Ekran kartı driver sürümü guncellerken veren mavi ekran

molara41

Zeptopat
Katılım
11 Eylül 2024
Mesajlar
5
Daha fazla  
Cinsiyet
Erkek
RAM
16 gb
SSD veya HDD modeli
512 gb
Ekran kartı
Gtx1650
İşlemci
İ5 11 th
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : True
AllowNugetExeUpdate : True
NonInteractiveNuget : True
AllowNugetMSCredentialProviderInstall : True
AllowParallelInitializationOfLocalRepositories : True
EnableRedirectToChakraJsProvider : False
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: True
----> Repository : UserExtensions, Enabled: True

>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds

----> Repository : UserExtensions, Enabled: True, Packages count: 0
----> Repository : LocalInstalled, Enabled: True, Packages count: 42

Microsoft (R) Windows Debugger Version 10.0.27668.1000 AMD64
Copyright (C) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\091124-9078-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol Search path is: Srv*
Executable Search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free X64
Product: WinNt, Suite: TerminalServer SingleUserTS

Loading User Symbols
PEB is paged out (Peb. Ldr = 00000057'7caf8018). Type ".hh dbgerr001" for details
Loading unloaded module list

For analysis of this file, run! Analyze -v
NT! KeBugCheckEx:
Fffff802'417fdde0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffe0a'aceaed50 = 0000000000000050
6: Kd>!analyze -v
*******************************************************************************
  • *
  • Bugcheck Analysis *
  • *
*******************************************************************************

DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS (CE)
A driver unloaded without cancelling timers, DPCs, worker Threads, ETC.
The broken driver's name is displayed on the screen and saved in
KiBugCheckDriver.
Arguments:
Arg1: FffFF802AF71da60, Memory referenced
Arg2: 0000000000000010, Value 0 = read operation, 1 = write operation
Arg3: FffFF802AF71da60, If non-Zero, the instruction address which referenced the bad Memory
Address.
Arg4: 0000000000000000, Mm internal code.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key: Analysis. CPU. MSec
Value: 2030

Key: Analysis. Elapsed. MSec
Value: 13065

Key: Analysis. IO. Other. MB
Value: 9

Key: Analysis. IO. Read. MB
Value: 1

Key: Analysis. IO. Write. MB
Value: 14

Key: Analysis. Init. CPU. MSec
Value: 390

Key: Analysis. Init. Elapsed. MSec
Value: 771946

Key: Analysis. Memory.commitPeak. MB
Value: 92

Key: Bugcheck. Code. LegacyAPI
Value: 0xce

Key: Bugcheck. Code. TargetModel
Value: 0xce

Key: Failure. Bucket
Value: 0xCE_nvpcf.sys!unknown_function

Key: Failure. Hash
Value: {F67B6608-184F-F714-5E74-2C925173937F}

Key: WER. OS. Branch
Value: Vb_release

Key: WER. OS. Version
Value: 10.0.19041.1

BUGCHECK_CODE: CE

BUGCHECK_P1: FffFF802AF71da60

BUGCHECK_P2: 10

BUGCHECK_P3: FffFF802AF71da60

BUGCHECK_P4: 0

FILE_IN_CAB: 091124-9078-01.dmp

FAULTING_THREAD: FfffBC01FCB5C080

WRITE_ADDRESS: FffFF802420FB390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Unable to get NT! MmSpecialPagesInUse
FffFF802AF71da60

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: drvinst.exe

TRAP_FRAME: Fffffe0aaceaeff0 -- (.trap 0xfffffe0aaceaeff0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFF802AF71da60 rbx = 0000000000000000 rcx = ffffBC020058e080
Rdx = 000000000000172C rsi = 0000000000000000 rdi = 0000000000000000
Rip = fffFF802AF71da60 rsp = fffffe0aaceaf188 rbp = fffffe0aaceaf1F9
R8 = 0000000000000000 R9 = ffffBC0200DF8080 R10 = fffFF802AF71da60
R11 = 0000000000000000 R12 = 0000000000000000 R13 = 0000000000000000
R14 = 0000000000000000 R15 = 0000000000000000
İopl = 0 nv up ei pl zrna po nc
<Unloaded_nvpcf.sys>+0x1da60:
Fffff802'AF71DA60?
Resetting default scope

IP_MODULE_UNLOADED:
nvpcf.sys+1da60
Fffff802'AF71DA60?

STACK_TEXT:
Fffffe0a'aceaed48 fffff802'41839C9D: 00000000'00000050 fffff802'AF71DA60 00000000'00000010 fffffe0a'aceaeff0: NT! KeBugCheckEx
Fffffe0a'aceaed50 fffff802'4161BE30: Ffffcc05'CF2e0330 00000000'00000010 fffffe0a'aceaf070 00000000'00000000: NT! MiSystemFault+0x1df09D
Fffffe0a'aceaee50 fffff802'4180DE6D: Ffffbc01'00000002 00000000'00000000 00000000'00000000 00000000'00000000: NT! MmAccessFault+0x400
Fffffe0a'aceaeff0 fffff802'AF71DA60: Fffff802'41A9098F fffff802'420ec460 00000000'00000000 fffffe0a'aceaf1F9: NT! KiPageFault+0x36D
Fffffe0a'aceaf188 fffff802'41A9098F: Fffff802'420ec460 00000000'00000000 fffffe0a'aceaf1F9 ffffbc01'FD03B440: <Unloaded_nvpcf.sys>+0x1da60
Fffffe0a'aceaf190 fffff802'41A39FC8: Ffffbc02'0058E000 ffffbc02'0058E080 00000000'00000000 00000000'00000000: NT! PspCallProcessNotifyRoutines+0x213
Fffffe0a'aceaf260 fffff802'41a8A77a: Ffffbc01'fcb5C4b8 00000000'00000000 00000000'00000000 00000000'00000000: NT! PspExitProcess+0x70
Fffffe0a'aceaf290 fffff802'41abf87e: Ffffbc02'00000000 00000000'00000001 00000000'00000001 00000057'7caf9000: NT! PspExitThread+0x5b2
Fffffe0a'aceaf390 fffff802'41811D05: Ffffbc02'0058E080 ffffbc01'fcb5C080 fffffe0a'aceaf480 ffffbc01'00000000: NT! NtTerminateProcess+0X'de
Fffffe0a'aceaf400 00007FFA'C70edae4: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! KiSystemServiceCopyEnd+0x25
00000057'7C95F678 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`c70edae4

SYMBOL_NAME: nvpcf.sys+1da60

MODULE_NAME: Nvpcf

IMAGE_NAME: nvpcf.sys

STACK_COMMAND: Process /r /p 0xffffbc020058e080;.thread 0xffffbc01fcb5c080; KB

BUCKET_ID_FUNC_OFFSET: 1da60

FAILURE_BUCKET_ID: 0xCE_nvpcf.sys!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: Vb_release

OSPLATFORM_TYPE: X64

OSNAME: Windows 10

FAILURE_ID_HASH: {F67B6608-184F-F714-5E74-2C925173937F}

Followup: MachineOwner
---------
 
Son düzenleyen: Moderatör:
 

Yeni konular

Geri
Yukarı