Casper Excalibur G770 mavi ekran hatası

İşletim sistemi
Windows 11

Fabio

Decapat
Katılım
29 Aralık 2022
Mesajlar
83
Daha fazla  
Cinsiyet
Erkek
RAM
16 GB 3200 MHz
SSD veya HDD modeli
Samsung MZVLQ512HBLI-00B00V 512 GB SSD
Ekran kartı
RTX 3050 70watt
İşlemci
i5 12450H
Casper Excalibur G770. 8 aylık laptop.
Arkadaşlar, tüm dosyaları taradım. Hatalar bu şekilde. Yardmcı olur mususnuz?

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************

 ExtensionRepository : Implicit

 UseExperimentalFeatureForNugetShare : false

 AllowNugetExeUpdate : false

 AllowNugetMSCredentialProviderInstall : false

 AllowParallelInitializationOfLocalRepositories : true

 -- Configuring repositories

 ----> Repository : LocalInstalled, Enabled: true

 ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds

 ----> Repository : UserExtensions, Enabled: true, Packages count: 0

 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\Ferhat\Desktop\102923-19328-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22000 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 22000.1.amd64fre.co_release.210604-1628

Kernel base = 0xfffff802`2da00000 PsLoadedModuleList = 0xfffff802`2e6298a0

Debug session time: Sun Oct 29 01:37:05.123 2023 (UTC + 3:00)

System Uptime: 0 days 2:47:46.011

Loading Kernel Symbols

.DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.

Run !sym noisy before .reload to track down problems loading symbols.

..............................................................

................................................................

................................................................

....................................

Loading User Symbols

Loading unloaded module list

...............................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff802`2de1d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff606`1eac1f40=0000000000000050

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)

Invalid system memory was referenced. This cannot be protected by try-except.

Typically the address is just plain bad or it is pointing at freed memory.

Arguments:

Arg1: ffffe5f8f43810f0, memory referenced.

Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.

 bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the processor decided the fault was due to a corrupted PTE.

 bit 4 is set if the fault was due to attempted execute of a no-execute PTE.

 - ARM64: bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the fault was due to attempted execute of a no-execute PTE.

Arg3: fffff8025ec1176a, If non-zero, the instruction address which referenced the bad memory

 address.

Arg4: 0000000000000002, (reserved)

Debugging Details:

------------------

KEY_VALUES_STRING: 1

 Key : AV.Type

 Value: Write

 Key : Analysis.CPU.mSec

 Value: 2609

 Key : Analysis.Elapsed.mSec

 Value: 61747

 Key : Analysis.IO.Other.Mb

 Value: 9

 Key : Analysis.IO.Read.Mb

 Value: 0

 Key : Analysis.IO.Write.Mb

 Value: 25

 Key : Analysis.Init.CPU.mSec

 Value: 953

 Key : Analysis.Init.Elapsed.mSec

 Value: 170910

 Key : Analysis.Memory.CommitPeak.Mb

 Value: 100

 Key : Bugcheck.Code.LegacyAPI

 Value: 0x50

 Key : Failure.Bucket

 Value: AV_W_(null)_nvlddmkm!unknown_function

 Key : Failure.Hash

 Value: {838100fa-f28b-2ef7-d702-e31713cb338c}

 Key : Hypervisor.Enlightenments.Value

 Value: 68673420

 Key : Hypervisor.Enlightenments.ValueHex

 Value: 417df8c

 Key : Hypervisor.Flags.AnyHypervisorPresent

 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened

 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable

 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint

 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested

 Value: 0

 Key : Hypervisor.Flags.CpuManager

 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi

 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled

 Value: 1

 Key : Hypervisor.Flags.Epf

 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks

 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable

 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber

 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl

 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush

 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing

 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone

 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos

 Value: 0

 Key : Hypervisor.Flags.RootScheduler

 Value: 0

 Key : Hypervisor.Flags.SynicAvailable

 Value: 1

 Key : Hypervisor.Flags.UseQpcBias

 Value: 0

 Key : Hypervisor.Flags.Value

 Value: 21631230

 Key : Hypervisor.Flags.ValueHex

 Value: 14a10fe

 Key : Hypervisor.Flags.VpAssistPage

 Value: 1

 Key : Hypervisor.Flags.VsmAvailable

 Value: 1

 Key : Hypervisor.RootFlags.AccessStats

 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor

 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading

 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync

 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled

 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV

 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt

 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.Nested

 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor

 Value: 1

 Key : Hypervisor.RootFlags.Value

 Value: 1015

 Key : Hypervisor.RootFlags.ValueHex

 Value: 3f7

 Key : WER.OS.Branch

 Value: co_release

 Key : WER.OS.Version

 Value: 10.0.22000.1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffe5f8f43810f0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8025ec1176a

BUGCHECK_P4: 2

FILE_IN_CAB: 102923-19328-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

READ_ADDRESS: fffff8022e705450: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 ffffe5f8f43810f0

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff6061eac21e0 -- (.trap 0xfffff6061eac21e0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80

rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8025ec1176a rsp=fffff6061eac2370 rbp=ffffc60bfe8adca0

 r8=0000000000000a80 r9=fffff6061eac2420 r10=fffff8025ef7c5f0

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl zr na po nc

nvlddmkm+0x9176a:

fffff802`5ec1176a f3aa rep stos byte ptr [rdi]

Resetting default scope

STACK_TEXT:

fffff606`1eac1f38 fffff802`2deea0a1 : 00000000`00000050 ffffe5f8`f43810f0 00000000`00000002 fffff606`1eac21e0 : nt!KeBugCheckEx

fffff606`1eac1f40 fffff802`2dd43636 : 00000000`000001d0 00000000`00000002 fffff606`1eac2140 00000000`00000000 : nt!MiSystemFault+0x189ff1

fffff606`1eac2040 fffff802`2de2e141 : 00000000`00000000 00000000`00000000 ffffc60c`07e7e920 ffffc60c`0504cfe0 : nt!MmAccessFault+0x2a6

fffff606`1eac21e0 fffff802`5ec1176a : 00000000`00000000 fffff802`5ec2b2de ffffc60c`0504d010 fffff802`5ed9fb6a : nt!KiPageFault+0x341

fffff606`1eac2370 00000000`00000000 : fffff802`5ec2b2de ffffc60c`0504d010 fffff802`5ed9fb6a ffffc60b`fe8ade10 : nvlddmkm+0x9176a

SYMBOL_NAME: nvlddmkm+9176a

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 9176a

FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}

Followup: MachineOwner

---------

************* Preparing the environment for Debugger Extensions Gallery repositories **************

 ExtensionRepository : Implicit

 UseExperimentalFeatureForNugetShare : false

 AllowNugetExeUpdate : false

 AllowNugetMSCredentialProviderInstall : false

 AllowParallelInitializationOfLocalRepositories : true

 -- Configuring repositories

 ----> Repository : LocalInstalled, Enabled: true

 ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds

 ----> Repository : UserExtensions, Enabled: true, Packages count: 0

 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\Ferhat\Desktop\102123-18171-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22000 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 22000.1.amd64fre.co_release.210604-1628

Kernel base = 0xfffff806`5b400000 PsLoadedModuleList = 0xfffff806`5c0298a0

Debug session time: Sat Oct 21 14:35:34.603 2023 (UTC + 3:00)

System Uptime: 0 days 0:19:47.490

Loading Kernel Symbols

.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.

Run !sym noisy before .reload to track down problems loading symbols.

..............................................................

................................................................

................................................................

...............................................

Loading User Symbols

Loading unloaded module list

...............

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff806`5b81d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa60b`6686ef40=0000000000000050

4: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)

Invalid system memory was referenced. This cannot be protected by try-except.

Typically the address is just plain bad or it is pointing at freed memory.

Arguments:

Arg1: fffff17b037810f0, memory referenced.

Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.

 bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the processor decided the fault was due to a corrupted PTE.

 bit 4 is set if the fault was due to attempted execute of a no-execute PTE.

 - ARM64: bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the fault was due to attempted execute of a no-execute PTE.

Arg3: fffff8068cba176a, If non-zero, the instruction address which referenced the bad memory

 address.

Arg4: 0000000000000002, (reserved)

Debugging Details:

------------------

KEY_VALUES_STRING: 1

 Key : AV.Type

 Value: Write

 Key : Analysis.CPU.mSec

 Value: 2139

 Key : Analysis.Elapsed.mSec

 Value: 20650

 Key : Analysis.IO.Other.Mb

 Value: 1

 Key : Analysis.IO.Read.Mb

 Value: 0

 Key : Analysis.IO.Write.Mb

 Value: 4

 Key : Analysis.Init.CPU.mSec

 Value: 546

 Key : Analysis.Init.Elapsed.mSec

 Value: 92026

 Key : Analysis.Memory.CommitPeak.Mb

 Value: 104

 Key : Bugcheck.Code.LegacyAPI

 Value: 0x50

 Key : Failure.Bucket

 Value: AV_W_(null)_nvlddmkm!unknown_function

 Key : Failure.Hash

 Value: {838100fa-f28b-2ef7-d702-e31713cb338c}

 Key : Hypervisor.Enlightenments.Value

 Value: 68673420

 Key : Hypervisor.Enlightenments.ValueHex

 Value: 417df8c

 Key : Hypervisor.Flags.AnyHypervisorPresent

 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened

 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable

 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint

 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested

 Value: 0

 Key : Hypervisor.Flags.CpuManager

 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi

 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled

 Value: 1

 Key : Hypervisor.Flags.Epf

 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks

 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable

 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber

 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl

 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush

 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing

 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone

 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos

 Value: 0

 Key : Hypervisor.Flags.RootScheduler

 Value: 0

 Key : Hypervisor.Flags.SynicAvailable

 Value: 1

 Key : Hypervisor.Flags.UseQpcBias

 Value: 0

 Key : Hypervisor.Flags.Value

 Value: 21631230

 Key : Hypervisor.Flags.ValueHex

 Value: 14a10fe

 Key : Hypervisor.Flags.VpAssistPage

 Value: 1

 Key : Hypervisor.Flags.VsmAvailable

 Value: 1

 Key : Hypervisor.RootFlags.AccessStats

 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor

 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading

 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync

 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled

 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV

 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt

 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.Nested

 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor

 Value: 1

 Key : Hypervisor.RootFlags.Value

 Value: 1015

 Key : Hypervisor.RootFlags.ValueHex

 Value: 3f7

 Key : WER.OS.Branch

 Value: co_release

 Key : WER.OS.Version

 Value: 10.0.22000.1

BUGCHECK_CODE: 50

BUGCHECK_P1: fffff17b037810f0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff8068cba176a

BUGCHECK_P4: 2

FILE_IN_CAB: 102123-18171-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

READ_ADDRESS: fffff8065c105450: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 fffff17b037810f0

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffa60b6686f1e0 -- (.trap 0xffffa60b6686f1e0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80

rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff8068cba176a rsp=ffffa60b6686f370 rbp=ffffd18cb60a38f0

 r8=0000000000000a80 r9=ffffa60b6686f420 r10=fffff8068cf0c5f0

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl zr na po nc

nvlddmkm+0x9176a:

fffff806`8cba176a f3aa rep stos byte ptr [rdi]

Resetting default scope

STACK_TEXT:

ffffa60b`6686ef38 fffff806`5b8ea0a1 : 00000000`00000050 fffff17b`037810f0 00000000`00000002 ffffa60b`6686f1e0 : nt!KeBugCheckEx

ffffa60b`6686ef40 fffff806`5b743636 : 00000000`00000210 00000000`00000002 ffffa60b`6686f140 00000000`00000000 : nt!MiSystemFault+0x189ff1

ffffa60b`6686f040 fffff806`5b82e141 : 00000000`00000000 00000000`00000000 ffffd18c`c1dd3960 ffffd18c`c4665030 : nt!MmAccessFault+0x2a6

ffffa60b`6686f1e0 fffff806`8cba176a : 00000000`00000000 fffff806`8cbbb2de ffffd18c`c4665050 fffff806`8cd2fb6a : nt!KiPageFault+0x341

ffffa60b`6686f370 00000000`00000000 : fffff806`8cbbb2de ffffd18c`c4665050 fffff806`8cd2fb6a ffffd18c`b60a3a60 : nvlddmkm+0x9176a

SYMBOL_NAME: nvlddmkm+9176a

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 9176a

FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}

Followup: MachineOwner

---------

************* Preparing the environment for Debugger Extensions Gallery repositories **************

 ExtensionRepository : Implicit

 UseExperimentalFeatureForNugetShare : false

 AllowNugetExeUpdate : false

 AllowNugetMSCredentialProviderInstall : false

 AllowParallelInitializationOfLocalRepositories : true

 -- Configuring repositories

 ----> Repository : LocalInstalled, Enabled: true

 ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds

 ----> Repository : UserExtensions, Enabled: true, Packages count: 0

 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\Ferhat\Desktop\102123-18156-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22000 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 22000.1.amd64fre.co_release.210604-1628

Kernel base = 0xfffff800`72400000 PsLoadedModuleList = 0xfffff800`730298a0

Debug session time: Sat Oct 21 14:43:42.340 2023 (UTC + 3:00)

System Uptime: 0 days 0:07:27.227

Loading Kernel Symbols

...............................................................

................................................................

................................................................

......................................

Loading User Symbols

Loading unloaded module list

...............

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff800`7281d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa901`bfd9df40=0000000000000050

2: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)

Invalid system memory was referenced. This cannot be protected by try-except.

Typically the address is just plain bad or it is pointing at freed memory.

Arguments:

Arg1: ffffa5fc4ff810f0, memory referenced.

Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.

 bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the processor decided the fault was due to a corrupted PTE.

 bit 4 is set if the fault was due to attempted execute of a no-execute PTE.

 - ARM64: bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the fault was due to attempted execute of a no-execute PTE.

Arg3: fffff800a5aa176a, If non-zero, the instruction address which referenced the bad memory

 address.

Arg4: 0000000000000002, (reserved)

Debugging Details:

------------------

KEY_VALUES_STRING: 1

 Key : AV.Type

 Value: Write

 Key : Analysis.CPU.mSec

 Value: 1874

 Key : Analysis.Elapsed.mSec

 Value: 8482

 Key : Analysis.IO.Other.Mb

 Value: 0

 Key : Analysis.IO.Read.Mb

 Value: 0

 Key : Analysis.IO.Write.Mb

 Value: 1

 Key : Analysis.Init.CPU.mSec

 Value: 312

 Key : Analysis.Init.Elapsed.mSec

 Value: 72514

 Key : Analysis.Memory.CommitPeak.Mb

 Value: 99

 Key : Bugcheck.Code.LegacyAPI

 Value: 0x50

 Key : Failure.Bucket

 Value: AV_W_(null)_nvlddmkm!unknown_function

 Key : Failure.Hash

 Value: {838100fa-f28b-2ef7-d702-e31713cb338c}

 Key : Hypervisor.Enlightenments.Value

 Value: 68673420

 Key : Hypervisor.Enlightenments.ValueHex

 Value: 417df8c

 Key : Hypervisor.Flags.AnyHypervisorPresent

 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened

 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable

 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint

 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested

 Value: 0

 Key : Hypervisor.Flags.CpuManager

 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi

 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled

 Value: 1

 Key : Hypervisor.Flags.Epf

 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks

 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable

 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber

 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl

 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush

 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing

 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone

 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos

 Value: 0

 Key : Hypervisor.Flags.RootScheduler

 Value: 0

 Key : Hypervisor.Flags.SynicAvailable

 Value: 1

 Key : Hypervisor.Flags.UseQpcBias

 Value: 0

 Key : Hypervisor.Flags.Value

 Value: 21631230

 Key : Hypervisor.Flags.ValueHex

 Value: 14a10fe

 Key : Hypervisor.Flags.VpAssistPage

 Value: 1

 Key : Hypervisor.Flags.VsmAvailable

 Value: 1

 Key : Hypervisor.RootFlags.AccessStats

 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor

 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading

 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync

 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled

 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV

 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt

 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.Nested

 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor

 Value: 1

 Key : Hypervisor.RootFlags.Value

 Value: 1015

 Key : Hypervisor.RootFlags.ValueHex

 Value: 3f7

 Key : WER.OS.Branch

 Value: co_release

 Key : WER.OS.Version

 Value: 10.0.22000.1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffa5fc4ff810f0

BUGCHECK_P2: 2

BUGCHECK_P3: fffff800a5aa176a

BUGCHECK_P4: 2

FILE_IN_CAB: 102123-18156-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

READ_ADDRESS: fffff80073105450: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 ffffa5fc4ff810f0

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffa901bfd9e1e0 -- (.trap 0xffffa901bfd9e1e0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80

rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000

rip=fffff800a5aa176a rsp=ffffa901bfd9e370 rbp=ffffc10d38408ca0

 r8=0000000000000a80 r9=ffffa901bfd9e420 r10=fffff800a5e0c5f0

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl zr na po nc

nvlddmkm+0x9176a:

fffff800`a5aa176a f3aa rep stos byte ptr [rdi]

Resetting default scope

STACK_TEXT:

ffffa901`bfd9df38 fffff800`728ea0a1 : 00000000`00000050 ffffa5fc`4ff810f0 00000000`00000002 ffffa901`bfd9e1e0 : nt!KeBugCheckEx

ffffa901`bfd9df40 fffff800`72743636 : 00000000`000001d0 00000000`00000002 ffffa901`bfd9e140 00000000`00000000 : nt!MiSystemFault+0x189ff1

ffffa901`bfd9e040 fffff800`7282e141 : 00000000`00000000 00000000`00000000 ffffc10d`43b02960 ffffc10d`41dccfe0 : nt!MmAccessFault+0x2a6

ffffa901`bfd9e1e0 fffff800`a5aa176a : 00000000`00000000 fffff800`a5abb2de ffffc10d`41dcd010 fffff800`a5c2fb6a : nt!KiPageFault+0x341

ffffa901`bfd9e370 00000000`00000000 : fffff800`a5abb2de ffffc10d`41dcd010 fffff800`a5c2fb6a ffffc10d`38408e10 : nvlddmkm+0x9176a

SYMBOL_NAME: nvlddmkm+9176a

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 9176a

FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}

Followup: MachineOwner

---------

************* Preparing the environment for Debugger Extensions Gallery repositories **************

 ExtensionRepository : Implicit

 UseExperimentalFeatureForNugetShare : false

 AllowNugetExeUpdate : false

 AllowNugetMSCredentialProviderInstall : false

 AllowParallelInitializationOfLocalRepositories : true

 -- Configuring repositories

 ----> Repository : LocalInstalled, Enabled: true

 ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds

 ----> Repository : UserExtensions, Enabled: true, Packages count: 0

 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\Ferhat\Desktop\022623-16281-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22000 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 22000.1.amd64fre.co_release.210604-1628

Kernel base = 0xfffff807`34200000 PsLoadedModuleList = 0xfffff807`34e29ba0

Debug session time: Sun Feb 26 12:22:25.814 2023 (UTC + 3:00)

System Uptime: 0 days 13:19:43.703

Loading Kernel Symbols

...............................................................

................................................................

................................................................

.....................

Loading User Symbols

PEB is paged out (Peb.Ldr = 00000000`0034e018). Type ".hh dbgerr001" for details

Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff807`3461bd30 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffb681`afadade0=0000000000000133

8: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)

The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL

or above.

Arguments:

Arg1: 0000000000000001, The system cumulatively spent an extended period of time at

 DISPATCH_LEVEL or above.

Arg2: 0000000000001e00, The watchdog period (in ticks).

Arg3: fffff80734f05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains

 additional information regarding the cumulative timeout

Arg4: 0000000000000000

Debugging Details:

------------------

*************************************************************************

*** ***

*** ***

*** Either you specified an unqualified symbol, or your debugger ***

*** doesn't have full symbol information. Unqualified symbol ***

*** resolution is turned off by default. Please either specify a ***

*** fully qualified symbol module!symbolname, or enable resolution ***

*** of unqualified symbols by typing ".symopt- 100". Note that ***

*** enabling unqualified symbol resolution with network symbol ***

*** server shares in the symbol path may cause the debugger to ***

*** appear to hang for long periods of time when an incorrect ***

*** symbol name is typed or the network symbol server is down. ***

*** ***

*** For some commands to work properly, your symbol path ***

*** must point to .pdb files that have full type information. ***

*** ***

*** Certain .pdb files (such as the public OS symbols) do not ***

*** contain the required information. Contact the group that ***

*** provided you with these symbols if you need this command to ***

*** work. ***

*** ***

*** Type referenced: TickPeriods ***

*** ***

*************************************************************************

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec

 Value: 2202

 Key : Analysis.Elapsed.mSec

 Value: 25807

 Key : Analysis.IO.Other.Mb

 Value: 7

 Key : Analysis.IO.Read.Mb

 Value: 0

 Key : Analysis.IO.Write.Mb

 Value: 24

 Key : Analysis.Init.CPU.mSec

 Value: 781

 Key : Analysis.Init.Elapsed.mSec

 Value: 86044

 Key : Analysis.Memory.CommitPeak.Mb

 Value: 100

 Key : Bugcheck.Code.LegacyAPI

 Value: 0x133

 Key : Failure.Bucket

 Value: 0x133_ISR_nvlddmkm!unknown_function

 Key : Failure.Hash

 Value: {f97493a5-ea2b-23ca-a808-8602773c2a86}

 Key : Hypervisor.Enlightenments.Value

 Value: 68673420

 Key : Hypervisor.Enlightenments.ValueHex

 Value: 417df8c

 Key : Hypervisor.Flags.AnyHypervisorPresent

 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened

 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable

 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint

 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested

 Value: 0

 Key : Hypervisor.Flags.CpuManager

 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi

 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled

 Value: 1

 Key : Hypervisor.Flags.Epf

 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks

 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable

 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber

 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl

 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush

 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing

 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone

 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos

 Value: 0

 Key : Hypervisor.Flags.RootScheduler

 Value: 0

 Key : Hypervisor.Flags.SynicAvailable

 Value: 1

 Key : Hypervisor.Flags.UseQpcBias

 Value: 0

 Key : Hypervisor.Flags.Value

 Value: 21631230

 Key : Hypervisor.Flags.ValueHex

 Value: 14a10fe

 Key : Hypervisor.Flags.VpAssistPage

 Value: 1

 Key : Hypervisor.Flags.VsmAvailable

 Value: 1

 Key : Hypervisor.RootFlags.AccessStats

 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor

 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading

 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync

 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled

 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV

 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt

 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.Nested

 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor

 Value: 1

 Key : Hypervisor.RootFlags.Value

 Value: 1015

 Key : Hypervisor.RootFlags.ValueHex

 Value: 3f7

 Key : WER.OS.Branch

 Value: co_release

 Key : WER.OS.Version

 Value: 10.0.22000.1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80734f05330

BUGCHECK_P4: 0

FILE_IN_CAB: 022623-16281-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffffd87e00a70c0 -- (.trap 0xfffffd87e00a70c0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=00000000badf1020 rbx=0000000000000000 rcx=0000000000000012

rdx=0000000000000048 rsi=0000000000000000 rdi=0000000000000000

rip=fffff80761b6fab8 rsp=fffffd87e00a7250 rbp=fffffd87e00a72d0

 r8=fffffd87e00a7298 r9=0000000000000048 r10=ffffe705478ca380

r11=000000000000000c r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl nz na po nc

nvlddmkm+0x8fab8:

fffff807`61b6fab8 488b5c2430 mov rbx,qword ptr [rsp+30h] ss:fffffd87`e00a7280=ffffe705478c8000

Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NeedForSpeedHeat.exe

STACK_TEXT:

ffffb681`afadadd8 fffff807`34431c8f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`34f05330 : nt!KeBugCheckEx

ffffb681`afadade0 fffff807`344318a1 : 00000e68`03e31774 ffffb681`00000500 00000000`00000002 fffff807`3442cfc8 : nt!KeAccumulateTicks+0x20f

ffffb681`afadae50 fffff807`3442fa8a : ffffb681`afac9200 fffffd87`e00a70c0 ffffb681`afac9338 00000000`00000a10 : nt!KiUpdateRunTime+0x61

ffffb681`afadaeb0 fffff807`3442f876 : ffffe705`3533a100 ffffe705`3533a1b0 ffffb681`00000000 ffffb681`afadafc0 : nt!KeClockInterruptNotify+0x11a

ffffb681`afadaf40 fffff807`34414650 : 00000000`0000000c ffff675c`f8551537 ffffe705`478c8a40 fffff807`3461dc1b : nt!HalpTimerClockIpiRoutine+0x16

ffffb681`afadaf70 fffff807`3461de7a : fffffd87`e00a7140 ffffe705`3533a100 00000e67`8cffe0f8 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa0

ffffb681`afadafb0 fffff807`3461e6e7 : 00000000`badf1020 00000000`00000440 00000000`00001100 fffffd87`e00a7268 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa

fffffd87`e00a70c0 fffff807`61b6fab8 : 00000000`00000048 00000000`00000020 ffffe705`47972050 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37

fffffd87`e00a7250 00000000`00000048 : 00000000`00000020 ffffe705`47972050 00000000`00000000 00000000`00000048 : nvlddmkm+0x8fab8

fffffd87`e00a7258 00000000`00000020 : ffffe705`47972050 00000000`00000000 00000000`00000048 fffff807`61c64af9 : 0x48

fffffd87`e00a7260 ffffe705`47972050 : 00000000`00000000 00000000`00000048 fffff807`61c64af9 ffffe705`478c8000 : 0x20

fffffd87`e00a7268 00000000`00000000 : 00000000`00000048 fffff807`61c64af9 ffffe705`478c8000 fffffd87`e00a72d0 : 0xffffe705`47972050

SYMBOL_NAME: nvlddmkm+8fab8

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 8fab8

FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}

Followup: MachineOwner

---------

************* Preparing the environment for Debugger Extensions Gallery repositories **************

 ExtensionRepository : Implicit

 UseExperimentalFeatureForNugetShare : false

 AllowNugetExeUpdate : false

 AllowNugetMSCredentialProviderInstall : false

 AllowParallelInitializationOfLocalRepositories : true

 -- Configuring repositories

 ----> Repository : LocalInstalled, Enabled: true

 ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds

 ----> Repository : UserExtensions, Enabled: true, Packages count: 0

 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\Ferhat\Desktop\041123-17015-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22000 MP (12 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS

Edition build lab: 22000.1.amd64fre.co_release.210604-1628

Kernel base = 0xfffff806`65e00000 PsLoadedModuleList = 0xfffff806`66a29ba0

Debug session time: Mon Apr 10 23:32:00.528 2023 (UTC + 3:00)

System Uptime: 21 days 16:44:45.200

Loading Kernel Symbols

...............................................................

................................................................

................................................................

.....................................

Loading User Symbols

PEB is paged out (Peb.Ldr = 000000e3`da7ad018). Type ".hh dbgerr001" for details

Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff806`6621bd30 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe108`4fea6c30=0000000000000050

11: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)

Invalid system memory was referenced. This cannot be protected by try-except.

Typically the address is just plain bad or it is pointing at freed memory.

Arguments:

Arg1: ffffe281479d0a61, memory referenced.

Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.

 bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the processor decided the fault was due to a corrupted PTE.

 bit 4 is set if the fault was due to attempted execute of a no-execute PTE.

 - ARM64: bit 1 is set if the fault was due to a write, clear if a read.

 bit 3 is set if the fault was due to attempted execute of a no-execute PTE.

Arg3: fffff8068458d761, If non-zero, the instruction address which referenced the bad memory

 address.

Arg4: 0000000000000000, (reserved)

Debugging Details:

------------------

DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information

DBGHELP: Timeout to store: Symbol information

DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information

KEY_VALUES_STRING: 1

 Key : AV.Type

 Value: Read

 Key : Analysis.CPU.mSec

 Value: 2671

 Key : Analysis.Elapsed.mSec

 Value: 182542

 Key : Analysis.IO.Other.Mb

 Value: 10

 Key : Analysis.IO.Read.Mb

 Value: 0

 Key : Analysis.IO.Write.Mb

 Value: 31

 Key : Analysis.Init.CPU.mSec

 Value: 890

 Key : Analysis.Init.Elapsed.mSec

 Value: 113131

 Key : Analysis.Memory.CommitPeak.Mb

 Value: 102

 Key : Bugcheck.Code.LegacyAPI

 Value: 0x50

 Key : Failure.Bucket

 Value: AV_R_(null)_vgk!unknown_function

 Key : Failure.Hash

 Value: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}

 Key : Hypervisor.Enlightenments.Value

 Value: 68673420

 Key : Hypervisor.Enlightenments.ValueHex

 Value: 417df8c

 Key : Hypervisor.Flags.AnyHypervisorPresent

 Value: 1

 Key : Hypervisor.Flags.ApicEnlightened

 Value: 0

 Key : Hypervisor.Flags.ApicVirtualizationAvailable

 Value: 1

 Key : Hypervisor.Flags.AsyncMemoryHint

 Value: 0

 Key : Hypervisor.Flags.CoreSchedulerRequested

 Value: 0

 Key : Hypervisor.Flags.CpuManager

 Value: 1

 Key : Hypervisor.Flags.DeprecateAutoEoi

 Value: 1

 Key : Hypervisor.Flags.DynamicCpuDisabled

 Value: 1

 Key : Hypervisor.Flags.Epf

 Value: 0

 Key : Hypervisor.Flags.ExtendedProcessorMasks

 Value: 1

 Key : Hypervisor.Flags.HardwareMbecAvailable

 Value: 1

 Key : Hypervisor.Flags.MaxBankNumber

 Value: 0

 Key : Hypervisor.Flags.MemoryZeroingControl

 Value: 0

 Key : Hypervisor.Flags.NoExtendedRangeFlush

 Value: 0

 Key : Hypervisor.Flags.NoNonArchCoreSharing

 Value: 1

 Key : Hypervisor.Flags.Phase0InitDone

 Value: 1

 Key : Hypervisor.Flags.PowerSchedulerQos

 Value: 0

 Key : Hypervisor.Flags.RootScheduler

 Value: 0

 Key : Hypervisor.Flags.SynicAvailable

 Value: 1

 Key : Hypervisor.Flags.UseQpcBias

 Value: 0

 Key : Hypervisor.Flags.Value

 Value: 21631230

 Key : Hypervisor.Flags.ValueHex

 Value: 14a10fe

 Key : Hypervisor.Flags.VpAssistPage

 Value: 1

 Key : Hypervisor.Flags.VsmAvailable

 Value: 1

 Key : Hypervisor.RootFlags.AccessStats

 Value: 1

 Key : Hypervisor.RootFlags.CrashdumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.CreateVirtualProcessor

 Value: 1

 Key : Hypervisor.RootFlags.DisableHyperthreading

 Value: 0

 Key : Hypervisor.RootFlags.HostTimelineSync

 Value: 1

 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled

 Value: 0

 Key : Hypervisor.RootFlags.IsHyperV

 Value: 1

 Key : Hypervisor.RootFlags.LivedumpEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.MapDeviceInterrupt

 Value: 1

 Key : Hypervisor.RootFlags.MceEnlightened

 Value: 1

 Key : Hypervisor.RootFlags.Nested

 Value: 0

 Key : Hypervisor.RootFlags.StartLogicalProcessor

 Value: 1

 Key : Hypervisor.RootFlags.Value

 Value: 1015

 Key : Hypervisor.RootFlags.ValueHex

 Value: 3f7

 Key : WER.OS.Branch

 Value: co_release

 Key : WER.OS.Version

 Value: 10.0.22000.1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffe281479d0a61

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8068458d761

BUGCHECK_P4: 0

FILE_IN_CAB: 041123-17015-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

READ_ADDRESS: fffff80666b05450: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

 ffffe281479d0a61

MM_INTERNAL_CODE: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vgc.exe

TRAP_FRAME: ffffe1084fea6ed0 -- (.trap 0xffffe1084fea6ed0)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=0000000000000f00 rbx=0000000000000000 rcx=ffffe281479d0a61

rdx=fffffe87084d68df rsi=0000000000000000 rdi=0000000000000000

rip=fffff8068458d761 rsp=ffffe1084fea7068 rbp=ffff800f744d42e0

 r8=0000000000000010 r9=ffffe281479d0a61 r10=0000000000000a61

r11=ffffe281479d0000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl nz ac po cy

vgk+0x2d761:

fffff806`8458d761 413801 cmp byte ptr [r9],al ds:ffffe281`479d0a61=00

Resetting default scope

STACK_TEXT:

ffffe108`4fea6c28 fffff806`662a1b51 : 00000000`00000050 ffffe281`479d0a61 00000000`00000000 ffffe108`4fea6ed0 : nt!KeBugCheckEx

ffffe108`4fea6c30 fffff806`66065396 : ffffe108`4fea6d58 00000000`00000000 ffffe108`4fea6e30 00000000`00000000 : nt!MiSystemFault+0x1c4b11

ffffe108`4fea6d30 fffff806`6622c741 : ffffe108`4fea6f60 fffff806`66221a94 ffff800f`744d4380 00000000`00000000 : nt!MmAccessFault+0x2a6

ffffe108`4fea6ed0 fffff806`8458d761 : fffff806`8463948c ffff800f`788e1e30 00000000`00000098 00000001`39372000 : nt!KiPageFault+0x341

ffffe108`4fea7068 fffff806`8463948c : ffff800f`788e1e30 00000000`00000098 00000001`39372000 00000000`000001b0 : vgk+0x2d761

ffffe108`4fea7070 ffff800f`788e1e30 : 00000000`00000098 00000001`39372000 00000000`000001b0 00000000`000001a0 : vgk+0xd948c

ffffe108`4fea7078 00000000`00000098 : 00000001`39372000 00000000`000001b0 00000000`000001a0 00000000`00000001 : 0xffff800f`788e1e30

ffffe108`4fea7080 00000001`39372000 : 00000000`000001b0 00000000`000001a0 00000000`00000001 00000000`00000001 : 0x98

ffffe108`4fea7088 00000000`000001b0 : 00000000`000001a0 00000000`00000001 00000000`00000001 ffff800f`907c9948 : 0x00000001`39372000

ffffe108`4fea7090 00000000`000001a0 : 00000000`00000001 00000000`00000001 ffff800f`907c9948 00000000`00000010 : 0x1b0

ffffe108`4fea7098 00000000`00000001 : 00000000`00000001 ffff800f`907c9948 00000000`00000010 fffff806`84709ab3 : 0x1a0

ffffe108`4fea70a0 00000000`00000001 : ffff800f`907c9948 00000000`00000010 fffff806`84709ab3 ffffe108`4fea7340 : 0x1

ffffe108`4fea70a8 ffff800f`907c9948 : 00000000`00000010 fffff806`84709ab3 ffffe108`4fea7340 00000000`00000010 : 0x1

ffffe108`4fea70b0 00000000`00000010 : fffff806`84709ab3 ffffe108`4fea7340 00000000`00000010 00000001`39372000 : 0xffff800f`907c9948

ffffe108`4fea70b8 fffff806`84709ab3 : ffffe108`4fea7340 00000000`00000010 00000001`39372000 ffff800f`788e1e30 : 0x10

ffffe108`4fea70c0 ffffe108`4fea7340 : 00000000`00000010 00000001`39372000 ffff800f`788e1e30 fffff806`84588970 : vgk+0x1a9ab3

ffffe108`4fea70c8 00000000`00000010 : 00000001`39372000 ffff800f`788e1e30 fffff806`84588970 ffffe108`4fea7550 : 0xffffe108`4fea7340

ffffe108`4fea70d0 00000001`39372000 : ffff800f`788e1e30 fffff806`84588970 ffffe108`4fea7550 ffff800f`744d42b0 : 0x10

ffffe108`4fea70d8 ffff800f`788e1e30 : fffff806`84588970 ffffe108`4fea7550 ffff800f`744d42b0 00000000`00000001 : 0x00000001`39372000

ffffe108`4fea70e0 fffff806`84588970 : ffffe108`4fea7550 ffff800f`744d42b0 00000000`00000001 ffff800f`9d303630 : 0xffff800f`788e1e30

ffffe108`4fea70e8 ffffe108`4fea7550 : ffff800f`744d42b0 00000000`00000001 ffff800f`9d303630 ffff800f`75d1e0b0 : vgk+0x28970

ffffe108`4fea70f0 ffff800f`744d42b0 : 00000000`00000001 ffff800f`9d303630 ffff800f`75d1e0b0 ffffe108`4fea7680 : 0xffffe108`4fea7550

ffffe108`4fea70f8 00000000`00000001 : ffff800f`9d303630 ffff800f`75d1e0b0 ffffe108`4fea7680 adf31eb8`435902bc : 0xffff800f`744d42b0

ffffe108`4fea7100 ffff800f`9d303630 : ffff800f`75d1e0b0 ffffe108`4fea7680 adf31eb8`435902bc 00000000`00000001 : 0x1

ffffe108`4fea7108 ffff800f`75d1e0b0 : ffffe108`4fea7680 adf31eb8`435902bc 00000000`00000001 ffffe108`4fea7340 : 0xffff800f`9d303630

ffffe108`4fea7110 ffffe108`4fea7680 : adf31eb8`435902bc 00000000`00000001 ffffe108`4fea7340 ffffe108`4fea7340 : 0xffff800f`75d1e0b0

ffffe108`4fea7118 adf31eb8`435902bc : 00000000`00000001 ffffe108`4fea7340 ffffe108`4fea7340 00000000`00000010 : 0xffffe108`4fea7680

ffffe108`4fea7120 00000000`00000001 : ffffe108`4fea7340 ffffe108`4fea7340 00000000`00000010 00000000`00000010 : 0xadf31eb8`435902bc

ffffe108`4fea7128 ffffe108`4fea7340 : ffffe108`4fea7340 00000000`00000010 00000000`00000010 00000000`00000001 : 0x1

ffffe108`4fea7130 ffffe108`4fea7340 : 00000000`00000010 00000000`00000010 00000000`00000001 00000000`00000000 : 0xffffe108`4fea7340

ffffe108`4fea7138 00000000`00000010 : 00000000`00000010 00000000`00000001 00000000`00000000 00000000`00000001 : 0xffffe108`4fea7340

ffffe108`4fea7140 00000000`00000010 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000018 : 0x10

ffffe108`4fea7148 00000000`00000001 : 00000000`00000000 00000000`00000001 00000000`00000018 ffffe108`4fea7320 : 0x10

ffffe108`4fea7150 00000000`00000000 : 00000000`00000001 00000000`00000018 ffffe108`4fea7320 798910c2`4a734c69 : 0x1

SYMBOL_NAME: vgk+2d761

MODULE_NAME: vgk

IMAGE_NAME: vgk.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 2d761

FAILURE_BUCKET_ID: AV_R_(null)_vgk!unknown_function

OS_VERSION: 10.0.22000.1

BUILDLAB_STR: co_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}

Followup: MachineOwner

---------
 
Son düzenleyen: Moderatör:

Technopat Haberler

Yeni konular

Geri
Yukarı