25 30 dakikada bir System servıce exceptıon hatası.
minidump.rar minidump dosyalarım burada
minidump.rar minidump dosyalarım burada
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Desktop\minidump\071620-43093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff804`64600000 PsLoadedModuleList = 0xfffff804`64a48170
Debug session time: Thu Jul 16 22:33:39.704 2020 (UTC + 3:00)
System Uptime: 2 days 21:22:50.957
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`647c2390 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd20a`34394650=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000002d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804646a5436, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4124
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8731
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 2d
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804646a5436
READ_ADDRESS: fffff80464b733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80464a2a3d8: Unable to get Flags value from nt!KdVersionBlock
fffff80464a2a3d8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000002d
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd20a34394790 -- (.trap 0xffffd20a34394790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000004ff rbx=0000000000000000 rcx=ffff988703002340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804646a5436 rsp=ffffd20a34394920 rbp=0000000000000001
r8=00000000ffffffff r9=0000000000000001 r10=0000000000000001
r11=ffff988709a96050 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpLfhSubsegmentDecommitPages+0xc6:
fffff804`646a5436 410fb6472d movzx eax,byte ptr [r15+2Dh] ds:00000000`0000002d=??
Resetting default scope
STACK_TEXT:
ffffd20a`34394648 fffff804`647d41e9 : 00000000`0000000a 00000000`0000002d 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd20a`34394650 fffff804`647d0529 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff804`6461bd76 : nt!KiBugCheckDispatch+0x69
ffffd20a`34394790 fffff804`646a5436 : 00000000`00000003 00000000`00003000 00000000`00001000 fffff804`6471cd53 : nt!KiPageFault+0x469
ffffd20a`34394920 fffff804`646a491f : ffff9887`03002340 ffffd20a`34394a80 ffff9887`0fd9d6ff ffff9887`00000001 : nt!RtlpHpLfhSubsegmentDecommitPages+0xc6
ffffd20a`343949b0 fffff804`646a496d : ffff9887`03006200 ffff9887`03002280 00000000`00000004 00000000`00000001 : nt!RtlpHpLfhOwnerCompact+0x67
ffffd20a`34394a10 fffff804`646a4882 : ffff9887`030023e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpLfhOwnerCompact+0xb5
ffffd20a`34394a70 fffff804`64641daa : ffff9887`03002000 00000000`00000001 ffff9887`03002280 ffff9887`03002280 : nt!RtlpHpLfhContextCompact+0xae
ffffd20a`34394ab0 fffff804`646a45b1 : 00000000`00000001 ffff9887`03002000 00000000`00000000 ffff9887`0e24e180 : nt!RtlpHpHeapCompact+0x76
ffffd20a`34394ae0 fffff804`646f43b5 : 00000000`00000001 ffff9887`00000000 ffff9887`0000003f 00000000`00000000 : nt!ExpHpCompactionRoutine+0x211
ffffd20a`34394b70 fffff804`6466bcd5 : ffff9887`0e24e040 00000000`00000080 ffff9887`036802c0 fffffc42`00000001 : nt!ExpWorkerThread+0x105
ffffd20a`34394c10 fffff804`647c9998 : ffffb180`dcdc0180 ffff9887`0e24e040 fffff804`6466bc80 00000000`00000001 : nt!PspSystemThreadStartup+0x55
ffffd20a`34394c60 00000000`00000000 : ffffd20a`34395000 ffffd20a`3438f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlpHpLfhSubsegmentDecommitPages+c6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.836
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: c6
FAILURE_BUCKET_ID: AV_nt!RtlpHpLfhSubsegmentDecommitPages
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3ea916f4-98f1-2e2d-978b-851f95bd1f17}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.