SYSTEM_SERVICE_EXCEPTION hatası

Katılım
15 Temmuz 2015
Mesajlar
1.328
Makaleler
9
Çözümler
4
Merhabalar, sadece oyun oynarken ( CS:GO) aniden bilgisayar kapanıyor ve mavi ekran veriyor. Ekran sürekli aynı fakat verdiği hatalar değişiyor:
  • SYSTEM_SERVICE_EXCEPTION
  • SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
  • KERNEL_SECURITY_CHECK_FAILURE

Açılan diğer konulara baktım, ekran kartı sürücüsü güncel. Diğer bileşenlerle alakalı sıkıntı olup olamayacağını bilmiyorum, kurulu programlarım bunlar:

explorer_yUGJYSSqRn.png


Sistem:
  • PowerColor R7 265.
  • FX X6 6350.
  • M5A97LE r2.0.
  • Cooler Master RC-430 500W.
  • Crucial 4 GB 1600MHz.
  • Windows 10 64 Bit.
Sıcaklık sorunu olduğunu düşünmüyorum; oyun esnasında ortalama GPU 60°, CPU ise 40° civarında oluyor.

Minidump dosyalarım:
@Recep Baltaş minidump dosyalarına bakmaya zamanınız olursa sevinirim.

IMG_5095.JPG
IMG_5096.JPG
IMG_5100.JPG
IMG_5101.JPG

 
Son düzenleyen: Moderatör:
Windows 10 2004 sürümüne geçer misin?

 
Son düzenleyen: Moderatör:
Bellek testi yapınız ilk olarak.


Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8037628c9ce, The address that the exception occurred at
Arg3: ffff84834e8b5518, Exception Record Address
Arg4: ffff8c81f1ab2930, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8037628c9ce

BUGCHECK_P3: ffff84834e8b5518

BUGCHECK_P4: ffff8c81f1ab2930

EXCEPTION_RECORD:  ffff84834e8b5518 -- (.exr 0xffff84834e8b5518)
ExceptionAddress: fffff8037628c9ce (nt!KxWaitForLockOwnerShip+0x000000000000000e)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffff8c81f1ab2930 -- (.cxr 0xffff8c81f1ab2930)
rax=0000000000000000 rbx=ffff84834e8b5860 rcx=ffff84834e8b5860
rdx=0008000000000000 rsi=00000000001b0486 rdi=ffffcb05ba857db8
rip=fffff8037628c9ce rsp=ffff84834e8b5750 rbp=ffff84834e8b5889
 r8=0000000000000089  r9=0000000000000000 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffffcb05b62da010 r13=ffffc70001a4aaa0
r14=fffff8037666a400 r15=00000000ffffffff
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff803`7628c9ce 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff803767733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037662a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8037662a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

BAD_STACK_POINTER:  ffff8c81f1ab20c8

STACK_TEXT: 
ffff8483`4e8b5750 fffff803`7631777d : ffffcb05`ba45a8a0 ffffcb05`ba45a8b0 00000000`00000001 00000000`003f9b00 : nt!KxWaitForLockOwnerShip+0xe
ffff8483`4e8b5780 fffff803`76349f4e : ffffcb05`ba857cd0 ffffcb05`b5cc0028 00000000`001b0486 00000000`001b0485 : nt!KeAcquireInStackQueuedSpinLock+0x7d
ffff8483`4e8b57b0 fffff803`7634aa08 : ffffcb05`b62da010 ffff8483`00000001 00000000`001b0486 00000000`00000000 : nt!MiStoreWriteModifiedPages+0x376
ffff8483`4e8b58f0 fffff803`7639169a : ffffcb05`b62da010 00000000`00000100 fffff803`000d09db ffffcb05`00000100 : nt!MiGatherPagefilePages+0x44c
ffff8483`4e8b59f0 fffff803`7626bcd5 : ffffcb05`b64cc080 ffffcb05`b64cc080 00000000`00000080 fffff803`76391440 : nt!MiModifiedPageWriter+0x25a
ffff8483`4e8b5c10 fffff803`763c9998 : ffff8c81`f1c80180 ffffcb05`b64cc080 fffff803`7626bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8483`4e8b5c60 00000000`00000000 : ffff8483`4e8b6000 ffff8483`4e8b0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffff8c81f1ab2930 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5e1ad-426c-3e07-1dfd-b329bf712cb6}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffff9a8068cb1ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9a8068cb1f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffff9a8068cb1ff0

BUGCHECK_P3: ffff9a8068cb1f48

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9a8068cb1ff0 -- (.trap 0xffff9a8068cb1ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffb0e66c55000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffb0e66c5b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804170002f1 rsp=ffff9a8068cb2180 rbp=ffff9a8068cb26f0
 r8=fffffb0e66c5b000  r9=ffff9a8068cb2710 r10=ffff870cb52ed080
r11=000000a69d0fdd68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x19e355:
fffff804`170002f1 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9a8068cb1f48 -- (.exr 0xffff9a8068cb1f48)
ExceptionAddress: fffff804170002f1 (nt!RtlpGetStackLimitsEx+0x000000000019e355)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steamwebhelper.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  ffff9a8068cb1cc8

STACK_TEXT: 
ffff9a80`68cb1cc8 fffff804`16fd41e9 : 00000000`00000139 00000000`00000004 ffff9a80`68cb1ff0 ffff9a80`68cb1f48 : nt!KeBugCheckEx
ffff9a80`68cb1cd0 fffff804`16fd4610 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9a80`68cb1e10 fffff804`16fd29a3 : fffff804`16e69038 fffff804`1720e88c ffff9a80`68cb27d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9a80`68cb1ff0 fffff804`170002f1 : 00000000`00000000 00000000`0000035e 0005e380`00ab7000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x323
ffff9a80`68cb2180 fffff804`1705982a : 00000000`00000000 00000000`00000000 ffff9a80`68cb26f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x19e355
ffff9a80`68cb21b0 fffff804`16efe85e : fffffb0e`66c5a068 ffff9a80`68cb2e30 fffffb0e`66c5a068 00000000`00000001 : nt!RtlDispatchException+0x15fa0a
ffff9a80`68cb2900 fffff804`16fc3202 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffff9a80`68cb2fb0 fffff804`16fc31d0 : fffff804`16fd4316 00000000`00000028 00000000`00000000 fffffb0e`66c59fe1 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffb0e`66c59f28 fffff804`16fd4316 : 00000000`00000028 00000000`00000000 fffffb0e`66c59fe1 fffff804`16ecd1f7 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffb0e`66c59f30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8006a68c9ce, Address of the instruction which caused the bugcheck
Arg3: ffffc98006cb2930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32kfull.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 19

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8006a68c9ce

BUGCHECK_P3: ffffc98006cb2930

BUGCHECK_P4: 0

CONTEXT:  ffffc98006cb2930 -- (.cxr 0xffffc98006cb2930)
rax=0000000000000000 rbx=fffffa0f83d1dde0 rcx=fffffa0f83d1dde0
rdx=0008000000000000 rsi=ffff888dc0625010 rdi=ffffae88607a4690
rip=fffff8006a68c9ce rsp=fffffa0f83d1dd50 rbp=fffffa0f83d1de70
 r8=000000000000021c  r9=0000000000000000 r10=fffff8006a711000
r11=ffffb97cd3e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000a16ce3 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!KxWaitForLockOwnerShip+0xe:
fffff800`6a68c9ce 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

BAD_STACK_POINTER:  ffffc98006cb1ff8

STACK_TEXT: 
fffffa0f`83d1dd50 fffff800`6a71777d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0xe
fffffa0f`83d1dd80 fffff800`6a71105c : ffffae88`607a4630 ffff888d`c0911000 00000000`fffffde4 ffff88b8`2fa6f7d7 : nt!KeAcquireInStackQueuedSpinLock+0x7d
fffffa0f`83d1ddb0 ffff88b8`2f7e6415 : ffff888d`c0911000 fffffa0f`83d1de70 ffff888d`c0911000 ffffb97c`d3e00000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x5c
fffffa0f`83d1de10 ffff88b8`2f45b022 : 00000000`00000000 fffffa0f`83d1de70 ffff888d`c0625010 ffff888d`c0911000 : win32kbase!GreReleaseSemaphoreInternal+0x15
fffffa0f`83d1de40 00000000`00000000 : fffffa0f`83d1de70 ffff888d`c0625010 ffff888d`c0911000 ffff888d`c0911000 : win32kfull+0x5b022


SYMBOL_NAME:  win32kbase!GreReleaseSemaphoreInternal+15

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffc98006cb2930 ; kb

BUCKET_ID_FUNC_OFFSET:  15

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_win32kbase!GreReleaseSemaphoreInternal

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {be9879cf-2916-f071-51a9-d6fff044b73c}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80532c8c9ce, The address that the exception occurred at
Arg3: ffffc388510bc518, Exception Record Address
Arg4: ffffd901c98ab930, Context Record Address

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 0

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 0

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 42

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.CorruptModuleList
    Value: 1


ADDITIONAL_XML: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80532c8c9ce

BUGCHECK_P3: ffffc388510bc518

BUGCHECK_P4: ffffd901c98ab930

EXCEPTION_RECORD:  ffffc388510bc518 -- (.exr 0xffffc388510bc518)
Cannot read Exception record @ ffffc388510bc518

CONTEXT:  ffffd901c98ab930 -- (.cxr 0xffffd901c98ab930)
rax=0000000000000000 rbx=ffffc388510bc860 rcx=ffffc388510bc860
rdx=0008000000000000 rsi=000000000039e235 rdi=ffffb30fc94cdee8
rip=fffff80532c8c9ce rsp=ffffc388510bc750 rbp=ffffc388510bc889
 r8=000000000000001d  r9=0000000000000000 r10=7ffffffffffffffc
r11=0000000000000000 r12=ffffb30fcf2c5010 r13=ffffef8001872720
r14=fffff8053306a400 r15=00000000ffffffff
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
fffff805`32c8c9ce ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffffd901`c98ab0c8 fffff805`32ddb416 : 00000000`0000007e ffffffff`c0000005 fffff805`32c8c9ce ffffc388`510bc518 : 0xfffff805`32dc2390
ffffd901`c98ab0d0 00000000`0000007e : ffffffff`c0000005 fffff805`32c8c9ce ffffc388`510bc518 ffffd901`c98ab930 : 0xfffff805`32ddb416
ffffd901`c98ab0d8 ffffffff`c0000005 : fffff805`32c8c9ce ffffc388`510bc518 ffffd901`c98ab930 00000000`00000000 : 0x7e
ffffd901`c98ab0e0 fffff805`32c8c9ce : ffffc388`510bc518 ffffd901`c98ab930 00000000`00000000 00000000`0006bcd5 : 0xffffffff`c0000005
ffffd901`c98ab0e8 ffffc388`510bc518 : ffffd901`c98ab930 00000000`00000000 00000000`0006bcd5 fffff805`32d9d37c : 0xfffff805`32c8c9ce
ffffd901`c98ab0f0 ffffd901`c98ab930 : 00000000`00000000 00000000`0006bcd5 fffff805`32d9d37c fffff805`00000003 : 0xffffc388`510bc518
ffffd901`c98ab0f8 00000000`00000000 : 00000000`0006bcd5 fffff805`32d9d37c fffff805`00000003 ffffc388`510bcc10 : 0xffffd901`c98ab930


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_AV

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fc259191-ef0c-6215-476f-d32e5dcaf1b7}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8050f28c9ce, Address of the instruction which caused the bugcheck
Arg3: ffffe200a1cb2930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 4

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8050f28c9ce

BUGCHECK_P3: ffffe200a1cb2930

BUGCHECK_P4: 0

CONTEXT:  ffffe200a1cb2930 -- (.cxr 0xffffe200a1cb2930)
rax=0000000000000000 rbx=fffffd09d7539ff0 rcx=fffffd09d7539ff0
rdx=0008000000000000 rsi=0000000000000000 rdi=fffff8050f78d3e0
rip=fffff8050f28c9ce rsp=fffffd09d7539f90 rbp=ffff9f86d278a3c0
 r8=00000000ffffffff  r9=7fffaf869ea6e240 r10=7ffffffffffffffc
r11=000000000000001b r12=0000000000000003 r13=fffffd09d753a1c0
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!KxWaitForLockOwnerShip+0xe:
fffff805`0f28c9ce 48890a          mov     qword ptr [rdx],rcx ds:002b:00080000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

BAD_STACK_POINTER:  ffffe200a1cb1ff8

STACK_TEXT: 
fffffd09`d7539f90 fffff805`0f30f459 : 00000000`00000000 fffff805`0f8c076e 00000000`00000000 ffffaf86`00000000 : nt!KxWaitForLockOwnerShip+0xe
fffffd09`d7539fc0 fffff805`0f8b6019 : fffffd09`d753a150 fffffd09`d753a940 00000000`00000001 fffffd09`d753a940 : nt!ExReleaseResourceLite+0x119
fffffd09`d753a020 fffff805`0f8bd066 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmpUnlockRegistry+0x19
fffffd09`d753a050 fffff805`0f8b8934 : fffffd09`0000001c fffffd09`d753a3a0 fffffd09`d753a368 00000000`00000000 : nt!CmpDoParseKey+0x2196
fffffd09`d753a2f0 fffff805`0f8b681f : ffff9f86`d3ea7010 ffffaf86`9ea35b01 ffff9f86`00000000 00000000`00000001 : nt!CmpParseKey+0x274
fffffd09`d753a510 fffff805`0f8b4c81 : ffff9f86`d3ea7000 fffffd09`d753a758 00000000`00000040 ffff9f86`c6ac5da0 : nt!ObpLookupObjectName+0x78f
fffffd09`d753a6d0 fffff805`0f8be19c : ffff9f86`00000001 00000000`00000000 00000000`00000000 ffff9f86`c6ac5da0 : nt!ObOpenObjectByNameEx+0x201
fffffd09`d753a810 fffff805`0f8be01d : 00000030`941fe588 fffffd09`d753ab80 00000000`00000001 00000000`00000000 : nt!ObOpenObjectByName+0x5c
fffffd09`d753a860 fffff805`0f802002 : 00000000`00000004 000001f8`eda1c740 00000000`000000a0 00000000`00000008 : nt!CmOpenKey+0x29d
fffffd09`d753aac0 fffff805`0f3d3c18 : 00000000`00000000 fffffd09`d753ab80 fffffd09`d753ab80 ffff9f86`d5703060 : nt!NtOpenKey+0x12
fffffd09`d753ab00 00007ffe`4e8dc2b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000030`941fe528 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4e8dc2b4


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .cxr 0xffffe200a1cb2930 ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  0x3B_c0000005_STACKPTR_ERROR_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d727c4af-27c7-04e4-888d-ab8b74fdce06}

Followup:     MachineOwner
---------
 
Bellek testi yapınız ilk olarak.


Öncelikle zaman ayırdığınız için çok teşekkür ederim, siz yazmadan önce yabancı forumlarda araştırmıştım ve çözümü buymuş:

Kod:
Solution:

1.Run cmd.exe
2.c:
3.BCDEDIT /SET {default} bootmenupolicy legacy
4.exit
5.Finally problem solved.

Bu kod ne işe yarıyor peki? 2 gündür sorunsuz oynuyorum.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı