RAM'lerde çok fazla hata var. Mavi ekranların sebebi de bu. Ben mesajımın altına mavi ekranlarınızın dökümünü ekleyeceğim. Bunu satıcıya gösterebilirsiniz.
[CODE title="Mavi ekran dökümler"]************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`54a00000 PsLoadedModuleList = 0xfffff801`54cc55d0
Debug session time: Mon May 24 14:29:19.839 2021 (UTC + 3:00)
System Uptime: 0 days 0:08:16.503
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
.....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`54b404c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`205c5e70=000000000000003b
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80162275823, Address of the instruction which caused the BugCheck.
Arg3: ffffd000205c6720, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80154d4f308.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2343.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 6496.
Key : Analysis.Init.CPU.mSec
Value: 733.
Key : Analysis.Init.Elapsed.mSec
Value: 28032.
Key : Analysis.Memory.CommitPeak.Mb
Value: 83.
Key : WER.OS.Branch
Value: winblue_ltsb.
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
BUGCHECK_CODE: 3b.
BUGCHECK_P1: c0000005.
BUGCHECK_P2: fffff80162275823.
BUGCHECK_P3: ffffd000205c6720.
BUGCHECK_P4: 0
CONTEXT: ffffd000205c6720 -- (.cxr 0xffffd000205c6720)
rax=ffffc00173103138 rbx=ffffc00173103100 rcx=fffdc00171343608
rdx=ffffc00171343608 rsi=ffffe000d1f8d000 rdi=ffffe000d09957f0
rip=fffff80162275823 rsp=ffffd000205c7140 rbp=ffffd000205c71c9
r8=0000000000000004 r9=0000000000000007 r10=ffffd001e1066000
r11=0000000000000174 r12=0000000000000001 r13=ffffc001713434f0
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263:
fffff801`62275823 483901 cmp qword ptr [rcx],rax ds:002b:fffdc001`71343608=????????????????
Resetting default scope.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Lege.
STACK_TEXT:
ffffd000`205c7140 fffff801`62275064 : ffffe000`d1f8d000 fffff801`54a9a8a5 00000000`00000001 ffffe000`d1f8d000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x263
ffffd000`205c7230 fffff801`62274e82 : ffffc001`713fa0e0 fffff801`00000000 ffffc001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x194
ffffd000`205c73b0 fffff801`62119dc2 : ffffc001`6906ab00 00000000`00000000 ffffc001`70e8c5e0 ffffc001`00000007 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd000`205c73f0 fffff801`6212a1e2 : ffffc001`713fa0e0 00000000`00000000 00000000`00000000 ffffc001`6906ab00 : dxgkrnl!DXGDEVICE:
estroyAllocations+0x752
ffffd000`205c74f0 fffff801`62126f07 : ffffc001`6ad00000 ffffd000`205c75d9 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE:
estroyAllDeviceState+0x172
ffffd000`205c7550 fffff801`621252c1 : ffffc001`6ad00000 ffffc001`70e8c5e0 ffffc001`70e8c5e0 fffff960`005171a0 : dxgkrnl!ADAPTER_RENDER:
estroyDevice+0xa7
ffffd000`205c7580 fffff801`621256a5 : 00000000`00000100 ffffc001`70e8c5e0 fffff901`422a4d88 00000000`00000000 : dxgkrnl!DXGPROCESS:
estroy+0x2dd
ffffd000`205c7640 fffff960`001d08f7 : 00000000`000008e8 ffffd000`205c7860 fffff901`422a4c90 ffffe000`d37302c0 : dxgkrnl!DxgkProcessCallout+0x135
ffffd000`205c76a0 fffff960`001d173b : fffff901`422a4c90 ffffe000`d37302c0 00000000`00000000 00000000`ffcf0000 : win32k!GdiProcessCallout+0x1f7
ffffd000`205c7720 fffff801`54dcdafe : ffffd000`205c7860 ffffd000`205c7800 00000000`00000000 00060030`00010002 : win32k!W32pProcessCallout+0x53
ffffd000`205c7750 fffff801`54dccd2c : ffffe000`d1fe0e40 00000000`00000000 00000000`00000000 ffffe000`d3730588 : nt!PsInvokeWin32Callout+0x42
ffffd000`205c7790 fffff801`54e73270 : ffffd000`00000001 ffffe000`d1331080 ffffd000`205c7b00 ffffe000`d1331128 : nt!PspExitThread+0x518
ffffd000`205c78a0 fffff801`54a560aa : 00000000`00000000 ffffe000`d1eb8900 00000000`00000001 00000000`773453ea : nt!KiSchedulerApcTerminate+0x18
ffffd000`205c78d0 fffff801`54b45950 : 00000000`0ebcea90 ffffd000`205c7950 fffff801`54bbbc44 00000000`00000000 : nt!KiDeliverApc+0x2fa
ffffd000`205c7950 fffff801`54b5048a : 00000000`000001f8 00000000`0ebcea90 00000000`00000010 00000000`1215f9f0 : nt!KiInitiateUserApc+0x70
ffffd000`205c7a90 00007ff8`a02620da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0ebce378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a02620da
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+263
MODULE_NAME: dxgmms1.
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 6.3.9600.19176
STACK_COMMAND: .cxr 0xffffd000205c6720 ; kb.
BUCKET_ID_FUNC_OFFSET: 263.
FAILURE_BUCKET_ID: 0x3B_c0000005_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff803`85214000 PsLoadedModuleList = 0xfffff803`854d95d0
Debug session time: Mon May 24 10:31:47.472 2021 (UTC + 3:00)
System Uptime: 0 days 1:34:20.135
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`853544c0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffd000`21a552b0=0000000000000024
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00021a56498.
Arg3: ffffd00021a55cb0.
Arg4: fffff8038523bfd5.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80385563308.
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read.
Key : Analysis.CPU.mSec
Value: 2296.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 7316.
Key : Analysis.Init.CPU.mSec
Value: 703.
Key : Analysis.Init.Elapsed.mSec
Value: 25895.
Key : Analysis.Memory.CommitPeak.Mb
Value: 71.
Key : WER.OS.Branch
Value: winblue_ltsb.
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
BUGCHECK_CODE: 24.
BUGCHECK_P1: b500190645.
BUGCHECK_P2: ffffd00021a56498.
BUGCHECK_P3: ffffd00021a55cb0.
BUGCHECK_P4: fffff8038523bfd5.
EXCEPTION_RECORD: ffffd00021a56498 -- (.exr 0xffffd00021a56498)
ExceptionAddress: fffff8038523bfd5 (nt!DeleteNodeFromTree+0x0000000000000165)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.
CONTEXT: ffffd00021a55cb0 -- (.cxr 0xffffd00021a55cb0)
rax=ffffc00159ca6a50 rbx=ffffc001599541b0 rcx=0002000000000000
rdx=ffffc00159954101 rsi=ffffe001496a1488 rdi=ffffc001599541b0
rip=fffff8038523bfd5 rsp=ffffd00021a566d0 rbp=ffffe0014a640708
r8=00000000000021fe r9=0000ffffffffffff r10=ffffe00149000000
r11=0000000000000689 r12=ffffd00021a567ff r13=0000000000000000
r14=0000000000000001 r15=ffffe0014a640100
iopl=0 nv up ei pl nz na po nc.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`7f805000 PsLoadedModuleList = 0xfffff802`7faca5d0
Debug session time: Tue May 25 14:00:31.309 2021 (UTC + 3:00)
System Uptime: 0 days 1:20:52.973
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard.
coded breakpoint or assertion was hit, but this system was booted.
/NODEBUG. This is not supposed to happen as developers should never have.
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the.
system is booted /DEBUG. This will let us see why this breakpoint is.
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff8027f871dc7, The address that the exception occurred at.
Arg3: ffffd000e2267708, Exception Record Address.
Arg4: ffffd000e2266f20, Context Record Address.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff8027fb54308.
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read.
Key : Analysis.CPU.mSec
Value: 2155.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 7857.
Key : Analysis.Init.CPU.mSec
Value: 749.
Key : Analysis.Init.Elapsed.mSec
Value: 24454.
Key : Analysis.Memory.CommitPeak.Mb
Value: 70.
Key : WER.OS.Branch
Value: winblue_ltsb.
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
BUGCHECK_CODE: 7e.
BUGCHECK_P1: ffffffffc0000005.
BUGCHECK_P2: fffff8027f871dc7.
BUGCHECK_P3: ffffd000e2267708.
BUGCHECK_P4: ffffd000e2266f20.
EXCEPTION_RECORD: ffffd000e2267708 -- (.exr 0xffffd000e2267708)
ExceptionAddress: fffff8027f871dc7 (nt!IoGetRelatedDeviceObject+0x0000000000000087)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.
CONTEXT: ffffd000e2266f20 -- (.cxr 0xffffd000e2266f20)
rax=fffde000f9b780d0 rbx=ffffe000f9f31030 rcx=ffffe000f9a2d070
rdx=0000000000000000 rsi=ffffe000f92fbdc0 rdi=ffffe000f9a2d040
rip=fffff8027f871dc7 rsp=ffffd000e2267940 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000002 r10=0000000000000002
r11=ffffd000e2267a48 r12=0000000000000000 r13=0000000000000000
r14=ffffc0011d0cc200 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!IoGetRelatedDeviceObject+0x87:
fffff802`7f871dc7 488b4810 mov rcx,qword ptr [rax+10h] ds:002b:fffde000`f9b780e0=????????????????
Resetting default scope.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8027fb542a8.
GetUlongPtrFromAddress: unable to read from fffff8027fb54530.
ffffffffffffffff.
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff801`39613000 PsLoadedModuleList = 0xfffff801`398d85d0
Debug session time: Wed May 26 11:39:11.598 2021 (UTC + 3:00)
System Uptime: 0 days 3:01:15.270
Loading Kernel Symbols.
...............................................................
................................................................
.........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`397534c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`ae8a8670=000000000000003b
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff8013963fb2c, Address of the instruction which caused the BugCheck.
Arg3: ffffd001ae8a8f20, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff80139962308.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2640.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 5643.
Key : Analysis.Init.CPU.mSec
Value: 717.
Key : Analysis.Init.Elapsed.mSec
Value: 23180.
Key : Analysis.Memory.CommitPeak.Mb
Value: 64.
Key : WER.OS.Branch
Value: winblue_ltsb.
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
BUGCHECK_CODE: 3b.
BUGCHECK_P1: c0000005.
BUGCHECK_P2: fffff8013963fb2c.
BUGCHECK_P3: ffffd001ae8a8f20.
BUGCHECK_P4: 0
CONTEXT: ffffd001ae8a8f20 -- (.cxr 0xffffd001ae8a8f20)
rax=0000000000000002 rbx=0000000000000000 rcx=ffffe0006b1fb070
rdx=0000000000000002 rsi=0000000000000000 rdi=ffffe0006b1fb070
rip=fffff8013963fb2c rsp=ffffd001ae8a9948 rbp=ffffe0006aff28c0
r8=0000000000000000 r9=0002000000000000 r10=0000000000000001
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210207
nt!IopGetFileObjectExtension+0x18:
fffff801`3963fb2c 498b44c108 mov rax,qword ptr [r9+rax*8+8] ds:002b:00020000`00000018=????????????????
Resetting default scope.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.
STACK_TEXT:
ffffd001`ae8a9948 fffff801`399f6f4a : ffffe000`00000000 ffffe000`0000000e 00000000`00000000 ffffd001`ae8a99a0 : nt!IopGetFileObjectExtension+0x18
ffffd001`ae8a9950 fffff801`399f99a3 : ffffe000`66afb840 ffffd001`ae8a9a99 00000000`00000000 00000000`00000000 : nt!IopCloseFile+0x242
ffffd001`ae8a99e0 fffff801`397633e3 : ffffe000`6adce080 00000000`000000e8 00000000`0063fdb0 00000000`0073f9dc : nt!NtClose+0x1c3
ffffd001`ae8a9b00 00000000`77b92352 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0063e618 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b92352.
SYMBOL_NAME: nt!IopGetFileObjectExtension+18
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 6.3.9600.20012
STACK_COMMAND: .cxr 0xffffd001ae8a8f20 ; kb.
BUCKET_ID_FUNC_OFFSET: 18.
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!IopGetFileObjectExtension
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 8.1
FAILURE_ID_HASH: {03045510-38a3-0637-f832-f8ea54b50f00}
Followup: MachineOwner.
---------
************ Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff800`18e88000 PsLoadedModuleList = 0xfffff800`1914d5d0
Debug session time: Wed May 26 14:18:53.255 2021 (UTC + 3:00)
System Uptime: 0 days 0:41:06.926
Loading Kernel Symbols.
...............................................................
................................................................
..........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`18fc84c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`21310550=000000000000003b
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck.
Arg2: fffff80019116b12, Address of the instruction which caused the BugCheck.
Arg3: ffffd00021310e00, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff800191d7308.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2624.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 7653.
Key : Analysis.Init.CPU.mSec
Value: 671.
Key : Analysis.Init.Elapsed.mSec
Value: 21873.
Key : Analysis.Memory.CommitPeak.Mb
Value: 65.
Key : WER.OS.Branch
Value: winblue_ltsb.
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
BUGCHECK_CODE: 3b.
BUGCHECK_P1: c0000005.
BUGCHECK_P2: fffff80019116b12.
BUGCHECK_P3: ffffd00021310e00.
BUGCHECK_P4: 0
CONTEXT: ffffd00021310e00 -- (.cxr 0xffffd00021310e00)
rax=fffdc000701d5b20 rbx=0000000000000002 rcx=ffffe000b7c17420
rdx=fffdc000701d5b20 rsi=0000000000000000 rdi=ffffe000b7c17280
rip=fffff80019116b12 rsp=ffffd00021311820 rbp=000000000000000b
r8=ffffc0006eaca1b0 r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=ffffe000b7c17288
iopl=0 nv up ei ng nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!ExDeferredFreePool+0x102:
fffff800`19116b12 488b10 mov rdx,qword ptr [rax] ds:002b:fffdc000`701d5b20=????????????????
Resetting default scope.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffd000`21311820 fffff800`19115874 : ffffc000`7108ba90 ffffc000`7003ea80 00000000`656b6f54 ffffe000`b7c17280 : nt!ExDeferredFreePool+0x102
ffffd000`213118a0 fffff800`1925fc44
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (4 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Edition build lab: 9600.20012.amd64fre.winblue_ltsb.210405-1700
Machine Name:
Kernel base = 0xfffff802`21684000 PsLoadedModuleList = 0xfffff802`219495d0
Debug session time: Thu May 27 14:57:24.441 2021 (UTC + 3:00)
System Uptime: 0 days 0:07:45.102
Loading Kernel Symbols.
...............................................................
................................................................
........
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`217c44c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`26a13360=0000000000000024
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd.
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack.
trace.
Arguments:
Arg1: 000000b500190645.
Arg2: ffffd00126a14548.
Arg3: ffffd00126a13d60.
Arg4: fffff80221718664.
Debugging Details:
------------------
GetUlongPtrFromAddress: unable to read from fffff802219d3308.
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read.
Key : Analysis.CPU.mSec
Value: 2359.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 7774.
Key : Analysis.Init.CPU.mSec
Value: 765.
Key : Analysis.Init.Elapsed.mSec
Value: 19584.
Key : Analysis.Memory.CommitPeak.Mb
Value: 72.
Key : WER.OS.Branch
Value: winblue_ltsb.
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
BUGCHECK_CODE: 24.
BUGCHECK_P1: b500190645.
BUGCHECK_P2: ffffd00126a14548.
BUGCHECK_P3: ffffd00126a13d60.
BUGCHECK_P4: fffff80221718664.
EXCEPTION_RECORD: ffffd00126a14548 -- (.exr 0xffffd00126a14548)
ExceptionAddress: fffff80221718664 (nt!FsRtlAcquireHeaderMutex+0x0000000000000024)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000.
NumberParameters: 2
Parameter[0]: 0000000000000000.
Parameter[1]: ffffffffffffffff.
Attempt to read from address ffffffffffffffff.
CONTEXT: ffffd00126a13d60 -- (.cxr 0xffffd00126a13d60)
rax=000000000000fffe rbx=fffdc000d643b140 rcx=ffffc000d643b1a8
rdx=ffffc000d643b140 rsi=ffffc000d643b140 rdi=ffffc000d643b140
rip=fffff80221718664 rsp=ffffd00126a14780 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=ffffc000d643b140
r11=ffffe001f216c180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe001f20e0de8
iopl=0 nv up ei pl nz na pe nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!FsRtlAcquireHeaderMutex+0x24:
fffff802`21718664 488b5b30 mov rbx,qword ptr [rbx+30h] ds:002b:fffdc000`d643b170=????????????????
Resetting default scope.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802219d32a8.
GetUlongPtrFromAddress: unable to read from fffff802219d3530.
ffffffffffffffff [/CODE]