muhammetguven
Femtopat
- Katılım
- 7 Nisan 2022
- Mesajlar
- 4
Daha fazla
- Cinsiyet
- Erkek
- RAM
- 8 gb
- SSD veya HDD modeli
- A2000
- Ekran kartı
- RX 550 2GB
- Anakart
- ROG Strix
- İşlemci
- intel i5 10400f
*
Selam hayırlı ramazanlar benim PC'de uzun zamandır bir sorun var. işlemci ve ankart harici bütün parçaları değiştim ama sorun devam ediyor. DPM bu şekilde:
[CODE title="Mavi ekran"]Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040422-10359-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`6c000000 PsLoadedModuleList = 0xfffff805`6cc2a2d0
Debug session time: Mon Apr 4 19:03:03.948 2022 (UTC + 3:00)
System Uptime: 0 days 1:23:07.530
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`6c3f7620 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8d89`80615e80=0000000000000154
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffce04432e2000, Pointer to the store context or data manager
Arg2: ffff8d8980615f30, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2983
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 38450
Key : Analysis.Init.CPU.mSec
Value: 702
Key : Analysis.Init.Elapsed.mSec
Value: 16111
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 040422-10359-01.dmp
BUGCHECK_CODE: 154
BUGCHECK_P1: ffffce04432e2000
BUGCHECK_P2: ffff8d8980615f30
BUGCHECK_P3: 2
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffff8d8980616eb8 -- (.exr 0xffff8d8980616eb8)
ExceptionAddress: fffff8056c3317f0 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
ExceptionCode: c0000006 (In-page I/O error)
ExceptionFlags: 00000000
NumberParameters: 3
Parameter[0]: 0000000000000000
Parameter[1]: 000002498fa80b40
Parameter[2]: 00000000c0000010
Inpage operation failed at 000002498fa80b40, due to I/O error 00000000c0000010
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000002498fa80b40
CONTEXT: ffff8d89806166f0 -- (.cxr 0xffff8d89806166f0)
rax=fffff8056c3317a0 rbx=ffff9f80e16e5000 rcx=ffff9f80e16e5000
rdx=ffff9f80e16e5000 rsi=0000000000000002 rdi=000002498fa80b40
rip=fffff8056c3317f0 rsp=ffff8d89806170f8 rbp=000002498fa81646
r8=000002498fa80b40 r9=0000000000000b5c r10=ffff9f80e16e5ea0
r11=000002498fa8169c r12=ffff8d8980617368 r13=ffffce0448cf2000
r14=ffff9f80e16e6000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlDecompressBufferXpressLz+0x50:
fffff805`6c3317f0 418b08 mov ecx,dword ptr [r8] ds:002b:00000249`8fa80b40=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/ hata durumu y z nden belle e yerle tirilmedi.
EXCEPTION_CODE_STR: c0000006
EXCEPTION_PARAMETER3: 00000000c0000010
EXCEPTION_STR: 0xc0000006
STACK_TEXT:
ffff8d89`806170f8 fffff805`6c306660 : ffff9f80`e16e5000 ffff9f80`e16e5000 00000000`00000002 00000249`8fa80b40 : nt!RtlDecompressBufferXpressLz+0x50
ffff8d89`80617110 fffff805`6c3063a8 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`000e16e4 : nt!RtlDecompressBufferEx+0x60
ffff8d89`80617160 fffff805`6c306235 : 00000000`00000004 fffff805`6c305d9e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffff8d89`80617220 fffff805`6c305a6c : 00000000`00000001 00000000`00000b40 ffffce04`432e2000 ffffce04`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff8d89`80617270 fffff805`6c30589c : ffffce04`ffffffff ffffce04`48cf2000 ffff8d89`80617350 ffffce04`47078990 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff8d89`80617310 fffff805`6c3056e9 : ffff9f80`dfa08730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff8d89`806173c0 fffff805`6c3055a1 : ffffce04`432e2000 ffffce04`47078990 ffffce04`48cf2000 ffffce04`432e39c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff8d89`80617440 fffff805`6c2f8618 : ffffce04`441ce080 ffffce04`432e2000 00000000`00000000 ffffce04`43dfe440 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff8d89`80617470 fffff805`6c3030ff : fffff805`6c305580 ffff8d89`80617510 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8d89`806174e0 fffff805`6c2d0fc4 : ffff8d89`806175e0 00000000`31526d73 00000000`000003ff fffff805`6cd229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff8d89`806175b0 fffff805`6c2d09f8 : 00000000`0000000c 00000000`000003ff ffff8d89`80617660 fffff805`6cd229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff8d89`80617600 fffff805`6c303b87 : 00000000`0000000c 00000000`00000001 ffffce04`47078990 ffffce04`43dfe440 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff8d89`80617690 fffff805`6c35afcb : ffffce04`00000001 ffffce04`43dfe500 00000000`00000000 ffffce04`432e2000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff8d89`80617700 fffff805`6c25df30 : 0000007f`00000100 00000000`00000000 ffff8d89`80617958 fffff805`6c25be80 : nt!SmPageRead+0x33
ffff8d89`80617750 fffff805`6c25b9dd : 00000000`00000002 ffff8d89`806177e0 ffff8d89`80617958 ffffce04`43dfe3f0 : nt!MiIssueHardFaultIo+0x10c
ffff8d89`806177a0 fffff805`6c29f5b8 : 00000000`c0033333 00000000`00000001 000001e6`5fbcad47 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffff8d89`80617860 fffff805`6c40575e : 00000000`00000000 0000001c`9c77a530 ffff8d89`80617a80 ffffce04`00000000 : nt!MmAccessFault+0x468
ffff8d89`80617a00 00007ffe`e728ad4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
0000001c`9c77ae40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e728ad4c
SYMBOL_NAME: nt!RtlDecompressBufferXpressLz+50
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1586
STACK_COMMAND: .cxr 0xffff8d89806166f0 ; kb
BUCKET_ID_FUNC_OFFSET: 50
FAILURE_BUCKET_ID: 0x154_c0000006_c0000010_nt!RtlDecompressBufferXpressLz
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a4be585-9932-44df-c399-947f3eda8d83}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040422-10109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`11800000 PsLoadedModuleList = 0xfffff801`1242a2d0
Debug session time: Mon Apr 4 20:52:21.188 2022 (UTC + 3:00)
System Uptime: 0 days 0:01:17.893
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`11bf7620 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc28e`2d49f840=00000000000000ef
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff9a048e181240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 89662
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 3716
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : CriticalProcessDied.ExceptionCode
Value: 8e1e2040
Key : CriticalProcessDied.ImageName
Value: psmserviceexthost.dll
Key : CriticalProcessDied.ImageOffset
Value: 73438
Key : CriticalProcessDied.ImageSize
Value: c1000
Key : CriticalProcessDied.ImageTimestamp
Value: eee121a3
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : CriticalProcessDied.Symbol
Value: psmserviceexthost.dll!?RmHostFromHamHost@@YAPEAU_RM_ACTIVITY_HOST@@PEAU_RM_HAM_ACTIVITY_HOST@@@Z
Key : CriticalProcessDied.WERReportId
Value: f79b0bd4-5089-4c2a-ba34-7a7002427051
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 040422-10109-01.dmp
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff9a048e181240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x8e1e2040 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {f79b0bd4-5089-4c2a-ba34-7a7002427051}
IMAGE_NAME: psmserviceexthost.dll
MODULE_NAME: psmserviceexthost
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffc28e`2d49f838 fffff801`121086d2 : 00000000`000000ef ffff9a04`8e181240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc28e`2d49f840 fffff801`1200fceb : 00000000`00000000 fffff801`11afd8ad 00000000`00000002 fffff801`11afcec7 : nt!PspCatchCriticalBreak+0x10e
ffffc28e`2d49f8e0 fffff801`11eb58b4 : ffff9a04`00000000 00000000`00000000 ffff9a04`8e181240 ffff9a04`8e181678 : nt!PspTerminateAllThreads+0x15ab6f
ffffc28e`2d49f950 fffff801`11eb5bdc : ffff9a04`8e181240 00000000`00000000 000000f9`6b6ff99c fffff801`11e01a3a : nt!PspTerminateProcess+0xe0
ffffc28e`2d49f990 fffff801`11c08fb5 : ffff9a04`8e181240 ffff9a04`8e1e2040 ffffc28e`2d49fa80 ffff9a04`8e181240 : nt!NtTerminateProcess+0x9c
ffffc28e`2d49fa00 00007fff`68ecd2f4 : 00007fff`68f42c03 00007fff`68f766f8 000000f9`6b6ff960 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f9`6b6fe6e8 00007fff`68f42c03 : 00007fff`68f766f8 000000f9`6b6ff960 00000000`00000000 00007fff`68e30000 : 0x00007fff`68ecd2f4
000000f9`6b6fe6f0 00007fff`68f766f8 : 000000f9`6b6ff960 00000000`00000000 00007fff`68e30000 00000000`00000006 : 0x00007fff`68f42c03
000000f9`6b6fe6f8 000000f9`6b6ff960 : 00000000`00000000 00007fff`68e30000 00000000`00000006 00007fff`68ed530e : 0x00007fff`68f766f8
000000f9`6b6fe700 00000000`00000000 : 00007fff`68e30000 00000000`00000006 00007fff`68ed530e 00007fff`68f766f8 : 0x000000f9`6b6ff960
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8e1e2040_psmserviceexthost.dll!?RmHostFromHamHost@@YAPEAU_RM_ACTIVITY_HOST@@PEAU_RM_HAM_ACTIVITY_HOST@@@Z_IMAGE_psmserviceexthost.dll
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {23205916-acb6-7c0f-67e7-f1efd91cf984}
Followup: MachineOwner
---------
10: kd> lmvm psmserviceexthost
Browse full module list
start end module name[/CODE]
Selam hayırlı ramazanlar benim PC'de uzun zamandır bir sorun var. işlemci ve ankart harici bütün parçaları değiştim ama sorun devam ediyor. DPM bu şekilde:
[CODE title="Mavi ekran"]Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040422-10359-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`6c000000 PsLoadedModuleList = 0xfffff805`6cc2a2d0
Debug session time: Mon Apr 4 19:03:03.948 2022 (UTC + 3:00)
System Uptime: 0 days 1:23:07.530
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`6c3f7620 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8d89`80615e80=0000000000000154
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffffce04432e2000, Pointer to the store context or data manager
Arg2: ffff8d8980615f30, Exception information
Arg3: 0000000000000002, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2983
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 38450
Key : Analysis.Init.CPU.mSec
Value: 702
Key : Analysis.Init.Elapsed.mSec
Value: 16111
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 040422-10359-01.dmp
BUGCHECK_CODE: 154
BUGCHECK_P1: ffffce04432e2000
BUGCHECK_P2: ffff8d8980615f30
BUGCHECK_P3: 2
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffff8d8980616eb8 -- (.exr 0xffff8d8980616eb8)
ExceptionAddress: fffff8056c3317f0 (nt!RtlDecompressBufferXpressLz+0x0000000000000050)
ExceptionCode: c0000006 (In-page I/O error)
ExceptionFlags: 00000000
NumberParameters: 3
Parameter[0]: 0000000000000000
Parameter[1]: 000002498fa80b40
Parameter[2]: 00000000c0000010
Inpage operation failed at 000002498fa80b40, due to I/O error 00000000c0000010
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000002498fa80b40
CONTEXT: ffff8d89806166f0 -- (.cxr 0xffff8d89806166f0)
rax=fffff8056c3317a0 rbx=ffff9f80e16e5000 rcx=ffff9f80e16e5000
rdx=ffff9f80e16e5000 rsi=0000000000000002 rdi=000002498fa80b40
rip=fffff8056c3317f0 rsp=ffff8d89806170f8 rbp=000002498fa81646
r8=000002498fa80b40 r9=0000000000000b5c r10=ffff9f80e16e5ea0
r11=000002498fa8169c r12=ffff8d8980617368 r13=ffffce0448cf2000
r14=ffff9f80e16e6000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!RtlDecompressBufferXpressLz+0x50:
fffff805`6c3317f0 418b08 mov ecx,dword ptr [r8] ds:002b:00000249`8fa80b40=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
ERROR_CODE: (NTSTATUS) 0xc0000006 - 0x%p adresindeki y nerge, 0x%p bellek adresine ba vurdu. Gerekli veriler, 0x%x G/ hata durumu y z nden belle e yerle tirilmedi.
EXCEPTION_CODE_STR: c0000006
EXCEPTION_PARAMETER3: 00000000c0000010
EXCEPTION_STR: 0xc0000006
STACK_TEXT:
ffff8d89`806170f8 fffff805`6c306660 : ffff9f80`e16e5000 ffff9f80`e16e5000 00000000`00000002 00000249`8fa80b40 : nt!RtlDecompressBufferXpressLz+0x50
ffff8d89`80617110 fffff805`6c3063a8 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`000e16e4 : nt!RtlDecompressBufferEx+0x60
ffff8d89`80617160 fffff805`6c306235 : 00000000`00000004 fffff805`6c305d9e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x150
ffff8d89`80617220 fffff805`6c305a6c : 00000000`00000001 00000000`00000b40 ffffce04`432e2000 ffffce04`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff8d89`80617270 fffff805`6c30589c : ffffce04`ffffffff ffffce04`48cf2000 ffff8d89`80617350 ffffce04`47078990 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff8d89`80617310 fffff805`6c3056e9 : ffff9f80`dfa08730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff8d89`806173c0 fffff805`6c3055a1 : ffffce04`432e2000 ffffce04`47078990 ffffce04`48cf2000 ffffce04`432e39c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff8d89`80617440 fffff805`6c2f8618 : ffffce04`441ce080 ffffce04`432e2000 00000000`00000000 ffffce04`43dfe440 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff8d89`80617470 fffff805`6c3030ff : fffff805`6c305580 ffff8d89`80617510 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff8d89`806174e0 fffff805`6c2d0fc4 : ffff8d89`806175e0 00000000`31526d73 00000000`000003ff fffff805`6cd229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff8d89`806175b0 fffff805`6c2d09f8 : 00000000`0000000c 00000000`000003ff ffff8d89`80617660 fffff805`6cd229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff8d89`80617600 fffff805`6c303b87 : 00000000`0000000c 00000000`00000001 ffffce04`47078990 ffffce04`43dfe440 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff8d89`80617690 fffff805`6c35afcb : ffffce04`00000001 ffffce04`43dfe500 00000000`00000000 ffffce04`432e2000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff8d89`80617700 fffff805`6c25df30 : 0000007f`00000100 00000000`00000000 ffff8d89`80617958 fffff805`6c25be80 : nt!SmPageRead+0x33
ffff8d89`80617750 fffff805`6c25b9dd : 00000000`00000002 ffff8d89`806177e0 ffff8d89`80617958 ffffce04`43dfe3f0 : nt!MiIssueHardFaultIo+0x10c
ffff8d89`806177a0 fffff805`6c29f5b8 : 00000000`c0033333 00000000`00000001 000001e6`5fbcad47 00000000`00000000 : nt!MiIssueHardFault+0x29d
ffff8d89`80617860 fffff805`6c40575e : 00000000`00000000 0000001c`9c77a530 ffff8d89`80617a80 ffffce04`00000000 : nt!MmAccessFault+0x468
ffff8d89`80617a00 00007ffe`e728ad4c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
0000001c`9c77ae40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e728ad4c
SYMBOL_NAME: nt!RtlDecompressBufferXpressLz+50
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1586
STACK_COMMAND: .cxr 0xffff8d89806166f0 ; kb
BUCKET_ID_FUNC_OFFSET: 50
FAILURE_BUCKET_ID: 0x154_c0000006_c0000010_nt!RtlDecompressBufferXpressLz
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8a4be585-9932-44df-c399-947f3eda8d83}
Followup: MachineOwner
---------
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2202.7001.0_neutral__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\040422-10109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`11800000 PsLoadedModuleList = 0xfffff801`1242a2d0
Debug session time: Mon Apr 4 20:52:21.188 2022 (UTC + 3:00)
System Uptime: 0 days 0:01:17.893
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`11bf7620 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc28e`2d49f840=00000000000000ef
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffff9a048e181240, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 89662
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 3716
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : CriticalProcessDied.ExceptionCode
Value: 8e1e2040
Key : CriticalProcessDied.ImageName
Value: psmserviceexthost.dll
Key : CriticalProcessDied.ImageOffset
Value: 73438
Key : CriticalProcessDied.ImageSize
Value: c1000
Key : CriticalProcessDied.ImageTimestamp
Value: eee121a3
Key : CriticalProcessDied.Process
Value: svchost.exe
Key : CriticalProcessDied.Symbol
Value: psmserviceexthost.dll!?RmHostFromHamHost@@YAPEAU_RM_ACTIVITY_HOST@@PEAU_RM_HAM_ACTIVITY_HOST@@@Z
Key : CriticalProcessDied.WERReportId
Value: f79b0bd4-5089-4c2a-ba34-7a7002427051
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 040422-10109-01.dmp
BUGCHECK_CODE: ef
BUGCHECK_P1: ffff9a048e181240
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
ERROR_CODE: (NTSTATUS) 0x8e1e2040 - <Unable to get error code text>
CRITICAL_PROCESS_REPORTGUID: {f79b0bd4-5089-4c2a-ba34-7a7002427051}
IMAGE_NAME: psmserviceexthost.dll
MODULE_NAME: psmserviceexthost
FAULTING_MODULE: 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffc28e`2d49f838 fffff801`121086d2 : 00000000`000000ef ffff9a04`8e181240 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc28e`2d49f840 fffff801`1200fceb : 00000000`00000000 fffff801`11afd8ad 00000000`00000002 fffff801`11afcec7 : nt!PspCatchCriticalBreak+0x10e
ffffc28e`2d49f8e0 fffff801`11eb58b4 : ffff9a04`00000000 00000000`00000000 ffff9a04`8e181240 ffff9a04`8e181678 : nt!PspTerminateAllThreads+0x15ab6f
ffffc28e`2d49f950 fffff801`11eb5bdc : ffff9a04`8e181240 00000000`00000000 000000f9`6b6ff99c fffff801`11e01a3a : nt!PspTerminateProcess+0xe0
ffffc28e`2d49f990 fffff801`11c08fb5 : ffff9a04`8e181240 ffff9a04`8e1e2040 ffffc28e`2d49fa80 ffff9a04`8e181240 : nt!NtTerminateProcess+0x9c
ffffc28e`2d49fa00 00007fff`68ecd2f4 : 00007fff`68f42c03 00007fff`68f766f8 000000f9`6b6ff960 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f9`6b6fe6e8 00007fff`68f42c03 : 00007fff`68f766f8 000000f9`6b6ff960 00000000`00000000 00007fff`68e30000 : 0x00007fff`68ecd2f4
000000f9`6b6fe6f0 00007fff`68f766f8 : 000000f9`6b6ff960 00000000`00000000 00007fff`68e30000 00000000`00000006 : 0x00007fff`68f42c03
000000f9`6b6fe6f8 000000f9`6b6ff960 : 00000000`00000000 00007fff`68e30000 00000000`00000006 00007fff`68ed530e : 0x00007fff`68f766f8
000000f9`6b6fe700 00000000`00000000 : 00007fff`68e30000 00000000`00000006 00007fff`68ed530e 00007fff`68f766f8 : 0x000000f9`6b6ff960
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_8e1e2040_psmserviceexthost.dll!?RmHostFromHamHost@@YAPEAU_RM_ACTIVITY_HOST@@PEAU_RM_HAM_ACTIVITY_HOST@@@Z_IMAGE_psmserviceexthost.dll
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {23205916-acb6-7c0f-67e7-f1efd91cf984}
Followup: MachineOwner
---------
10: kd> lmvm psmserviceexthost
Browse full module list
start end module name[/CODE]