Opakovaná modrá smrt
Napsal: 05 dub 2020 15:39
Dobrý den,
můj ntb opakovaně hází modrou smrt. IRQL_NOT_LESS_OR_EQUAL. Nepomohla ani čistá instalace. Crystal disk i memtest prošel vpohodě.
Zkusil jsem ještě windbg s tímto výsledkem. Nevíte někdo prosím co s tím?
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`45000000 PsLoadedModuleList = 0xfffff802`45448150
Debug session time: Sat Apr 4 23:10:29.084 2020 (UTC + 2:00)
System Uptime: 0 days 0:00:45.943
Loading Kernel Symbols
......................................Page 2001e20e7 too large to be in the dump file.
.........................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8024500321f, The address that the exception occurred at
Arg3: ffffca8474bcf848, Exception Record Address
Arg4: ffffca8474bcf090, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: ASUSTeK COMPUTER INC.
SYSTEM_PRODUCT_NAME: X555LF
SYSTEM_SKU: ASUS-NotebookSKU
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: X555LF.601
BIOS_DATE: 05/06/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: X555LF
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 1
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8024500321f
BUGCHECK_P3: ffffca8474bcf848
BUGCHECK_P4: ffffca8474bcf090
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KxWaitForLockChainValid+1f
fffff802`4500321f 488b07 mov rax,qword ptr [rdi]
EXCEPTION_RECORD: ffffca8474bcf848 -- (.exr 0xffffca8474bcf848)
ExceptionAddress: fffff8024500321f (nt!KxWaitForLockChainValid+0x000000000000001f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: ffffca8474bcf090 -- (.cxr 0xffffca8474bcf090)
rax=0000000000000000 rbx=0000000000000001 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8024500321f rsp=ffffca8474bcfa80 rbp=ffffcc81ab61e000
r8=0000000000000000 r9=0000000000000000 r10=fffff802451177a0
r11=ffffca8474bcfb10 r12=0000000000000000 r13=fffff802412cd180
r14=ffffcc81ab61e000 r15=ffffcc81ab72b000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!KxWaitForLockChainValid+0x1f:
fffff802`4500321f 488b07 mov rax,qword ptr [rdi] ds:002b:00000000`00000000=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: 831
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3d
CPU_STEPPING: 4
CPU_MICROCODE: 6,3d,4,0 (F,M,S,R) SIG: 2D'00000000 (cache) 2D'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
dxgmms2!VidSchiSubmitSignalCommand+cd
fffff802`5612281d 85f6 test esi,esi
BUGCHECK_STR: AV
READ_ADDRESS: 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ANALYSIS_SESSION_HOST: ASUS
ANALYSIS_SESSION_TIME: 04-05-2020 14:23:21.0316
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8024511781b to fffff8024500321f
STACK_TEXT:
ffffca84`74bcfa80 fffff802`4511781b : 00000000`00000000 00000000`00000000 ffffca84`74bcfac0 ffffca84`74bcfac0 : nt!KxWaitForLockChainValid+0x1f
ffffca84`74bcfab0 fffff802`5612281d : ffffcc81`ac6808a0 fffff802`56121100 00000000`00000000 ffffcc81`ab61e670 : nt!KeReleaseInStackQueuedSpinLock+0x7b
ffffca84`74bcfae0 fffff802`561999f6 : ffffcc81`ac6808a0 ffffcc81`ab61e000 ffffcc81`ac7529a0 ffffcc81`ac7529a0 : dxgmms2!VidSchiSubmitSignalCommand+0xcd
ffffca84`74bcfb40 fffff802`5619994a : ffffcc81`ab61e400 fffff802`56199880 ffffcc81`ab61e000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x96
ffffca84`74bcfb90 fffff802`4506bce5 : ffffcc81`a9732080 fffff802`00000001 ffffcc81`ab61e000 00002427`bd9bbfff : dxgmms2!VidSchiWorkerThread+0xca
ffffca84`74bcfbd0 fffff802`451c99ca : fffff802`412cd180 ffffcc81`a9732080 fffff802`4506bc90 03eeec48`0000004e : nt!PspSystemThreadStartup+0x55
ffffca84`74bcfc20 00000000`00000000 : ffffca84`74bd0000 ffffca84`74bc9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: be834872ddf4ddc148fa65ab1a070e88fd2da160
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 43376f582497a0d8d49b8ffa063e562b1849ca23
THREAD_SHA1_HASH_MOD: 832e8c442c6dd5052190b80f9bd9e254253f4637
FAULT_INSTR_CODE: 2775f685
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: dxgmms2!VidSchiSubmitSignalCommand+cd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 40bd916b
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xffffca8474bcf090 ; kb
BUCKET_ID_FUNC_OFFSET: cd
FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiSubmitSignalCommand
BUCKET_ID: AV_dxgmms2!VidSchiSubmitSignalCommand
PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VidSchiSubmitSignalCommand
TARGET_TIME: 2020-04-04T21:10:29.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6193
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidschisubmitsignalcommand
FAILURE_ID_HASH: {5a1b5303-b085-ff08-a1d6-7d321ac439c8}
Followup: MachineOwner
---------
můj ntb opakovaně hází modrou smrt. IRQL_NOT_LESS_OR_EQUAL. Nepomohla ani čistá instalace. Crystal disk i memtest prošel vpohodě.
Zkusil jsem ještě windbg s tímto výsledkem. Nevíte někdo prosím co s tím?
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`45000000 PsLoadedModuleList = 0xfffff802`45448150
Debug session time: Sat Apr 4 23:10:29.084 2020 (UTC + 2:00)
System Uptime: 0 days 0:00:45.943
Loading Kernel Symbols
......................................Page 2001e20e7 too large to be in the dump file.
.........................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8024500321f, The address that the exception occurred at
Arg3: ffffca8474bcf848, Exception Record Address
Arg4: ffffca8474bcf090, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: ASUSTeK COMPUTER INC.
SYSTEM_PRODUCT_NAME: X555LF
SYSTEM_SKU: ASUS-NotebookSKU
SYSTEM_VERSION: 1.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: X555LF.601
BIOS_DATE: 05/06/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: X555LF
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 1
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8024500321f
BUGCHECK_P3: ffffca8474bcf848
BUGCHECK_P4: ffffca8474bcf090
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!KxWaitForLockChainValid+1f
fffff802`4500321f 488b07 mov rax,qword ptr [rdi]
EXCEPTION_RECORD: ffffca8474bcf848 -- (.exr 0xffffca8474bcf848)
ExceptionAddress: fffff8024500321f (nt!KxWaitForLockChainValid+0x000000000000001f)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: ffffca8474bcf090 -- (.cxr 0xffffca8474bcf090)
rax=0000000000000000 rbx=0000000000000001 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8024500321f rsp=ffffca8474bcfa80 rbp=ffffcc81ab61e000
r8=0000000000000000 r9=0000000000000000 r10=fffff802451177a0
r11=ffffca8474bcfb10 r12=0000000000000000 r13=fffff802412cd180
r14=ffffcc81ab61e000 r15=ffffcc81ab72b000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!KxWaitForLockChainValid+0x1f:
fffff802`4500321f 488b07 mov rax,qword ptr [rdi] ds:002b:00000000`00000000=????????????????
Resetting default scope
CPU_COUNT: 4
CPU_MHZ: 831
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3d
CPU_STEPPING: 4
CPU_MICROCODE: 6,3d,4,0 (F,M,S,R) SIG: 2D'00000000 (cache) 2D'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
dxgmms2!VidSchiSubmitSignalCommand+cd
fffff802`5612281d 85f6 test esi,esi
BUGCHECK_STR: AV
READ_ADDRESS: 0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ANALYSIS_SESSION_HOST: ASUS
ANALYSIS_SESSION_TIME: 04-05-2020 14:23:21.0316
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8024511781b to fffff8024500321f
STACK_TEXT:
ffffca84`74bcfa80 fffff802`4511781b : 00000000`00000000 00000000`00000000 ffffca84`74bcfac0 ffffca84`74bcfac0 : nt!KxWaitForLockChainValid+0x1f
ffffca84`74bcfab0 fffff802`5612281d : ffffcc81`ac6808a0 fffff802`56121100 00000000`00000000 ffffcc81`ab61e670 : nt!KeReleaseInStackQueuedSpinLock+0x7b
ffffca84`74bcfae0 fffff802`561999f6 : ffffcc81`ac6808a0 ffffcc81`ab61e000 ffffcc81`ac7529a0 ffffcc81`ac7529a0 : dxgmms2!VidSchiSubmitSignalCommand+0xcd
ffffca84`74bcfb40 fffff802`5619994a : ffffcc81`ab61e400 fffff802`56199880 ffffcc81`ab61e000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x96
ffffca84`74bcfb90 fffff802`4506bce5 : ffffcc81`a9732080 fffff802`00000001 ffffcc81`ab61e000 00002427`bd9bbfff : dxgmms2!VidSchiWorkerThread+0xca
ffffca84`74bcfbd0 fffff802`451c99ca : fffff802`412cd180 ffffcc81`a9732080 fffff802`4506bc90 03eeec48`0000004e : nt!PspSystemThreadStartup+0x55
ffffca84`74bcfc20 00000000`00000000 : ffffca84`74bd0000 ffffca84`74bc9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: be834872ddf4ddc148fa65ab1a070e88fd2da160
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 43376f582497a0d8d49b8ffa063e562b1849ca23
THREAD_SHA1_HASH_MOD: 832e8c442c6dd5052190b80f9bd9e254253f4637
FAULT_INSTR_CODE: 2775f685
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: dxgmms2!VidSchiSubmitSignalCommand+cd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 40bd916b
IMAGE_VERSION: 10.0.18362.719
STACK_COMMAND: .cxr 0xffffca8474bcf090 ; kb
BUCKET_ID_FUNC_OFFSET: cd
FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiSubmitSignalCommand
BUCKET_ID: AV_dxgmms2!VidSchiSubmitSignalCommand
PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VidSchiSubmitSignalCommand
TARGET_TIME: 2020-04-04T21:10:29.000Z
OSBUILD: 18362
OSSERVICEPACK: 720
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6193
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidschisubmitsignalcommand
FAILURE_ID_HASH: {5a1b5303-b085-ff08-a1d6-7d321ac439c8}
Followup: MachineOwner
---------