nihatkemal
Centipat
- Katılım
- 19 Mayıs 2020
- Mesajlar
- 129
Sürekli mavi ekran yiyorum lütfen çözmeme yardımcı olun.
Madem atabiliyorsun, neden DMP dosyalarını atmadın? Hata kodunu falan da atmamışsın. Müneccim miyiz biz?
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1356.39499\110320-6609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`6fe00000 PsLoadedModuleList = 0xfffff805`70a2a310
Debug session time: Tue Nov 3 22:54:57.836 2020 (UTC + 3:00)
System Uptime: 0 days 0:04:49.475
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`701f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8008`ee6f4530=000000000000000a
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000003f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 000000000000003f, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14773
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 3f
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: 3f
READ_ADDRESS: fffff80570afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80570a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80570a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000003f
PROCESS_NAME: chrome.exe
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffff8008ee6f4670 -- (.trap 0xffff8008ee6f4670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8008ee6f47c8 rbx=0000000000000000 rcx=ffff8008ee6f4830
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=000000000000003f rsp=ffff8008ee6f4800 rbp=ffffa6856a788080
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff717fc1a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
00000000`0000003f ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
00000000`0000003f ?? ???
STACK_TEXT:
ffff8008`ee6f4528 fffff805`70206569 : 00000000`0000000a 00000000`0000003f 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffff8008`ee6f4530 fffff805`70202869 : 00000000`00000000 fffff805`700e016c 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8008`ee6f4670 00000000`0000003f : ffffa685`6a5a1430 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8008`ee6f4800 ffffa685`6a5a1430 : 00000000`00000000 00000000`00000000 00000000`00000000 00000001`ffffffff : 0x3f
ffff8008`ee6f4808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000001`ffffffff fffffff6`00000007 : 0xffffa685`6a5a1430
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1356.10841\110320-6531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`13800000 PsLoadedModuleList = 0xfffff802`1442a310
Debug session time: Tue Nov 3 22:57:38.787 2020 (UTC + 3:00)
System Uptime: 0 days 0:02:18.427
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`13bf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9a83`d20c3b70=0000000000000001
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff80213f07540, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4186
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-IPC9T25
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9951
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: fffff80213f07540
BUGCHECK_P2: 0
BUGCHECK_P3: 1
BUGCHECK_P4: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff9a83`d20c3b68 fffff802`13c77765 : 00000000`00000001 fffff802`13f07540 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
ffff9a83`d20c3b70 fffff802`13aa2ae5 : ffff8589`bd39a080 00000000`00000080 ffff8589`b2c76040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x174275
ffff9a83`d20c3c10 fffff802`13bfbbf8 : ffffa180`e4b89180 ffff8589`bd39a080 fffff802`13aa2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9a83`d20c3c60 00000000`00000000 : ffff9a83`d20c4000 ffff9a83`d20be000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PfSnSectionInfoCleanupWorkItem+0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: 0x1_SysCallNum_0_nt!PfSnSectionInfoCleanupWorkItem
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4a6bfb4c-ad90-5f76-7b42-dca41f7ffa82}
Followup: MachineOwner
---------
BAD_OBJECT_HEADER (189)
The OBJECT_HEADER has been corrupted
Arguments:
Arg1: ffffde03371e4a90, Pointer to bad OBJECT_HEADER
Arg2: 0000000000000000, Pointer to the resulting OBJECT_TYPE based on the TypeIndex in the OBJECT_HEADER
Arg3: 0000000000000000, The type index is corrupt.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5696
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 189
BUGCHECK_P1: ffffde03371e4a90
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffff88f`c243e888 fffff802`5e63a08c : 00000000`00000189 ffffde03`371e4a90 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff88f`c243e890 fffff802`5e4efbce : ffffde03`3549d080 00000000`00000001 ffffde03`2b2f7560 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0x14a4ac
fffff88f`c243e920 fffff802`5e0de4fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObReferenceObjectByHandle+0x2e
fffff88f`c243e970 fffff802`5e4b94a4 : ffffde03`33ca4080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopReferenceFileObject+0x3a
fffff88f`c243e9b0 fffff802`5e206bb8 : 00000000`00000000 00000000`000003c0 00000000`00000000 00000011`f23feae0 : nt!NtReadFile+0x64
fffff88f`c243ea90 00007ffd`d704be64 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000011`f23fea08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d704be64
SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+14a4ac
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14a4ac
FAILURE_BUCKET_ID: 0x189_nt!ObpReferenceObjectByHandleWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8bf3796f-7602-d49d-dd11-eaa45fa2179c}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8060e8fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding this single DPC timeout
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12319
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 0
BUGCHECK_P2: 501
BUGCHECK_P3: 500
BUGCHECK_P4: fffff8060e8fb320
DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8061206bbf0 -- (.trap 0xfffff8061206bbf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000003a3ab4da rbx=0000000000000000 rcx=fffff8061206bdf8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060debecd7 rsp=fffff8061206bd80 rbp=fffff80609d84180
r8=0000000000000100 r9=0000000000000000 r10=fffff8060dec2e00
r11=fffff80609d84180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff806`0debecd7 4883c420 add rsp,20h
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff806`1207ae18 fffff806`0e087372 : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`1207ae20 fffff806`0df26853 : 00000839`66c17980 fffff806`09d84180 00000000`00000000 fffff806`09d84180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`1207ae80 fffff806`0df2633a : fffff806`0e8f38c0 fffff806`1206bc70 fffff806`18b33c00 00000000`0000b301 : nt!KeClockInterruptNotify+0x453
fffff806`1207af30 fffff806`0de2ecd5 : fffff806`0e8f38c0 fffff806`1207af40 00000000`00000010 ffff4089`906461f1 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`1207af60 fffff806`0dff6cba : fffff806`1206bc70 fffff806`0e8f38c0 00000000`00000002 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`1207afb0 fffff806`0dff7227 : ffffcf0b`601f2a50 ffffcf0b`61c6e4f8 ffffcf0b`614fb080 fffff806`0dff7234 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`1206bbf0 fffff806`0debecd7 : 00000000`00000010 00000000`00000286 fffff806`1206bda8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`1206bd80 fffff806`0dec0fe8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
fffff806`1206bdb0 fffff806`0de1016d : fffff806`09d84180 fffff806`3a3ab4da ffffcf0b`614fb080 fffff806`1206bea9 : nt!KiSignalThread+0x1a8
fffff806`1206bdf0 fffff806`0dec33bc : ffffcf0b`614fb080 fffff806`1206bea9 ffffcf0b`614fb080 fffff806`1e0680e7 : nt!KiSignalThreadForApc+0xb5
fffff806`1206be20 fffff806`0dec2e97 : 00000000`00000000 fffff806`1206bf06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x50c
fffff806`1206bf10 fffff806`19b65056 : 00000000`00000018 fffff806`1206bfb0 ffffcf0b`614f7270 ffffcf0b`5ef72e10 : nt!IofCompleteRequest+0x17
fffff806`1206bf40 fffff806`19b43aa7 : 00000000`00000002 ffffcf0b`5e141450 ffffcf0b`5cbb1970 fffff806`1206c024 : mouclass!MouseClassServiceCallback+0x476
fffff806`1206bfe0 fffff806`0dec2fce : 00000000`00000000 fffff806`1206c100 00000000`00000001 fffff806`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff806`1206c080 fffff806`0dec2e97 : 00000000`00000008 00000000`00000006 ffffcf0b`5ef791d0 ffffcf0b`5e18e400 : nt!IopfCompleteRequest+0x11e
fffff806`1206c170 fffff806`19acaef5 : ffffcf0b`5e18e400 00000000`00000007 ffffcf0b`5e18e3f0 00000000`00000007 : nt!IofCompleteRequest+0x17
fffff806`1206c1a0 fffff806`19aca7ed : ffffcf0b`5ef791d0 ffffcf0b`5ef79102 ffffcf0b`5ef791d0 00000000`00000007 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff806`1206c2a0 fffff806`0dec2fce : ffffcf0b`5ecc6050 ffffcf0b`5ecc6050 fffff806`1206c301 ffffcf0b`5ecc643b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff806`1206c340 fffff806`0dec2e97 : 00000000`00000001 00000000`00000000 ffffcf0b`5ef80020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff806`1206c430 fffff806`109b811a : 00000000`00000000 ffffcf0b`5e0d4c90 ffffcf0b`5ecc6050 fffff806`0e08973b : nt!IofCompleteRequest+0x17
fffff806`1206c460 fffff806`109b5bbf : ffffcf0b`62f18102 ffffcf0b`5ef805e0 ffffcf0b`5ecc6050 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff806`1206c4f0 fffff806`194bb91c : 00000000`ffffff02 ffffcf0b`62f18020 ffffcf0b`5ef80400 ffffcf0b`5ef80400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff806`1206c550 fffff806`194bb7e1 : ffffcf0b`62f181c0 00000000`00000006 ffffcf0b`62f18250 fffff806`1206c768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff806`1206c5b0 fffff806`194bb5d0 : 00000000`00000004 fffff806`1206c720 00000000`00000000 ffffcf0b`5ef7f5e0 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff806`1206c660 fffff806`194b6570 : 00000000`00000004 fffff806`1206c738 00000000`00000008 fffff806`1206c740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff806`1206c690 fffff806`194b60a5 : 00000000`00000780 000030f4`a3155700 ffffcf0b`5cc34f10 ffffcf0b`5ece2cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff806`1206c6f0 fffff806`194b5d7c : ffffcf0b`5ec5a398 fffff806`09d84180 000030f4`a652b308 fffff806`1206c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff806`1206c7f0 fffff806`109b38f5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`1206c820 fffff806`0dee535e : fffff806`09d87240 fffff806`1206c960 fffff806`1206cb20 fffff806`09d84180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff806`1206c860 fffff806`0dee4644 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`1206c9d0 fffff806`0dff8d7e : 00000000`00000000 fffff806`09d84180 fffff806`0e927600 ffffcf0b`5ef39100 : nt!KiRetireDpcList+0x1f4
fffff806`1206cc60 00000000`00000000 : fffff806`1206d000 fffff806`12067000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: mouclass!MouseClassServiceCallback+476
MODULE_NAME: mouclass
IMAGE_NAME: mouclass.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 476
FAILURE_BUCKET_ID: 0x133_DPC_mouclass!MouseClassServiceCallback
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3fa01bd8-d2f7-df82-2794-89aa20021973}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff878e2ba6d420, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff878e2ba6d378, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4905
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 43172
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff878e2ba6d420
BUGCHECK_P3: ffff878e2ba6d378
BUGCHECK_P4: 0
TRAP_FRAME: ffff878e2ba6d420 -- (.trap 0xffff878e2ba6d420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8017aa248a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017a0c506d rsp=ffff878e2ba6d5b0 rbp=ffffa70259346080
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=ffffa702611460b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiExitDispatcher+0x1ad:
fffff801`7a0c506d cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff878e2ba6d378 -- (.exr 0xffff878e2ba6d378)
ExceptionAddress: fffff8017a0c506d (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff878e`2ba6d0f8 fffff801`7a207169 : 00000000`00000139 00000000`00000003 ffff878e`2ba6d420 ffff878e`2ba6d378 : nt!KeBugCheckEx
ffff878e`2ba6d100 fffff801`7a207590 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff878e`2ba6d240 fffff801`7a205923 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff878e`2ba6d420 fffff801`7a0c506d : 00000000`00000000 fffff801`8acd96c0 00000048`063000e4 00000000`00000004 : nt!KiRaiseSecurityCheckFailure+0x323
ffff878e`2ba6d5b0 fffff801`7a057c50 : fffff801`7aa248c0 fffff801`00000000 fffff801`7aa248c0 00000000`00000000 : nt!KiExitDispatcher+0x1ad
ffff878e`2ba6d620 fffff801`7a09d821 : 00000000`00000048 00000000`00000000 00000000`00000000 fffff801`79e01328 : nt!KeReleaseSemaphoreEx+0x120
ffff878e`2ba6d6a0 fffff801`7a02a0e0 : 00000000`00000001 ffffa702`61146000 00000000`00000000 00000000`00000002 : nt!PopFxRequestWorker+0x31
ffff878e`2ba6d6e0 fffff801`7a029fa1 : ffffa702`61146000 00000000`00000002 00000000`00000006 ffffa702`611460b8 : nt!PopPepRequestWork+0x18
ffff878e`2ba6d710 fffff801`7a0bb48c : 00000000`00000000 00000000`00000000 ffffa702`5fbbb902 fffff801`7a0e002c : nt!PopPepProcessEvent+0xf1
ffff878e`2ba6d770 fffff801`7a0ba73a : 00000000`00000001 00000000`00000000 ffffa702`5fbbb9a0 00000000`8aab499c : nt!PopPluginComponentActive+0x7c
ffff878e`2ba6d7b0 fffff801`7a0ba57c : 00000000`00000002 00000000`00000000 00000000`00000000 ffffa702`5ff31000 : nt!PopFxActivateComponentWorker+0x5a
ffff878e`2ba6d800 fffff801`85ef6ba2 : ffffa702`5ff31000 00000000`00000000 ffffa702`61141000 00000000`00000003 : nt!PoFxActivateComponent+0x13c
ffff878e`2ba6d890 fffff801`85ef6725 : 00000000`00000002 ffffa702`5ff31000 00000000`00000000 fffff801`00000002 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+0x45e
ffff878e`2ba6d980 fffff801`85effd53 : ffffa702`5d512030 ffffa702`5ff71000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBInternal+0x6d
ffff878e`2ba6d9b0 fffff801`86fbd37e : ffffa702`5ff3e000 ffffa702`5ff71000 ffffffff`ffffffff 00000000`00000000 : dxgkrnl!DxgSetPowerComponentActiveNoWaitForceAsyncCB+0x43
ffff878e`2ba6da20 fffff801`86fab81d : ffffa702`5ff3e000 00000000`00000000 ffffffff`ffffffff 00000000`00989680 : dxgmms2!VidSchiSwitchContextWithCheck+0x1096e
ffff878e`2ba6dac0 fffff801`8702ad45 : ffffa702`5f25a600 ffffa702`5ff3e000 ffffa702`5f25a620 ffffa702`61d87610 : dxgmms2!VidSchiScheduleCommandToRun+0x11d
ffff878e`2ba6db80 fffff801`8702acfa : ffffa702`5ff3e400 fffff801`8702ac30 ffffa702`5ff3e000 ffff9201`8bd89100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff878e`2ba6dbd0 fffff801`7a0a29a5 : ffffa702`5fdc6580 fffff801`00000001 ffffa702`5ff3e000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff878e`2ba6dc10 fffff801`7a1fc868 : ffff9201`8bd89180 ffffa702`5fdc6580 fffff801`7a0a2950 32336469`736c4362 : nt!PspSystemThreadStartup+0x55
ffff878e`2ba6dc60 00000000`00000000 : ffff878e`2ba6e000 ffff878e`2ba68000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+45e
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.626
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 45e
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5106890b-1385-57f9-9b8f-28678a37d713}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000e097100022f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80537918ccf, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10634
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: e097100022f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80537918ccf
READ_ADDRESS: fffff805380fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053800f340: Unable to get Flags value from nt!KdVersionBlock
fffff8053800f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000e097100022f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffbd8b804066d0 -- (.trap 0xffffbd8b804066d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=00000e0971000117
rdx=000000000000003f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80537918ccf rsp=ffffbd8b80406868 rbp=ffffbd8b804068b0
r8=000000000000000c r9=ffffbd8b804068f8 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiGenerateHeteroSets+0x7:
fffff805`37918ccf 4e8b9cc1b8000000 mov r11,qword ptr [rcx+r8*8+0B8h] ds:00000e09`7100022f=????????????????
Resetting default scope
STACK_TEXT:
ffffbd8b`80406588 fffff805`37807169 : 00000000`0000000a 00000e09`7100022f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbd8b`80406590 fffff805`37803469 : ffffe501`93d671c0 ffffc384`e59a7040 ffffe501`93d5c180 fffff805`377fc422 : nt!KiBugCheckDispatch+0x69
ffffbd8b`804066d0 fffff805`37918ccf : fffff805`3765902e ffffe501`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffbd8b`80406868 fffff805`3765902e : ffffe501`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGenerateHeteroSets+0x7
ffffbd8b`80406870 fffff805`37919b56 : ffffc384`e59a7101 ffffc384`db127080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x7e
ffffbd8b`804068e0 fffff805`379199b4 : 00000000`00000004 ffffbd8b`804069a8 ffffbd8b`804069a0 ffffe501`93d5c180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffffbd8b`80406970 fffff805`3786fb1c : ffffe501`ffffffff 00000000`00000000 00000000`00000000 fffff805`376be528 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffbd8b`804069a0 fffff805`376df38f : 00000000`00000002 fffff805`00000005 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x1901bc
ffffbd8b`80406a50 fffff805`377038a7 : ffffc384`00000000 00000000`00000000 ffffbd8b`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffffbd8b`80406af0 fffff805`37703450 : ffffc384`e59a7040 fffff805`37a12360 ffffc384`db088590 ffffc384`00000000 : nt!KeRemovePriQueue+0x1a7
ffffbd8b`80406b70 fffff805`376a29a5 : ffffc384`e59a7040 00000000`00000080 ffffc384`db09f040 000f8067`b4bbbdff : nt!ExpWorkerThread+0xa0
ffffbd8b`80406c10 fffff805`377fc868 : fffff805`35a7d180 ffffc384`e59a7040 fffff805`376a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffbd8b`80406c60 00000000`00000000 : ffffbd8b`80407000 ffffbd8b`80401000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiGenerateHeteroSets+7
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7
FAILURE_BUCKET_ID: AV_nt!KiGenerateHeteroSets
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e12c4c11-0ff5-f5ca-55be-f1d53353b217}
Followup: MachineOwner
---------
Baktınız mıEkran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
.dmp
dosyasına?Evet, dosyaya bakarak cevap veriyorum zaten. Siz şimdilik yazdıklarımı uygulayın, mesaja eklemeler yapacağım.
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.