ソ
ソンウンホ
Hey, I've just built a pc and I am getting random reboots with no bluescreen.
I used windbg to analyze error logs and got this on the MEMORY.dmp
Any recommendations?
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*Symbol information
Symbol search path is: SRV*C:\Symbols*Symbol information
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`54a00000 PsLoadedModuleList = 0xfffff800`5562a490
Debug session time: Fri Apr 9 06:09:26.200 2021 (UTC + 9:00)
System Uptime: 0 days 1:01:41.889
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8005509e938, Address of the instruction which caused the bugcheck
Arg3: fffff3008dd78c20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on FREEMAN
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 20
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8005509e938
BUGCHECK_P3: fffff3008dd78c20
BUGCHECK_P4: 0
CONTEXT: fffff3008dd78c20 -- (.cxr 0xfffff3008dd78c20)
rax=0000000000002f40 rbx=fffff3008dd796b0 rcx=00000000000005e8
rdx=00000000827f827f rsi=0000000000000000 rdi=ffffab03a351f000
rip=fffff8005509e938 rsp=fffff3008dd79628 rbp=fffff3008dd79730
r8=ffffab03ad04a000 r9=0000000000000013 r10=000000000000027f
r11=000000000000027f r12=000001f3b838dc64 r13=ffffab03a351f000
r14=fffff3008dd79920 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0x68:
fffff800`5509e938 488b4808 mov rcx,qword ptr [rax+8] ds:002b:00000000`00002f48=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffff300`8dd79628 fffff800`55020a74 : 00000000`00000060 00000000`00000001 fffff300`00000000 00000000`00000000 : nt!HvpGetCellPaged+0x68
fffff300`8dd79630 fffff800`54fecb32 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284
fffff300`8dd79790 fffff800`54e075b8 : 00000000`08b3e370 00000000`00000002 00000000`00000000 00000000`02000000 : nt!NtQueryValueKey+0x5f2
fffff300`8dd79a90 00007ffd`6abacef4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`08b3e2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6abacef4
SYMBOL_NAME: nt!HvpGetCellPaged+68
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xfffff3008dd78c20 ; kb
BUCKET_ID_FUNC_OFFSET: 68
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {32f4db97-5bc1-37be-caf3-746cdc554a0b}
Followup: MachineOwner
---------
Continue reading...
I used windbg to analyze error logs and got this on the MEMORY.dmp
Any recommendations?
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*Symbol information
Symbol search path is: SRV*C:\Symbols*Symbol information
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`54a00000 PsLoadedModuleList = 0xfffff800`5562a490
Debug session time: Fri Apr 9 06:09:26.200 2021 (UTC + 9:00)
System Uptime: 0 days 1:01:41.889
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
PEB address is NULL !
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8005509e938, Address of the instruction which caused the bugcheck
Arg3: fffff3008dd78c20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on FREEMAN
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 20
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8005509e938
BUGCHECK_P3: fffff3008dd78c20
BUGCHECK_P4: 0
CONTEXT: fffff3008dd78c20 -- (.cxr 0xfffff3008dd78c20)
rax=0000000000002f40 rbx=fffff3008dd796b0 rcx=00000000000005e8
rdx=00000000827f827f rsi=0000000000000000 rdi=ffffab03a351f000
rip=fffff8005509e938 rsp=fffff3008dd79628 rbp=fffff3008dd79730
r8=ffffab03ad04a000 r9=0000000000000013 r10=000000000000027f
r11=000000000000027f r12=000001f3b838dc64 r13=ffffab03a351f000
r14=fffff3008dd79920 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!HvpGetCellPaged+0x68:
fffff800`5509e938 488b4808 mov rcx,qword ptr [rax+8] ds:002b:00000000`00002f48=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffff300`8dd79628 fffff800`55020a74 : 00000000`00000060 00000000`00000001 fffff300`00000000 00000000`00000000 : nt!HvpGetCellPaged+0x68
fffff300`8dd79630 fffff800`54fecb32 : 00000000`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284
fffff300`8dd79790 fffff800`54e075b8 : 00000000`08b3e370 00000000`00000002 00000000`00000000 00000000`02000000 : nt!NtQueryValueKey+0x5f2
fffff300`8dd79a90 00007ffd`6abacef4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`08b3e2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6abacef4
SYMBOL_NAME: nt!HvpGetCellPaged+68
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr 0xfffff3008dd78c20 ; kb
BUCKET_ID_FUNC_OFFSET: 68
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!HvpGetCellPaged
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {32f4db97-5bc1-37be-caf3-746cdc554a0b}
Followup: MachineOwner
---------
Continue reading...