- RAM
- 16 gb
- SSD veya HDD modeli
- 512 gb
- Ekran kartı
- Gtx1650
- İşlemci
- İ5 11 th
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : True
AllowNugetExeUpdate : True
NonInteractiveNuget : True
AllowNugetMSCredentialProviderInstall : True
AllowParallelInitializationOfLocalRepositories : True
EnableRedirectToChakraJsProvider : False
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: True
----> Repository : UserExtensions, Enabled: True
************* Waiting for Debugger Extensions Gallery to Initialize **************
----> Repository : UserExtensions, Enabled: True, Packages count: 0
----> Repository : LocalInstalled, Enabled: True, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091124-9078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free X64
Product: WinNt, Suite: TerminalServer SingleUserTS
Loading User Symbols
PEB is paged out (Peb. Ldr = 00000057'7caf8018). Type ".hh dbgerr001" for details
Loading unloaded module list
For analysis of this file, run! Analyze -v
NT! KeBugCheckEx:
Fffff802'417fdde0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffe0a'aceaed50 = 0000000000000050
6: Kd>!analyze -v
*******************************************************************************
DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS (CE)
A driver unloaded without cancelling timers, DPCs, worker Threads, ETC.
The broken driver's name is displayed on the screen and saved in
KiBugCheckDriver.
Arguments:
Arg1: FffFF802AF71da60, Memory referenced
Arg2: 0000000000000010, Value 0 = read operation, 1 = write operation
Arg3: FffFF802AF71da60, If non-Zero, the instruction address which referenced the bad Memory
Address.
Arg4: 0000000000000000, Mm internal code.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key: Analysis. CPU. MSec
Value: 2030
Key: Analysis. Elapsed. MSec
Value: 13065
Key: Analysis. IO. Other. MB
Value: 9
Key: Analysis. IO. Read. MB
Value: 1
Key: Analysis. IO. Write. MB
Value: 14
Key: Analysis. Init. CPU. MSec
Value: 390
Key: Analysis. Init. Elapsed. MSec
Value: 771946
Key: Analysis. Memory.commitPeak. MB
Value: 92
Key: Bugcheck. Code. LegacyAPI
Value: 0xce
Key: Bugcheck. Code. TargetModel
Value: 0xce
Key: Failure. Bucket
Value: 0xCE_nvpcf.sys!unknown_function
Key: Failure. Hash
Value: {F67B6608-184F-F714-5E74-2C925173937F}
Key: WER. OS. Branch
Value: Vb_release
Key: WER. OS. Version
Value: 10.0.19041.1
BUGCHECK_CODE: CE
BUGCHECK_P1: FffFF802AF71da60
BUGCHECK_P2: 10
BUGCHECK_P3: FffFF802AF71da60
BUGCHECK_P4: 0
FILE_IN_CAB: 091124-9078-01.dmp
FAULTING_THREAD: FfffBC01FCB5C080
WRITE_ADDRESS: FffFF802420FB390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Unable to get NT! MmSpecialPagesInUse
FffFF802AF71da60
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: drvinst.exe
TRAP_FRAME: Fffffe0aaceaeff0 -- (.trap 0xfffffe0aaceaeff0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFF802AF71da60 rbx = 0000000000000000 rcx = ffffBC020058e080
Rdx = 000000000000172C rsi = 0000000000000000 rdi = 0000000000000000
Rip = fffFF802AF71da60 rsp = fffffe0aaceaf188 rbp = fffffe0aaceaf1F9
R8 = 0000000000000000 R9 = ffffBC0200DF8080 R10 = fffFF802AF71da60
R11 = 0000000000000000 R12 = 0000000000000000 R13 = 0000000000000000
R14 = 0000000000000000 R15 = 0000000000000000
İopl = 0 nv up ei pl zrna po nc
<Unloaded_nvpcf.sys>+0x1da60:
Fffff802'AF71DA60?
Resetting default scope
IP_MODULE_UNLOADED:
nvpcf.sys+1da60
Fffff802'AF71DA60?
STACK_TEXT:
Fffffe0a'aceaed48 fffff802'41839C9D: 00000000'00000050 fffff802'AF71DA60 00000000'00000010 fffffe0a'aceaeff0: NT! KeBugCheckEx
Fffffe0a'aceaed50 fffff802'4161BE30: Ffffcc05'CF2e0330 00000000'00000010 fffffe0a'aceaf070 00000000'00000000: NT! MiSystemFault+0x1df09D
Fffffe0a'aceaee50 fffff802'4180DE6D: Ffffbc01'00000002 00000000'00000000 00000000'00000000 00000000'00000000: NT! MmAccessFault+0x400
Fffffe0a'aceaeff0 fffff802'AF71DA60: Fffff802'41A9098F fffff802'420ec460 00000000'00000000 fffffe0a'aceaf1F9: NT! KiPageFault+0x36D
Fffffe0a'aceaf188 fffff802'41A9098F: Fffff802'420ec460 00000000'00000000 fffffe0a'aceaf1F9 ffffbc01'FD03B440: <Unloaded_nvpcf.sys>+0x1da60
Fffffe0a'aceaf190 fffff802'41A39FC8: Ffffbc02'0058E000 ffffbc02'0058E080 00000000'00000000 00000000'00000000: NT! PspCallProcessNotifyRoutines+0x213
Fffffe0a'aceaf260 fffff802'41a8A77a: Ffffbc01'fcb5C4b8 00000000'00000000 00000000'00000000 00000000'00000000: NT! PspExitProcess+0x70
Fffffe0a'aceaf290 fffff802'41abf87e: Ffffbc02'00000000 00000000'00000001 00000000'00000001 00000057'7caf9000: NT! PspExitThread+0x5b2
Fffffe0a'aceaf390 fffff802'41811D05: Ffffbc02'0058E080 ffffbc01'fcb5C080 fffffe0a'aceaf480 ffffbc01'00000000: NT! NtTerminateProcess+0X'de
Fffffe0a'aceaf400 00007FFA'C70edae4: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! KiSystemServiceCopyEnd+0x25
00000057'7C95F678 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`c70edae4
SYMBOL_NAME: nvpcf.sys+1da60
MODULE_NAME: Nvpcf
IMAGE_NAME: nvpcf.sys
STACK_COMMAND: Process /r /p 0xffffbc020058e080;.thread 0xffffbc01fcb5c080; KB
BUCKET_ID_FUNC_OFFSET: 1da60
FAILURE_BUCKET_ID: 0xCE_nvpcf.sys!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: Vb_release
OSPLATFORM_TYPE: X64
OSNAME: Windows 10
FAILURE_ID_HASH: {F67B6608-184F-F714-5E74-2C925173937F}
Followup: MachineOwner
---------
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : True
AllowNugetExeUpdate : True
NonInteractiveNuget : True
AllowNugetMSCredentialProviderInstall : True
AllowParallelInitializationOfLocalRepositories : True
EnableRedirectToChakraJsProvider : False
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: True
----> Repository : UserExtensions, Enabled: True
>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: True, Packages count: 0
----> Repository : LocalInstalled, Enabled: True, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\091124-9078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free X64
Product: WinNt, Suite: TerminalServer SingleUserTS
Loading User Symbols
PEB is paged out (Peb. Ldr = 00000057'7caf8018). Type ".hh dbgerr001" for details
Loading unloaded module list
For analysis of this file, run! Analyze -v
NT! KeBugCheckEx:
Fffff802'417fdde0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffe0a'aceaed50 = 0000000000000050
6: Kd>!analyze -v
*******************************************************************************
- *
- Bugcheck Analysis *
- *
DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS (CE)
A driver unloaded without cancelling timers, DPCs, worker Threads, ETC.
The broken driver's name is displayed on the screen and saved in
KiBugCheckDriver.
Arguments:
Arg1: FffFF802AF71da60, Memory referenced
Arg2: 0000000000000010, Value 0 = read operation, 1 = write operation
Arg3: FffFF802AF71da60, If non-Zero, the instruction address which referenced the bad Memory
Address.
Arg4: 0000000000000000, Mm internal code.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key: Analysis. CPU. MSec
Value: 2030
Key: Analysis. Elapsed. MSec
Value: 13065
Key: Analysis. IO. Other. MB
Value: 9
Key: Analysis. IO. Read. MB
Value: 1
Key: Analysis. IO. Write. MB
Value: 14
Key: Analysis. Init. CPU. MSec
Value: 390
Key: Analysis. Init. Elapsed. MSec
Value: 771946
Key: Analysis. Memory.commitPeak. MB
Value: 92
Key: Bugcheck. Code. LegacyAPI
Value: 0xce
Key: Bugcheck. Code. TargetModel
Value: 0xce
Key: Failure. Bucket
Value: 0xCE_nvpcf.sys!unknown_function
Key: Failure. Hash
Value: {F67B6608-184F-F714-5E74-2C925173937F}
Key: WER. OS. Branch
Value: Vb_release
Key: WER. OS. Version
Value: 10.0.19041.1
BUGCHECK_CODE: CE
BUGCHECK_P1: FffFF802AF71da60
BUGCHECK_P2: 10
BUGCHECK_P3: FffFF802AF71da60
BUGCHECK_P4: 0
FILE_IN_CAB: 091124-9078-01.dmp
FAULTING_THREAD: FfffBC01FCB5C080
WRITE_ADDRESS: FffFF802420FB390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Unable to get NT! MmSpecialPagesInUse
FffFF802AF71da60
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: drvinst.exe
TRAP_FRAME: Fffffe0aaceaeff0 -- (.trap 0xfffffe0aaceaeff0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFF802AF71da60 rbx = 0000000000000000 rcx = ffffBC020058e080
Rdx = 000000000000172C rsi = 0000000000000000 rdi = 0000000000000000
Rip = fffFF802AF71da60 rsp = fffffe0aaceaf188 rbp = fffffe0aaceaf1F9
R8 = 0000000000000000 R9 = ffffBC0200DF8080 R10 = fffFF802AF71da60
R11 = 0000000000000000 R12 = 0000000000000000 R13 = 0000000000000000
R14 = 0000000000000000 R15 = 0000000000000000
İopl = 0 nv up ei pl zrna po nc
<Unloaded_nvpcf.sys>+0x1da60:
Fffff802'AF71DA60?
Resetting default scope
IP_MODULE_UNLOADED:
nvpcf.sys+1da60
Fffff802'AF71DA60?
STACK_TEXT:
Fffffe0a'aceaed48 fffff802'41839C9D: 00000000'00000050 fffff802'AF71DA60 00000000'00000010 fffffe0a'aceaeff0: NT! KeBugCheckEx
Fffffe0a'aceaed50 fffff802'4161BE30: Ffffcc05'CF2e0330 00000000'00000010 fffffe0a'aceaf070 00000000'00000000: NT! MiSystemFault+0x1df09D
Fffffe0a'aceaee50 fffff802'4180DE6D: Ffffbc01'00000002 00000000'00000000 00000000'00000000 00000000'00000000: NT! MmAccessFault+0x400
Fffffe0a'aceaeff0 fffff802'AF71DA60: Fffff802'41A9098F fffff802'420ec460 00000000'00000000 fffffe0a'aceaf1F9: NT! KiPageFault+0x36D
Fffffe0a'aceaf188 fffff802'41A9098F: Fffff802'420ec460 00000000'00000000 fffffe0a'aceaf1F9 ffffbc01'FD03B440: <Unloaded_nvpcf.sys>+0x1da60
Fffffe0a'aceaf190 fffff802'41A39FC8: Ffffbc02'0058E000 ffffbc02'0058E080 00000000'00000000 00000000'00000000: NT! PspCallProcessNotifyRoutines+0x213
Fffffe0a'aceaf260 fffff802'41a8A77a: Ffffbc01'fcb5C4b8 00000000'00000000 00000000'00000000 00000000'00000000: NT! PspExitProcess+0x70
Fffffe0a'aceaf290 fffff802'41abf87e: Ffffbc02'00000000 00000000'00000001 00000000'00000001 00000057'7caf9000: NT! PspExitThread+0x5b2
Fffffe0a'aceaf390 fffff802'41811D05: Ffffbc02'0058E080 ffffbc01'fcb5C080 fffffe0a'aceaf480 ffffbc01'00000000: NT! NtTerminateProcess+0X'de
Fffffe0a'aceaf400 00007FFA'C70edae4: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! KiSystemServiceCopyEnd+0x25
00000057'7C95F678 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`c70edae4
SYMBOL_NAME: nvpcf.sys+1da60
MODULE_NAME: Nvpcf
IMAGE_NAME: nvpcf.sys
STACK_COMMAND: Process /r /p 0xffffbc020058e080;.thread 0xffffbc01fcb5c080; KB
BUCKET_ID_FUNC_OFFSET: 1da60
FAILURE_BUCKET_ID: 0xCE_nvpcf.sys!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: Vb_release
OSPLATFORM_TYPE: X64
OSNAME: Windows 10
FAILURE_ID_HASH: {F67B6608-184F-F714-5E74-2C925173937F}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: