Hatanın nedeni harici ses kartı, orası açık ve net. Tabii bunu tetikleyen şeye derince analiz şart. Bir dump dosyasında memory access hatalarıyla karşılaştım fakat ben şahsen onu sürücünün bozuk olmasına bağlıyorum. Anakartın kendi ses yongası çok mu kötü ki kullanmıyorsunuz? Tavsiyem DDU ile ses sürücülerini kaldırıp daha eski bir sürücü kurmanız yönünde.
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...
www.technopat.net
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9e014070ffec, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802579b951a, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32kbase.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 34610
Key : Analysis.Init.CPU.mSec
Value: 1062
Key : Analysis.Init.Elapsed.mSec
Value: 8735
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122321-34781-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: ffff9e014070ffec
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff802579b951a
READ_ADDRESS: fffff802542fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9e014070ffec
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: audiodg.exe
TRAP_FRAME: ffff820268de1de0 -- (.trap 0xffff820268de1de0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf02d9dc3ffc rbx=0000000000000000 rcx=fffffffffffffff4
rdx=ffffeefe6694c000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802579b951a rsp=ffff820268de1f78 rbp=ffffaf0298f78000
r8=0000000040e4bff0 r9=0000000040e4bffc r10=ffffaf0298f78000
r11=ffffaf0298f78000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
cmudaxp+0x1b951a:
fffff802`579b951a f30f6f4402f0 movdqu xmm0,xmmword ptr [rdx+rax-10h] ds:ffff9e01`4070ffec=????????????????????????????????
Resetting default scope
STACK_TEXT:
ffff8202`68de1c98 fffff802`53a09169 : 00000000`0000000a ffff9e01`4070ffec 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8202`68de1ca0 fffff802`53a05469 : 00000000`bf1b1740 00000000`000000b0 ffffffff`ffffffff fffff802`538cf309 : nt!KiBugCheckDispatch+0x69
ffff8202`68de1de0 fffff802`579b951a : fffff802`579b6a06 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 : nt!KiPageFault+0x469
ffff8202`68de1f78 fffff802`579b6a06 : 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 00000000`00000000 : cmudaxp+0x1b951a
ffff8202`68de1f80 00000000`40e4ffff : 00000000`00000000 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 : cmudaxp+0x1b6a06
ffff8202`68de1f88 00000000`00000000 : 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 fffff802`5798270a : 0x40e4ffff
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff81db7aca3820 - win32kbase!NtQueryCompositionInputSink+150
[ 00:48 ]
ffff81db7aca382d-ffff81db7aca388d 97 bytes - win32kbase!NtQueryCompositionInputSink+15d (+0x0d)
[ 0f 10 44 24 38 85 db 78:e0 02 c3 cc b8 01 00 00 ]
ffff81db7aca388f-ffff81db7aca3899 11 bytes - win32kbase!NtQueryCompositionInputSink+1bf (+0x62)
[ 5e 5f 5e c3 cc cc cc cc:09 42 10 41 c6 01 01 41 ]
ffff81db7aca389b-ffff81db7aca38cd 51 bytes - win32kbase!NtQueryCompositionInputSink+1cb (+0x0c)
[ cc 48 89 5c 24 08 48 89:83 fa 01 0f 85 40 af 06 ]
ffff81db7aca38d0-ffff81db7aca38d3 4 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+34 (+0x35)
[ 00 48 8d 4f:eb af b8 00 ]
ffff81db7aca38d5-ffff81db7aca3900 44 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+39 (+0x05)
[ 8b d8 e8 3c d2 fa ff 48:00 00 b9 6c 00 00 00 eb ]
ffff81db7aca3903-ffff81db7aca3909 7 bytes - win32kbase!CInputSink::QueryInputQueueTypes+7 (+0x2e)
[ 83 ec 20 c7 02 14 00:8d 6c 24 c9 48 81 ec ]
ffff81db7aca390b-ffff81db7aca391c 18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+f (+0x08)
[ 00 48 8b d9 48 8b 49 30:01 00 00 48 8b 05 9b 33 ]
ffff81db7acae1c0-ffff81db7acae1f1 50 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+68 (+0xa8b5)
[ 30 48 83 c4 20 5f c3 cc:48 83 ec 28 48 8b ca e8 ]
ffff81db7acae1fe-ffff81db7acae20c 15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x3e)
[ 8b c0 48 8d 4c 24 30 48:06 00 41 83 e8 03 74 4d ]
ffff81db7acae219-ffff81db7acae23a 34 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+49 (+0x1b)
[ 8b c0 48 09 43 10 48 8b:01 0f 84 16 33 06 00 41 ]
ffff81db7acae247-ffff81db7acae256 16 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+77 (+0x2e)
[ 48 89 03 48 85 c0 74 36:00 00 c6 00 01 0f ba 69 ]
ffff81db7acae258-ffff81db7acae282 43 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+88 (+0x11)
[ e8 03 f1 ff ff 48 85 c0:00 8a c1 c0 e8 03 24 01 ]
ffff81db7acae284-ffff81db7acae2aa 39 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+b4 (+0x2c)
[ cc 32 c0 eb f0 cc cc cc:c3 cc 8a 89 4c 01 00 00 ]
ffff81db7acae2b7-ffff81db7acae2bf 9 bytes - win32kbase!NSInstrumentation:

latformMapViewInSessionSpace+27 (+0x33)
[ 85 c0 78 0b 48 39 7c 24:6c 24 18 48 89 74 24 20 ]
ffff81db7acb027a-ffff81db7acb0284 11 bytes - win32kbase!DxgkEngEnterUserCrit+31a (+0x1fc3)
[ 3c 01 0f 84 bb 20 06 00:47 55 6d 61 e8 85 0c f8 ]
ffff81db7acb0291-ffff81db7acb029f 15 bytes - win32kbase!DxgkEngEnterUserCrit+331 (+0x17)
[ 4c 8b 35 40 aa 19 00 4d:89 5c 24 08 57 48 83 ec ]
ffff81db7acb02a1-ffff81db7acb02a3 3 bytes - win32kbase!DxgkEngEnterUserCrit+341 (+0x10)
[ 48 8b 0b:8b da 48 ]
ffff81db7acb02b0-ffff81db7acb02c6 23 bytes - win32kbase!DxgkEngEnterUserCrit+350 (+0x0f)
[ e9 0e fe ff ff 4c 3b 35:01 74 08 48 8b cf e8 f5 ]
ffff81db7acb02d4-ffff81db7acb02d5 2 bytes - win32kbase!DxgkEngEnterUserCrit+374 (+0x24)
[ 8b c8:89 58 ]
ffff81db7acb02e2-ffff81db7acb02e3 2 bytes - win32kbase!DxgkEngEnterUserCrit+382 (+0x0e)
[ 8b d8:33 db ]
ffff81db7acb02f0-ffff81db7acb02f2 3 bytes - win32kbase!DxgkEngEnterUserCrit+390 (+0x0e)
[ 48 8b c8:ff 48 89 ]
ffff81db7acb02ff-ffff81db7acb0300 2 bytes - win32kbase!DxgkEngEnterUserCrit+39f (+0x0f)
[ 3b d8:85 d2 ]
ffff81db7acb0302-ffff81db7acb036f 110 bytes - win32kbase!DxgkEngEnterUserCrit+3a2 (+0x03)
[ 85 bc fd ff ff e9 c9 fe:84 bd 1c 06 00 85 db 0f ]
610 errors : !win32kbase (ffff81db7aca3820-ffff81db7acb036f)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa38873803000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8043165944b, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 116862
Key : Analysis.Init.CPU.mSec
Value: 1171
Key : Analysis.Init.Elapsed.mSec
Value: 9174
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122521-29421-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffa38873803000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8043165944b
WRITE_ADDRESS: fffff8042c2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa38873803000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff689de4293f0 -- (.trap 0xfffff689de4293f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffa38873803000
rdx=000030791ae8b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043165944b rsp=fffff689de429588 rbp=ffffa388737f9000
r8=0000000040e91ffc r9=0000000002074dff r10=ffffa388737f9000
r11=ffffa388737f9000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cmudaxp+0x1b944b:
fffff804`3165944b 660fe701 movntdq xmmword ptr [rcx],xmm0 ds:ffffa388`73803000=????????????????????????????????
Resetting default scope
STACK_TEXT:
fffff689`de4292a8 fffff804`2ba09169 : 00000000`0000000a ffffa388`73803000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff689`de4292b0 fffff804`2ba05469 : 00000f71`f47d1168 00000000`000000d0 00000000`00000000 fffff804`314b156e : nt!KiBugCheckDispatch+0x69
fffff689`de4293f0 fffff804`3165944b : fffff804`31656a06 00000000`40e9ffff 00000000`00000000 00000000`bf160000 : nt!KiPageFault+0x469
fffff689`de429588 fffff804`31656a06 : 00000000`40e9ffff 00000000`00000000 00000000`bf160000 00000000`00000000 : cmudaxp+0x1b944b
fffff689`de429590 00000000`40e9ffff : 00000000`00000000 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 : cmudaxp+0x1b6a06
fffff689`de429598 00000000`00000000 : 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 fffff804`3162270a : 0x40e9ffff
SYMBOL_NAME: cmudaxp+1b944b
MODULE_NAME: cmudaxp
IMAGE_NAME: cmudaxp.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b944b
FAILURE_BUCKET_ID: AV_cmudaxp!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {03686d51-1f48-1dca-e2e9-bc35f26d989f}
Followup: MachineOwner
---------
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132848941857908727
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_045E&PID_0040\6&36f9fd40&0&2
VetoString :
[/CODE]