kayisikent
Megapat
- Katılım
- 17 Ağustos 2014
- Mesajlar
- 144
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
- Ekran kartı
- GTX 1660S
- Anakart
- B450M S2H v1
- İşlemci
- Ryzen 1600 AF
CoD: Warzone açıkken yeşil ekran vermeye başladı, oyun sırasında değil de Firefox'a geçiş için Alt Tab yaptığım sırada alıyorum genelde.
drive.google.com
Bu da konuyu açarken yediğim mavi ekran dosyası 
drive.google.com
033124-12578-01.dmp

************* Preparing the environment for debugger extensions gallery repositories **************
Extensionrepository : Implicit.
Useexperimentalfeaturefornugetshare : True.
Allownugetexeupdate : True.
Nonınteractivenuget : True.
Allownugetmscredentialproviderınstall : True.
Allowparallelınitializationoflocalrepositories : True.
Enableredirecttov8jsprovider : False.
-- Configuring repositories.
----> Repository : Localınstalled, enabled: True.
----> Repository : Userextensions, enabled: True.
************* Waiting for debugger extensions gallery to ınitialize **************
----> Repository : Userextensions, enabled: True, packages count: 0
----> Repository : Localınstalled, enabled: True, packages count: 41.
Microsoft (r) Windows debugger version 10.0.27553.1004 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Users\kayis\Desktop\033124-12578-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 22621 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts personal.
Edition Build lab: 22621.1.AMD64fre.ni_release.220506-1250
Kernel base = 0xfffff805`5f000000 psloadedmodulelist = 0xfffff805`5fc13130
Debug session time: Sun mar 31 01:11:58.418 2024 (utc + 3:00)
System uptime: 0 days 0:09:33.099
Loading kernel symbols.
...............................................................
................................................................
................................................................
.........
Loading user symbols.
Loading unloaded module list.
...........
For analysis of this file, run !analyze -v
NT!kebugcheckex:
Fffff805'5F418090 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff9901'C475AD30 = 000000000000007F.
6: Kd> !analyze -v
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7F)
This means a trap occurred in kernel mode, and it's a trap of a kind.
That the kernel isn't allowed to have/catch (bound trap) or that.
İs always instant death (double fault). The first number in the.
Bugcheck params is the number of the trap (8 = double fault, ETC)
Consult an Intel X86 family manual to learn more about what these.
Traps are. Here is a portion of those codes:
If kv shows a taskgate.
Use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
Use .trap on that Value.
Else.
.Trap on the appropriate frame will show where the trap was taken.
(On X86, this will be the ebp that goes with the procedure kitrap)
Endif.
KB will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, exceptıon_double_fault
Arg2: FfFF9901C475AE70.
Arg3: FfFF830F05EA1CD0.
Arg4: FffFF8055F2dd71b.
Debugging details:
------------------
Key_values_strıng: 1
Key : Analysis.CPU.msec
Value: 2562.
Key : Analysis.elapsed.msec
Value: 4099.
Key : Analysis.I
ther.MB
Value: 0
Key : Analysis.IO.read.MB
Value: 0
Key : Analysis.IO.write.MB
Value: 0
Key : Analysis.ınit.CPU.msec
Value: 390.
Key : Analysis.ınit.elapsed.msec
Value: 23916.
Key : Analysis.Memory.commitpeak.MB
Value: 97.
Key : Bugcheck.code.legacyapı
Value: 0x7f.
Key : Bugcheck.code.targetmodel
Value: 0x7f.
Key : Failure.bucket
Value: 0x7f_8_nt!kidoublefaultabort
Key : Failure.hash
Value: {D1F8395A-8C58-45da-6EBF-E8bb4aad2FC5}
Key : Wer.OS.branch
Value: Ni_release.
Key : Wer.OS.version
Value: 10.0.22621.1
Bugcheck_code: 7F.
Bugcheck_p1: 8
Bugcheck_p2: FfFF9901C475AE70.
Bugcheck_p3: FfFF830F05EA1CD0.
Bugcheck_p4: FffFF8055F2dd71b.
Fıle_ın_cab: 033124-12578-01.dmp
Trap_frame: FfFF9901C475AE70 -- (.trap 0xffff9901c475ae70)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFF9841EE469A9 rbx = 0000000000000000 rcx = fffFD686610D3820.
Rdx = 0000000000000007 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8055F2dd71b rsp = ffFF830F05EA1CD0 rbp = ffFF830F05EA1D30.
R8 = 0000000000000000 R9 = ffFF830F05EA2220 R10 = 0000000000000007.
R11 = fffFD686610D3820 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up di ng nzna po nc.
NT!etwpeventwritefull+0x3b:
Fffff805'5F2dd71b 4C898D78010000 mov qword ptr [rbp+178h],R9 SS:0018:ffff830F'05EA1EA8=????????????????
Resetting default scope.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: System.
Stack_text:
Ffff9901'C475AD28 fffff805'5F42DC29 : 00000000'0000007F 00000000'00000008 ffff9901'C475AE70 ffff830F'05EA1CD0 : NT!kebugcheckex
Ffff9901'C475AD30 fffff805'5F427B6F : C3D8a4D6'edbca673 F2FC0255'b4b25153 2254A942'1B05D840 5E758B7A'781493AC : NT!kibugcheckdispatch+0x69
Ffff9901'C475AE70 fffff805'5F2dd71b : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!kidoublefaultabort+0x32F
Ffff830F'05EA1CD0 00000000'00000000 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!etwpeventwritefull+0x3b
Symbol_name: NT!kidoublefaultabort+32F
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.22621.3374
Stack_command: .cxr; .ecxr ; KB.
Bucket_ıd_func_offset: 32F.
Faılure_bucket_ıd: 0x7f_8_nt!kidoublefaultabort
Os_versıon: 10.0.22621.1
Buıldlab_str: Ni_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {D1F8395A-8C58-45da-6EBF-E8bb4aad2FC5}
Followup: Machineowner.
---------
Extensionrepository : Implicit.
Useexperimentalfeaturefornugetshare : True.
Allownugetexeupdate : True.
Nonınteractivenuget : True.
Allownugetmscredentialproviderınstall : True.
Allowparallelınitializationoflocalrepositories : True.
Enableredirecttov8jsprovider : False.
-- Configuring repositories.
----> Repository : Localınstalled, enabled: True.
----> Repository : Userextensions, enabled: True.
>>>>>>>>>>> Preparing the environment for debugger extensions gallery repositories completed, duration 0.000 seconds.
************* Waiting for debugger extensions gallery to ınitialize **************
>>>>>>>>>>> Waiting for debugger extensions gallery to ınitialize completed, duration 0.125 seconds.
----> Repository : Userextensions, enabled: True, packages count: 0
----> Repository : Localınstalled, enabled: True, packages count: 41.
Microsoft (r) Windows debugger version 10.0.27553.1004 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Users\kayis\Desktop\033124-12578-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 22621 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts personal.
Edition Build lab: 22621.1.AMD64fre.ni_release.220506-1250
Kernel base = 0xfffff805`5f000000 psloadedmodulelist = 0xfffff805`5fc13130
Debug session time: Sun mar 31 01:11:58.418 2024 (utc + 3:00)
System uptime: 0 days 0:09:33.099
Loading kernel symbols.
...............................................................
................................................................
................................................................
.........
Loading user symbols.
Loading unloaded module list.
...........
For analysis of this file, run !analyze -v
NT!kebugcheckex:
Fffff805'5F418090 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff9901'C475AD30 = 000000000000007F.
6: Kd> !analyze -v
*******************************************************************************
- *
- Bugcheck analysis *
- *
UNEXPECTED_KERNEL_MODE_TRAP (7F)
This means a trap occurred in kernel mode, and it's a trap of a kind.
That the kernel isn't allowed to have/catch (bound trap) or that.
İs always instant death (double fault). The first number in the.
Bugcheck params is the number of the trap (8 = double fault, ETC)
Consult an Intel X86 family manual to learn more about what these.
Traps are. Here is a portion of those codes:
If kv shows a taskgate.
Use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
Use .trap on that Value.
Else.
.Trap on the appropriate frame will show where the trap was taken.
(On X86, this will be the ebp that goes with the procedure kitrap)
Endif.
KB will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, exceptıon_double_fault
Arg2: FfFF9901C475AE70.
Arg3: FfFF830F05EA1CD0.
Arg4: FffFF8055F2dd71b.
Debugging details:
------------------
Key_values_strıng: 1
Key : Analysis.CPU.msec
Value: 2562.
Key : Analysis.elapsed.msec
Value: 4099.
Key : Analysis.I
Value: 0
Key : Analysis.IO.read.MB
Value: 0
Key : Analysis.IO.write.MB
Value: 0
Key : Analysis.ınit.CPU.msec
Value: 390.
Key : Analysis.ınit.elapsed.msec
Value: 23916.
Key : Analysis.Memory.commitpeak.MB
Value: 97.
Key : Bugcheck.code.legacyapı
Value: 0x7f.
Key : Bugcheck.code.targetmodel
Value: 0x7f.
Key : Failure.bucket
Value: 0x7f_8_nt!kidoublefaultabort
Key : Failure.hash
Value: {D1F8395A-8C58-45da-6EBF-E8bb4aad2FC5}
Key : Wer.OS.branch
Value: Ni_release.
Key : Wer.OS.version
Value: 10.0.22621.1
Bugcheck_code: 7F.
Bugcheck_p1: 8
Bugcheck_p2: FfFF9901C475AE70.
Bugcheck_p3: FfFF830F05EA1CD0.
Bugcheck_p4: FffFF8055F2dd71b.
Fıle_ın_cab: 033124-12578-01.dmp
Trap_frame: FfFF9901C475AE70 -- (.trap 0xffff9901c475ae70)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFF9841EE469A9 rbx = 0000000000000000 rcx = fffFD686610D3820.
Rdx = 0000000000000007 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8055F2dd71b rsp = ffFF830F05EA1CD0 rbp = ffFF830F05EA1D30.
R8 = 0000000000000000 R9 = ffFF830F05EA2220 R10 = 0000000000000007.
R11 = fffFD686610D3820 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up di ng nzna po nc.
NT!etwpeventwritefull+0x3b:
Fffff805'5F2dd71b 4C898D78010000 mov qword ptr [rbp+178h],R9 SS:0018:ffff830F'05EA1EA8=????????????????
Resetting default scope.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxpnp: 1 (!blackboxpnp)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: System.
Stack_text:
Ffff9901'C475AD28 fffff805'5F42DC29 : 00000000'0000007F 00000000'00000008 ffff9901'C475AE70 ffff830F'05EA1CD0 : NT!kebugcheckex
Ffff9901'C475AD30 fffff805'5F427B6F : C3D8a4D6'edbca673 F2FC0255'b4b25153 2254A942'1B05D840 5E758B7A'781493AC : NT!kibugcheckdispatch+0x69
Ffff9901'C475AE70 fffff805'5F2dd71b : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!kidoublefaultabort+0x32F
Ffff830F'05EA1CD0 00000000'00000000 : 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000 : NT!etwpeventwritefull+0x3b
Symbol_name: NT!kidoublefaultabort+32F
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.22621.3374
Stack_command: .cxr; .ecxr ; KB.
Bucket_ıd_func_offset: 32F.
Faılure_bucket_ıd: 0x7f_8_nt!kidoublefaultabort
Os_versıon: 10.0.22621.1
Buıldlab_str: Ni_release.
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {D1F8395A-8C58-45da-6EBF-E8bb4aad2FC5}
Followup: Machineowner.
---------
033124-11703-01.dmp
