Çözüldü Monster DRIVER_IRQL_NOT_LESS_OR_EQUAL hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Lord Timurchad

Centipat
Katılım
19 Şubat 2023
Mesajlar
142
Çözümler
2
Daha fazla  
Cinsiyet
Erkek
RAM
16 GB 3200 MHz
SSD veya HDD modeli
Samsung MZVL4512HBLU-00B07
Ekran kartı
NVIDIA GeForce Rtx 3050 Ti
Anakart
Anakart hakkında bilgim yok.
İşlemci
12th Gen Intel i7-12700H 2,3 Ghz
Arkadaşlar laptopumu açtığım zaman arada aşağıdaki hatayı alıyordum. Ama şimdi sıklaştı, her açtığımda bu hata geliyor. Aşağıdaki görselden anladığım kadarıyla driver problemi var ama hangisi olduğunu çözemedim.
Bu hatayı aldıktan sonra ekran kartı duruyor, çalışmıyor. Yardımcı olur musunuz?
Laptop modeli: Monster Abra A5 v19.3

20230417_042047.jpg


Bu da dump dosyaları.

17 Nisan tarihli olana bakın.
 
Son düzenleyen: Moderatör:
Çözüm
Hocam Linux üzerinde debugger olarak ne kullanıyorsunuz acaba konudan bağımsız.

Konu sahibi sorun sanırım Realtek driverları.
Eki Görüntüle 1743252
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit.
 UseExperimentalFeatureForNugetShare : false.
 AllowNugetExeUpdate : false.

 - Configuring repositories.
 ----> Repository : LocalInstalled, Enabled: true.
 ----> Repository : UserExtensions, Enabled: true.

************* Waiting for Debugger Extensions Gallery to Initialize **************
.
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36.

Microsoft (R) Windows Debugger Version 10.0.25324.1001 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\bugra\Desktop\041623-7968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff806`35600000 PsLoadedModuleList = 0xfffff806`3622a310
Debug session time: Sun Apr 16 20:38:52.510 2023 (UTC + 3:00)
System Uptime: 0 days 0:00:13.126
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
............................
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`359f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff60a`36187430=000000000000000a
19: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8064e6b5195, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1655.

 Key : Analysis.Elapsed.mSec
 Value: 6941.

 Key : Analysis.IO.Other.Mb
 Value: 11.

 Key : Analysis.IO.Read.Mb
 Value: 2

 Key : Analysis.IO.Write.Mb
 Value: 18.

 Key : Analysis.Init.CPU.mSec
 Value: 155.

 Key : Analysis.Init.Elapsed.mSec
 Value: 24909.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 129.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Failure.Bucket
 Value: AV_rtf64x64!unknown_function

 Key : Failure.Hash
 Value: {91d6f247-f02b-bde9-35b3-efc844316e53}

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: d1.

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8064e6b5195.

FILE_IN_CAB: 041623-7968-01.dmp

READ_ADDRESS: fffff806362fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 0000000000000008.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffff60a36187570 -- (.trap 0xfffff60a36187570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe388cdd575a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064e6b5195 rsp=fffff60a36187700 rbp=fffff60a36187810
 r8=ffffe388cfe5417c r9=0000000000000000 r10=00000000ffffffff
r11=0000000000000137 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy.
rtf64x64+0x5195:
fffff806`4e6b5195 48397808 cmp qword ptr [rax+8],rdi ds:00000000`00000008=????????????????
Resetting default scope.

STACK_TEXT:
fffff60a`36187428 fffff806`35a05e69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff60a`36187430 fffff806`35a02169 : 00000000`00000000 00000000`746c6946 00000000`000000e0 00000000`00000cfc : nt!KiBugCheckDispatch+0x69
fffff60a`36187570 fffff806`4e6b5195 : 00000000`00000000 ffffe388`cdd575a0 ffffb4a0`58c8a27e 00000000`00000001 : nt!KiPageFault+0x469
fffff60a`36187700 00000000`00000000 : ffffe388`cdd575a0 ffffb4a0`58c8a27e 00000000`00000001 ffffe388`bcddf8a0 : rtf64x64+0x5195

SYMBOL_NAME: rtf64x64+5195

MODULE_NAME: rtf64x64.

IMAGE_NAME: rtf64x64.sys

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5195.

FAILURE_BUCKET_ID: AV_rtf64x64!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {91d6f247-f02b-bde9-35b3-efc844316e53}

Followup: MachineOwner.
---------

19: kd> lmvm rtf64x64.
Browse full module list.
start end module name.
fffff806`4e6b0000 fffff806`4e6c1000 rtf64x64 T (no symbols)
 Loaded symbol image file: rtf64x64.sys
 Image path: \SystemRoot\system32\DRIVERS\rtf64x64.sys
 Image name: rtf64x64.sys
 Browse all global symbols functions data.
 Timestamp: Fri Aug 27 06:00:42 2021 (6128555A)
 CheckSum: 00019C8A.
 ImageSize: 00011000.
 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 Information from resource tables:

Bir dump daha Realtek gibi.
Kod:
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit.
 UseExperimentalFeatureForNugetShare : false.
 AllowNugetExeUpdate : false.

 - Configuring repositories.
 ----> Repository : LocalInstalled, Enabled: true.
 ----> Repository : UserExtensions, Enabled: true.

************* Waiting for Debugger Extensions Gallery to Initialize **************
.
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36.

Microsoft (R) Windows Debugger Version 10.0.25324.1001 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\bugra\Desktop\041623-8281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff803`58600000 PsLoadedModuleList = 0xfffff803`5922a310
Debug session time: Sun Apr 16 20:38:18.551 2023 (UTC + 3:00)
System Uptime: 0 days 0:00:18.168
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
.............................
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`589f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffca8e`eafaf430=000000000000000a
19: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8036f1f5195, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1734.

 Key : Analysis.Elapsed.mSec
 Value: 7390.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 2

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 186.

 Key : Analysis.Init.Elapsed.mSec
 Value: 19816.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 129.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Failure.Bucket
 Value: AV_rtf64x64!unknown_function

 Key : Failure.Hash
 Value: {91d6f247-f02b-bde9-35b3-efc844316e53}

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: d1.

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8036f1f5195.

FILE_IN_CAB: 041623-8281-01.dmp

READ_ADDRESS: fffff803592fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 0000000000000008.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffca8eeafaf570 -- (.trap 0xffffca8eeafaf570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb90f5c6891f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036f1f5195 rsp=ffffca8eeafaf700 rbp=ffffca8eeafaf810
 r8=ffffb90f6e55e1a6 r9=0000000000000000 r10=00000000ffffffff
r11=00000000000002bc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy.
rtf64x64+0x5195:
fffff803`6f1f5195 48397808 cmp qword ptr [rax+8],rdi ds:00000000`00000008=????????????????
Resetting default scope.

STACK_TEXT:
ffffca8e`eafaf428 fffff803`58a05e69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffca8e`eafaf430 fffff803`58a02169 : 00000000`00000000 00000000`746c6946 00000000`000000e0 00000000`00000cfc : nt!KiBugCheckDispatch+0x69
ffffca8e`eafaf570 fffff803`6f1f5195 : 00000000`00000000 ffffb90f`5c6891f0 ffffd8e6`3492cf82 00000000`00000001 : nt!KiPageFault+0x469
ffffca8e`eafaf700 00000000`00000000 : ffffb90f`5c6891f0 ffffd8e6`3492cf82 00000000`00000001 ffffb90f`5a1c58a0 : rtf64x64+0x5195

SYMBOL_NAME: rtf64x64+5195

MODULE_NAME: rtf64x64.

IMAGE_NAME: rtf64x64.sys

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5195.

FAILURE_BUCKET_ID: AV_rtf64x64!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {91d6f247-f02b-bde9-35b3-efc844316e53}

Followup: MachineOwner.
---------

Debugger bol da deneyim olmadığı için denemedim ubuntucuğumda, bir ara bakarım :D

@Lord Timurchad Realtek network driverıymış bu, ses değilmiş, kenara köşeye driverlarınızı yedekleyip kaldırmayı deneyin güvenli moddan.

@Recep Baltaş hazır sizi Online gördüm siz de okuyabilir misiniz acaba?

Yani bir ağ kartı sürücüsü bile herhangi bir bilgisayara mavi ekran verdirtebiliyorsa denilecek bir şey yok :D. Deneyip göreceğim olursa bilgilendiririm.

Sorunu çözdüm hatta bilgisayar daha iyi oldu :D. Şimdi madde madde nasıl yaptığımı anlatayım:
  1. Öncelikle Windows'u güvenli modda başlattım herhangi bir tuş ataması olmaması durumunda Win tuşu + r ye basıp veya direk çalıştır'ı başlatıp yazı yazılabilen bölgeye MSConfig yazıp başlattım. Daha sonra yukarıda önyükleme sekmesine tıkladım ve güvenli önyükleme seçeneğini tikleyip ağ'ı seçtim ve uygulaya basıp o sekmeyi kapattım daha sonra önüme bir pencere geldi yeniden başlat'ı seçtim ve bilgisayar yeniden başladı.
  2. Bilgisayar güvenli modda başladı. İlk yaptığım iş Aygıt Yöneticisi'ni açmak oldu ve orada sorunlu sürücüleri ünlemli şekilde gösterdi zaten. Daha sonra Monster'ın kendi sitesindeki önceden yüklediğim Driver'ları tek tek açıp kontrol ettim. Bazıları yüklendi bazıları zaten yüklü dedi.
  3. Tüm işlemler bittikten sonra 1. maddede anlattığım güvenli önyüklemenin tikini kaldırıp bilgisayarı yeniden başlattım ve sorunum çözüldü.
Arkadaşlar laptopumu açtığım zaman arada aşağıdaki hatayı alıyordum. Ama şimdi sıklaştı, her açtığımda bu hata geliyor. Aşağıdaki görselden anladığım kadarıyla driver problemi var ama hangisi olduğunu çözemedim.
Bu hatayı aldıktan sonra ekran kartı duruyor, çalışmıyor. Yardımcı olur musunuz?
Laptop modeli: Monster Abra A5 v19.3

Eki Görüntüle 1743156

Bu da dump dosyaları.

17 Nisan tarihli olana bakın.
Merhaba bir program da sorun çıkartıyor olabilir, okumaya çalışacağım.
 
Arkadaşlar laptopumu açtığım zaman arada aşağıdaki hatayı alıyordum. Ama şimdi sıklaştı, her açtığımda bu hata geliyor. Aşağıdaki görselden anladığım kadarıyla driver problemi var ama hangisi olduğunu çözemedim.
Bu hatayı aldıktan sonra ekran kartı duruyor, çalışmıyor. Yardımcı olur musunuz?
Laptop modeli: Monster Abra A5 v19.3

Eki Görüntüle 1743156

Bu da dump dosyaları.

17 Nisan tarihli olana bakın.
Bilgisayarın driverından kaynaklı bir soruna benziyor ama bi minidumpu bi okuyayım. Bilgisayarı f8 e art arda basar açmayı deneyin hocam sonra ordan güvenli başlatmayı seçin eğer windows hello açık değilse.
 
Bilgisayarın driverından kaynaklı bir soruna benziyor ama bi minidumpu bi okuyayım. Bilgisayarı f8 e art arda basar açmayı deneyin hocam sonra ordan güvenli başlatmayı seçin eğer windows hello açık değilse.
Hocam Linux üzerinde debugger olarak ne kullanıyorsunuz acaba konudan bağımsız.

Konu sahibi sorun sanırım Realtek driverları
1681705350321.png

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : false
   AllowNugetExeUpdate : false

   - Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true


************* Waiting for Debugger Extensions Gallery to Initialize **************
.
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25324.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\bugra\Desktop\041623-7968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff806`35600000 PsLoadedModuleList = 0xfffff806`3622a310
Debug session time: Sun Apr 16 20:38:52.510 2023 (UTC + 3:00)
System Uptime: 0 days 0:00:13.126
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`359f3ea0 48894c2408      mov     qword ptr [rsp+8],rcx ss:fffff60a`36187430=000000000000000a
19: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8064e6b5195, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1655

    Key  : Analysis.Elapsed.mSec
    Value: 6941

    Key  : Analysis.IO.Other.Mb
    Value: 11

    Key  : Analysis.IO.Read.Mb
    Value: 2

    Key  : Analysis.IO.Write.Mb
    Value: 18

    Key  : Analysis.Init.CPU.mSec
    Value: 155

    Key  : Analysis.Init.Elapsed.mSec
    Value: 24909

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 129

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_rtf64x64!unknown_function

    Key  : Failure.Hash
    Value: {91d6f247-f02b-bde9-35b3-efc844316e53}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8064e6b5195

FILE_IN_CAB:  041623-7968-01.dmp

READ_ADDRESS: fffff806362fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000008

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff60a36187570 -- (.trap 0xfffff60a36187570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe388cdd575a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064e6b5195 rsp=fffff60a36187700 rbp=fffff60a36187810
 r8=ffffe388cfe5417c  r9=0000000000000000 r10=00000000ffffffff
r11=0000000000000137 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
rtf64x64+0x5195:
fffff806`4e6b5195 48397808        cmp     qword ptr [rax+8],rdi ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT: 
fffff60a`36187428 fffff806`35a05e69     : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff60a`36187430 fffff806`35a02169     : 00000000`00000000 00000000`746c6946 00000000`000000e0 00000000`00000cfc : nt!KiBugCheckDispatch+0x69
fffff60a`36187570 fffff806`4e6b5195     : 00000000`00000000 ffffe388`cdd575a0 ffffb4a0`58c8a27e 00000000`00000001 : nt!KiPageFault+0x469
fffff60a`36187700 00000000`00000000     : ffffe388`cdd575a0 ffffb4a0`58c8a27e 00000000`00000001 ffffe388`bcddf8a0 : rtf64x64+0x5195


SYMBOL_NAME:  rtf64x64+5195

MODULE_NAME: rtf64x64

IMAGE_NAME:  rtf64x64.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  5195

FAILURE_BUCKET_ID:  AV_rtf64x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {91d6f247-f02b-bde9-35b3-efc844316e53}

Followup:     MachineOwner
---------

19: kd> lmvm rtf64x64
Browse full module list
start             end                 module name
fffff806`4e6b0000 fffff806`4e6c1000   rtf64x64 T (no symbols)           
    Loaded symbol image file: rtf64x64.sys
    Image path: \SystemRoot\system32\DRIVERS\rtf64x64.sys
    Image name: rtf64x64.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Aug 27 06:00:42 2021 (6128555A)
    CheckSum:         00019C8A
    ImageSize:        00011000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
 
Bir dump daha Realtek gibi.
Kod:
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : false
   AllowNugetExeUpdate : false

   - Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true


************* Waiting for Debugger Extensions Gallery to Initialize **************
.
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25324.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\bugra\Desktop\041623-8281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff803`58600000 PsLoadedModuleList = 0xfffff803`5922a310
Debug session time: Sun Apr 16 20:38:18.551 2023 (UTC + 3:00)
System Uptime: 0 days 0:00:18.168
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`589f3ea0 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffffca8e`eafaf430=000000000000000a
19: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8036f1f5195, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1734

    Key  : Analysis.Elapsed.mSec
    Value: 7390

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 2

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19816

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 129

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_rtf64x64!unknown_function

    Key  : Failure.Hash
    Value: {91d6f247-f02b-bde9-35b3-efc844316e53}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8036f1f5195

FILE_IN_CAB:  041623-8281-01.dmp

READ_ADDRESS: fffff803592fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000008

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffca8eeafaf570 -- (.trap 0xffffca8eeafaf570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb90f5c6891f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036f1f5195 rsp=ffffca8eeafaf700 rbp=ffffca8eeafaf810
 r8=ffffb90f6e55e1a6  r9=0000000000000000 r10=00000000ffffffff
r11=00000000000002bc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
rtf64x64+0x5195:
fffff803`6f1f5195 48397808        cmp     qword ptr [rax+8],rdi ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffffca8e`eafaf428 fffff803`58a05e69     : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffca8e`eafaf430 fffff803`58a02169     : 00000000`00000000 00000000`746c6946 00000000`000000e0 00000000`00000cfc : nt!KiBugCheckDispatch+0x69
ffffca8e`eafaf570 fffff803`6f1f5195     : 00000000`00000000 ffffb90f`5c6891f0 ffffd8e6`3492cf82 00000000`00000001 : nt!KiPageFault+0x469
ffffca8e`eafaf700 00000000`00000000     : ffffb90f`5c6891f0 ffffd8e6`3492cf82 00000000`00000001 ffffb90f`5a1c58a0 : rtf64x64+0x5195


SYMBOL_NAME:  rtf64x64+5195

MODULE_NAME: rtf64x64

IMAGE_NAME:  rtf64x64.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  5195

FAILURE_BUCKET_ID:  AV_rtf64x64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {91d6f247-f02b-bde9-35b3-efc844316e53}

Followup:     MachineOwner
---------
Virtio ile windowsa giriyorum da ama merak ettim şimdi acaba var mı öyle bişey :D. Varmış:
aur/minidump-stackwalk
Debugger bol da deneyim olmadığı için denemedim ubuntucuğumda, bi ara bakarım :D

@Lord Timurchad Realtek network driverıymış bu, ses değilmiş, Kenara köşeye driverlarınızı yedekleyip kaldırmayı deneyin güvenli moddan.

@Recep Baltaş hazır sizi online gördüm siz de okuyabilir misiniz acaba?
 
Son düzenleme:
Hocam Linux üzerinde debugger olarak ne kullanıyorsunuz acaba konudan bağımsız.

Konu sahibi sorun sanırım Realtek driverları.
Eki Görüntüle 1743252
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit.
 UseExperimentalFeatureForNugetShare : false.
 AllowNugetExeUpdate : false.

 - Configuring repositories.
 ----> Repository : LocalInstalled, Enabled: true.
 ----> Repository : UserExtensions, Enabled: true.

************* Waiting for Debugger Extensions Gallery to Initialize **************
.
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36.

Microsoft (R) Windows Debugger Version 10.0.25324.1001 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\bugra\Desktop\041623-7968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff806`35600000 PsLoadedModuleList = 0xfffff806`3622a310
Debug session time: Sun Apr 16 20:38:52.510 2023 (UTC + 3:00)
System Uptime: 0 days 0:00:13.126
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
............................
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`359f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff60a`36187430=000000000000000a
19: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8064e6b5195, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1655.

 Key : Analysis.Elapsed.mSec
 Value: 6941.

 Key : Analysis.IO.Other.Mb
 Value: 11.

 Key : Analysis.IO.Read.Mb
 Value: 2

 Key : Analysis.IO.Write.Mb
 Value: 18.

 Key : Analysis.Init.CPU.mSec
 Value: 155.

 Key : Analysis.Init.Elapsed.mSec
 Value: 24909.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 129.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Failure.Bucket
 Value: AV_rtf64x64!unknown_function

 Key : Failure.Hash
 Value: {91d6f247-f02b-bde9-35b3-efc844316e53}

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: d1.

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8064e6b5195.

FILE_IN_CAB: 041623-7968-01.dmp

READ_ADDRESS: fffff806362fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 0000000000000008.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: fffff60a36187570 -- (.trap 0xfffff60a36187570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe388cdd575a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064e6b5195 rsp=fffff60a36187700 rbp=fffff60a36187810
 r8=ffffe388cfe5417c r9=0000000000000000 r10=00000000ffffffff
r11=0000000000000137 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy.
rtf64x64+0x5195:
fffff806`4e6b5195 48397808 cmp qword ptr [rax+8],rdi ds:00000000`00000008=????????????????
Resetting default scope.

STACK_TEXT:
fffff60a`36187428 fffff806`35a05e69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff60a`36187430 fffff806`35a02169 : 00000000`00000000 00000000`746c6946 00000000`000000e0 00000000`00000cfc : nt!KiBugCheckDispatch+0x69
fffff60a`36187570 fffff806`4e6b5195 : 00000000`00000000 ffffe388`cdd575a0 ffffb4a0`58c8a27e 00000000`00000001 : nt!KiPageFault+0x469
fffff60a`36187700 00000000`00000000 : ffffe388`cdd575a0 ffffb4a0`58c8a27e 00000000`00000001 ffffe388`bcddf8a0 : rtf64x64+0x5195

SYMBOL_NAME: rtf64x64+5195

MODULE_NAME: rtf64x64.

IMAGE_NAME: rtf64x64.sys

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5195.

FAILURE_BUCKET_ID: AV_rtf64x64!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {91d6f247-f02b-bde9-35b3-efc844316e53}

Followup: MachineOwner.
---------

19: kd> lmvm rtf64x64.
Browse full module list.
start end module name.
fffff806`4e6b0000 fffff806`4e6c1000 rtf64x64 T (no symbols)
 Loaded symbol image file: rtf64x64.sys
 Image path: \SystemRoot\system32\DRIVERS\rtf64x64.sys
 Image name: rtf64x64.sys
 Browse all global symbols functions data.
 Timestamp: Fri Aug 27 06:00:42 2021 (6128555A)
 CheckSum: 00019C8A.
 ImageSize: 00011000.
 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 Information from resource tables:

Bir dump daha Realtek gibi.
Kod:
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2303.30001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Usb4Kd.natvis'

************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit.
 UseExperimentalFeatureForNugetShare : false.
 AllowNugetExeUpdate : false.

 - Configuring repositories.
 ----> Repository : LocalInstalled, Enabled: true.
 ----> Repository : UserExtensions, Enabled: true.

************* Waiting for Debugger Extensions Gallery to Initialize **************
.
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36.

Microsoft (R) Windows Debugger Version 10.0.25324.1001 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\bugra\Desktop\041623-8281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (20 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff803`58600000 PsLoadedModuleList = 0xfffff803`5922a310
Debug session time: Sun Apr 16 20:38:18.551 2023 (UTC + 3:00)
System Uptime: 0 days 0:00:18.168
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
.............................
Loading User Symbols.
Loading unloaded module list.
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`589f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffca8e`eafaf430=000000000000000a
19: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff8036f1f5195, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1734.

 Key : Analysis.Elapsed.mSec
 Value: 7390.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 2

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 186.

 Key : Analysis.Init.Elapsed.mSec
 Value: 19816.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 129.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Failure.Bucket
 Value: AV_rtf64x64!unknown_function

 Key : Failure.Hash
 Value: {91d6f247-f02b-bde9-35b3-efc844316e53}

 Key : WER.OS.Branch
 Value: vb_release.

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: d1.

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8036f1f5195.

FILE_IN_CAB: 041623-8281-01.dmp

READ_ADDRESS: fffff803592fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 0000000000000008.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

TRAP_FRAME: ffffca8eeafaf570 -- (.trap 0xffffca8eeafaf570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb90f5c6891f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036f1f5195 rsp=ffffca8eeafaf700 rbp=ffffca8eeafaf810
 r8=ffffb90f6e55e1a6 r9=0000000000000000 r10=00000000ffffffff
r11=00000000000002bc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy.
rtf64x64+0x5195:
fffff803`6f1f5195 48397808 cmp qword ptr [rax+8],rdi ds:00000000`00000008=????????????????
Resetting default scope.

STACK_TEXT:
ffffca8e`eafaf428 fffff803`58a05e69 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffca8e`eafaf430 fffff803`58a02169 : 00000000`00000000 00000000`746c6946 00000000`000000e0 00000000`00000cfc : nt!KiBugCheckDispatch+0x69
ffffca8e`eafaf570 fffff803`6f1f5195 : 00000000`00000000 ffffb90f`5c6891f0 ffffd8e6`3492cf82 00000000`00000001 : nt!KiPageFault+0x469
ffffca8e`eafaf700 00000000`00000000 : ffffb90f`5c6891f0 ffffd8e6`3492cf82 00000000`00000001 ffffb90f`5a1c58a0 : rtf64x64+0x5195

SYMBOL_NAME: rtf64x64+5195

MODULE_NAME: rtf64x64.

IMAGE_NAME: rtf64x64.sys

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 5195.

FAILURE_BUCKET_ID: AV_rtf64x64!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {91d6f247-f02b-bde9-35b3-efc844316e53}

Followup: MachineOwner.
---------

Debugger bol da deneyim olmadığı için denemedim ubuntucuğumda, bir ara bakarım :D

@Lord Timurchad Realtek network driverıymış bu, ses değilmiş, kenara köşeye driverlarınızı yedekleyip kaldırmayı deneyin güvenli moddan.

@Recep Baltaş hazır sizi Online gördüm siz de okuyabilir misiniz acaba?

Yani bir ağ kartı sürücüsü bile herhangi bir bilgisayara mavi ekran verdirtebiliyorsa denilecek bir şey yok :D. Deneyip göreceğim olursa bilgilendiririm.

Sorunu çözdüm hatta bilgisayar daha iyi oldu :D. Şimdi madde madde nasıl yaptığımı anlatayım:
  1. Öncelikle Windows'u güvenli modda başlattım herhangi bir tuş ataması olmaması durumunda Win tuşu + r ye basıp veya direk çalıştır'ı başlatıp yazı yazılabilen bölgeye MSConfig yazıp başlattım. Daha sonra yukarıda önyükleme sekmesine tıkladım ve güvenli önyükleme seçeneğini tikleyip ağ'ı seçtim ve uygulaya basıp o sekmeyi kapattım daha sonra önüme bir pencere geldi yeniden başlat'ı seçtim ve bilgisayar yeniden başladı.
  2. Bilgisayar güvenli modda başladı. İlk yaptığım iş Aygıt Yöneticisi'ni açmak oldu ve orada sorunlu sürücüleri ünlemli şekilde gösterdi zaten. Daha sonra Monster'ın kendi sitesindeki önceden yüklediğim Driver'ları tek tek açıp kontrol ettim. Bazıları yüklendi bazıları zaten yüklü dedi.
  3. Tüm işlemler bittikten sonra 1. maddede anlattığım güvenli önyüklemenin tikini kaldırıp bilgisayarı yeniden başlattım ve sorunum çözüldü.
 
Son düzenleme:
Çözüm
Doğal ama biraz geliştirilmeli bence artık teknolojinin ilerlediği yerdeyiz.
Teknolojinin ilerlemesi developerları hatasızlaşmıyor. Binlerce kullanıcının farklı yazılımlarla farklı şekillerde kullanacağı cihazların sürücüsünü yazıyorsunuz, hatasız olması garip kaçar. Windows da parçaya ya da işletim sistemine hasar vermesin diye size mavi veriyor ki bu iyi bir şey.

Windows 95 ve öncesinde çok fazla çökme ve mavi ekran hatası görülürdü, bunun için XP döneminde mavi ekran ve hata raporlarını Microsoft'a iletme seçeneği geldi, o seçenekten raporlama yapan kullanıcılar sayesinde görüldü ki sorunlar genel olarak driverlar sebepli. O zamanlardan beri de hala gelişiyorlar, en büyük kısmı ise XP ile temizlendi. Çıkması normal fakat sorun Windows değil, Mac de kullansanız driver sorun verse sistem yine kernel panic verip kapatacak.
 

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı