Çözüldü DRIVER_IRQL_NOT_LESS_OR_EQUAL hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

UncleSam

Hectopat
Katılım
2 Ağustos 2021
Mesajlar
27
Daha fazla  
Cinsiyet
Erkek
Merhabalar, uzunca bir zamandır aynı mavi ekran hatasını almaktan muzdaribim. Sorunumu ve çözümü olarak neler denediğimi kısaca anlatayım.

Oyun oynarken, müzik dinlerken veya tarayıcıda gezinirken ses aniden kesiliyor ve bilgisayarı yeniden başlatmadan gelmiyor. Ses kesildiğindeyse videolu ve sesli hiçbir medyayı sessize almadan izleyemiyorsunuz yani oynatmıyor.
Bazen de o an yaptığım iş fark etmeksizin mavi ekran alıyorum bu genellikle oyun oynarken oluyor. Mavi ekran kodu "DRIVER_IRQL_NOT_LESS_OR_EQUAL" "cmudaxp.sys".

Denediğim çözümler: Format atıp temiz kurulum yapmak, donanım bileşenlerini temizleyip tekrar takmak ve farklı ses driver dosyalarını denemek.
Anladığım kadarıyla sorun harici ses kartımın driverının Windows 10 ile uyumsuz olmasından kaynaklanıyor. Gönüllü geliştiricilerin oluşturduğu farklı driverları da kurup yüklemeyi denedim ama sorun aynı devam ediyor.
Dump Dosyaları

Sistem Bileşenleri: Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz 3.40 GHz
8 GB DDR3 RAM
1TB HDD
AMD HD6700 Series Ekran kartı
ASUS XONAR DGX Ses Kartı


Edisyon Windows 10 Home
Sürüm 21H1
Yüklenme tarihi ‎02.‎09.‎2021
İS derlemesi 19043.1237
Deneyim Windows Feature Experience Pack 120.2212.3530.0
 
Çözüm
Hatanın nedeni harici ses kartı, orası açık ve net. Tabii bunu tetikleyen şeye derince analiz şart. Bir dump dosyasında memory access hatalarıyla karşılaştım fakat ben şahsen onu sürücünün bozuk olmasına bağlıyorum. Anakartın kendi ses yongası çok mu kötü ki kullanmıyorsunuz? Tavsiyem DDU ile ses sürücülerini kaldırıp daha eski bir sürücü kurmanız yönünde.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9e014070ffec, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802579b951a, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9624

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 34610

Key : Analysis.Init.CPU.mSec
Value: 1062

Key : Analysis.Init.Elapsed.mSec
Value: 8735

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 122321-34781-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffff9e014070ffec

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802579b951a

READ_ADDRESS: fffff802542fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9e014070ffec

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

TRAP_FRAME: ffff820268de1de0 -- (.trap 0xffff820268de1de0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf02d9dc3ffc rbx=0000000000000000 rcx=fffffffffffffff4
rdx=ffffeefe6694c000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802579b951a rsp=ffff820268de1f78 rbp=ffffaf0298f78000
r8=0000000040e4bff0 r9=0000000040e4bffc r10=ffffaf0298f78000
r11=ffffaf0298f78000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
cmudaxp+0x1b951a:
fffff802`579b951a f30f6f4402f0 movdqu xmm0,xmmword ptr [rdx+rax-10h] ds:ffff9e01`4070ffec=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff8202`68de1c98 fffff802`53a09169 : 00000000`0000000a ffff9e01`4070ffec 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8202`68de1ca0 fffff802`53a05469 : 00000000`bf1b1740 00000000`000000b0 ffffffff`ffffffff fffff802`538cf309 : nt!KiBugCheckDispatch+0x69
ffff8202`68de1de0 fffff802`579b951a : fffff802`579b6a06 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 : nt!KiPageFault+0x469
ffff8202`68de1f78 fffff802`579b6a06 : 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 00000000`00000000 : cmudaxp+0x1b951a
ffff8202`68de1f80 00000000`40e4ffff : 00000000`00000000 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 : cmudaxp+0x1b6a06
ffff8202`68de1f88 00000000`00000000 : 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 fffff802`5798270a : 0x40e4ffff


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff81db7aca3820 - win32kbase!NtQueryCompositionInputSink+150
[ 00:48 ]
ffff81db7aca382d-ffff81db7aca388d 97 bytes - win32kbase!NtQueryCompositionInputSink+15d (+0x0d)
[ 0f 10 44 24 38 85 db 78:e0 02 c3 cc b8 01 00 00 ]
ffff81db7aca388f-ffff81db7aca3899 11 bytes - win32kbase!NtQueryCompositionInputSink+1bf (+0x62)
[ 5e 5f 5e c3 cc cc cc cc:09 42 10 41 c6 01 01 41 ]
ffff81db7aca389b-ffff81db7aca38cd 51 bytes - win32kbase!NtQueryCompositionInputSink+1cb (+0x0c)
[ cc 48 89 5c 24 08 48 89:83 fa 01 0f 85 40 af 06 ]
ffff81db7aca38d0-ffff81db7aca38d3 4 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+34 (+0x35)
[ 00 48 8d 4f:eb af b8 00 ]
ffff81db7aca38d5-ffff81db7aca3900 44 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+39 (+0x05)
[ 8b d8 e8 3c d2 fa ff 48:00 00 b9 6c 00 00 00 eb ]
ffff81db7aca3903-ffff81db7aca3909 7 bytes - win32kbase!CInputSink::QueryInputQueueTypes+7 (+0x2e)
[ 83 ec 20 c7 02 14 00:8d 6c 24 c9 48 81 ec ]
ffff81db7aca390b-ffff81db7aca391c 18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+f (+0x08)
[ 00 48 8b d9 48 8b 49 30:01 00 00 48 8b 05 9b 33 ]
ffff81db7acae1c0-ffff81db7acae1f1 50 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+68 (+0xa8b5)
[ 30 48 83 c4 20 5f c3 cc:48 83 ec 28 48 8b ca e8 ]
ffff81db7acae1fe-ffff81db7acae20c 15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x3e)
[ 8b c0 48 8d 4c 24 30 48:06 00 41 83 e8 03 74 4d ]
ffff81db7acae219-ffff81db7acae23a 34 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+49 (+0x1b)
[ 8b c0 48 09 43 10 48 8b:01 0f 84 16 33 06 00 41 ]
ffff81db7acae247-ffff81db7acae256 16 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+77 (+0x2e)
[ 48 89 03 48 85 c0 74 36:00 00 c6 00 01 0f ba 69 ]
ffff81db7acae258-ffff81db7acae282 43 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+88 (+0x11)
[ e8 03 f1 ff ff 48 85 c0:00 8a c1 c0 e8 03 24 01 ]
ffff81db7acae284-ffff81db7acae2aa 39 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+b4 (+0x2c)
[ cc 32 c0 eb f0 cc cc cc:c3 cc 8a 89 4c 01 00 00 ]
ffff81db7acae2b7-ffff81db7acae2bf 9 bytes - win32kbase!NSInstrumentation::platformMapViewInSessionSpace+27 (+0x33)
[ 85 c0 78 0b 48 39 7c 24:6c 24 18 48 89 74 24 20 ]
ffff81db7acb027a-ffff81db7acb0284 11 bytes - win32kbase!DxgkEngEnterUserCrit+31a (+0x1fc3)
[ 3c 01 0f 84 bb 20 06 00:47 55 6d 61 e8 85 0c f8 ]
ffff81db7acb0291-ffff81db7acb029f 15 bytes - win32kbase!DxgkEngEnterUserCrit+331 (+0x17)
[ 4c 8b 35 40 aa 19 00 4d:89 5c 24 08 57 48 83 ec ]
ffff81db7acb02a1-ffff81db7acb02a3 3 bytes - win32kbase!DxgkEngEnterUserCrit+341 (+0x10)
[ 48 8b 0b:8b da 48 ]
ffff81db7acb02b0-ffff81db7acb02c6 23 bytes - win32kbase!DxgkEngEnterUserCrit+350 (+0x0f)
[ e9 0e fe ff ff 4c 3b 35:01 74 08 48 8b cf e8 f5 ]
ffff81db7acb02d4-ffff81db7acb02d5 2 bytes - win32kbase!DxgkEngEnterUserCrit+374 (+0x24)
[ 8b c8:89 58 ]
ffff81db7acb02e2-ffff81db7acb02e3 2 bytes - win32kbase!DxgkEngEnterUserCrit+382 (+0x0e)
[ 8b d8:33 db ]
ffff81db7acb02f0-ffff81db7acb02f2 3 bytes - win32kbase!DxgkEngEnterUserCrit+390 (+0x0e)
[ 48 8b c8:ff 48 89 ]
ffff81db7acb02ff-ffff81db7acb0300 2 bytes - win32kbase!DxgkEngEnterUserCrit+39f (+0x0f)
[ 3b d8:85 d2 ]
ffff81db7acb0302-ffff81db7acb036f 110 bytes - win32kbase!DxgkEngEnterUserCrit+3a2 (+0x03)
[ 85 bc fd ff ff e9 c9 fe:84 bd 1c 06 00 85 db 0f ]
610 errors : !win32kbase (ffff81db7aca3820-ffff81db7acb036f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa38873803000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8043165944b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9124

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 116862

Key : Analysis.Init.CPU.mSec
Value: 1171

Key : Analysis.Init.Elapsed.mSec
Value: 9174

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 122521-29421-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffa38873803000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8043165944b

WRITE_ADDRESS: fffff8042c2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa38873803000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff689de4293f0 -- (.trap 0xfffff689de4293f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffa38873803000
rdx=000030791ae8b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043165944b rsp=fffff689de429588 rbp=ffffa388737f9000
r8=0000000040e91ffc r9=0000000002074dff r10=ffffa388737f9000
r11=ffffa388737f9000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cmudaxp+0x1b944b:
fffff804`3165944b 660fe701 movntdq xmmword ptr [rcx],xmm0 ds:ffffa388`73803000=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff689`de4292a8 fffff804`2ba09169 : 00000000`0000000a ffffa388`73803000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff689`de4292b0 fffff804`2ba05469 : 00000f71`f47d1168 00000000`000000d0 00000000`00000000 fffff804`314b156e : nt!KiBugCheckDispatch+0x69
fffff689`de4293f0 fffff804`3165944b : fffff804`31656a06 00000000`40e9ffff 00000000`00000000 00000000`bf160000 : nt!KiPageFault+0x469
fffff689`de429588 fffff804`31656a06 : 00000000`40e9ffff 00000000`00000000 00000000`bf160000 00000000`00000000 : cmudaxp+0x1b944b
fffff689`de429590 00000000`40e9ffff : 00000000`00000000 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 : cmudaxp+0x1b6a06
fffff689`de429598 00000000`00000000 : 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 fffff804`3162270a : 0x40e9ffff


SYMBOL_NAME: cmudaxp+1b944b

MODULE_NAME: cmudaxp

IMAGE_NAME: cmudaxp.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1b944b

FAILURE_BUCKET_ID: AV_cmudaxp!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {03686d51-1f48-1dca-e2e9-bc35f26d989f}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132848941857908727
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_045E&PID_0040\6&36f9fd40&0&2
VetoString :
[/CODE]
Dahili ses kartını kullanmadığım için denemedim çözüm sağlayacağını düşünmüyorum ama denedikten sonra güncelleme yaparım.
Deneyin belki harici sürücü arızalı olduğu için problem yaratıyor.
 
Son düzenleyen: Moderatör:
Hatanın nedeni harici ses kartı, orası açık ve net. Tabii bunu tetikleyen şeye derince analiz şart. Bir dump dosyasında memory access hatalarıyla karşılaştım fakat ben şahsen onu sürücünün bozuk olmasına bağlıyorum. Anakartın kendi ses yongası çok mu kötü ki kullanmıyorsunuz? Tavsiyem DDU ile ses sürücülerini kaldırıp daha eski bir sürücü kurmanız yönünde.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9e014070ffec, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802579b951a, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9624

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 34610

Key : Analysis.Init.CPU.mSec
Value: 1062

Key : Analysis.Init.Elapsed.mSec
Value: 8735

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 122321-34781-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffff9e014070ffec

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802579b951a

READ_ADDRESS: fffff802542fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9e014070ffec

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

TRAP_FRAME: ffff820268de1de0 -- (.trap 0xffff820268de1de0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf02d9dc3ffc rbx=0000000000000000 rcx=fffffffffffffff4
rdx=ffffeefe6694c000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802579b951a rsp=ffff820268de1f78 rbp=ffffaf0298f78000
r8=0000000040e4bff0 r9=0000000040e4bffc r10=ffffaf0298f78000
r11=ffffaf0298f78000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
cmudaxp+0x1b951a:
fffff802`579b951a f30f6f4402f0 movdqu xmm0,xmmword ptr [rdx+rax-10h] ds:ffff9e01`4070ffec=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff8202`68de1c98 fffff802`53a09169 : 00000000`0000000a ffff9e01`4070ffec 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8202`68de1ca0 fffff802`53a05469 : 00000000`bf1b1740 00000000`000000b0 ffffffff`ffffffff fffff802`538cf309 : nt!KiBugCheckDispatch+0x69
ffff8202`68de1de0 fffff802`579b951a : fffff802`579b6a06 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 : nt!KiPageFault+0x469
ffff8202`68de1f78 fffff802`579b6a06 : 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 00000000`00000000 : cmudaxp+0x1b951a
ffff8202`68de1f80 00000000`40e4ffff : 00000000`00000000 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 : cmudaxp+0x1b6a06
ffff8202`68de1f88 00000000`00000000 : 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 fffff802`5798270a : 0x40e4ffff


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff81db7aca3820 - win32kbase!NtQueryCompositionInputSink+150
[ 00:48 ]
ffff81db7aca382d-ffff81db7aca388d 97 bytes - win32kbase!NtQueryCompositionInputSink+15d (+0x0d)
[ 0f 10 44 24 38 85 db 78:e0 02 c3 cc b8 01 00 00 ]
ffff81db7aca388f-ffff81db7aca3899 11 bytes - win32kbase!NtQueryCompositionInputSink+1bf (+0x62)
[ 5e 5f 5e c3 cc cc cc cc:09 42 10 41 c6 01 01 41 ]
ffff81db7aca389b-ffff81db7aca38cd 51 bytes - win32kbase!NtQueryCompositionInputSink+1cb (+0x0c)
[ cc 48 89 5c 24 08 48 89:83 fa 01 0f 85 40 af 06 ]
ffff81db7aca38d0-ffff81db7aca38d3 4 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+34 (+0x35)
[ 00 48 8d 4f:eb af b8 00 ]
ffff81db7aca38d5-ffff81db7aca3900 44 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+39 (+0x05)
[ 8b d8 e8 3c d2 fa ff 48:00 00 b9 6c 00 00 00 eb ]
ffff81db7aca3903-ffff81db7aca3909 7 bytes - win32kbase!CInputSink::QueryInputQueueTypes+7 (+0x2e)
[ 83 ec 20 c7 02 14 00:8d 6c 24 c9 48 81 ec ]
ffff81db7aca390b-ffff81db7aca391c 18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+f (+0x08)
[ 00 48 8b d9 48 8b 49 30:01 00 00 48 8b 05 9b 33 ]
ffff81db7acae1c0-ffff81db7acae1f1 50 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+68 (+0xa8b5)
[ 30 48 83 c4 20 5f c3 cc:48 83 ec 28 48 8b ca e8 ]
ffff81db7acae1fe-ffff81db7acae20c 15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x3e)
[ 8b c0 48 8d 4c 24 30 48:06 00 41 83 e8 03 74 4d ]
ffff81db7acae219-ffff81db7acae23a 34 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+49 (+0x1b)
[ 8b c0 48 09 43 10 48 8b:01 0f 84 16 33 06 00 41 ]
ffff81db7acae247-ffff81db7acae256 16 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+77 (+0x2e)
[ 48 89 03 48 85 c0 74 36:00 00 c6 00 01 0f ba 69 ]
ffff81db7acae258-ffff81db7acae282 43 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+88 (+0x11)
[ e8 03 f1 ff ff 48 85 c0:00 8a c1 c0 e8 03 24 01 ]
ffff81db7acae284-ffff81db7acae2aa 39 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+b4 (+0x2c)
[ cc 32 c0 eb f0 cc cc cc:c3 cc 8a 89 4c 01 00 00 ]
ffff81db7acae2b7-ffff81db7acae2bf 9 bytes - win32kbase!NSInstrumentation::platformMapViewInSessionSpace+27 (+0x33)
[ 85 c0 78 0b 48 39 7c 24:6c 24 18 48 89 74 24 20 ]
ffff81db7acb027a-ffff81db7acb0284 11 bytes - win32kbase!DxgkEngEnterUserCrit+31a (+0x1fc3)
[ 3c 01 0f 84 bb 20 06 00:47 55 6d 61 e8 85 0c f8 ]
ffff81db7acb0291-ffff81db7acb029f 15 bytes - win32kbase!DxgkEngEnterUserCrit+331 (+0x17)
[ 4c 8b 35 40 aa 19 00 4d:89 5c 24 08 57 48 83 ec ]
ffff81db7acb02a1-ffff81db7acb02a3 3 bytes - win32kbase!DxgkEngEnterUserCrit+341 (+0x10)
[ 48 8b 0b:8b da 48 ]
ffff81db7acb02b0-ffff81db7acb02c6 23 bytes - win32kbase!DxgkEngEnterUserCrit+350 (+0x0f)
[ e9 0e fe ff ff 4c 3b 35:01 74 08 48 8b cf e8 f5 ]
ffff81db7acb02d4-ffff81db7acb02d5 2 bytes - win32kbase!DxgkEngEnterUserCrit+374 (+0x24)
[ 8b c8:89 58 ]
ffff81db7acb02e2-ffff81db7acb02e3 2 bytes - win32kbase!DxgkEngEnterUserCrit+382 (+0x0e)
[ 8b d8:33 db ]
ffff81db7acb02f0-ffff81db7acb02f2 3 bytes - win32kbase!DxgkEngEnterUserCrit+390 (+0x0e)
[ 48 8b c8:ff 48 89 ]
ffff81db7acb02ff-ffff81db7acb0300 2 bytes - win32kbase!DxgkEngEnterUserCrit+39f (+0x0f)
[ 3b d8:85 d2 ]
ffff81db7acb0302-ffff81db7acb036f 110 bytes - win32kbase!DxgkEngEnterUserCrit+3a2 (+0x03)
[ 85 bc fd ff ff e9 c9 fe:84 bd 1c 06 00 85 db 0f ]
610 errors : !win32kbase (ffff81db7aca3820-ffff81db7acb036f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa38873803000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8043165944b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9124

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 116862

Key : Analysis.Init.CPU.mSec
Value: 1171

Key : Analysis.Init.Elapsed.mSec
Value: 9174

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 122521-29421-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffa38873803000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8043165944b

WRITE_ADDRESS: fffff8042c2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa38873803000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff689de4293f0 -- (.trap 0xfffff689de4293f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffa38873803000
rdx=000030791ae8b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043165944b rsp=fffff689de429588 rbp=ffffa388737f9000
r8=0000000040e91ffc r9=0000000002074dff r10=ffffa388737f9000
r11=ffffa388737f9000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cmudaxp+0x1b944b:
fffff804`3165944b 660fe701 movntdq xmmword ptr [rcx],xmm0 ds:ffffa388`73803000=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff689`de4292a8 fffff804`2ba09169 : 00000000`0000000a ffffa388`73803000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff689`de4292b0 fffff804`2ba05469 : 00000f71`f47d1168 00000000`000000d0 00000000`00000000 fffff804`314b156e : nt!KiBugCheckDispatch+0x69
fffff689`de4293f0 fffff804`3165944b : fffff804`31656a06 00000000`40e9ffff 00000000`00000000 00000000`bf160000 : nt!KiPageFault+0x469
fffff689`de429588 fffff804`31656a06 : 00000000`40e9ffff 00000000`00000000 00000000`bf160000 00000000`00000000 : cmudaxp+0x1b944b
fffff689`de429590 00000000`40e9ffff : 00000000`00000000 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 : cmudaxp+0x1b6a06
fffff689`de429598 00000000`00000000 : 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 fffff804`3162270a : 0x40e9ffff


SYMBOL_NAME: cmudaxp+1b944b

MODULE_NAME: cmudaxp

IMAGE_NAME: cmudaxp.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1b944b

FAILURE_BUCKET_ID: AV_cmudaxp!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {03686d51-1f48-1dca-e2e9-bc35f26d989f}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132848941857908727
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_045E&PID_0040\6&36f9fd40&0&2
VetoString :
[/CODE]
 
Çözüm
Hatanın nedeni harici ses kartı, orası açık ve net. Tabii bunu tetikleyen şeye derince analiz şart. Bir dump dosyasında memory access hatalarıyla karşılaştım fakat ben şahsen onu sürücünün bozuk olmasına bağlıyorum. Anakartın kendi ses yongası çok mu kötü ki kullanmıyorsunuz? Tavsiyem DDU ile ses sürücülerini kaldırıp daha eski bir sürücü kurmanız yönünde.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff9e014070ffec, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff802579b951a, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9624

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 34610

Key : Analysis.Init.CPU.mSec
Value: 1062

Key : Analysis.Init.Elapsed.mSec
Value: 8735

Key : Analysis.Memory.CommitPeak.Mb
Value: 80

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 122321-34781-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffff9e014070ffec

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802579b951a

READ_ADDRESS: fffff802542fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9e014070ffec

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

TRAP_FRAME: ffff820268de1de0 -- (.trap 0xffff820268de1de0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffaf02d9dc3ffc rbx=0000000000000000 rcx=fffffffffffffff4
rdx=ffffeefe6694c000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802579b951a rsp=ffff820268de1f78 rbp=ffffaf0298f78000
r8=0000000040e4bff0 r9=0000000040e4bffc r10=ffffaf0298f78000
r11=ffffaf0298f78000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
cmudaxp+0x1b951a:
fffff802`579b951a f30f6f4402f0 movdqu xmm0,xmmword ptr [rdx+rax-10h] ds:ffff9e01`4070ffec=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff8202`68de1c98 fffff802`53a09169 : 00000000`0000000a ffff9e01`4070ffec 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8202`68de1ca0 fffff802`53a05469 : 00000000`bf1b1740 00000000`000000b0 ffffffff`ffffffff fffff802`538cf309 : nt!KiBugCheckDispatch+0x69
ffff8202`68de1de0 fffff802`579b951a : fffff802`579b6a06 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 : nt!KiPageFault+0x469
ffff8202`68de1f78 fffff802`579b6a06 : 00000000`40e4ffff 00000000`00000000 00000000`bf1b0000 00000000`00000000 : cmudaxp+0x1b951a
ffff8202`68de1f80 00000000`40e4ffff : 00000000`00000000 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 : cmudaxp+0x1b6a06
ffff8202`68de1f88 00000000`00000000 : 00000000`bf1b0000 00000000`00000000 ffff9e00`ff8c0220 fffff802`5798270a : 0x40e4ffff


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffff81db7aca3820 - win32kbase!NtQueryCompositionInputSink+150
[ 00:48 ]
ffff81db7aca382d-ffff81db7aca388d 97 bytes - win32kbase!NtQueryCompositionInputSink+15d (+0x0d)
[ 0f 10 44 24 38 85 db 78:e0 02 c3 cc b8 01 00 00 ]
ffff81db7aca388f-ffff81db7aca3899 11 bytes - win32kbase!NtQueryCompositionInputSink+1bf (+0x62)
[ 5e 5f 5e c3 cc cc cc cc:09 42 10 41 c6 01 01 41 ]
ffff81db7aca389b-ffff81db7aca38cd 51 bytes - win32kbase!NtQueryCompositionInputSink+1cb (+0x0c)
[ cc 48 89 5c 24 08 48 89:83 fa 01 0f 85 40 af 06 ]
ffff81db7aca38d0-ffff81db7aca38d3 4 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+34 (+0x35)
[ 00 48 8d 4f:eb af b8 00 ]
ffff81db7aca38d5-ffff81db7aca3900 44 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+39 (+0x05)
[ 8b d8 e8 3c d2 fa ff 48:00 00 b9 6c 00 00 00 eb ]
ffff81db7aca3903-ffff81db7aca3909 7 bytes - win32kbase!CInputSink::QueryInputQueueTypes+7 (+0x2e)
[ 83 ec 20 c7 02 14 00:8d 6c 24 c9 48 81 ec ]
ffff81db7aca390b-ffff81db7aca391c 18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+f (+0x08)
[ 00 48 8b d9 48 8b 49 30:01 00 00 48 8b 05 9b 33 ]
ffff81db7acae1c0-ffff81db7acae1f1 50 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+68 (+0xa8b5)
[ 30 48 83 c4 20 5f c3 cc:48 83 ec 28 48 8b ca e8 ]
ffff81db7acae1fe-ffff81db7acae20c 15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x3e)
[ 8b c0 48 8d 4c 24 30 48:06 00 41 83 e8 03 74 4d ]
ffff81db7acae219-ffff81db7acae23a 34 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+49 (+0x1b)
[ 8b c0 48 09 43 10 48 8b:01 0f 84 16 33 06 00 41 ]
ffff81db7acae247-ffff81db7acae256 16 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+77 (+0x2e)
[ 48 89 03 48 85 c0 74 36:00 00 c6 00 01 0f ba 69 ]
ffff81db7acae258-ffff81db7acae282 43 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+88 (+0x11)
[ e8 03 f1 ff ff 48 85 c0:00 8a c1 c0 e8 03 24 01 ]
ffff81db7acae284-ffff81db7acae2aa 39 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+b4 (+0x2c)
[ cc 32 c0 eb f0 cc cc cc:c3 cc 8a 89 4c 01 00 00 ]
ffff81db7acae2b7-ffff81db7acae2bf 9 bytes - win32kbase!NSInstrumentation::platformMapViewInSessionSpace+27 (+0x33)
[ 85 c0 78 0b 48 39 7c 24:6c 24 18 48 89 74 24 20 ]
ffff81db7acb027a-ffff81db7acb0284 11 bytes - win32kbase!DxgkEngEnterUserCrit+31a (+0x1fc3)
[ 3c 01 0f 84 bb 20 06 00:47 55 6d 61 e8 85 0c f8 ]
ffff81db7acb0291-ffff81db7acb029f 15 bytes - win32kbase!DxgkEngEnterUserCrit+331 (+0x17)
[ 4c 8b 35 40 aa 19 00 4d:89 5c 24 08 57 48 83 ec ]
ffff81db7acb02a1-ffff81db7acb02a3 3 bytes - win32kbase!DxgkEngEnterUserCrit+341 (+0x10)
[ 48 8b 0b:8b da 48 ]
ffff81db7acb02b0-ffff81db7acb02c6 23 bytes - win32kbase!DxgkEngEnterUserCrit+350 (+0x0f)
[ e9 0e fe ff ff 4c 3b 35:01 74 08 48 8b cf e8 f5 ]
ffff81db7acb02d4-ffff81db7acb02d5 2 bytes - win32kbase!DxgkEngEnterUserCrit+374 (+0x24)
[ 8b c8:89 58 ]
ffff81db7acb02e2-ffff81db7acb02e3 2 bytes - win32kbase!DxgkEngEnterUserCrit+382 (+0x0e)
[ 8b d8:33 db ]
ffff81db7acb02f0-ffff81db7acb02f2 3 bytes - win32kbase!DxgkEngEnterUserCrit+390 (+0x0e)
[ 48 8b c8:ff 48 89 ]
ffff81db7acb02ff-ffff81db7acb0300 2 bytes - win32kbase!DxgkEngEnterUserCrit+39f (+0x0f)
[ 3b d8:85 d2 ]
ffff81db7acb0302-ffff81db7acb036f 110 bytes - win32kbase!DxgkEngEnterUserCrit+3a2 (+0x03)
[ 85 bc fd ff ff e9 c9 fe:84 bd 1c 06 00 85 db 0f ]
610 errors : !win32kbase (ffff81db7aca3820-ffff81db7acb036f)

MODULE_NAME: memory_corruption

IMAGE_NAME: memory_corruption

MEMORY_CORRUPTOR: LARGE

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffa38873803000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8043165944b, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for cmudaxp.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9124

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 116862

Key : Analysis.Init.CPU.mSec
Value: 1171

Key : Analysis.Init.Elapsed.mSec
Value: 9174

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 122521-29421-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffa38873803000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8043165944b

WRITE_ADDRESS: fffff8042c2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa38873803000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff689de4293f0 -- (.trap 0xfffff689de4293f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=ffffa38873803000
rdx=000030791ae8b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043165944b rsp=fffff689de429588 rbp=ffffa388737f9000
r8=0000000040e91ffc r9=0000000002074dff r10=ffffa388737f9000
r11=ffffa388737f9000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cmudaxp+0x1b944b:
fffff804`3165944b 660fe701 movntdq xmmword ptr [rcx],xmm0 ds:ffffa388`73803000=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff689`de4292a8 fffff804`2ba09169 : 00000000`0000000a ffffa388`73803000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff689`de4292b0 fffff804`2ba05469 : 00000f71`f47d1168 00000000`000000d0 00000000`00000000 fffff804`314b156e : nt!KiBugCheckDispatch+0x69
fffff689`de4293f0 fffff804`3165944b : fffff804`31656a06 00000000`40e9ffff 00000000`00000000 00000000`bf160000 : nt!KiPageFault+0x469
fffff689`de429588 fffff804`31656a06 : 00000000`40e9ffff 00000000`00000000 00000000`bf160000 00000000`00000000 : cmudaxp+0x1b944b
fffff689`de429590 00000000`40e9ffff : 00000000`00000000 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 : cmudaxp+0x1b6a06
fffff689`de429598 00000000`00000000 : 00000000`bf160000 00000000`00000000 ffffd401`8e680c40 fffff804`3162270a : 0x40e9ffff


SYMBOL_NAME: cmudaxp+1b944b

MODULE_NAME: cmudaxp

IMAGE_NAME: cmudaxp.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1b944b

FAILURE_BUCKET_ID: AV_cmudaxp!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {03686d51-1f48-1dca-e2e9-bc35f26d989f}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132848941857908727
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_045E&PID_0040\6&36f9fd40&0&2
VetoString :
[/CODE]
Aslında geçenlerde harici kartı çıkartıp dahili ses yongasını kullanmayı denedim ama sanırım formattan sonra gerekli sürücüleri yüklemeyi başaramadığım için bir türlü ses alamadım, muhtemelen tekrar deneyeceğim.

DDU'yu rehberdeki gibi kurup ses kartı sürücülerini silmeyi denediğimde maalesef benim kullandığımAsus seçeneğini göremedim.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı