drive.google.com
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8000eafa320
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x133
PROCESS_NAME: System
CURRENT_IRQL: d
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre
TRAP_FRAME: ffffb487e6276c70 -- (.trap 0xffffb487e6276c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000
rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001
r8=ffffb70400000000 r9=ffffb7047b69ce40 r10=ffffb7047b69d580
r11=000000000000004f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff800`0e1fbdd7 498b08 mov rcx,qword ptr [r8] ds:ffffb704`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000e27955a to fffff8000e1f3ea0
STACK_TEXT:
ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a
ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd
ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a
ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5
ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315
ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c
ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94
ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c
ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b
ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d
ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f
ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb
ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b
ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349
ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5
ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683
ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e
ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4
ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5
ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue
ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee
ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20
ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e
ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750
ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920
ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18
ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac
ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040
ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d
ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90
ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930
ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8000e0ee812 - nt!MmAccessFault+92
[ f6:87 ]
fffff8000e1963ae-fffff8000e1963b1 4 bytes - nt!MiFreeUltraMapping+32 (+0xa7b9c)
[ a0 7d fb f6:e0 e1 c3 87 ]
5 errors : !nt (fffff8000e0ee812-fffff8000e1963b1)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
BUCKET_ID: MEMORY_CORRUPTION_LARGE
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:memory_corruption_large
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
www.technopat.net
Cfosspeed adlı yapımcının programlarını kullanıyorsanız kaldırın. Ağ kartı sürücüsünü güncelleyiniz.
Kaspersky güncelleyin güncelse şu anlık kaldırın.Sürücüsünü güncellemeyi bilmiyorsanız donanım kimliklerini paylaşınız.Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL. or above. Arguments: Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending. component can usually be identified with a stack trace. Arg2: 0000000000000501, The DPC time count (in ticks). Arg3: 0000000000000500, The DPC time allotment (in ticks). Arg4: fffff8000eafa320. Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED. CUSTOMER_CRASH_COUNT: 1. DEFAULT_BUCKET_ID: CODE_CORRUPTION. BUGCHECK_STR: 0x133. PROCESS_NAME: System. CURRENT_IRQL: d. ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre. TRAP_FRAME: ffffb487e6276c70 -- (.trap 0xffffb487e6276c70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000. rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001. r8=ffffb70400000000 r9=ffffb7047b69ce40 r10=ffffb7047b69d580. r11=000000000000004f r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei ng nz na po nc. nt!ExpInterlockedPopEntrySListFault: fffff800`0e1fbdd7 498b08 mov rcx,qword ptr [r8] ds:ffffb704`00000000=???????????????? Resetting default scope. LAST_CONTROL_TRANSFER: from fffff8000e27955a to fffff8000e1f3ea0. STACK_TEXT: ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx. ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a. ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd. ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a. ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5. ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa. ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37. ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315. ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault. ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c. ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94. ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c. ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b. ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d. ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f. ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb. ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b. ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349. ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5. ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683. ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e. ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4. ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5. ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue. ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee. ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20. ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e. ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750. ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920. ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18. ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac. ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040. ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d. ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90. ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930. ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0. STACK_COMMAND: kb. CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt. fffff8000e0ee812 - nt!MmAccessFault+92. [ f6:87 ] fffff8000e1963ae-fffff8000e1963b1 4 bytes - nt!MiFreeUltraMapping+32 (+0xa7b9c) [ a0 7d fb f6:e0 e1 c3 87 ] 5 errors : !nt (fffff8000e0ee812-fffff8000e1963b1) MODULE_NAME: memory_corruption. IMAGE_NAME: memory_corruption. FOLLOWUP_NAME: memory_corruption. DEBUG_FLR_IMAGE_TIMESTAMP: 0. MEMORY_CORRUPTOR: LARGE. FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE. BUCKET_ID: MEMORY_CORRUPTION_LARGE. ANALYSIS_SOURCE: KM. FAILURE_ID_HASH_STRING: km:memory_corruption_large. FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption. ---------
Hatalı arkadaş ntoskrnl.exe değil hataya yol açan dosyalar ndu.sys ve cfosspeed.sys adlı dosyalar. Bluescreen Viewer ile bakınca dump dosyalarına doğru sonuçlar çıkmayabiliyor. Onun için windbg ile bakınız.Donanım Kimliği ile Sürücüleri Bulma
Aygıtların donanım kimliği ile aradığınız sürücüyü çok daha kısa sürede bulabilirsiniz.www.technopat.net
Aygıt yöneticisinden ağ bağdaştırıcılarına girip attığım konudan donanım kimliklerini paylaşınız.Ağ kartı sürücüsünü nereden bulabilirim?
PCI\VEN_10EC&DEV_8168&SUBSYS_7C131462&REV_15Cfosspeed adlı yapımcının programlarını kullanıyorsanız kaldırın. Ağ kartı sürücüsünü güncelleyiniz.
Kaspersky güncelleyin güncelse şu anlık kaldırın.Sürücüsünü güncellemeyi bilmiyorsanız donanım kimliklerini paylaşınız.Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending component can usually be identified with a stack trace. Arg2: 0000000000000501, The DPC time count (in ticks). Arg3: 0000000000000500, The DPC time allotment (in ticks). Arg4: fffff8000eafa320 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x133 PROCESS_NAME: System CURRENT_IRQL: d ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre TRAP_FRAME: ffffb487e6276c70 -- (.trap 0xffffb487e6276c70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000 rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001 r8=ffffb70400000000 r9=ffffb7047b69ce40 r10=ffffb7047b69d580 r11=000000000000004f r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!ExpInterlockedPopEntrySListFault: fffff800`0e1fbdd7 498b08 mov rcx,qword ptr [r8] ds:ffffb704`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8000e27955a to fffff8000e1f3ea0 STACK_TEXT: ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5 ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315 ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94 ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349 ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5 ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683 ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4 ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5 ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20 ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750 ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920 ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18 ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040 ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90 ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930 ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8000e0ee812 - nt!MmAccessFault+92 [ f6:87 ] fffff8000e1963ae-fffff8000e1963b1 4 bytes - nt!MiFreeUltraMapping+32 (+0xa7b9c) [ a0 7d fb f6:e0 e1 c3 87 ] 5 errors : !nt (fffff8000e0ee812-fffff8000e1963b1) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE BUCKET_ID: MEMORY_CORRUPTION_LARGE ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:memory_corruption_large FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption ---------
Hatalı arkadaş ntoskrnl.exe değil hataya yol açan dosyalar ndu.sys ve cfosspeed.sys adlı dosyalar. Bluescreen Viewer ile bakınca dump dosyalarına doğru sonuçlar çıkmayabiliyor. Onun için WinDbg ile bakınız.Donanım Kimliği ile Sürücüleri Bulma
Aygıtların donanım kimliği ile aradığınız sürücüyü çok daha kısa sürede bulabilirsiniz.www.technopat.net
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.