RX550 sistemde mavi ekran hatası

İşletim sistemi
Windows 10

Osman Kankal

Centipat
Katılım
21 Aralık 2019
Mesajlar
12
Minidump dosyam https://www.dropbox.com/s/in40u3wr73bg5cp/27.03.2021 minidump.rar?dl=0
Kernel Security check failure.
System service exception.
Bir iki tane daha vardı böyle hata.
Windows 10 Pro.
8 GB DDR3 RAM kullanıyorum.
İşlemcim FX 8320e.
Ekran kartım RX550.
MA5g97le r2.0 anakart.
2 tane James Donkey SSD takılı.

Yeni format attım format atarken de mavi ekran hataları veriyordu. Bir şekilde formatı atmayı başardım.

Şimdi deli etti hatalar ardı arkası kesilmiyor. AMD wattmann hatası da geliyor. Sistem kitleniyor, tekrar ekran kapanıp geliyor.
 
HD Tune 5.75 indirip sistemdeki tüm disklerin Health sekmesini paylaşın ve sisteme yüklü tüm yazıcı sürücülerini kaldırın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8025b22e07e, Address of the instruction which caused the bugcheck
Arg3: ffffd30166472920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8077

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12656

    Key  : Analysis.Init.CPU.mSec
    Value: 1108

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6245

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8025b22e07e

BUGCHECK_P3: ffffd30166472920

BUGCHECK_P4: 0

CONTEXT:  ffffd30166472920 -- (.cxr 0xffffd30166472920)
rax=0000000000000000 rbx=ffffe38470adf760 rcx=ffffe38470adf760
rdx=8400000000000000 rsi=0000000000000001 rdi=ffffab0b0d10f580
rip=fffff8025b22e07e rsp=ffffe38470adf700 rbp=ffffe38470adf799
 r8=ffffab0b0d10f520  r9=0000000000000000 r10=0000000000000000
r11=ffffe38470adf860 r12=0000000000000000 r13=ffffffffffffffff
r14=0000000000000000 r15=ffffab0b0c39b080
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff802`5b22e07e 48890a          mov     qword ptr [rdx],rcx ds:002b:84000000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  voicemeeterpro.exe

STACK_TEXT: 
ffffe384`70adf700 fffff802`5b262fe2     : 00000000`00000000 ffffab0b`0d10f580 00000000`00000001 fffff802`5b2622c0 : nt!KxWaitForLockOwnerShip+0xe
ffffe384`70adf730 fffff802`5b261f4c     : 00000000`00000001 fffff802`5b2ef62a ffffab0b`0d10f520 ffffe384`70adf8f0 : nt!ExpAcquireResourceExclusiveLite+0x5c2
ffffe384`70adf800 ffffa238`a68166e1     : fffff802`5b261f10 ffffa238`a67b7fd8 00000000`00000000 ffffe384`70adf8b0 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3c
ffffe384`70adf840 ffffa238`a686f7a5     : 00000000`0085000f 00000000`00000000 00000000`0085000f ffffe384`70adf8f0 : win32kbase!GreAcquireHmgrSemaphore+0x41
ffffe384`70adf880 ffffa238`a67ccc71     : 00000000`0012001f 00000000`0085000f 00000000`00000000 ffffe384`70adfa00 : win32kbase!hbmSelectBitmapInternal+0xb5
ffffe384`70adf920 ffffa238`a68224ad     : ffffe384`00000000 ffffa238`a67b9054 00000000`00000000 00000aad`00000000 : win32kbase!hbmSelectBitmap+0x11
ffffe384`70adf960 ffffa238`a680ce73     : 00000000`00000000 00000000`00000000 ffffe384`70adfa00 00000000`00000001 : win32kbase!XDCOBJ::bCleanDC+0xdd
ffffe384`70adf9a0 ffffa238`a680cd2d     : 00000000`00000001 00000000`1c010afb ffffe384`70adfa69 00000000`1c010afb : win32kbase!bDeleteDCOBJ+0x103
ffffe384`70adf9e0 ffffa238`a680c556     : 00000000`00000afb 00000000`09050854 00000000`00000000 ffffa250`c08e0120 : win32kbase!bDeleteDCInternalEx+0x4d
ffffe384`70adfa20 ffffa238`a645df25     : 00000000`00000000 00000000`ffffffff 00000267`00000000 00000000`00000020 : win32kbase!NtGdiDeleteObjectApp+0x536
ffffe384`70adfad0 fffff802`5b4075b8     : 00000000`00000212 ffffe384`70adfb80 00000000`00000000 ffffa238`a6459ddc : win32k!NtGdiDeleteObjectApp+0x15
ffffe384`70adfb00 00000000`77311cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0145e7a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77311cfc


SYMBOL_NAME:  win32kbase!GreAcquireHmgrSemaphore+41

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1140

STACK_COMMAND:  .cxr 0xffffd30166472920 ; kb

BUCKET_ID_FUNC_OFFSET:  41

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kbase!GreAcquireHmgrSemaphore

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ce44f46d-2eba-67d3-9ade-9a779da8905d}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8040b90bbbe, Address of the instruction which caused the bugcheck
Arg3: ffff8f80029bf920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16040

    Key  : Analysis.Init.CPU.mSec
    Value: 1327

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9875

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8040b90bbbe

BUGCHECK_P3: ffff8f80029bf920

BUGCHECK_P4: 0

CONTEXT:  ffff8f80029bf920 -- (.cxr 0xffff8f80029bf920)
rax=0000000000000000 rbx=ffffb401496216d8 rcx=ffffb401496216d8
rdx=0008000000000000 rsi=0000000000000000 rdi=fffff8040c24e268
rip=fffff8040b90bbbe rsp=ffffb40149621640 rbp=ffffb40149621709
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000001
r11=0000000000000000 r12=fffffa500034d800 r13=fffff8040c250c00
r14=8000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff804`0b90bbbe 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
ffffb401`49621640 fffff804`0b90bb9f     : ffffc106`00000000 00000000`00000000 00000000`0012ba9b 00000000`00000003 : nt!KxWaitForLockOwnerShip+0xe
ffffb401`49621670 fffff804`0b90cfc9     : ffffa000`69b00000 ffffa000`69b00000 ffffc106`54af4038 00000000`001185c0 : nt!KeAcquireInStackQueuedSpinLock+0x7f
ffffb401`496216a0 fffff804`0b950539     : 00000000`00000001 00000000`20000000 00000000`20000000 ffffd18f`6ba54208 : nt!MiReleaseSystemCacheView+0xad
ffffb401`49621770 fffff804`0bcf82bf     : ffffa000`69b40000 ffffd18f`6cfc4540 ffffc106`00000000 fffff804`0b8d5701 : nt!MmUnmapViewInSystemCache+0x609
ffffb401`49621890 fffff804`0b909b16     : 00000000`00000000 ffffc106`5c49fc70 ffffc106`54bdbf88 00000000`00000000 : nt!CcUnmapVacb+0x63
ffffb401`496218d0 fffff804`0b911536     : 00000000`00000001 ffffd18f`6a29f700 00000000`00000000 ffffffff`ffffffff : nt!CcUnmapVacbArray+0x206
ffffb401`49621940 fffff804`0b9113a4     : 00000000`00000000 ffffb401`49621a00 ffffb401`49621a00 ffffc106`5c49fc70 : nt!CcUnmapAndPurge+0x36
ffffb401`49621980 fffff804`0b90f183     : ffffc106`5c49fc70 ffffb401`49621a50 ffffc106`54b02a60 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x138
ffffb401`496219d0 fffff804`0eeab260     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcUninitializeCacheMap+0x2f3
ffffb401`49621a90 fffff804`0ee9bf60     : ffffd18f`6a29f600 ffffd18f`6a29f660 00000000`00000000 ffffd18f`6a29f7c0 : Ntfs+0x11b260
ffffb401`49621ad0 fffff804`0eda7b95     : ffffd18f`6a29f660 ffffd18f`6a29f7c0 00000000`00000000 ffffd18f`6a29f7c0 : Ntfs+0x10bf60
ffffb401`49621b30 fffff804`0eda7869     : ffffd18f`6d38e050 00000000`00000008 ffffc106`56b61180 ffffd18f`6a29f660 : Ntfs+0x17b95
ffffb401`49621b70 fffff804`0ee9bc7a     : ffffc106`59152d08 ffffc106`56b61180 ffffd18f`6d38e010 ffffd18f`6d38e528 : Ntfs+0x17869
ffffb401`49621c10 fffff804`0eed2ba7     : ffffc106`59152d08 00000000`c000003a ffffd18f`6d38e528 ffffd18f`6de391e0 : Ntfs+0x10bc7a
ffffb401`49621c90 fffff804`0eecc10b     : ffffc106`5c6dfa20 ffffb401`49622080 ffffc106`5c6dfa20 00000000`00000000 : Ntfs+0x142ba7
ffffb401`49621f70 fffff804`0b8cd6c5     : ffffc106`56b61030 ffffc106`5c6dfa20 ffffb401`49622200 ffffc106`5c5faa90 : Ntfs+0x13c10b
ffffb401`496221f0 fffff804`08e16ccf     : ffffc106`5c5fab00 ffffb401`496222e0 ffffb401`496222e9 fffff804`08e15b37 : nt!IofCallDriver+0x55
ffffb401`49622230 fffff804`08e4bbd4     : ffffb401`496222e0 ffffc106`5c5faae8 ffffc106`56b40d10 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffb401`496222a0 fffff804`0b8cd6c5     : ffffc106`5c5faa00 ffffc106`56a908f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffffb401`49622350 fffff804`0b8cecb4     : 00000000`00000000 ffffc106`5c6dfa20 ffffc106`56b48150 fffff804`0b895a02 : nt!IofCallDriver+0x55
ffffb401`49622390 fffff804`0bcc3c3d     : ffffb401`49622650 00000000`000000f0 00000000`00000000 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffffb401`496223e0 fffff804`0bcec3ae     : ffffc106`56a908f0 00000000`00000000 ffffc106`5c6dba20 ffffc106`5c6dba01 : nt!IopParseDevice+0x117d
ffffb401`49622550 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpLookupObjectName+0x3fe


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .cxr 0xffff8f80029bf920 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {30b07425-154d-9599-35b8-aa3fc841c8aa}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8044e70bbbe, Address of the instruction which caused the bugcheck
Arg3: ffffdd8178499920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6328

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11784

    Key  : Analysis.Init.CPU.mSec
    Value: 1030

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5603

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8044e70bbbe

BUGCHECK_P3: ffffdd8178499920

BUGCHECK_P4: 0

CONTEXT:  ffffdd8178499920 -- (.cxr 0xffffdd8178499920)
rax=000000000000011d rbx=ffff8584bbdb7e28 rcx=ffff8584bbdb7e28
rdx=8400000000000000 rsi=ffffc08004c7aab0 rdi=ffffc380000030e8
rip=fffff8044e70bbbe rsp=ffff8584bbdb7dc0 rbp=ffff8584bbdb7ea9
 r8=ffffc38000007000  r9=0000000000000039 r10=0000000000197e30
r11=ffff8584bbdb7dc0 r12=0000000000000001 r13=0000000000197e39
r14=ffffc38000003108 r15=000000000000772d
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff804`4e70bbbe 48890a          mov     qword ptr [rdx],rcx ds:002b:84000000`00000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT: 
ffff8584`bbdb7dc0 fffff804`4e747499     : 00000000`00000000 00000000`00000000 ffff8584`bbdb7ea9 ffffc080`04c7aab0 : nt!KxWaitForLockOwnerShip+0xe
ffff8584`bbdb7df0 fffff804`4e749b72     : 00000000`00197e39 fffff804`4f050c00 00000000`00000001 ffffc787`00000039 : nt!MiInsertPageInFreeOrZeroedList+0x839
ffff8584`bbdb7f10 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeletePteRun+0x11c2


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.631

STACK_COMMAND:  .cxr 0xffffdd8178499920 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {30b07425-154d-9599-35b8-aa3fc841c8aa}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8064cc2e07e, Address of the instruction which caused the bugcheck
Arg3: ffffca01e4f6b920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6124

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12243

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7565

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8064cc2e07e

BUGCHECK_P3: ffffca01e4f6b920

BUGCHECK_P4: 0

CONTEXT:  ffffca01e4f6b920 -- (.cxr 0xffffca01e4f6b920)
rax=0000000000000000 rbx=ffff9a0e66084200 rcx=ffff9a0e66084200
rdx=8400000000000000 rsi=ffffde0a8538c500 rdi=ffffde0a7cd70588
rip=fffff8064cc2e07e rsp=ffff9a0e66084170 rbp=ffffde0a84cde080
 r8=0000000000000000  r9=ffff9a0e66084340 r10=0000000000000000
r11=ffff9a0e66084338 r12=0000000000000000 r13=ffffde0a8538c590
r14=0000000000000001 r15=ffffde0a7cd70528
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff806`4cc2e07e 48890a          mov     qword ptr [rdx],rcx ds:002b:84000000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT: 
ffff9a0e`66084170 fffff806`4cc2e05f     : 00000000`00780038 ffffb086`eda6ea60 ffffde0a`8538c590 00120081`00000000 : nt!KxWaitForLockOwnerShip+0xe
ffff9a0e`660841a0 fffff806`4cc61cc0     : ffffde0a`7cd70528 00000038`13ef95b6 00000000`0289cb9d 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7f
ffff9a0e`660841d0 fffff806`48bb3ec9     : 00000000`00000000 ffffde0a`8538c590 ffff9a0e`66084340 00000000`00000000 : nt!ExAcquireResourceExclusiveLite+0xb0
ffff9a0e`66084260 fffff806`48be98fb     : ffffde0a`87edca70 ffffde0a`86d092a0 00000000`00000008 ffffde0a`84ed9010 : FLTMGR!FltpGetStreamListCtrl+0x119
ffff9a0e`660842b0 fffff806`48bb70e4     : 00000000`00000000 ffffde0a`8538c590 00000000`00000008 fffff806`48bb5b37 : FLTMGR!FltpCacheCreateNames+0x5b
ffff9a0e`66084340 fffff806`48bebbd4     : ffff9a0e`660843f0 ffffde0a`8538c5e8 ffffde0a`7cc93d60 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x6a4
ffff9a0e`660843b0 fffff806`4cc52f55     : 00000000`00000000 ffffde0a`7cca28f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffff9a0e`66084460 fffff806`4cc54544     : 00000000`00000003 ffffde0a`84ed9010 ffffde0a`6d4e6f49 fffff806`4cc54173 : nt!IofCallDriver+0x55
ffff9a0e`660844a0 fffff806`4cffefad     : ffff9a0e`66084760 00000000`000000f0 00000000`00000000 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffff9a0e`660844f0 fffff806`4d02797e     : ffffde0a`7cca28f0 00000000`00000028 ffffde0a`86af4a20 ffffde0a`86af4a01 : nt!IopParseDevice+0x117d
ffff9a0e`66084660 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpLookupObjectName+0x3fe


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .cxr 0xffffca01e4f6b920 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {30b07425-154d-9599-35b8-aa3fc841c8aa}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8071362e07e, Address of the instruction which caused the bugcheck
Arg3: ffffe281f5bbf920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14731

    Key  : Analysis.Init.CPU.mSec
    Value: 952

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5608

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8071362e07e

BUGCHECK_P3: ffffe281f5bbf920

BUGCHECK_P4: 0

CONTEXT:  ffffe281f5bbf920 -- (.cxr 0xffffe281f5bbf920)
rax=0000000000000000 rbx=ffffc60ac9d7fe40 rcx=ffffc60ac9d7fe40
rdx=0008000000000000 rsi=0000000000000700 rdi=ffff9c8777262940
rip=fffff8071362e07e rsp=ffffc60ac9d7fdb0 rbp=ffff9c8777616080
 r8=0000000000000000  r9=0000000000000009 r10=0000000000000000
r11=ffffc60ac9d7feb0 r12=0000000000000000 r13=0000000000000001
r14=0000000000000001 r15=ffffc8889f38a801
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff807`1362e07e 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LocalBridge.ex

STACK_TEXT: 
ffffc60a`c9d7fdb0 fffff807`1362e05f     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c87`77593468 : nt!KxWaitForLockOwnerShip+0xe
ffffc60a`c9d7fde0 fffff807`13661cc0     : ffff9c87`772628e0 fffff807`1366007d ffff9c87`6e369010 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7f
ffffc60a`c9d7fe10 fffff807`15793d40     : 00000000`00000000 00000000`00000702 00000000`00000009 ffffc888`9f38a760 : nt!ExAcquireResourceExclusiveLite+0xb0
ffffc60a`c9d7fea0 fffff807`15876189     : ffff9c87`746f84b8 ffffc888`9f38a760 00000000`00000000 ffffc888`00000001 : Ntfs!NtfsAcquireExclusiveFcb+0x90
ffffc60a`c9d7ff20 fffff807`158756a3     : ffff9c87`746f84b8 ffffc888`9f38a8c0 ffffc888`9f38a760 ffff9c87`6e36a180 : Ntfs!NtfsCommonClose+0xc9
ffffc60a`c9d80000 fffff807`13652f55     : ffffc60a`c9d80201 ffff9c87`75550010 ffffc60a`c9d81000 ffffc60a`00000002 : Ntfs!NtfsFsdClose+0x2d3
ffffc60a`c9d80140 fffff807`0f796ccf     : 7fffffff`ffffffff 00000000`00000000 ffffc888`9f38a8c0 00000000`00000200 : nt!IofCallDriver+0x55
ffffc60a`c9d80180 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .cxr 0xffffe281f5bbf920 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {30b07425-154d-9599-35b8-aa3fc841c8aa}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı