosyalarının ilki 1.5 GB, ikincisi 1 GB, kimse indirmek istemeyeceği için muhtemelen kendim açıp paylaştım. Dosyaları WinDbg Preview ile açıp, analiz ettim. Kimse DMP dosyası nasıl paylaşılır diye boşuna link atmasın lütfen. Yine de indirmek istiyen var ise, yükleyebilirim.
up
1. Memory.DMP dosya içeriği;
Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\emana\OneDrive\Masaüstü\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff803`2f600000 PsLoadedModuleList = 0xfffff803`2fa48150
Debug session time: Wed Aug 12 02:24:33.380 2020 (UTC + 3:00)
System Uptime: 0 days 20:51:59.053
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`2f7c23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa8c`5fc6e740=000000000000007e
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8032f745b44, The address that the exception occurred at
Arg3: fffffa8c5fc6f758, Exception Record Address
Arg4: fffffa8c5fc6efa0, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9IGTL22
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6223
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8032f745b44
BUGCHECK_P3: fffffa8c5fc6f758
BUGCHECK_P4: fffffa8c5fc6efa0
EXCEPTION_RECORD: fffffa8c5fc6f758 -- (.exr 0xfffffa8c5fc6f758)
ExceptionAddress: fffff8032f745b44 (nt!RtlCompressBufferXpressLzStandard+0x0000000000000144)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffffa8c5fc6efa0 -- (.cxr 0xfffffa8c5fc6efa0)
rax=00000000000008fc rbx=ffffaf04b24d59cc rcx=0000000000000073
rdx=ffffaf04b24c63c0 rsi=0000000000100000 rdi=000000000000047e
rip=fffff8032f745b44 rsp=fffffa8c5fc6f990 rbp=ffffaf04b42f5c20
r8=3abed0cbb24d4f4f r9=ffffaf04b24d5f29 r10=ffffaf04b42f5c20
r11=ffffaf04b42f6000 r12=ffffaf04b24d5f29 r13=ffffaf04b42f5fd7
r14=ffffaf04b42f5c38 r15=ffffaf04b24c6028
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050216
nt!RtlCompressBufferXpressLzStandard+0x144:
fffff803`2f745b44 413808 cmp byte ptr [r8],cl ds:002b:3abed0cb`b24d4f4f=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: MemCompression
READ_ADDRESS: ffffffffffffffff
ERRR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffffa8c`5fc6f990 fffff803`2f7459f1 : ffffaf04`b24d5f29 fffff803`2f6ecee9 ffffaf04`b42f5070 ffffaf04`b24d4f4f : nt!RtlCompressBufferXpressLzStandard+0x144
fffffa8c`5fc6fa40 fffff803`2f71667f : fffff803`2fb8df10 fffff803`2fb8df20 00000000`00000000 ffffd269`349a4af0 : nt!RtlCompressBufferXpressLz+0x61
fffffa8c`5fc6faa0 fffff803`2f7495cd : fffff803`2fb8deb0 ffffaf04`a46c20e0 ffffaf04`b37d1028 ffffaf04`b24d4f4f : nt!RtlCompressBuffer+0x6f
fffffa8c`5fc6fb00 fffff803`2f7493ed : fffff803`2fb8deb0 fffff803`2fb8d9c0 ffffaf04`b42f5028 fffff803`2fb8de00 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxProcessEntry+0x91
fffffa8c`5fc6fb90 fffff803`2f71e155 : ffffffff`fd050f80 ffffaf04`ad1f2540 fffff803`2f749280 ffffffff`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxWorkerThread+0x16d
fffffa8c`5fc6fc10 fffff803`2f7c99c8 : ffff8281`14679180 ffffaf04`ad1f2540 fffff803`2f71e100 fffffa8c`5fc6fcd0 : nt!PspSystemThreadStartup+0x55
fffffa8c`5fc6fc60 00000000`00000000 : fffffa8c`5fc70000 fffffa8c`5fc6a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlCompressBufferXpressLzStandard+144
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xfffffa8c5fc6efa0 ; kb
BUCKET_ID_FUNC_OFFSET: 144
FAILURE_BUCKET_ID: AV_nt!RtlCompressBufferXpressLzStandard
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ecd29322-2063-7ed6-1d71-1cd65a0a5eee}
Followup: MachineOwner
---------
2. Memory.DMP dosya içeriği;
Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff805`5aa00000 PsLoadedModuleList = 0xfffff805`5ae480f0
Debug session time: Thu Aug 13 21:25:14.791 2020 (UTC + 3:00)
System Uptime: 0 days 1:02:02.462
Loading Kernel Symbols
...............................................................
................................................................
..............Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details
..................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000010`f6fb6018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`5abc23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9b0f`a6725740=0000000000000192
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc48a997b3080, The address of the thread.
Arg2: ffffc48a8b4f78c0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3265
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-9IGTL22
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3359
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffffc48a997b3080
BUGCHECK_P2: ffffc48a8b4f78c0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: ModernWarfare.exe
STACK_TEXT:
ffff9b0f`a6725738 fffff805`5aaa163d : 00000000`00000192 ffffc48a`997b3080 ffffc48a`8b4f78c0 00000000`00000000 : nt!KeBugCheckEx
ffff9b0f`a6725740 fffff805`5d6e4b95 : ffffc48a`8b4f78c0 ffffc48a`00000000 ffffc48a`8f53fb30 ffffc48a`99fb8c40 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14d
ffff9b0f`a6725780 fffff805`5d6e2f5c : ffff9b0f`a6725920 ffff9b0f`a6725900 00000000`00000003 fffff805`5d6e6400 : FLTMGR!FltpPerformPreCallbacks+0x435
ffff9b0f`a6725890 fffff805`5d71c7c5 : ffff9b0f`a67259f8 ffff9b0f`a6725b80 ffffc48a`997b3080 ffffc48a`97d816c0 : FLTMGR!FltpPassThroughFastIo+0x8c
ffff9b0f`a67258f0 fffff805`5b00407f : ffffc48a`97d816c0 00000000`00000000 00000000`00000000 ffffc48a`00000000 : FLTMGR!FltpFastIoRead+0x165
ffff9b0f`a67259a0 fffff805`5abd3c18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000010`f7dfd718 : nt!NtReadFile+0x39f
ffff9b0f`a6725a90 00007ff9`a62fc134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000010`f7dfd658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a62fc134
SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14d
FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}
Followup: MachineOwner
---------
İlkini hatırlamıyorum ama, ikinci olan oyun içerisinde iken oldu şimdi. Diğeri de belki oyunda iken olmuş olabilir. Oyun: Call Of Duty: Warzone.
Memtest86 İle RAM'larımı test ettim bir sorun çıkmadı. Yardımlarınızı bekliyorum...
* Oyun daha önce DEV ERROR 6328 hatası ve çeşitli hatalar veriyordu, dün akşam bazı ayarlamalar yaptım oyun için internet'den araştırıp uyguladığım.
* .DMP dosyalarının ilki 1.5 GB, ikincisi 1 GB, kimse indirmek istemeyeceği için muhtemelen kendim açıp paylaştım. Dosyaları WinDbg Preview ile açıp, analiz ettim. Kimse DMP dosyası nasıl paylaşılır diye boşuna link atmasın lütfen. Yine de indirmek istiyen var ise, yükleyebilirim.
up