PROCESS_NAME: GoW.exe
God of War ile ilgili olabilir.
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\muham\OneDrive\Masaüstü\dump\040323-9062-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (6 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS Personal.
Machine Name:
Kernel base = 0xfffff807`66000000 PsLoadedModuleList = 0xfffff807`66c13430
Debug session time: Mon Apr 3 18:25:48.316 2023 (UTC + 3:00)
System Uptime: 0 days 0:12:05.097
Loading Kernel Symbols.
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
......................................................
Loading User Symbols.
Loading unloaded module list.
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`66429400 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff807`62b99e40=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8079148f0f0, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg4: fffff8079148f0f0, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1687.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 1685.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 717.
Key : Analysis.Init.Elapsed.mSec
Value: 86715.
Key : Analysis.Memory.CommitPeak.Mb
Value: 226.
Key : Bugcheck.Code.DumpHeader
Value: 0xd1.
Key : Bugcheck.Code.Register
Value: 0xa.
Key : Dump.Attributes.AsUlong
Value: 1808.
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
FILE_IN_CAB: 040323-9062-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.
DUMP_FILE_ATTRIBUTES: 0x1808.
Kernel Generated Triage Dump.
BUGCHECK_CODE: d1.
BUGCHECK_P1: fffff8079148f0f0.
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff8079148f0f0.
READ_ADDRESS: fffff80766d1c468: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
fffff8079148f0f0
IP_IN_PAGED_CODE:
nvlddmkm+d0f0f0
fffff807`9148f0f0 ?? ???
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: GoW.exe
DPC_STACK_BASE: FFFFF80762B9AFB0.
TRAP_FRAME: fffff80762b99f80 -- (.trap 0xfffff80762b99f80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8079148f0f0 rbx=0000000000000000 rcx=ffffc70ece802000
rdx=00000000ff060080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8079148f0f0 rsp=fffff80762b9a118 rbp=ffffc70ed016d000
r8=fffff80762b9a230 r9=0000000000000000 r10=fffff8079148f0f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc.
nvlddmkm+0xd0f0f0:
fffff807`9148f0f0 ?? ???
Resetting default scope.
FAILED_INSTRUCTION_ADDRESS:
nvlddmkm+d0f0f0
fffff807`9148f0f0 ?? ???
STACK_TEXT:
fffff807`62b99e38 fffff807`6643eaa9 : 00000000`0000000a fffff807`9148f0f0 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff807`62b99e40 fffff807`6643a134 : 00000000`00000005 fffff807`91059370 00000000`00000000 0000042d`0073afe7 : nt!KiBugCheckDispatch+0x69
fffff807`62b99f80 fffff807`9148f0f0 : fffff807`9081aba4 00000000`00000000 ffffc70e`d016d000 00000000`00000000 : nt!KiPageFault+0x474
fffff807`62b9a118 fffff807`9081aba4 : 00000000`00000000 ffffc70e`d016d000 00000000`00000000 ffffc70e`d016d000 : nvlddmkm+0xd0f0f0
fffff807`62b9a120 00000000`00000000 : ffffc70e`d016d000 00000000`00000000 ffffc70e`d016d000 ffffc70e`00000000 : nvlddmkm+0x9aba4
SYMBOL_NAME: nvlddmkm+d0f0f0
MODULE_NAME: nvlddmkm.
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: d0f0f0.
FAILURE_BUCKET_ID: AV_CODE_AV_PAGED_IP_nvlddmkm!unknown_function
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {5e1e0500-a5d5-2e5c-dae5-9b72e39c3ef8}
Followup: MachineOwner.
---------