Siema pomoże ktoś męczą mnie blue screeny podsyłam analizę plików .dmp
Spec sprzętu: AMD Ryzen 5 2600 / Nvidia Palit RTX 2060 6GB / MSI B450 - A PRO/ G.skill 16GB 3000Mhz 2x8 / SilentiumPC Vero L2 500W 80 Plus Bronze / SSD: Adata SU 650 / HDD: TOSHIBA HDWD110
Win 10, 64bity, wersja 21H1
Nie mam zainstalowanego konkretnego oprogramowania antywirusowego, korzystam z Windows Defender.
Od razu mówię, że nic nigdy podkręcane nie było. Zdarzały się również wcześniej różne blue screeny. To jest tak, że czasami może nawet być z 3 dziennie, a potem spokój na miesiąc i wraca (czysta instalacja Win10 na nowo już była próbowana). Problem z BSODAMI występuję najczęściej podczas oglądania filmów (takie mam wrażenie), czasem jak np. przeglądam neta, rzadko zdarza się to w grach, nie mam pojęcia dlaczego. Sterowniki do chipsetu, karty graficznej, karty sieciowej są aktualne.
Jak coś to Memtest robiłem w niedzielę widząc „memory_corruption”, pokazał 0 błędów.
Wynik testu: Zapodaj.Net - Darmowy hosting zdjęć i obrazków bez rejestracji! - fe4d205ba06c6.jpg
Od razu podsyłam zrzuty z CrystalDiskInfo:
https://zapodaj.net/d5d2487886b31.png.html
https://zapodaj.net/e0aa70e20ad72.png.html
Plik 1:
Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\081321-8687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff80628600000 PsLoadedModuleList = 0xfffff806
2922a1b0
Debug session time: Fri Aug 13 21:58:30.338 2021 (UTC + 2:00)
System Uptime: 0 days 1:08:54.994
Loading Kernel Symbols
…
…
…
Loading User Symbols
Loading unloaded module list
…
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806289f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff806
2ea82160=000000000000001e
0: kd> !analyze -v
-
*
-
Bugcheck Analysis *
-
*
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff806327e491f, The address that the exception occurred at
Arg3: fffff80629326a00, Parameter 0 of the exception
Arg4: fffff8062883a390, Parameter 1 of the exception
Debugging Details:
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3531
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3599
Key : Analysis.Init.CPU.mSec
Value: 406
Key : Analysis.Init.Elapsed.mSec
Value: 5879
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff806327e491f
BUGCHECK_P3: fffff80629326a00
BUGCHECK_P4: fffff8062883a390
EXCEPTION_PARAMETER1: fffff80629326a00
EXCEPTION_PARAMETER2: fffff8062883a390
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
FAILED_INSTRUCTION_ADDRESS:
dxgmms2!VidSchiReferenceDisplayingAllocationsForThisEntry+9f
fffff806`327e491f 48 ???
STACK_TEXT:
fffff8062ea82158 fffff806
28af5c6e : 000000000000001e ffffffff
c000001d fffff806327e491f fffff806
29326a00 : nt!KeBugCheckEx
fffff8062ea82160 fffff806
289ffbb2 : fffff80628af5c4c 00000000
00000000 0000000000000000 00000000
00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff8062ea821a0 fffff806
28887547 : fffff8062ea82710 00000000
00000000 fffff8062ea6dc60 fffff806
289fa85e : nt!RtlpExecuteHandlerForException+0x12
fffff8062ea821d0 fffff806
28886136 : fffff8062ea6cf68 fffff806
2ea82e20 fffff8062ea6cf68 00000000
00000001 : nt!RtlDispatchException+0x297
fffff8062ea828f0 fffff806
289f7b82 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiDispatchException+0x186
fffff8062ea82fb0 fffff806
289f7b50 : fffff80628a08da5 00000000
00000000 fffff80626aca180 ffff2755
70bc600d : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff8062ea6ce28 fffff806
28a08da5 : 0000000000000000 fffff806
26aca180 ffff275570bc600d 00000000
00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff8062ea6ce30 fffff806
28a032e9 : 0000000000000000 ffffc206
35f23668 0000000000000000 00000000
00000002 : nt!KiExceptionDispatch+0x125
fffff8062ea6d010 fffff806
327e491f : 0000000000000000 ffffc206
35f23d58 fffff8062ea6d378 ffffc206
35f33000 : nt!KiInvalidOpcodeFault+0x329
fffff8062ea6d1a0 fffff806
327e3a51 : fffff8062ea6d378 00000000
00000001 ffffc20600000001 fffff806
327ec101 : dxgmms2!VidSchiReferenceDisplayingAllocationsForThisEntry+0x9f
fffff8062ea6d250 fffff806
327e565a : fffff8062ea6d378 ffffc206
0000003e fffff8062ea6d490 fffff806
2ea6d360 : dxgmms2!VidSchiProcessVsyncCompletedFlipEntry+0x141
fffff8062ea6d2f0 fffff806
327e6674 : ffffc20635efa000 ffffc206
35f23000 ffffd700eedb2e70 00000000
00000000 : dxgmms2!VidSchiProcessDpcVSyncCookie+0x5ba
fffff8062ea6d520 fffff806
2ece4071 : fffff8062ea6d619 00000000
00000000 fffff8062ea6db20 00000cd7
95cb6434 : dxgmms2!VidSchDdiNotifyDpc+0x344
fffff8062ea6d5d0 fffff806
330289fb : ffffc2063459d030 00000000
00000000 ffffc2063459d030 ffffc206
34566000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff8062ea6d680 ffffc206
3459d030 : 0000000000000000 ffffc206
3459d030 ffffc20634566000 fffff806
3302898e : nvlddmkm+0x589fb
fffff8062ea6d688 00000000
00000000 : ffffc2063459d030 ffffc206
34566000 fffff8063302898e ffffc206
34566000 : 0xffffc206`3459d030
CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgmms2
8 errors : !dxgmms2 (fffff806327e4900-fffff806327e4938)
fffff806327e4900 *af 0f be d1 89 54 24 50 *e5 c0 75 25 45 85 c9 75 …T$P…u%E…u
fffff806327e4910 *e0 0f b7 83 48 04 00 00 *36 89 86 8a 81 00 00 48 …H…6…H
fffff806327e4920 *43 c4 68 41 5f 41 5e 41 *8d 41 5c 5f 5e 5d 5b c3 C.hA_A^A.A_^][.
fffff806327e4930 *dc 3b fa 0f 83 dc 01 00 *70 33 ed 39 ab 48 04 00 .;…p3.9.H…
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
Plik2
Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\080221-8000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff80049600000 PsLoadedModuleList = 0xfffff800
4a22a1b0
Debug session time: Mon Aug 2 22:26:09.661 2021 (UTC + 2:00)
System Uptime: 0 days 1:17:38.317
Loading Kernel Symbols
…
…
…
Loading User Symbols
Loading unloaded module list
…
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800499f6cf0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa00a
81c3dd90=00000000000000ef
0: kd> !analyze -v
-
*
-
Bugcheck Analysis *
-
*
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffe2827a57b080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3827
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3827
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 7568
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : CriticalProcessDied.ExceptionCode
Value: 7a585080
Key : CriticalProcessDied.Process
Value: svchost.exe
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: ef
BUGCHECK_P1: ffffe2827a57b080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME: svchost.exe
CRITICAL_PROCESS: svchost.exe
EXCEPTION_RECORD: ffffe2827a57b7c0 – (.exr 0xffffe2827a57b7c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x7a585080 -
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0x0
TRAP_FRAME: ffff800000000000 – (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffa00a81c3dd88 fffff800
49f084d2 : 00000000000000ef ffffe282
7a57b080 0000000000000000 00000000
00000000 : nt!KeBugCheckEx
ffffa00a81c3dd90 fffff800
49dfa4ab : 0000000000000001 fffff800
4989de5d 0000000000000002 fffff800
4989d477 : nt!PspCatchCriticalBreak+0x10e
ffffa00a81c3de30 fffff800
49c5ea14 : ffffe28200000000 00000000
00000000 ffffe2827a57b080 ffffe282
7a57b4b8 : nt!PspTerminateAllThreads+0x19c1cf
ffffa00a81c3dea0 fffff800
49c5ed3c : ffffe2827a57b080 00000000
00000001 ffffffffffffffff 00000000
00000000 : nt!PspTerminateProcess+0xe0
ffffa00a81c3dee0 fffff800
49a086b8 : ffffe2827a57b080 ffffe282
7a585080 ffffa00a81c3dfd0 fffff800
49d1fa22 : nt!NtTerminateProcess+0x9c
ffffa00a81c3df50 fffff800
499fab50 : fffff80049a3b8c5 ffffa00a
81c3ea58 ffffa00a81c3ea58 ffffffff
ffffffff : nt!KiSystemServiceCopyEnd+0x28
ffffa00a81c3e0e8 fffff800
49a3b8c5 : ffffa00a81c3ea58 ffffa00a
81c3ea58 ffffffffffffffff 00000000
00000000 : nt!KiServiceLinkage
ffffa00a81c3e0f0 fffff800
49a090a4 : ffffe2827a57b7c0 fffff800
4992a576 ffff800000000000 00000000
00000000 : nt!KiDispatchException+0x1b5915
ffffa00a81c3e920 fffff800
49a07423 : 0000000000000001 ffffe282
7a588ba0 ffffa00a81c3eb80 ffffe282
00000e78 : nt!KiFastFailDispatch+0xe4
ffffa00a81c3eb00 00007ffe
fa354cf8 : 00000018ef37ec30 00000000
00000000 00000018ef37eb88 00000018
ef37ebc8 : nt!KiRaiseSecurityCheckFailure+0x323
00000018ef37eb10 00000018
ef37ec30 : 0000000000000000 00000018
ef37eb88 00000018ef37ebc8 00007ffe
fa2d48e3 : 0x00007ffefa354cf8 00000018
ef37eb18 0000000000000000 : 00000018
ef37eb88 00000018ef37ebc8 00007ffe
fa2d48e3 0000000000000001 : 0x00000018
ef37ec30
SYMBOL_NAME: nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.985
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 10e
FAILURE_BUCKET_ID: 0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_7a585080_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ea87d7df-79d5-13ce-86d1-89803266d66d}