Page fault in nonpaged area mavi ekran hatası

Samet Sönmez

Kilopat
Katılım
24 Ocak 2015
Mesajlar
53
Daha fazla  
Cinsiyet
Erkek
Merhaba. Önceden farklı bir mavi ekran hatası alıyordum. Sonra bilgisayara format attım ve bir süre iyi gitti. Şimdi ise bu mavi ekran hatasını alıyorum. Minidump dosyalarının linkini aşağıda bulabilirsiniz. Yardımcı olursanız beni çok mutlu edersiniz. İşimin yarısında bilgisayar kapanıyor. Şimdiden çok teşekkür ederim iyi günler.

Minidump: minidump.7z
 
Ağ sürücünüzü güncelleyin.

Memtest86 ile belleklerinizi test edin.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

cFos yazılımı varsa kaldırın.

BIOS güncellemesi yapın.

Telefondan internet paylaşmak zorunda iseniz Wi-Fi yoluyla değil de USB kablosu ile paylaşın.
 
1) BIOS güncelleyin.

2) Aşağıdaki yazılımı kurun.

3) Aşağıdaki Wi-Fi/LAN sürücüsünü kurun.

4) Samsung telefonunuzu bilgisayara bağlıyorsanız bunu bir daha yapmayın. Ayrıca emin olmamakla beraber o telefon ile hotspot aracılığıyla ağ paylaşıp o ağa bağlanırsanız buna neden olabilir. Kısaca telefonu bağlamayın ve hotspot ile bağlanmayın.

5) Aşağıdaki rehberi inceleyin ve işlemleri uyguladıktan sonra sonucun ekran alıntısını paylaşın.

6) cFosSpeed kaldırın.

7) Chipset driver indirin ve kurun.

8) Windows Update ile daha güncel olan 20H2 sürümüne geçiş yapın.

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAFB1A2\112120-9718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0da00000 PsLoadedModuleList = 0xfffff804`0e62a3b0
Debug session time: Sat Nov 21 15:12:30.124 2020 (UTC + 3:00)
System Uptime: 0 days 13:41:29.802
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0ddf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe583`8f7791d0=0000000000000050
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffee80006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 12468

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 72877

Key : Analysis.Memory.CommitPeak.Mb
Value: 91

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffee80006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff8040e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040e60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8040e60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffee80006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffe5838f779550 -- (.trap 0xffffe5838f779550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeef77bbdd000 rbx=0000000000000000 rcx=ffffee80006f56d8
rdx=ffffeef77bbdd000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040dd41130 rsp=ffffe5838f7796e8 rbp=ffffeef77bbdd000
r8=ffffeef77ba00018 r9=0000000000000002 r10=0000000000000002
r11=ffffee80006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff804`0dd41130 488b01 mov rax,qword ptr [rcx] ds:ffffee80`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
ffffe583`8f7791c8 fffff804`0de2121f : 00000000`00000050 ffffee80`006f56d8 00000000`00000000 ffffeef7`7ba00018 : nt!KeBugCheckEx
ffffe583`8f7791d0 fffff804`0dcead67 : 00000000`00000000 00000000`00000000 ffffe583`8f779550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffffe583`8f779320 fffff804`0dcea20a : ffffc205`2e000000 00000000`00000000 ffffe583`8f7795d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffffe583`8f7793b0 fffff804`0de0335e : ffffc205`2ce021c0 00000000`0000002b ffffc205`2e000020 fffff804`0dc247fb : nt!MmAccessFault+0x16a
ffffe583`8f779550 fffff804`0dd41130 : fffff804`0dc49691 00000000`00000200 00000000`00000000 00000000`002ac660 : nt!KiPageFault+0x35e
ffffe583`8f7796e8 fffff804`0dc49691 : 00000000`00000200 00000000`00000000 00000000`002ac660 fffff804`0e3b1094 : nt!MI_READ_PTE_LOCK_FREE
ffffe583`8f7796f0 fffff804`13a935bd : ffffc205`00000000 fffff804`13b1ce30 00000000`00000000 ffffee80`009a1d08 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffffe583`8f7797b0 fffff804`26a1ea6f : 00000000`00000000 ffffc205`3c35f2c0 ffffc205`34370800 ffffc205`3a96e300 : ndis!NdisAllocateMdl+0x3d
ffffe583`8f7797f0 00000000`00000000 : ffffc205`3c35f2c0 ffffc205`34370800 ffffc205`3a96e300 00000000`00000152 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAAA0A2\112220-10875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`81400000 PsLoadedModuleList = 0xfffff801`8202a3b0
Debug session time: Sun Nov 22 15:02:15.949 2020 (UTC + 3:00)
System Uptime: 0 days 23:28:00.205
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`817f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff840f`95a7d1d0=0000000000000050
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb000006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 13999

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 66655

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffb000006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff801820fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8018200f340: Unable to get Flags value from nt!KdVersionBlock
fffff8018200f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb000006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffff840f95a7d550 -- (.trap 0xffff840f95a7d550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb0582c160000 rbx=0000000000000000 rcx=ffffb000006f56d8
rdx=ffffb0582c160000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80181741130 rsp=ffff840f95a7d6e8 rbp=ffffb0582c160000
r8=ffffb0582c000018 r9=0000000000000002 r10=0000000000000002
r11=ffffb000006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff801`81741130 488b01 mov rax,qword ptr [rcx] ds:ffffb000`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
ffff840f`95a7d1c8 fffff801`8182121f : 00000000`00000050 ffffb000`006f56d8 00000000`00000000 ffffb058`2c000018 : nt!KeBugCheckEx
ffff840f`95a7d1d0 fffff801`816ead67 : 00000000`00000000 00000000`00000000 ffff840f`95a7d550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffff840f`95a7d320 fffff801`816ea20a : ffffb30f`4e000000 00000000`00000000 ffff840f`95a7d5d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffff840f`95a7d3b0 fffff801`8180335e : ffffb30f`4cc021c0 00000000`0000003b ffffb30f`4e000320 fffff801`816247fb : nt!MmAccessFault+0x16a
ffff840f`95a7d550 fffff801`81741130 : fffff801`81649691 00000000`00000200 00000000`00000000 00000000`003ae3d0 : nt!KiPageFault+0x35e
ffff840f`95a7d6e8 fffff801`81649691 : 00000000`00000200 00000000`00000000 00000000`003ae3d0 fffff801`81db1094 : nt!MI_READ_PTE_LOCK_FREE
ffff840f`95a7d6f0 fffff801`854935bd : ffffb30f`00000000 fffff801`00000001 00000000`00000000 ffffb000`00aa3a78 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffff840f`95a7d7b0 fffff801`92b0ea6f : 00000000`00000000 00000000`0000077e ffffb30f`57e58080 ffffb30f`59e2f040 : ndis!NdisAllocateMdl+0x3d
ffff840f`95a7d7f0 00000000`00000000 : 00000000`0000077e ffffb30f`57e58080 ffffb30f`59e2f040 00000000`000001f6 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BA6A2A2\112120-9281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`44800000 PsLoadedModuleList = 0xfffff804`4542a3b0
Debug session time: Sat Nov 21 15:33:58.447 2020 (UTC + 3:00)
System Uptime: 0 days 0:20:56.126
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`44bf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb0e`74c8b1d0=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff400006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 13796

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 95553

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: fffff400006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff804454fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044540f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044540f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff400006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffffb0e74c8b550 -- (.trap 0xfffffb0e74c8b550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff47a3d1e8000 rbx=0000000000000000 rcx=fffff400006f56d8
rdx=fffff47a3d1e8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444b41130 rsp=fffffb0e74c8b6e8 rbp=fffff47a3d1e8000
r8=fffff47a3d000018 r9=0000000000000002 r10=0000000000000002
r11=fffff400006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff804`44b41130 488b01 mov rax,qword ptr [rcx] ds:fffff400`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
fffffb0e`74c8b1c8 fffff804`44c2121f : 00000000`00000050 fffff400`006f56d8 00000000`00000000 fffff47a`3d000018 : nt!KeBugCheckEx
fffffb0e`74c8b1d0 fffff804`44aead67 : 00000000`00000000 00000000`00000000 fffffb0e`74c8b550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
fffffb0e`74c8b320 fffff804`44aea20a : ffffb58f`a5000000 00000000`00000000 fffffb0e`74c8b5d0 00000000`00000000 : nt!MiUserFault+0x5e7
fffffb0e`74c8b3b0 fffff804`44c0335e : ffffb58f`a46021c0 00000000`00000066 ffffb58f`a5000020 fffff804`44a247fb : nt!MmAccessFault+0x16a
fffffb0e`74c8b550 fffff804`44b41130 : fffff804`44a49691 00000000`00000200 00000000`00000000 00000000`0065d328 : nt!KiPageFault+0x35e
fffffb0e`74c8b6e8 fffff804`44a49691 : 00000000`00000200 00000000`00000000 00000000`0065d328 fffff804`451b1094 : nt!MI_READ_PTE_LOCK_FREE
fffffb0e`74c8b6f0 fffff804`470935bd : ffffb58f`00000000 fffff804`4711ce30 00000000`00000000 fffff400`00d529d0 : nt!MmBuildMdlForNonPagedPool+0x1f1
fffffb0e`74c8b7b0 fffff804`54a5ea6f : 00000000`00000000 ffffb58f`b04659b0 ffffb58f`aa52a800 ffffb58f`a65ce080 : ndis!NdisAllocateMdl+0x3d
fffffb0e`74c8b7f0 00000000`00000000 : ffffb58f`b04659b0 ffffb58f`aa52a800 ffffb58f`a65ce080 00000000`000000a4 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAE43A2\112120-10109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`3f400000 PsLoadedModuleList = 0xfffff805`4002a3b0
Debug session time: Sat Nov 21 01:30:29.353 2020 (UTC + 3:00)
System Uptime: 0 days 1:07:07.031
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`3f7f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe481`6bfef1d0=0000000000000050
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe280006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 11952

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 75425

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffe280006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff805400fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054000f340: Unable to get Flags value from nt!KdVersionBlock
fffff8054000f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe280006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffe4816bfef550 -- (.trap 0xffffe4816bfef550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe2f178bc5000 rbx=0000000000000000 rcx=ffffe280006f56d8
rdx=ffffe2f178bc5000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053f741130 rsp=ffffe4816bfef6e8 rbp=ffffe2f178bc5000
r8=ffffe2f178a00018 r9=0000000000000002 r10=0000000000000002
r11=ffffe280006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff805`3f741130 488b01 mov rax,qword ptr [rcx] ds:ffffe280`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
ffffe481`6bfef1c8 fffff805`3f82121f : 00000000`00000050 ffffe280`006f56d8 00000000`00000000 ffffe2f1`78a00018 : nt!KeBugCheckEx
ffffe481`6bfef1d0 fffff805`3f6ead67 : 00000000`00000000 00000000`00000000 ffffe481`6bfef550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffffe481`6bfef320 fffff805`3f6ea20a : ffffd287`d8000000 00000000`00000000 ffffe481`6bfef5d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffffe481`6bfef3b0 fffff805`3f80335e : ffffd287`d14021c0 00000000`0000007d ffffd287`d8000a00 fffff805`3f6247fb : nt!MmAccessFault+0x16a
ffffe481`6bfef550 fffff805`3f741130 : fffff805`3f649691 00000000`00000200 00000000`00000000 00000000`007c6e00 : nt!KiPageFault+0x35e
ffffe481`6bfef6e8 fffff805`3f649691 : 00000000`00000200 00000000`00000000 00000000`007c6e00 fffff805`3fdb1094 : nt!MI_READ_PTE_LOCK_FREE
ffffe481`6bfef6f0 fffff805`45a935bd : 00000000`00000000 ffffd287`00000001 00000000`00000000 ffffe280`00ebc4a8 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffffe481`6bfef7b0 fffff805`53b4ea6f : 00000000`00000000 00000000`0000017a ffff9c81`2708b140 ffffd287`d33df080 : ndis!NdisAllocateMdl+0x3d
ffffe481`6bfef7f0 00000000`00000000 : 00000000`0000017a ffff9c81`2708b140 ffffd287`d33df080 00000000`00000062 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------
 
Ağ sürücünüzü güncelleyin.

Memtest86 ile belleklerinizi test edin.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

cFos yazılımı varsa kaldırın.

BIOS güncellemesi yapın.

Telefondan internet paylaşmak zorunda iseniz Wi-Fi yoluyla değil de USB kablosu ile paylaşın.
İlginiz ve cevaplarınız için teşekkürler. Evet Cfos yazılımı kullanıyorum ve mavi ekran hatasının genellikle bir şeyler indirirken ortaya çıktığını fark etmiştim. Bu programla alakalı olabilir sanırım.
1) BIOS güncelleyin.

2) Aşağıdaki yazılımı kurun.

3) Aşağıdaki Wi-Fi/LAN sürücüsünü kurun.

4) Samsung telefonunuzu bilgisayara bağlıyorsanız bunu bir daha yapmayın. Ayrıca emin olmamakla beraber o telefon ile hotspot aracılığıyla ağ paylaşıp o ağa bağlanırsanız buna neden olabilir. Kısaca telefonu bağlamayın ve hotspot ile bağlanmayın.

5) Aşağıdaki rehberi inceleyin ve işlemleri uyguladıktan sonra sonucun ekran alıntısını paylaşın.

6) cFosSpeed kaldırın.

7) Chipset driver indirin ve kurun.

8) Windows Update ile daha güncel olan 20H2 sürümüne geçiş yapın.

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAFB1A2\112120-9718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0da00000 PsLoadedModuleList = 0xfffff804`0e62a3b0
Debug session time: Sat Nov 21 15:12:30.124 2020 (UTC + 3:00)
System Uptime: 0 days 13:41:29.802
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0ddf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe583`8f7791d0=0000000000000050
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffee80006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 12468

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 72877

Key : Analysis.Memory.CommitPeak.Mb
Value: 91

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffee80006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff8040e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040e60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8040e60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffee80006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffe5838f779550 -- (.trap 0xffffe5838f779550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeef77bbdd000 rbx=0000000000000000 rcx=ffffee80006f56d8
rdx=ffffeef77bbdd000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040dd41130 rsp=ffffe5838f7796e8 rbp=ffffeef77bbdd000
r8=ffffeef77ba00018 r9=0000000000000002 r10=0000000000000002
r11=ffffee80006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff804`0dd41130 488b01 mov rax,qword ptr [rcx] ds:ffffee80`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
ffffe583`8f7791c8 fffff804`0de2121f : 00000000`00000050 ffffee80`006f56d8 00000000`00000000 ffffeef7`7ba00018 : nt!KeBugCheckEx
ffffe583`8f7791d0 fffff804`0dcead67 : 00000000`00000000 00000000`00000000 ffffe583`8f779550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffffe583`8f779320 fffff804`0dcea20a : ffffc205`2e000000 00000000`00000000 ffffe583`8f7795d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffffe583`8f7793b0 fffff804`0de0335e : ffffc205`2ce021c0 00000000`0000002b ffffc205`2e000020 fffff804`0dc247fb : nt!MmAccessFault+0x16a
ffffe583`8f779550 fffff804`0dd41130 : fffff804`0dc49691 00000000`00000200 00000000`00000000 00000000`002ac660 : nt!KiPageFault+0x35e
ffffe583`8f7796e8 fffff804`0dc49691 : 00000000`00000200 00000000`00000000 00000000`002ac660 fffff804`0e3b1094 : nt!MI_READ_PTE_LOCK_FREE
ffffe583`8f7796f0 fffff804`13a935bd : ffffc205`00000000 fffff804`13b1ce30 00000000`00000000 ffffee80`009a1d08 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffffe583`8f7797b0 fffff804`26a1ea6f : 00000000`00000000 ffffc205`3c35f2c0 ffffc205`34370800 ffffc205`3a96e300 : ndis!NdisAllocateMdl+0x3d
ffffe583`8f7797f0 00000000`00000000 : ffffc205`3c35f2c0 ffffc205`34370800 ffffc205`3a96e300 00000000`00000152 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAAA0A2\112220-10875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`81400000 PsLoadedModuleList = 0xfffff801`8202a3b0
Debug session time: Sun Nov 22 15:02:15.949 2020 (UTC + 3:00)
System Uptime: 0 days 23:28:00.205
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`817f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff840f`95a7d1d0=0000000000000050
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb000006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 13999

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 66655

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffb000006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff801820fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8018200f340: Unable to get Flags value from nt!KdVersionBlock
fffff8018200f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb000006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffff840f95a7d550 -- (.trap 0xffff840f95a7d550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb0582c160000 rbx=0000000000000000 rcx=ffffb000006f56d8
rdx=ffffb0582c160000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80181741130 rsp=ffff840f95a7d6e8 rbp=ffffb0582c160000
r8=ffffb0582c000018 r9=0000000000000002 r10=0000000000000002
r11=ffffb000006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff801`81741130 488b01 mov rax,qword ptr [rcx] ds:ffffb000`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
ffff840f`95a7d1c8 fffff801`8182121f : 00000000`00000050 ffffb000`006f56d8 00000000`00000000 ffffb058`2c000018 : nt!KeBugCheckEx
ffff840f`95a7d1d0 fffff801`816ead67 : 00000000`00000000 00000000`00000000 ffff840f`95a7d550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffff840f`95a7d320 fffff801`816ea20a : ffffb30f`4e000000 00000000`00000000 ffff840f`95a7d5d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffff840f`95a7d3b0 fffff801`8180335e : ffffb30f`4cc021c0 00000000`0000003b ffffb30f`4e000320 fffff801`816247fb : nt!MmAccessFault+0x16a
ffff840f`95a7d550 fffff801`81741130 : fffff801`81649691 00000000`00000200 00000000`00000000 00000000`003ae3d0 : nt!KiPageFault+0x35e
ffff840f`95a7d6e8 fffff801`81649691 : 00000000`00000200 00000000`00000000 00000000`003ae3d0 fffff801`81db1094 : nt!MI_READ_PTE_LOCK_FREE
ffff840f`95a7d6f0 fffff801`854935bd : ffffb30f`00000000 fffff801`00000001 00000000`00000000 ffffb000`00aa3a78 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffff840f`95a7d7b0 fffff801`92b0ea6f : 00000000`00000000 00000000`0000077e ffffb30f`57e58080 ffffb30f`59e2f040 : ndis!NdisAllocateMdl+0x3d
ffff840f`95a7d7f0 00000000`00000000 : 00000000`0000077e ffffb30f`57e58080 ffffb30f`59e2f040 00000000`000001f6 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BA6A2A2\112120-9281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`44800000 PsLoadedModuleList = 0xfffff804`4542a3b0
Debug session time: Sat Nov 21 15:33:58.447 2020 (UTC + 3:00)
System Uptime: 0 days 0:20:56.126
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`44bf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb0e`74c8b1d0=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff400006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 13796

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 95553

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: fffff400006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff804454fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044540f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044540f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff400006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffffb0e74c8b550 -- (.trap 0xfffffb0e74c8b550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff47a3d1e8000 rbx=0000000000000000 rcx=fffff400006f56d8
rdx=fffff47a3d1e8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444b41130 rsp=fffffb0e74c8b6e8 rbp=fffff47a3d1e8000
r8=fffff47a3d000018 r9=0000000000000002 r10=0000000000000002
r11=fffff400006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff804`44b41130 488b01 mov rax,qword ptr [rcx] ds:fffff400`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
fffffb0e`74c8b1c8 fffff804`44c2121f : 00000000`00000050 fffff400`006f56d8 00000000`00000000 fffff47a`3d000018 : nt!KeBugCheckEx
fffffb0e`74c8b1d0 fffff804`44aead67 : 00000000`00000000 00000000`00000000 fffffb0e`74c8b550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
fffffb0e`74c8b320 fffff804`44aea20a : ffffb58f`a5000000 00000000`00000000 fffffb0e`74c8b5d0 00000000`00000000 : nt!MiUserFault+0x5e7
fffffb0e`74c8b3b0 fffff804`44c0335e : ffffb58f`a46021c0 00000000`00000066 ffffb58f`a5000020 fffff804`44a247fb : nt!MmAccessFault+0x16a
fffffb0e`74c8b550 fffff804`44b41130 : fffff804`44a49691 00000000`00000200 00000000`00000000 00000000`0065d328 : nt!KiPageFault+0x35e
fffffb0e`74c8b6e8 fffff804`44a49691 : 00000000`00000200 00000000`00000000 00000000`0065d328 fffff804`451b1094 : nt!MI_READ_PTE_LOCK_FREE
fffffb0e`74c8b6f0 fffff804`470935bd : ffffb58f`00000000 fffff804`4711ce30 00000000`00000000 fffff400`00d529d0 : nt!MmBuildMdlForNonPagedPool+0x1f1
fffffb0e`74c8b7b0 fffff804`54a5ea6f : 00000000`00000000 ffffb58f`b04659b0 ffffb58f`aa52a800 ffffb58f`a65ce080 : ndis!NdisAllocateMdl+0x3d
fffffb0e`74c8b7f0 00000000`00000000 : ffffb58f`b04659b0 ffffb58f`aa52a800 ffffb58f`a65ce080 00000000`000000a4 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAE43A2\112120-10109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`3f400000 PsLoadedModuleList = 0xfffff805`4002a3b0
Debug session time: Sat Nov 21 01:30:29.353 2020 (UTC + 3:00)
System Uptime: 0 days 1:07:07.031
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`3f7f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe481`6bfef1d0=0000000000000050
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe280006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bcmwl63a.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 11952

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 75425

Key : Analysis.Memory.CommitPeak.Mb
Value: 89

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffe280006f56d8

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff805400fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054000f340: Unable to get Flags value from nt!KdVersionBlock
fffff8054000f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe280006f56d8

MM_INTERNAL_CODE: 6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffe4816bfef550 -- (.trap 0xffffe4816bfef550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe2f178bc5000 rbx=0000000000000000 rcx=ffffe280006f56d8
rdx=ffffe2f178bc5000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053f741130 rsp=ffffe4816bfef6e8 rbp=ffffe2f178bc5000
r8=ffffe2f178a00018 r9=0000000000000002 r10=0000000000000002
r11=ffffe280006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff805`3f741130 488b01 mov rax,qword ptr [rcx] ds:ffffe280`006f56d8=????????????????
Resetting default scope

STACK_TEXT:
ffffe481`6bfef1c8 fffff805`3f82121f : 00000000`00000050 ffffe280`006f56d8 00000000`00000000 ffffe2f1`78a00018 : nt!KeBugCheckEx
ffffe481`6bfef1d0 fffff805`3f6ead67 : 00000000`00000000 00000000`00000000 ffffe481`6bfef550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffffe481`6bfef320 fffff805`3f6ea20a : ffffd287`d8000000 00000000`00000000 ffffe481`6bfef5d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffffe481`6bfef3b0 fffff805`3f80335e : ffffd287`d14021c0 00000000`0000007d ffffd287`d8000a00 fffff805`3f6247fb : nt!MmAccessFault+0x16a
ffffe481`6bfef550 fffff805`3f741130 : fffff805`3f649691 00000000`00000200 00000000`00000000 00000000`007c6e00 : nt!KiPageFault+0x35e
ffffe481`6bfef6e8 fffff805`3f649691 : 00000000`00000200 00000000`00000000 00000000`007c6e00 fffff805`3fdb1094 : nt!MI_READ_PTE_LOCK_FREE
ffffe481`6bfef6f0 fffff805`45a935bd : 00000000`00000000 ffffd287`00000001 00000000`00000000 ffffe280`00ebc4a8 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffffe481`6bfef7b0 fffff805`53b4ea6f : 00000000`00000000 00000000`0000017a ffff9c81`2708b140 ffffd287`d33df080 : ndis!NdisAllocateMdl+0x3d
ffffe481`6bfef7f0 00000000`00000000 : 00000000`0000017a ffff9c81`2708b140 ffffd287`d33df080 00000000`00000062 : bcmwl63a+0x8ea6f


SYMBOL_NAME: bcmwl63a+8ea6f

MODULE_NAME: bcmwl63a

IMAGE_NAME: bcmwl63a.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8ea6f

FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}

Followup: MachineOwner
---------
İlginiz ve cevaplarınız için teşekkür ederim. Normalde ev internetinden giriyorum bazen telefon internetinden giriyorum ama sorun her zaman ev internetini kullanırken ortaya çıkıyor. Laptop'umun bataryası yok, bios güncellerken bataryasız güncelleme yapabilir miyim?
 

Yeni konular

Geri
Yukarı