SYSTEM_SERVICE_EXCEPTION hatası

İşletim sistemi
Windows 11

kuebra

Yoctopat
Katılım
1 Ekim 2022
Mesajlar
1
Daha fazla  
Cinsiyet
Kadın
RAM
2x Kingston 8GB 1600MHZ DDR3 toplam 16GB
SSD veya HDD modeli
Toshiba DT01ACA100 1TB
Ekran kartı
NVIDIA GeForce GT 730
Anakart
Gigabyte Z97-HD3
İşlemci
Intel(R) Core(TM) i5-4460 CPU @ 3.20GHz 3.20 GH
Uzun süredir mavi ekran hatası alıyorum sorun hard disk mi bilmiyorum
Bilgisayar donuyor ardından mavi ekran hatası geliyor
Ve restart yaptıktan sonra "NO BOOTABLE Drive IS DETECTED" penceresi geliyor
Memtest 86 yaptım bir şey çıkmadı, format atıldı ama sorun çözülmedi

OBS Photoshop gib programlar kulanınca çoğu zaman bu mavi ekran hatası oluyor

*ATTTEMPTED WRİTE TO READONLY Memory
*UNEXPECTED Store EXEPTION
*SYSTEM_SERVICE_EXCEPTION
*CRITICAL_PROCESS_DIED(ef)
*DPC_WATCHDOG_VIOLATION (133)

Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\060622-28296-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 22000 MP (4 procs) Free X64
Product: WinNt, Suite: TerminalServer SingleUserTS
Edition Build lab: 22000.1.AMD64fre. Co_release. 210604-1628
Machine Name:
Kernel base = 0xfffff800`2d800000 PsLoadedModuleList = 0xfffff800`2e429b90
Debug session time: Mon Jun 6 20:56:34.221 2022 (UTC + 3:00)
System Uptime: 2 days 0:47:00.578
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

For analysis of this file, run! Analyze -v
1: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
Or above.
Arguments:
Arg1: 0000000000000001, The System cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
İdentified with a stack trace.
Arg2: 0000000000001E00, The watchdog period.
Arg3: FffFF8002E505330, cast to NT! DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
Additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** Doesn't have Full symbol information. Unqualified symbol ***
*** Resolution is turned off by default. Please either specify a ***
*** Fully qualified symbol module! Symbolname, or enable resolution ***
*** Of unqualified symbols by typing ".symopt- 100". Note that ***
*** Enabling unqualified symbol resolution with network symbol ***
*** Server shares in the symbol path may cause the debugger to ***
*** Appear to hang for long periods of time when an incorrect ***
*** Symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** Must point to. Pdb files that have Full type information. ***
*** ***
*** Certain. Pdb files (such as the public OS symbols) do not ***
*** Contain the required information. Contact the group that ***
*** Provided you with these symbols if you need this command to ***
*** Work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key: Analysis. CPU. MSec
Value: 6546

Key: Analysis. DebugAnalysisManager
Value: Create

Key: Analysis. Elapsed. MSec
Value: 71284

Key: Analysis. Init. CPU. MSec
Value: 9983

Key: Analysis. Init. Elapsed. MSec
Value: 1019292

Key: Analysis. Memory.commitPeak. MB
Value: 95

Key: WER. OS. Branch
Value: Co_release

Key: WER. OS. Timestamp
Value: 2021-06-04T16:28:00Z

Key: WER. OS. Version
Value: 10. 0. 22000.1

FILE_IN_CAB: 060622-28296-01.dmp

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1E00

BUGCHECK_P3: FFFFF8002E505330

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: FfffEC02401B8580 -- (.trap 0xffffec02401b8580)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = ffffBE0000000028 rbx = 0000000000000000 rcx = 0000200000000000
Rdx = 0000000018F612F0 rsi = 0000000000000000 rdi = 0000000000000000
Rip = fffFF8002DB1ceef rsp = ffffEC02401B8710 rbp = ffffEC02401B8900
R8 = 00000000ffffffff R9 = 7fffffffffffffff R10 = ffffDC084175eec0
R11 = fffFF20000000000 R12 = 0000000000000000 R13 = 0000000000000000
R14 = 0000000000000000 R15 = 0000000000000000
İopl = 0 nv up ei pl nz AC po nc
NT! MiResolveProtoPteFault+0x37F:
Fffff800'2dB1ceef 73C5 jae NT! MiResolveProtoPteFault+0x346 (fffff800'2dB1ceb6) [br=1]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dllhost.exe

STACK_TEXT:
Ffff8b01'4E69B9E8 fffff800'2da8a39F: 00000000'00000133 00000000'00000001 00000000'00001E00 fffff800'2E505330: NT! KeBugCheckEx
Ffff8b01'4E69B9F0 fffff800'2da89FB1: 0000B317'12C17541 ffff8b01'4E681180 ffff16C4'0ca6307b fffff800'2da4F640: NT! KeAccumulateTicks+0x20F
Ffff8b01'4E69BA60 fffff800'2da86FE6: 00000000'00AB8125 00000000'00663981 00000198'E6059ED2 00000000'00000000: NT! KiUpdateRunTime+0x61
Ffff8b01'4E69BAC0 fffff800'2da882F2: Ffffec02'401b8580 00000000'00000000 fffff800'2E42B3B0 00000000'00000000: NT! KiUpdateTime+0x686
Ffff8b01'4E69BEB0 fffff800'2da85CF2: Ffffec02'401b8580 ffffcc0e'378CD650 ffffcc0e'00000000 00000000'00000002: NT! KeClockInterruptNotify+0x272
Ffff8b01'4E69BF40 fffff800'2dadc270: 00000198'eccdd118 ffffcc0e'378CD5a0 00000000'00000001 00000000'00000000: NT! HalpTimerClockInterrupt+0Xe2
Ffff8b01'4E69BF70 fffff800'2DC1874a: Ffffec02'401b8600 ffffcc0e'378CD5a0 00000000'00000000 00000000'07a9a6F0: NT! KiCallInterruptServiceRoutine+0xa0
Ffff8b01'4E69BFB0 fffff800'2DC18D17: 00002042'903288C0 00000000'00000000 ffffec02'401b8898 00000000'00000000: NT! KiInterruptSubDispatchNoLockNoEtw+0xfa
Ffffec02'401b8580 fffff800'2dB1ceef: Ffffec02'401b8860 ffffffff'00000000 ffffbe00'07a9a6F0 00000000'00000000: NT! KiInterruptDispatchNoLockNoEtw+0x37
Ffffec02'401b8710 fffff800'2dB1C483: Ffffec02'401b8860 00000000'00000000 ffffec02'401b8840 fffff279'00000000: NT! MiResolveProtoPteFault+0x37F
Ffffec02'401b8800 fffff800'2dB1aa82: 00000000'00000110 00000000'00000005 00000000'C0000016 00000000'00000005: NT! MiDispatchFault+0x1b3
Ffffec02'401b8940 fffff800'2DC256F5: 0000013F'CA9ad9ef ffffcc0e'440e3BF0 00000000'00000000 00000000'00000000: NT! MmAccessFault+0x152
Ffffec02'401b8AE0 00007FFC'98ec3C2F: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! KiPageFault+0x335
00000026'560fea50 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffc`98ec3c2f

SYMBOL_NAME: NT! KeAccumulateTicks+20F

MODULE_NAME: NT

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10. 0. 22000.675

STACK_COMMAND: Cxr. Ecxr; KB

BUCKET_ID_FUNC_OFFSET: 20F

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10. 0. 22000.1

BUILDLAB_STR: Co_release

OSPLATFORM_TYPE: X64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-C3B9-F4B5-8829-4D27E9FF9b06}

Followup: MachineOwner
---------

1: Kd> lmvm NT
Browse Full module list
Start end module name
Fffff800'2D800000 fffff800'2E848000 NT (pdb symbols) C:\ProgramData\dbg\sym\ntkrnlmp.pdb\1D9CD02E95982257EA62A9E0F0E00AFD1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped Memory image file: C:\ProgramData\dbg\sym\ntkrnlmp.exe\6F9701191048000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 6F970119 (This is a reproducible Build file hash, not a timestamp)
CheckSum: 00B356D7
ImageSize: 01048000
File version: 10. 0. 22000.675
Product version: 10. 0. 22000.675
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10. 0. 22000.675
FileVersion: 10. 0. 22000.675 (WinBuild. 160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.





Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\071022-28000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 22000 MP (4 procs) Free X64
Product: WinNt, Suite: TerminalServer SingleUserTS
Edition Build lab: 22000.1.AMD64fre. Co_release. 210604-1628
Machine Name:
Kernel base = 0xfffff804`63a00000 PsLoadedModuleList = 0xfffff804`64629650
Debug session time: Sun Jul 10 00:17:21.574 2022 (UTC + 3:00)
System Uptime: 2 days 8:45:59.494
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

For analysis of this file, run! Analyze -v
0: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

CRITICAL_PROCESS_DIED (ef)
A critical System process died
Arguments:
Arg1: Ffff9A870F3C2080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key: Analysis. CPU. MSec
Value: 3875

Key: Analysis. DebugAnalysisManager
Value: Create

Key: Analysis. Elapsed. MSec
Value: 32826

Key: Analysis. Init. CPU. MSec
Value: 3171

Key: Analysis. Init. Elapsed. MSec
Value: 126665

Key: Analysis. Memory.commitPeak. MB
Value: 93

Key: CriticalProcessDied. ExceptionCode
Value: 124F1080

Key: CriticalProcessDied. ImageName
Value: ntdll.dll

Key: CriticalProcessDied. ImageOffset
Value: 19C20

Key: CriticalProcessDied. ImageSize
Value: 209000

Key: CriticalProcessDied. ImageTimestamp
Value: 5398AB6F

Key: CriticalProcessDied. Process
Value: services.exe

Key: CriticalProcessDied. Symbol
Value: ntdll.dll!RtlAcquireSRWLockExclusive

Key: CriticalProcessDied. WERReportId
Value: ED372747-A076-4EBE-B083-CC30B9B1ba87

Key: WER. OS. Branch
Value: Co_release

Key: WER. OS. Timestamp
Value: 2021-06-04T16:28:00Z

Key: WER. OS. Version
Value: 10. 0. 22000.1

FILE_IN_CAB: 071022-28000-01.dmp

BUGCHECK_CODE: Ef

BUGCHECK_P1: Ffff9A870F3C2080

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

PROCESS_NAME: services.exe

CRITICAL_PROCESS: services.exe

ERROR_CODE: (NTSTATUS) 0x124f1080 - <Unable to get error code text>

CRITICAL_PROCESS_REPORTGUID: {ED372747-A076-4EBE-B083-CC30B9B1ba87}

IMAGE_NAME: ntdll.dll

MODULE_NAME: Ntdll

FAULTING_MODULE: 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

STACK_TEXT:
Ffffbd88'44e0C918 fffff804'643ADB03: 00000000'000000EF ffff9a87'0F3C2080 00000000'00000000 00000000'00000000: NT! KeBugCheckEx
Ffffbd88'44e0C920 fffff804'642F0093: Ffff9a87'0F3C2080 fffff804'63CD32C9 00000000'00000002 fffff804'63CD31b7: NT! PspCatchCriticalBreak+0x11b
Ffffbd88'44e0C9b0 fffff804'6410DAB4: Ffff9a87'0F3C2080 00000000'C0000005 ffff9a87'0F3C2080 00000027'7677EE01: NT! PspTerminateAllThreads+0x111C3F
Ffffbd88'44e0ca20 fffff804'6410D890: Ffffffff'ffffffff ffff9a87'0F3C2080 ffff9a87'124F1080 00000000'00000001: NT! PspTerminateProcess+0Xe0
Ffffbd88'44e0ca60 fffff804'63e29b78: 00000000'00000324 ffff9a87'124F1080 ffff9a87'0F3C2080 ffff9a87'0F3C2080: NT! NtTerminateProcess+0xb0
Ffffbd88'44e0cae0 00007FFF'D70e4494: 00007FFF'D71655F5 00007FFF'D719206C 00000027'7677F540 00000000'00000007: NT! KiSystemServiceCopyEnd+0x28
00000027'7677E168 00007FFF'D71655F5: 00007FFF'D719206C 00000027'7677F540 00000000'00000007 00007FFF'D719204C: 0x00007fff`d70e4494
00000027'7677E170 00007FFF'D719206C: 00000027'7677F540 00000000'00000007 00007FFF'D719204C 00000000'00000004: 0x00007fff`d71655f5
00000027'7677E178 00000027'7677F540: 00000000'00000007 00007FFF'D719204C 00000000'00000004 00007FFF'D70eb43D: 0x00007fff`d719206c
00000027'7677E180 00000000'00000007: 00007FFF'D719204C 00000000'00000004 00007FFF'D70eb43D 00007FFF'D719206C: 0x00000027`7677f540
00000027'7677E188 00007FFF'D719204C: 00000000'00000004 00007FFF'D70eb43D 00007FFF'D719206C 00000000'00000008: 0x7
00000027'7677E190 00000000'00000004: 00007FFF'D70eb43D 00007FFF'D719206C 00000000'00000008 00000000'00000001: 0x00007fff`d719204c
00000027'7677E198 00007FFF'D70eb43D: 00007FFF'D719206C 00000000'00000008 00000000'00000001 00000000'00000000: 0x4
00000027'7677E1A0 00007FFF'D719206C: 00000000'00000008 00000000'00000001 00000000'00000000 00000000'00000020: 0x00007fff`d70eb43d
00000027'7677E1A8 00000000'00000008: 00000000'00000001 00000000'00000000 00000000'00000020 00000000'000ADC9b: 0x00007fff`d719206c
00000027'7677E1B0 00000000'00000001: 00000000'00000000 00000000'00000020 00000000'000ADC9b 00000000'00017148: 0x8
00000027'7677E1B8 00000000'00000000: 00000000'00000020 00000000'000ADC9b 00000000'00017148 00007FFF'D70D3eb6: 0x1

STACK_COMMAND: Cxr. Ecxr; KB

FAILURE_BUCKET_ID: 0xEF_services.exe_BUGCHECK_CRITICAL_PROCESS_124f1080_ntdll.dll!RtlAcquireSRWLockExclusive_IMAGE_ntdll.dll

OS_VERSION: 10. 0. 22000.1

BUILDLAB_STR: Co_release

OSPLATFORM_TYPE: X64

OSNAME: Windows 10

FAILURE_ID_HASH: {93712243-94B5-FEDD-36C4-816236CCa5b7}

Followup: MachineOwner
---------

0: Kd> lmvm ntdll
Browse Full module list





Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\072722-26484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 22000 MP (4 procs) Free X64
Product: WinNt, Suite: TerminalServer SingleUserTS
Edition Build lab: 22000.1.AMD64fre. Co_release. 210604-1628
Machine Name:
Kernel base = 0xfffff800`1c200000 PsLoadedModuleList = 0xfffff800`1ce29650
Debug session time: Wed Jul 27 14:40:31.869 2022 (UTC + 3:00)
System Uptime: 0 days 3:02:13.539
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

For analysis of this file, run! Analyze -v
1: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, Exception code that caused the BugCheck
Arg2: FffFF8001C52F37a, Address of the instruction which caused the BugCheck
Arg3: FfffAB01FB0A2900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, Zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key: Analysis. CPU. MSec
Value: 2827

Key: Analysis. DebugAnalysisManager
Value: Create

Key: Analysis. Elapsed. MSec
Value: 8707

Key: Analysis. Init. CPU. MSec
Value: 3530

Key: Analysis. Init. Elapsed. MSec
Value: 47901

Key: Analysis. Memory.commitPeak. MB
Value: 92

Key: WER. OS. Branch
Value: Co_release

Key: WER. OS. Timestamp
Value: 2021-06-04T16:28:00Z

Key: WER. OS. Version
Value: 10. 0. 22000.1

FILE_IN_CAB: 072722-26484-01.dmp

BUGCHECK_CODE: 3B

BUGCHECK_P1: C0000005

BUGCHECK_P2: FffFF8001C52F37a

BUGCHECK_P3: FfffAB01FB0A2900

BUGCHECK_P4: 0

CONTEXT: FfffAB01FB0A2900 -- (.cxr 0xffffab01fb0a2900)
Rax = 00000000ffffffff rbx = 800AA354C4C80C00 rcx = ffff9b0e6ec03700
Rdx = ffffffffffffffff rsi = fffffcbfFC1837C8 rdi = 0000000000000000
Rip = fffFF8001C52F37a rsp = ffffBD8067D32da0 rbp = ffff9b0e6ec03700
R8 = 0A000003fbe5D121 R9 = ffffFC8000000000 R10 = 0000FFFFF8001C46
R11 = ffff9afa0F400000 R12 = 00007FF8306F9000 R13 = ffffBD8067D33420
R14 = 0000000000000082 R15 = ffFF800A8354C4C8
İopl = 0 nv up ei ng nzna po nc
CS = 0010 SS = 0018 DS = 002b es = 002b fs = 0053 GS = 002b efl = 00010286
NT! MiDecrementCombinedPte+0x32:
Fffff800'1C52F37A 4D8B30 mov R14, qword ptr [r8] DS:002b:0A000003'fbe5D121=?
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

STACK_TEXT:
Ffffbd80'67D32da0 fffff800'1C46428D: 1A000001'5635E867 800aa354'C4C80C00 00000000'00000000 fffffcbf'FC1837C8: NT! MiDecrementCombinedPte+0x32
Ffffbd80'67D32de0 fffff800'1C47369A: 00000000'00000000 fffffcbf'FC1837C8 fffffdfa'670bbe86 00000000'00000000: NT! MiDeleteVa+0xbbd
Ffffbd80'67D32ee0 fffff800'1C4739B9: 00000000'00000000 ffff9b0e'6ec03700 fffffcfe'00000000 00000000'00000000: NT! MiWalkPageTablesRecursively+0x30a
Ffffbd80'67D32F70 fffff800'1C4739B9: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! MiWalkPageTablesRecursively+0x629
Ffffbd80'67D33000 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! MiWalkPageTablesRecursively+0x629

SYMBOL_NAME: NT! MiDecrementCombinedPte+32

MODULE_NAME: NT

IMAGE_VERSION: 10. 0. 22000.795

STACK_COMMAND: Cxr 0xffffab01fb0a2900; KB

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 32

FAILURE_BUCKET_ID: AV_nt! MiDecrementCombinedPte

OS_VERSION: 10. 0. 22000.1

BUILDLAB_STR: Co_release

OSPLATFORM_TYPE: X64

OSNAME: Windows 10

FAILURE_ID_HASH: {2A0B0FD5-F49C-C11B-58F7-BF573724b1e1}

Followup: MachineOwner
---------

1: Kd> lmvm NT
Browse Full module list
Start end module name
Fffff800'1C200000 fffff800'1D247000 NT (pdb symbols) C:\ProgramData\dbg\sym\ntkrnlmp.pdb\8E3373D6124E747F0E72EF8E02E676B31\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped Memory image file: C:\ProgramData\dbg\sym\ntkrnlmp.exe\1A9597421047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 1A959742 (This is a reproducible Build file hash, not a timestamp)
CheckSum: 00B35E22
ImageSize: 01047000
File version: 10. 0. 22000.795
Product version: 10. 0. 22000.795
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10. 0. 22000.795
FileVersion: 10. 0. 22000.795 (WinBuild. 160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.




Microsoft (R) Windows Debugger Version 10.0.22621.1 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\072822-29312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 22000 MP (4 procs) Free X64
Product: WinNt, Suite: TerminalServer SingleUserTS
Edition Build lab: 22000.1.AMD64fre. Co_release. 210604-1628
Machine Name:
Kernel base = 0xfffff804`3d800000 PsLoadedModuleList = 0xfffff804`3e429730
Debug session time: Thu Jul 28 21:40:06.773 2022 (UTC + 3:00)
System Uptime: 0 days 10:51:23.453
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

For analysis of this file, run! Analyze -v
2: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_STORE_EXCEPTION (154)
The Store component caught an unexpected exception.
Arguments:
Arg1: FfFF8201AEbbe000, Pointer to the Store context or data Manager
Arg2: FfffFB8418F7F7b0, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key: Analysis. CPU. MSec
Value: 2859

Key: Analysis. DebugAnalysisManager
Value: Create

Key: Analysis. Elapsed. MSec
Value: 21704

Key: Analysis. Init. CPU. MSec
Value: 3374

Key: Analysis. Init. Elapsed. MSec
Value: 90161

Key: Analysis. Memory.commitPeak. MB
Value: 93

Key: WER. OS. Branch
Value: Co_release

Key: WER. OS. Timestamp
Value: 2021-06-04T16:28:00Z

Key: WER. OS. Version
Value: 10. 0. 22000.1

FILE_IN_CAB: 072822-29312-01.dmp

BUGCHECK_CODE: 154

BUGCHECK_P1: FFFF8201AEBBE000

BUGCHECK_P2: FfffFB8418F7F7b0

BUGCHECK_P3: 1

BUGCHECK_P4: 0

EXCEPTION_RECORD: FfffFB8418F80798 -- (.exr 0xfffffb8418f80798)
ExceptionAddress: FFFFF8043DCCE447 (NT! ST_STORE<SM_TRAITS>:StDmPageRecordRemove+0x00000000001538b3)
ExceptionCode: C0000420 (Assertion failure)
ExceptionFlags: 00000000
NumberParameters: 0
Assertion: (((NTSTATUS)(Status)) >= 0)

EXCEPTION_PARAMETER1: 00000000A10966BE

EXCEPTION_PARAMETER2: 0000000000001358

CONTEXT: FfffFB8418F7FFB0 -- (.cxr 0xfffffb8418f7ffb0)
Rax = 00000000C0000225 rbx = ffFF8201AEbbe0e8 rcx = ffFF8201B43D0000
Rdx = 00000000000001C6 rsi = 0000000000000000 rdi = ffFF8201AEbbe050
Rip = fffFF8043DCce447 rsp = ffffFB8418F809D0 rbp = ffFF8201AEbbe0D0
R8 = 00000000000002E3 R9 = 00000000A10966BE R10 = 0000000000001358
R11 = 0000000000000009 R12 = ffFF8201B33eeb28 R13 = ffFF8201AEbbe068
R14 = 000000000005C6EC R15 = ffFF8201B33eeb28
İopl = 0 nv up ei ng nzna pe nc
CS = 0010 SS = 0018 DS = 002b es = 002b fs = 0053 GS = 002b efl = 00000282
NT! ST_STORE<SM_TRAITS>:StDmPageRecordRemove+0x1538B3:
Fffff804'3dcce447 CD2C int 2Ch
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: MemCompression

ERROR_CODE: (NTSTATUS) 0xc0000420 - Onaylama hatas olu tu.

EXCEPTION_CODE_STR: C0000420

EXCEPTION_STR: 0xc0000420

STACK_TEXT:
Fffffb84'18F809D0 fffff804'3dB7AE55: 00000000'00000000 fffffb84'18F80a88 00000000'20451E27 00000000'0005C6EC: NT! ST_STORE<SM_TRAITS>:StDmPageRecordRemove+0x1538B3
Fffffb84'18F80A10 fffff804'3dB7b941: Ffff8201'00000000 ffff8201'B14F8150 00000000'00000000 fffff804'20451E27: NT! ST_STORE<SM_TRAITS>:StDmPageRemove+0x12D
Fffffb84'18F80ad0 fffff804'3dB12288: 7fffffff'fffffffc fffffb84'18F80b78 ffff8201'aebbf788 ffff8201'aebbe000: NT! ST_STORE<SM_TRAITS>:StWorkItemProcess+0xc1
Fffffb84'18F80b20 fffff804'3dB12011: 00000000'00000000 ffff8201'00000000 ffff8201'aebe1080 00000000'00000000: NT! SMKM_STORE<SM_TRAITS>:SmStWorker+0x268
Fffffb84'18F80bc0 fffff804'3dB304b5: Ffff8201'aebbe000 fffff804'3dB12000 fffffb84'18F25158 004fa425'BD9bbfff: NT! SMKM_STORE<SM_TRAITS>:SmStWorkerThread+0x11
Fffffb84'18F80BF0 fffff804'3DC1bdd4: Ffffbf01'96D51180 ffff8201'aebe1080 fffff804'3dB30460 00000000'00000000: NT! PspSystemThreadStartup+0x55
Fffffb84'18F80C40 00000000'00000000: Fffffb84'18F81000 fffffb84'18F7b000 00000000'00000000 00000000'00000000: NT! KiStartSystemThread+0x34

SYMBOL_NAME: NT! ST_STORE<SM_TRAITS>:StDmPageRecordRemove+1538b3

MODULE_NAME: NT

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10. 0. 22000.832

STACK_COMMAND: Cxr 0xfffffb8418f7ffb0; KB

BUCKET_ID_FUNC_OFFSET: 1538B3

FAILURE_BUCKET_ID: 0x154_C0000420_nt! ST_STORE_SM_TRAITS_: StDmPageRecordRemove

OS_VERSION: 10. 0. 22000.1

BUILDLAB_STR: Co_release

OSPLATFORM_TYPE: X64

OSNAME: Windows 10

FAILURE_ID_HASH: {B82A73EA-D098-8451-8193-a5C6604483AC}

Followup: MachineOwner
 

Technopat Haberler

Yeni konular

Geri
Yukarı