[CODE title="Kod"]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\011921-21140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`77a00000 PsLoadedModuleList = 0xfffff801`7862a2f0
Debug session time: Tue Jan 19 00:16:19.650 2021 (UTC + 3:00)
System Uptime: 0 days 15:17:45.355
Loading Kernel Symbols
...............................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`77df5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffef0a`3ee301c0=0000000000000050
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803007969e8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80177f1920b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6906
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9402
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff803007969e8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80177f1920b
BUGCHECK_P4: 2
READ_ADDRESS: fffff8017860f330: Unable to get Flags value from nt!KdVersionBlock
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f908
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f918
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f928
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f938
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f948
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f958
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f968
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f978
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f988
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f998
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9a8
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9b8
Unable to get nt!_MI_SYSTEM_VA_ASSIGNMENT.BaseAddress at fffff8017864f9c8
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8017860f330: Unable to get Flags value from nt!KdVersionBlock
fffff8017860f330: Unable to get Flags value from nt!KdVersionBlock
GetUlongFromAddress: unable to read from fffff801786168c4
fffff803007969e8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffffef0a3ee30460 -- (.trap 0xffffef0a3ee30460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801786fa368 rbx=0000000000000000 rcx=ffff958c3122f080
rdx=00000000620271a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80177f1920b rsp=ffffef0a3ee305f0 rbp=ffff8381de728180
r8=00000000310138d0 r9=00000000310138d0 r10=ffff958c2eb8c080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiConvertDynamicHeteroPolicy+0x4b:
fffff801`77f1920b 8b0490 mov eax,dword ptr [rax+rdx*4] ds:fffff803`007969e8=????????
Resetting default scope
STACK_TEXT:
ffffef0a`3ee301b8 fffff801`77e1e8bb : 00000000`00000050 fffff803`007969e8 00000000`00000000 ffffef0a`3ee30460 : nt!KeBugCheckEx
ffffef0a`3ee301c0 fffff801`77c0c960 : 00000000`00000000 00000000`00000000 ffffef0a`3ee304e0 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffef0a`3ee302c0 fffff801`77e0395e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffef0a`3ee30460 fffff801`77f1920b : ffff958c`00000002 ffffef0a`00000005 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffef0a`3ee305f0 fffff801`77f195c7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiConvertDynamicHeteroPolicy+0x4b
ffffef0a`3ee30620 fffff801`77c4b0b6 : ffff958c`350c0b70 00000000`00000000 000001e8`d130a350 00000000`00000010 : nt!KiHeteroChooseTargetProcessor+0xa7
ffffef0a`3ee306f0 fffff801`77c4a891 : 000001e8`d130a350 00000000`0000038c ffff958c`3194b648 fffff801`77c43a4b : nt!KiDeferredReadySingleThread+0x566
ffffef0a`3ee308e0 00000000`00000000 : 00000000`00000000 000001e8`d130a350 0000007c`f21ffbc8 ffff958c`350c0b70 : nt!KiExitDispatcher+0x141
SYMBOL_NAME: nt!KiConvertDynamicHeteroPolicy+4b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.746
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4b
FAILURE_BUCKET_ID: AV_R_INVALID_nt!KiConvertDynamicHeteroPolicy
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {82612117-fdf5-7a3e-5637-9d80a974c40f}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\maksu\Downloads\Compressed\011721-8640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`4de00000 PsLoadedModuleList = 0xfffff802`4ea2a2f0
Debug session time: Sun Jan 17 12:00:22.627 2021 (UTC + 3:00)
System Uptime: 1 days 21:31:57.138
Loading Kernel Symbols
...............................................................
................................................................
..........................................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`4e1f5780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff909`f0774f00=000000000000007e
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8025e530e36, The address that the exception occurred at
Arg3: fffff909f0775ef8, Exception Record Address
Arg4: fffff909f0775730, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 11874
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G2EFLS9
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 57650
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8025e530e36
BUGCHECK_P3: fffff909f0775ef8
BUGCHECK_P4: fffff909f0775730
EXCEPTION_RECORD: fffff909f0775ef8 -- (.exr 0xfffff909f0775ef8)
ExceptionAddress: fffff8025e530e36 (nvlddmkm+0x00000000007c0e36)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048
CONTEXT: fffff909f0775730 -- (.cxr 0xfffff909f0775730)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc604dfbdc1d8
rdx=0000000000000000 rsi=ffffdb00d1a48c57 rdi=ffffc604dfb46000
rip=fffff8025e530e36 rsp=fffff909f0776130 rbp=ffffc604dfb67f20
r8=0000000000000003 r9=0000000000000000 r10=0000000000000000
r11=ffffdb00d1a48cc3 r12=0000000000000000 r13=0000000000000000
r14=0000000000000002 r15=ffffc604dfb46180
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nvlddmkm+0x7c0e36:
fffff802`5e530e36 ff5048 call qword ptr [rax+48h] ds:002b:00000000`00000048=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8024eafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8024ea0f330: Unable to get Flags value from nt!KdVersionBlock
fffff8024ea0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000048
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000048
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
fffff909`f0776130 00000000`00000000 : fffff802`5ded9543 00000000`00000001 fffff802`4e1d3608 00000000`000000ff : nvlddmkm+0x7c0e36
SYMBOL_NAME: nvlddmkm+7c0e36
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xfffff909f0775730 ; kb
BUCKET_ID_FUNC_OFFSET: 7c0e36
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
[/CODE]