"SYSTEM_SERVICE_EXCEPTION" ve "MEMORY_MANAGEMENT" hataları

11Pro

Hectopat
Katılım
14 Nisan 2020
Mesajlar
370
Makaleler
2
Çözümler
2
Daha fazla  
Cinsiyet
Erkek
Birkaç kez mavi ekran yedim, önceden de yemiştim ancak minidump dosyalarını yanlışlıkla silmiştim. Birkaç tanesini kurtarabildim.
Link: minidump.rar.

Sistem özellikleri:
-Ekran kartı: GTX1050.
-İşlemci: Ryzen 5
-RAM: 8 GB DDR4.
-Disk: 256 GB SSD.
 
%99 RAM ile ilgili sorun. Test edin:


Kod:
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=1961]
BiosMajorRelease = 15
BiosMinorRelease = 10
FirmwareMajorRelease = 96
FirmwareMinorRelease = 44
BiosVendor = AMI
BiosVersion = F.10
BiosReleaseDate = 08/25/2020
SystemManufacturer = HP
SystemProductName = HP Pavilion Gaming Laptop 15-ec0xxx
SystemFamily = 103C_5335KV HP Pavilion
SystemVersion =
SystemSKU = 8BN44EA#AB8
BaseBoardManufacturer = HP
BaseBoardProduct = 86D4
BaseBoardVersion = 96.44


Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8045a426629, Address of the instruction which caused the BugCheck
Arg3: ffffef08ecc605b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3578

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18134

    Key  : Analysis.Init.CPU.mSec
    Value: 483

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1310

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8045a426629

BUGCHECK_P3: ffffef08ecc605b0

BUGCHECK_P4: 0

CONTEXT:  ffffef08ecc605b0 -- (.cxr 0xffffef08ecc605b0)
rax=ffff828893ab9000 rbx=0000000061b38367 rcx=0000000000000201
rdx=ffff828893aba008 rsi=ffff828893b5daf0 rdi=00000000400620ab
rip=fffff8045a426629 rsp=ffffef08ecc60fb0 rbp=ce2b6015c26b6011
r8=ffffef08ecc60fc0  r9=0000000000000003 r10=7ffffffffffffffc
r11=0000000000000050 r12=ffff828893a20000 r13=0000000000000002
r14=ffff828893b5daf0 r15=ffffef08ecc612b0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nt!CmpPerformSingleKcbCacheLookup+0x139:
fffff804`5a426629 395d00          cmp     dword ptr [rbp],ebx ss:0018:ce2b6015`c26b6011=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  g2mupload.exe

STACK_TEXT:
ffffef08`ecc60fb0 fffff804`5a4245f7     : ffff8288`93b5daf0 ffff8288`9101f720 ffffef08`ecc611d0 fffff804`00000003 : nt!CmpPerformSingleKcbCacheLookup+0x139
ffffef08`ecc61040 fffff804`5a424a3a     : 00000000`00000000 ffffef08`ecc61100 ffffef08`00000003 00000000`00000000 : nt!CmpPerformCompleteKcbCacheLookup+0x77
ffffef08`ecc610d0 fffff804`5a423893     : 00000000`0000001c ffffef08`ecc61420 ffffef08`ecc613d8 ffffc90f`f67c7010 : nt!CmpDoParseKey+0x2da
ffffef08`ecc61370 fffff804`5a42795e     : fffff804`5a423501 00000000`00000000 ffffc90f`f67c7010 ffffef08`ecc61601 : nt!CmpParseKey+0x2c3
ffffef08`ecc61510 fffff804`5a3eb25a     : ffffc90f`f67c7000 ffffef08`ecc61778 00000000`00000040 ffffc90f`d8ef1d20 : nt!ObpLookupObjectName+0x3fe
ffffef08`ecc616e0 fffff804`5a3eb03c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc90f`d8ef1d20 : nt!ObOpenObjectByNameEx+0x1fa
ffffef08`ecc61810 fffff804`5a3eab61     : 00000000`0009e578 ffffef08`ecc61b80 00000000`00000001 fffff804`5a06119e : nt!ObOpenObjectByName+0x5c
ffffef08`ecc61860 fffff804`5a3ea88f     : 00000000`0037c000 00000000`00000000 00000000`76f14660 00000000`0019eb80 : nt!CmOpenKey+0x2c1
ffffef08`ecc61ac0 fffff804`5a2074b8     : 00000000`00000000 00000000`00000001 ffffef08`ecc61b80 00000000`0009e5d8 : nt!NtOpenKeyEx+0xf
ffffef08`ecc61b00 00007ffc`1b54ea14     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0009e518 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`1b54ea14


SYMBOL_NAME:  nt!CmpPerformSingleKcbCacheLookup+139

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .cxr 0xffffef08ecc605b0 ; kb

BUCKET_ID_FUNC_OFFSET:  139

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!CmpPerformSingleKcbCacheLookup

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56d50be7-3bf3-bcb0-75f5-7fbde9c26d56}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80219cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6156

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 44040

    Key  : Analysis.Init.CPU.mSec
    Value: 468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1322

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80219cfb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff830ae2e14620 -- (.trap 0xffff830ae2e14620)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff940000000028 rbx=0000000000000000 rcx=ffff94000317d000
rdx=000000240828e844 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80219283461 rsp=ffff830ae2e147b0 rbp=ffff94000317d000
r8=ffff940000000000  r9=ffff940000000028 r10=0000000fffffffff
r11=0004000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiDeleteSubsectionPages+0x221:
fffff802`19283461 749d            je      nt!MiDeleteSubsectionPages+0x1c0 (fffff802`19283400) [br=1]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffb981`95c6be18 fffff802`1943ae42     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`19cfb320 : nt!KeBugCheckEx
ffffb981`95c6be20 fffff802`1926f9a3     : 00001528`9c550170 ffffb981`95c52180 00000000`00000000 ffffb981`95c52180 : nt!KeAccumulateTicks+0x1c8c42
ffffb981`95c6be80 fffff802`1926f48a     : ffffca83`0f6dbec0 ffff830a`e2e146a0 00000000`00000000 ffffca83`26125e10 : nt!KeClockInterruptNotify+0x453
ffffb981`95c6bf30 fffff802`19327f55     : ffffca83`0f6dbec0 00000000`00000000 00000000`00000000 ffffc476`c13aeaaa : nt!HalpTimerClockIpiRoutine+0x1a
ffffb981`95c6bf60 fffff802`193f78ea     : ffff830a`e2e146a0 ffffca83`0f6dbec0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffb981`95c6bfb0 fffff802`193f7e57     : ce2b6015`c26b6011 01600190`19252f55 ffff830a`00000000 ffffca83`215c2010 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff830a`e2e14620 fffff802`19283461     : ffff8406`00000000 00000000`00000000 ffff8406`98800340 80000001`07f00963 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff830a`e2e147b0 fffff802`192b96f6     : ffffca83`26125e90 ffff830a`e2e148d8 ffffca83`260c1700 ffffca83`26125a50 : nt!MiDeleteSubsectionPages+0x221
ffff830a`e2e14870 fffff802`1963e396     : 00000000`00088089 00000000`00000000 fffff802`19c50c80 00000000`00088089 : nt!MiDeleteSegmentPages+0x56
ffff830a`e2e148d0 fffff802`193843bd     : 00000000`00000001 00000000`00000000 ffff830a`e2e149a0 ffffca83`26125e18 : nt!MiSegmentDelete+0x92
ffff830a`e2e14920 fffff802`193b9259     : 00000000`00000000 fffff802`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
ffff830a`e2e149e0 fffff802`19317e85     : ffffca83`11f0a040 ffffca83`11f0a040 00000000`00000080 fffff802`193b9130 : nt!MiDereferenceSegmentThread+0x129
ffff830a`e2e14c10 fffff802`193fd498     : ffffb981`95bd8180 ffffca83`11f0a040 fffff802`19317e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff830a`e2e14c60 00000000`00000000     : ffff830a`e2e15000 ffff830a`e2e0f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!KeAccumulateTicks+1c8c42

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c8c42

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff0a041474238, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: fffff881420eac10, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4749

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 20439

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1282

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  be

BUGCHECK_P1: fffff0a041474238

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: fffff881420eac10

BUGCHECK_P4: a

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff881420eac10 -- (.trap 0xfffff881420eac10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffed0000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffffed0000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80266e20fae rsp=fffff881420eada0 rbp=0000000000000000
r8=0000000000000000  r9=000000003d00116c r10=8000000000000000
r11=fffff881420eae28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff802`66e20fae f0480fba2e3f    lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffff881`420eaa18 fffff802`67063056     : 00000000`000000be fffff0a0`41474238 8a000000`00200121 fffff881`420eac10 : nt!KeBugCheckEx
fffff881`420eaa20 fffff802`66e0ca4f     : 8a000000`00200121 00000000`00000003 fffff881`420eac90 00000000`00000000 : nt!MiRaisedIrqlFault+0x16cc3a
fffff881`420eaa70 fffff802`67003d5e     : 00000001`ffffffff fffffff6`00000009 00000000`00000002 00000000`00000000 : nt!MmAccessFault+0x4ef
fffff881`420eac10 fffff802`66e20fae     : fffff881`420eb4b8 fffff802`66e20cbe 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
fffff881`420eada0 fffff802`66e2043b     : ffff8007`19863700 00000000`00000000 1a000001`00000000 ce2b6015`c26b6011 : nt!MiWsleFree+0x17e
fffff881`420eae30 fffff802`66e79439     : fffff881`420eb560 00000000`00000000 fffff881`420eb460 fffff881`420eb560 : nt!MiFreeWsleList+0x1bb
fffff881`420eb000 fffff802`66e0bedd     : 00000000`00000004 00000000`00000000 ffff8007`19863700 96000000`001a0005 : nt!MiAgeWorkingSetTail+0x139
fffff881`420eb040 fffff802`66e0bafb     : ffffed76`00000000 ffff8007`19863700 00000000`00000000 fffff881`420eb5b0 : nt!MiWalkPageTablesRecursively+0xc6d
fffff881`420eb0e0 fffff802`66e0bafb     : ffffed76`00000000 ffff8007`19863700 00000000`00000001 fffff881`420eb5c0 : nt!MiWalkPageTablesRecursively+0x88b
fffff881`420eb180 fffff802`66e0bafb     : ffffed76`bb400000 ffff8007`19863700 00000000`00000002 fffff881`420eb5d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff881`420eb220 fffff802`66e5de6b     : fffff802`00000000 ffff8007`19863700 00000000`00000003 fffff881`420eb5e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff881`420eb2c0 fffff802`66e5d901     : fffff881`420eb560 ffffc180`00000000 00000000`00000002 fffff802`00000001 : nt!MiWalkPageTables+0x36b
fffff881`420eb3c0 fffff802`66e5d009     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
fffff881`420eb8d0 fffff802`66e5c817     : 00000000`00000000 fffff881`420eba80 fffff881`420eba40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
fffff881`420eb9c0 fffff802`66e40560     : fffff802`67850d40 fffff881`420eba80 00000000`00003969 ffffc180`00000200 : nt!MiProcessWorkingSets+0x227
fffff881`420eba60 fffff802`66fb4f57     : 00000000`00000004 00000000`00000004 00000000`ffffffff ffffc180`ebe40180 : nt!MiWorkingSetManager+0x110
fffff881`420ebb20 fffff802`66f17e85     : ffff8007`0c728140 00000000`00000080 fffff802`66fb4e00 00000000`00000000 : nt!KeBalanceSetManager+0x157
fffff881`420ebc10 fffff802`66ffd2a8     : ffffc180`ebe40180 ffff8007`0c728140 fffff802`66f17e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff881`420ebc60 00000000`00000000     : fffff881`420ec000 fffff881`420e6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffd425c3e31150-ffffd425c3e3117f  48 bytes - win32kbase!xxxCreateThreadInfo+624
    [ 98 ec 00 00 00 48 8b 8f:48 8b 02 49 3b 00 77 09 ]
    ffffd425c3e31181-ffffd425c3e311a1  33 bytes - win32kbase!xxxCreateThreadInfo+655 (+0x31)
    [ 00 00 48 8b 87 d8 01 00:83 ea 01 74 7c 83 ea 02 ]
    ffffd425c3e311a4-ffffd425c3e311b4  17 bytes - win32kbase!xxxCreateThreadInfo+678 (+0x23)
    [ 1d 39 9f 70 02 00 00 75:8d 4a 58 eb 08 b8 40 00 ]
    ffffd425c3e311c1-ffffd425c3e311c6  6 bytes - win32kbase!xxxCreateThreadInfo+695 (+0x1d)
    [ 48 85 c0 74 1f 49:10 41 c6 01 01 41 ]
    ffffd425c3e311c8 - win32kbase!xxxCreateThreadInfo+69c (+0x07)
    [ cf:c0 ]
    ffffd425c3e311d5-ffffd425c3e311e0  12 bytes - win32kbase!xxxCreateThreadInfo+6a9 (+0x0d)
    [ 48 8b c8 e8 33 0b 00 00:00 08 00 00 8d 4a 5b eb ]
    ffffd425c3e311e3-ffffd425c3e311ea  8 bytes - win32kbase!xxxCreateThreadInfo+6b7 (+0x0e)
    [ eb 0a c7 87 70 02 00 00:b9 64 00 00 00 eb c7 b8 ]
    ffffd425c3e311ec - win32kbase!xxxCreateThreadInfo+6c0 (+0x09)
    [ 06:01 ]
    ffffd425c3e311ef-ffffd425c3e311fa  12 bytes - win32kbase!xxxCreateThreadInfo+6c3 (+0x03)
    [ 48 8b 05 e2 6c 22 00 48:b9 60 00 00 00 eb bb b8 ]
    ffffd425c3e31201-ffffd425c3e31204  4 bytes - win32kbase!xxxCreateThreadInfo+6d5 (+0x12)
    [ 41 bc bb 00:af b8 00 20 ]
    ffffd425c3e31206-ffffd425c3e31221  28 bytes - win32kbase!xxxCreateThreadInfo+6da (+0x05)
    [ c0 eb 09 41 bc bb 00 00:00 b9 6c 00 00 00 eb a3 ]
    ffffd425c3e31228-ffffd425c3e31239  18 bytes - win32kbase!xxxCreateThreadInfo+6fc (+0x22)
    [ 83 e6 0c 89 b4 24 58 02:24 20 55 57 41 54 41 56 ]
    ffffd425c3e3123b-ffffd425c3e3123f  5 bytes - win32kbase!xxxCreateThreadInfo+70f (+0x13)
    [ 48 85 c0 74 08:01 00 00 48 8b ]
    ffffd425c3e31246-ffffd425c3e3124f  10 bytes - win32kbase!xxxCreateThreadInfo+71a (+0x0b)
    [ eb 03 41 8b c4 85 c0 78:33 c4 48 89 45 27 44 8b ]
    ffffd425c3e3c750-ffffd425c3e3c790  65 bytes - win32kbase!DEVLOCKOBJ::bLock+a80 (+0xb50a)
    [ ff c1 41 3b f8 41 0f 42:48 83 ec 28 48 8b ca e8 ]
    ffffd425c3e3c7a9-ffffd425c3e3c7b8  16 bytes - win32kbase!DEVLOCKOBJ::bLock+ad9 (+0x59)
    [ 45 33 db 41 8b fb 44 89:01 0f 84 28 b1 0a 00 41 ]
    ffffd425c3e3c7c5-ffffd425c3e3c7ee  42 bytes - win32kbase!DEVLOCKOBJ::bLock+af5 (+0x1c)
    [ 85 ff 0f 85 d8 86 0b 00:39 89 48 01 00 00 74 44 ]
    ffffd425c3e3c7f0-ffffd425c3e3c7f9  10 bytes - win32kbase!DEVLOCKOBJ::bLock+b20 (+0x2b)
    [ 87 0b 00 b8 01 00 00 00:3a c2 74 1d c0 e2 03 80 ]
    ffffd425c3e3c7fc-ffffd425c3e3c840  69 bytes - win32kbase!DEVLOCKOBJ::bLock+b2c (+0x0c)
    [ 4b 20 85 c0 0f 84 2e 87:44 24 28 0a d1 41 88 92 ]
    ffffd425c3e3c842-ffffd425c3e3c84f  14 bytes - win32kbase!DEVLOCKOBJ::bLock+b72 (+0x46)
    [ a8 a8 07 00 00 48 8b 0d:5c 24 08 48 89 6c 24 18 ]
    ffffd425c3e3f031-ffffd425c3e3f063  51 bytes - win32kbase!RGNOBJ::bMerge+6c1 (+0x27ef)
    [ 89 45 10 48 8d 05 85 95:83 ec 28 8b ca 45 33 c0 ]
    ffffd425c3e3f065-ffffd425c3e3f06a  6 bytes - win32kbase!RGNOBJ::bMerge+6f5 (+0x34)
    [ 89 69 08 48 89 28:21 58 20 0f 57 c0 ]
    ffffd425c3e3f077-ffffd425c3e3f086  16 bytes - win32kbase!RGNOBJ::bMerge+707 (+0x12)
    [ 83 7c 24 20 00 0f 85 9e:c0 0f 84 28 97 0a 00 48 ]
    ffffd425c3e3f088 - win32kbase!RGNOBJ::bMerge+718 (+0x11)
    [ ed:db ]
    ffffd425c3e3f08a-ffffd425c3e3f08b  2 bytes - win32kbase!RGNOBJ::bMerge+71a (+0x02)
    [ 84 91:88 aa ]
    ffffd425c3e3f09b-ffffd425c3e3f0a6  12 bytes - win32kbase!RGNOBJ::bMerge+72b (+0x11)
    [ 65 48 8b 04 25 88 01 00:91 92 23 00 48 3b 08 77 ]
    ffffd425c3e3f0ab - win32kbase!RGNOBJ::bMerge+73b (+0x10)
    [ 30:58 ]
    ffffd425c3e3f0b8-ffffd425c3e3f0c4  13 bytes - win32kbase!RGNOBJ::bMerge+748 (+0x0d)
    [ 84 c0 0f 85 b3 6a 0b 00:74 92 23 00 48 3b 08 76 ]
    ffffd425c3e3f0d1-ffffd425c3e3f0f1  33 bytes - win32kbase!RGNOBJ::bMerge+761 (+0x19)
    [ 48 85 c0 74 03 4c 8b 20:8b 05 59 92 23 00 48 8b ]
    ffffd425c3e3f0f3 - win32kbase!RGNOBJ::bMerge+783 (+0x22)
    [ 4c:7c ]
    ffffd425c3e3f0f5-ffffd425c3e3f108  20 bytes - win32kbase!RGNOBJ::bMerge+785 (+0x02)
    [ 58 49 8d 44 24 58 48 39:50 85 db 78 3f 48 8d 54 ]
    ffffd425c3e3f10a-ffffd425c3e3f113  10 bytes - win32kbase!RGNOBJ::bMerge+79a (+0x15)
    [ 89 45 08 48 89 69 08 48:8b 7c 24 50 85 c0 78 27 ]
    ffffd425c3e3f120-ffffd425c3e3f125  6 bytes - win32kbase!RGNOBJ::bMerge+7b0 (+0x16)
    [ 4d 85 ed 0f 84 bb:54 24 20 e8 34 1f ]
    ffffd425c3e3f128-ffffd425c3e3f12c  5 bytes - win32kbase!RGNOBJ::bMerge+7b8 (+0x08)
    [ 00 49 8d 5d 30:8b d8 48 8b 07 ]
    ffffd425c3e3f12e-ffffd425c3e3f12f  2 bytes - win32kbase!RGNOBJ::bMerge+7be (+0x06)
    [ 85 db:8b 00 ]
598 errors : !win32kbase (ffffd425c3e31150-ffffd425c3e3f12f)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000006000, The subtype of the BugCheck.
Arg2: ffffc30a393a64b0
Arg3: ffffffffc0000225
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4702

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18072

    Key  : Analysis.Init.CPU.mSec
    Value: 405

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1306

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 6000

BUGCHECK_P2: ffffc30a393a64b0

BUGCHECK_P3: ffffffffc0000225

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffffd88133cd740 -- (.trap 0xfffffd88133cd740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000011
rdx=fffff807793264d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80778c1453a rsp=fffffd88133cd8d0 rbp=ffffc30a3da6e080
r8=fffffd88133cd8e0  r9=ffffe78f8d9cad00 r10=ffffe78f8d9cad00
r11=0000000000001001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!ObLogSecurityDescriptor+0x9a:
fffff807`78c1453a 48395f10        cmp     qword ptr [rdi+10h],rbx ds:00000000`00000010=????????????????
Resetting default scope

STACK_TEXT:
fffffd88`133cd3a8 fffff807`78a734f1     : 00000000`0000001a 00000000`00006000 ffffc30a`393a64b0 ffffffff`c0000225 : nt!KeBugCheckEx
fffffd88`133cd3b0 fffff807`788b694b     : ffffc30a`393a64d0 00000000`00000009 fffffd88`133cd700 00000000`00000000 : nt!MiStoreFaultComplete+0x156681
fffffd88`133cd3f0 fffff807`788b4b35     : fffffd88`00001000 fffffd88`133cd500 fffffd88`133cd530 ffffc30a`00000000 : nt!MiWaitForInPageComplete+0x2fb
fffffd88`133cd4e0 fffff807`7880c9c8     : 00000000`c0033333 00000000`00000000 ffffe78f`84873b50 00000000`00000000 : nt!MiIssueHardFault+0x3c5
fffffd88`133cd5a0 fffff807`78a03d5e     : ffffe78f`7e000340 ffffe78f`7e0029c0 ffffe78f`7e008480 fffffd88`000000c0 : nt!MmAccessFault+0x468
fffffd88`133cd740 fffff807`78c1453a     : 00000000`0448d031 00000000`00000000 fffffd88`00000000 fffff807`00000000 : nt!KiPageFault+0x35e
fffffd88`133cd8d0 fffff807`78c66dbf     : 00000000`00000430 ffffe78f`88d67928 00000000`00000001 00000000`00000430 : nt!ObLogSecurityDescriptor+0x9a
fffffd88`133cd950 fffff807`78c6bbdf     : 00000000`0448d031 fffffd88`133cdb80 000000da`65d7e201 ffffc30a`2da870c0 : nt!ExpWnfCreateNameInstance+0xb7
fffffd88`133cd9a0 fffff807`78a075b8     : ffffffff`fffffffa ffffc30a`3da6e080 000000da`65d7dd08 fffffd88`133cdaa8 : nt!NtCreateWnfStateName+0x1ef
fffffd88`133cda90 00007ffa`6c7ce564     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000da`65d7e228 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`6c7ce564


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffa00f85e31150-ffffa00f85e3117f  48 bytes - win32kbase!xxxCreateThreadInfo+624
    [ 98 ec 00 00 00 48 8b 8f:48 8b 02 49 3b 00 77 09 ]
    ffffa00f85e31181-ffffa00f85e311a1  33 bytes - win32kbase!xxxCreateThreadInfo+655 (+0x31)
    [ 00 00 48 8b 87 d8 01 00:83 ea 01 74 7c 83 ea 02 ]
    ffffa00f85e311a4-ffffa00f85e311b4  17 bytes - win32kbase!xxxCreateThreadInfo+678 (+0x23)
    [ 1d 39 9f 70 02 00 00 75:8d 4a 58 eb 08 b8 40 00 ]
    ffffa00f85e311c1-ffffa00f85e311c6  6 bytes - win32kbase!xxxCreateThreadInfo+695 (+0x1d)
    [ 48 85 c0 74 1f 49:10 41 c6 01 01 41 ]
    ffffa00f85e311c8 - win32kbase!xxxCreateThreadInfo+69c (+0x07)
    [ cf:c0 ]
    ffffa00f85e311d5-ffffa00f85e311e0  12 bytes - win32kbase!xxxCreateThreadInfo+6a9 (+0x0d)
    [ 48 8b c8 e8 33 0b 00 00:00 08 00 00 8d 4a 5b eb ]
    ffffa00f85e311e3-ffffa00f85e311ea  8 bytes - win32kbase!xxxCreateThreadInfo+6b7 (+0x0e)
    [ eb 0a c7 87 70 02 00 00:b9 64 00 00 00 eb c7 b8 ]
    ffffa00f85e311ec - win32kbase!xxxCreateThreadInfo+6c0 (+0x09)
    [ 06:01 ]
    ffffa00f85e311ef-ffffa00f85e311fa  12 bytes - win32kbase!xxxCreateThreadInfo+6c3 (+0x03)
    [ 48 8b 05 e2 6c 22 00 48:b9 60 00 00 00 eb bb b8 ]
    ffffa00f85e31201-ffffa00f85e31204  4 bytes - win32kbase!xxxCreateThreadInfo+6d5 (+0x12)
    [ 41 bc bb 00:af b8 00 20 ]
    ffffa00f85e31206-ffffa00f85e31221  28 bytes - win32kbase!xxxCreateThreadInfo+6da (+0x05)
    [ c0 eb 09 41 bc bb 00 00:00 b9 6c 00 00 00 eb a3 ]
    ffffa00f85e31228-ffffa00f85e31239  18 bytes - win32kbase!xxxCreateThreadInfo+6fc (+0x22)
    [ 83 e6 0c 89 b4 24 58 02:24 20 55 57 41 54 41 56 ]
    ffffa00f85e3123b-ffffa00f85e3123f  5 bytes - win32kbase!xxxCreateThreadInfo+70f (+0x13)
    [ 48 85 c0 74 08:01 00 00 48 8b ]
    ffffa00f85e31246-ffffa00f85e3124f  10 bytes - win32kbase!xxxCreateThreadInfo+71a (+0x0b)
    [ eb 03 41 8b c4 85 c0 78:33 c4 48 89 45 27 44 8b ]
    ffffa00f85e3c750-ffffa00f85e3c790  65 bytes - win32kbase!DEVLOCKOBJ::bLock+a80 (+0xb50a)
    [ ff c1 41 3b f8 41 0f 42:48 83 ec 28 48 8b ca e8 ]
    ffffa00f85e3c7a9-ffffa00f85e3c7b8  16 bytes - win32kbase!DEVLOCKOBJ::bLock+ad9 (+0x59)
    [ 45 33 db 41 8b fb 44 89:01 0f 84 28 b1 0a 00 41 ]
    ffffa00f85e3c7c5-ffffa00f85e3c7ee  42 bytes - win32kbase!DEVLOCKOBJ::bLock+af5 (+0x1c)
    [ 85 ff 0f 85 d8 86 0b 00:39 89 48 01 00 00 74 44 ]
    ffffa00f85e3c7f0-ffffa00f85e3c7f9  10 bytes - win32kbase!DEVLOCKOBJ::bLock+b20 (+0x2b)
    [ 87 0b 00 b8 01 00 00 00:3a c2 74 1d c0 e2 03 80 ]
    ffffa00f85e3c7fc-ffffa00f85e3c840  69 bytes - win32kbase!DEVLOCKOBJ::bLock+b2c (+0x0c)
    [ 4b 20 85 c0 0f 84 2e 87:44 24 28 0a d1 41 88 92 ]
    ffffa00f85e3c842-ffffa00f85e3c84f  14 bytes - win32kbase!DEVLOCKOBJ::bLock+b72 (+0x46)
    [ a8 a8 07 00 00 48 8b 0d:5c 24 08 48 89 6c 24 18 ]
    ffffa00f85e3f031-ffffa00f85e3f063  51 bytes - win32kbase!RGNOBJ::bMerge+6c1 (+0x27ef)
    [ 89 45 10 48 8d 05 85 95:83 ec 28 8b ca 45 33 c0 ]
    ffffa00f85e3f065-ffffa00f85e3f06a  6 bytes - win32kbase!RGNOBJ::bMerge+6f5 (+0x34)
    [ 89 69 08 48 89 28:21 58 20 0f 57 c0 ]
    ffffa00f85e3f077-ffffa00f85e3f086  16 bytes - win32kbase!RGNOBJ::bMerge+707 (+0x12)
    [ 83 7c 24 20 00 0f 85 9e:c0 0f 84 28 97 0a 00 48 ]
    ffffa00f85e3f088 - win32kbase!RGNOBJ::bMerge+718 (+0x11)
    [ ed:db ]
    ffffa00f85e3f08a-ffffa00f85e3f08b  2 bytes - win32kbase!RGNOBJ::bMerge+71a (+0x02)
    [ 84 91:88 aa ]
    ffffa00f85e3f09b-ffffa00f85e3f0a6  12 bytes - win32kbase!RGNOBJ::bMerge+72b (+0x11)
    [ 65 48 8b 04 25 88 01 00:91 92 23 00 48 3b 08 77 ]
    ffffa00f85e3f0ab - win32kbase!RGNOBJ::bMerge+73b (+0x10)
    [ 30:58 ]
    ffffa00f85e3f0b8-ffffa00f85e3f0c4  13 bytes - win32kbase!RGNOBJ::bMerge+748 (+0x0d)
    [ 84 c0 0f 85 b3 6a 0b 00:74 92 23 00 48 3b 08 76 ]
    ffffa00f85e3f0d1-ffffa00f85e3f0f1  33 bytes - win32kbase!RGNOBJ::bMerge+761 (+0x19)
    [ 48 85 c0 74 03 4c 8b 20:8b 05 59 92 23 00 48 8b ]
    ffffa00f85e3f0f3 - win32kbase!RGNOBJ::bMerge+783 (+0x22)
    [ 4c:7c ]
    ffffa00f85e3f0f5-ffffa00f85e3f108  20 bytes - win32kbase!RGNOBJ::bMerge+785 (+0x02)
    [ 58 49 8d 44 24 58 48 39:50 85 db 78 3f 48 8d 54 ]
    ffffa00f85e3f10a-ffffa00f85e3f113  10 bytes - win32kbase!RGNOBJ::bMerge+79a (+0x15)
    [ 89 45 08 48 89 69 08 48:8b 7c 24 50 85 c0 78 27 ]
    ffffa00f85e3f120-ffffa00f85e3f125  6 bytes - win32kbase!RGNOBJ::bMerge+7b0 (+0x16)
    [ 4d 85 ed 0f 84 bb:54 24 20 e8 34 1f ]
    ffffa00f85e3f128-ffffa00f85e3f12c  5 bytes - win32kbase!RGNOBJ::bMerge+7b8 (+0x08)
    [ 00 49 8d 5d 30:8b d8 48 8b 07 ]
    ffffa00f85e3f12e-ffffa00f85e3f12f  2 bytes - win32kbase!RGNOBJ::bMerge+7be (+0x06)
    [ 85 db:8b 00 ]
598 errors : !win32kbase (ffffa00f85e31150-ffffa00f85e3f12f)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı