ahmetGalatasaray
Decapat
- Katılım
- 10 Mart 2022
- Mesajlar
- 53
Daha fazla
- Cinsiyet
- Erkek
Paylaşıyım.Minidump dosyası paylaşınız.
Minidump Dosyalarını Paylaşın
Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi ekran hatalarının nedenini öğrenebiliriz. Minidump dosyaları C:\Windows\Minidump klasöründe bulunur ve DMP uzantılıdır. Bu dosyaları sizden istediğimizde...www.technopat.net
O zaman bilgisayarcıya söyle o taktığı ekran kartını çıkartsın. Sana da paranı geri versin. Ek olarak belki başka şeyden kaynaklanıyor olabilir o yüzden dump paylaşırsan iyi olur.
Minidump dosyası paylaşınız.
Minidump Dosyalarını Paylaşın
Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi ekran hatalarının nedenini öğrenebiliriz. Minidump dosyaları C:\Windows\Minidump klasöründe bulunur ve DMP uzantılıdır. Bu dosyaları sizden istediğimizde...www.technopat.net
O zaman bilgisayarcıya söyle o taktığı ekran kartını çıkartsın. Sana da paranı geri versin. Ek olarak belki başka şeyden kaynaklanıyor olabilir o yüzden dump paylaşırsan iyi olur.
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000009350, memory referenced
Arg2: 000000000000000a, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8009ff27e80, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801cf1d6308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1781
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11741
Key : Analysis.Init.CPU.mSec
Value: 483
Key : Analysis.Init.Elapsed.mSec
Value: 13507
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081822-7265-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: 9350
BUGCHECK_P2: a
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8009ff27e80
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801cf1d62a8
GetUlongPtrFromAddress: unable to read from fffff801cf1d6530
0000000000009350
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff801d089eac0 -- (.trap 0xfffff801d089eac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011290e3a8
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8009ff27e80 rsp=fffff801d089ec50 rbp=fffff801d089ed50
r8=000000000026a7cb r9=0000000000000000 r10=0000000000800002
r11=0000000000000007 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0xf3e80:
fffff800`9ff27e80 4d8bb750930000 mov r14,qword ptr [r15+9350h] ds:00000000`00009350=????????????????
Resetting default scope
STACK_TEXT:
fffff801`d089e978 fffff801`cefd7769 : 00000000`0000000a 00000000`00009350 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx
fffff801`d089e980 fffff801`cefd4ca8 : 00000000`80000103 fffff800`9fefa9e5 fffff801`d089ed00 00000000`0026a7cb : nt!KiBugCheckDispatch+0x69
fffff801`d089eac0 fffff800`9ff27e80 : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x428
fffff801`d089ec50 00000000`00000000 : 00000000`00000005 00000000`00000000 00000000`00000002 fffff800`9ff27f60 : nvlddmkm+0xf3e80
SYMBOL_NAME: nvlddmkm+f3e80
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: f3e80
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff801867deef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000fe894340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80362f57308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1577
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 6795
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 11239
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081622-4562-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff801867deef0
BUGCHECK_P3: ffffd000fe894340
BUGCHECK_P4: 0
CONTEXT: ffffd000fe894340 -- (.cxr 0xffffd000fe894340)
rax=ffffd000fe894e40 rbx=ffffe001ede80800 rcx=0000000000000000
rdx=ffffe001ed5bc3d0 rsi=0000000000000009 rdi=ffffe001ed5bc3d0
rip=fffff801867deef0 rsp=ffffd000fe894d60 rbp=0000000000000000
r8=0000000000000003 r9=0000000000000000 r10=ffffd000fe894d60
r11=ffffd000fe894d50 r12=0000000000000000 r13=0000000000000000
r14=ffffe001ec9b6000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nvlddmkm+0x2fbef0:
fffff801`867deef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffd000`fe894d60 ffffe001`ede80800 : ffffe001`ede80800 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`fe894d68 ffffe001`ede80800 : 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 : 0xffffe001`ede80800
ffffd000`fe894d70 00000000`00000009 : ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 : 0xffffe001`ede80800
ffffd000`fe894d78 ffffe001`ede80d98 : ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 : 0x9
ffffd000`fe894d80 ffffe001`00000000 : fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 : 0xffffe001`ede80d98
ffffd000`fe894d88 fffff801`00000001 : ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 : 0xffffe001`00000000
ffffd000`fe894d90 ffffe001`ede80d98 : ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 : 0xfffff801`00000001
ffffd000`fe894d98 ffffe001`ede83e48 : 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 : 0xffffe001`ede80d98
ffffd000`fe894da0 00000000`00000000 : ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 00000000`00781dc9 : 0xffffe001`ede83e48
SYMBOL_NAME: nvlddmkm+2fbef0
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffd000fe894340 ; kb
BUCKET_ID_FUNC_OFFSET: 2fbef0
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff800d993aef0, Address of the instruction which caused the BugCheck
Arg3: ffffd000795e2430, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff801c05d7308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1359
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10246
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 11867
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081622-4390-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800d993aef0
BUGCHECK_P3: ffffd000795e2430
BUGCHECK_P4: 0
CONTEXT: ffffd000795e2430 -- (.cxr 0xffffd000795e2430)
rax=ffffd000795e2f30 rbx=ffffe0014a67d3f0 rcx=0000000000000000
rdx=ffffe0014a1dc3d0 rsi=0000000000000011 rdi=ffffe0014a1dc3d0
rip=fffff800d993aef0 rsp=ffffd000795e2e50 rbp=0000000000000000
r8=0000000000000003 r9=0000000000000000 r10=ffffd000795e2e50
r11=ffffd000795e2e40 r12=0000000000000000 r13=0000000000000000
r14=ffffe001495f1000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nvlddmkm+0x2fbef0:
fffff800`d993aef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffd000`795e2e50 ffffe001`4a67d3f0 : ffffe001`4a67d3f0 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 : nvlddmkm+0x2fbef0
ffffd000`795e2e58 ffffe001`4a67d3f0 : 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 : 0xffffe001`4a67d3f0
ffffd000`795e2e60 00000000`00000011 : ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 : 0xffffe001`4a67d3f0
ffffd000`795e2e68 ffffe001`4a67d988 : ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 : 0x11
ffffd000`795e2e70 ffffe001`00000000 : fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 : 0xffffe001`4a67d988
ffffd000`795e2e78 fffff800`00000001 : ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 : 0xffffe001`00000000
ffffd000`795e2e80 ffffe001`4a67d988 : ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 : 0xfffff800`00000001
ffffd000`795e2e88 ffffe001`4a67fe48 : 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 : 0xffffe001`4a67d988
ffffd000`795e2e90 00000000`00000000 : ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 00000000`00781dc9 : 0xffffe001`4a67fe48
SYMBOL_NAME: nvlddmkm+2fbef0
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffd000795e2430 ; kb
BUCKET_ID_FUNC_OFFSET: 2fbef0
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8007f5beef0, Address of the instruction which caused the BugCheck
Arg3: ffffd0005c16e340, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
GetUlongPtrFromAddress: unable to read from fffff80079d69308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5868
Key : Analysis.Init.CPU.mSec
Value: 390
Key : Analysis.Init.Elapsed.mSec
Value: 11881
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: winblue_ltsb
Key : WER.OS.Timestamp
Value: 2021-04-05T17:00:00Z
Key : WER.OS.Version
Value: 8.1.9600.20012
FILE_IN_CAB: 081722-7468-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8007f5beef0
BUGCHECK_P3: ffffd0005c16e340
BUGCHECK_P4: 0
CONTEXT: ffffd0005c16e340 -- (.cxr 0xffffd0005c16e340)
rax=ffffd0005c16ee40 rbx=ffffe00067aaa9a0 rcx=0000000000000000
rdx=ffffe00068356010 rsi=0000000000000009 rdi=ffffe00068356010
rip=fffff8007f5beef0 rsp=ffffd0005c16ed60 rbp=0000000000000000
r8=0000000000000003 r9=0000000000000000 r10=ffffd0005c16ed60
r11=ffffd0005c16ed50 r12=0000000000000000 r13=0000000000000000
r14=ffffe00067915000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nvlddmkm+0x2fbef0:
fffff800`7f5beef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
STACK_TEXT:
ffffd000`5c16ed60 ffffe000`67aaa9a0 : ffffe000`67aaa9a0 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 : nvlddmkm+0x2fbef0
ffffd000`5c16ed68 ffffe000`67aaa9a0 : 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 : 0xffffe000`67aaa9a0
ffffd000`5c16ed70 00000000`00000009 : ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 : 0xffffe000`67aaa9a0
ffffd000`5c16ed78 ffffe000`67aaaf38 : ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 : 0x9
ffffd000`5c16ed80 ffffe000`00000000 : fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 : 0xffffe000`67aaaf38
ffffd000`5c16ed88 fffff800`00000001 : ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 : 0xffffe000`00000000
ffffd000`5c16ed90 ffffe000`67aaaf38 : ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 : 0xfffff800`00000001
ffffd000`5c16ed98 ffffe000`67aa7e48 : 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 : 0xffffe000`67aaaf38
ffffd000`5c16eda0 00000000`00000000 : ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 00000000`00781dc9 : 0xffffe000`67aa7e48
SYMBOL_NAME: nvlddmkm+2fbef0
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr 0xffffd0005c16e340 ; kb
BUCKET_ID_FUNC_OFFSET: 2fbef0
FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function
OS_VERSION: 8.1.9600.20012
BUILDLAB_STR: winblue_ltsb
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3}
Followup: MachineOwner
---------
Dökümlerinize baktım. Adam sizi 1500 TL kazıklayıp üstüne de çalışmayan bir ekran kartı ile bırakmış. Hakınızı aramak için yemeniz gereken kazığın boyutu nedir?
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000009350, memory referenced Arg2: 000000000000000a, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8009ff27e80, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff801cf1d6308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1781 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 11741 Key : Analysis.Init.CPU.mSec Value: 483 Key : Analysis.Init.Elapsed.mSec Value: 13507 Key : Analysis.Memory.CommitPeak.Mb Value: 73 Key : Bugcheck.Code.DumpHeader Value: 0xd1 Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081822-7265-01.dmp BUGCHECK_CODE: d1 BUGCHECK_P1: 9350 BUGCHECK_P2: a BUGCHECK_P3: 0 BUGCHECK_P4: fffff8009ff27e80 READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801cf1d62a8 GetUlongPtrFromAddress: unable to read from fffff801cf1d6530 0000000000009350 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff801d089eac0 -- (.trap 0xfffff801d089eac0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011290e3a8 rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8009ff27e80 rsp=fffff801d089ec50 rbp=fffff801d089ed50 r8=000000000026a7cb r9=0000000000000000 r10=0000000000800002 r11=0000000000000007 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nvlddmkm+0xf3e80: fffff800`9ff27e80 4d8bb750930000 mov r14,qword ptr [r15+9350h] ds:00000000`00009350=???????????????? Resetting default scope STACK_TEXT: fffff801`d089e978 fffff801`cefd7769 : 00000000`0000000a 00000000`00009350 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx fffff801`d089e980 fffff801`cefd4ca8 : 00000000`80000103 fffff800`9fefa9e5 fffff801`d089ed00 00000000`0026a7cb : nt!KiBugCheckDispatch+0x69 fffff801`d089eac0 fffff800`9ff27e80 : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x428 fffff801`d089ec50 00000000`00000000 : 00000000`00000005 00000000`00000000 00000000`00000002 fffff800`9ff27f60 : nvlddmkm+0xf3e80 SYMBOL_NAME: nvlddmkm+f3e80 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: f3e80 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff801867deef0, Address of the instruction which caused the BugCheck Arg3: ffffd000fe894340, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff80362f57308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1577 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 6795 Key : Analysis.Init.CPU.mSec Value: 374 Key : Analysis.Init.Elapsed.mSec Value: 11239 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081622-4562-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff801867deef0 BUGCHECK_P3: ffffd000fe894340 BUGCHECK_P4: 0 CONTEXT: ffffd000fe894340 -- (.cxr 0xffffd000fe894340) rax=ffffd000fe894e40 rbx=ffffe001ede80800 rcx=0000000000000000 rdx=ffffe001ed5bc3d0 rsi=0000000000000009 rdi=ffffe001ed5bc3d0 rip=fffff801867deef0 rsp=ffffd000fe894d60 rbp=0000000000000000 r8=0000000000000003 r9=0000000000000000 r10=ffffd000fe894d60 r11=ffffd000fe894d50 r12=0000000000000000 r13=0000000000000000 r14=ffffe001ec9b6000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nvlddmkm+0x2fbef0: fffff801`867deef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffffd000`fe894d60 ffffe001`ede80800 : ffffe001`ede80800 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 : nvlddmkm+0x2fbef0 ffffd000`fe894d68 ffffe001`ede80800 : 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 : 0xffffe001`ede80800 ffffd000`fe894d70 00000000`00000009 : ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 : 0xffffe001`ede80800 ffffd000`fe894d78 ffffe001`ede80d98 : ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 : 0x9 ffffd000`fe894d80 ffffe001`00000000 : fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 : 0xffffe001`ede80d98 ffffd000`fe894d88 fffff801`00000001 : ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 : 0xffffe001`00000000 ffffd000`fe894d90 ffffe001`ede80d98 : ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 : 0xfffff801`00000001 ffffd000`fe894d98 ffffe001`ede83e48 : 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 : 0xffffe001`ede80d98 ffffd000`fe894da0 00000000`00000000 : ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 00000000`00781dc9 : 0xffffe001`ede83e48 SYMBOL_NAME: nvlddmkm+2fbef0 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffffd000fe894340 ; kb BUCKET_ID_FUNC_OFFSET: 2fbef0 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff800d993aef0, Address of the instruction which caused the BugCheck Arg3: ffffd000795e2430, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff801c05d7308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1359 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 10246 Key : Analysis.Init.CPU.mSec Value: 421 Key : Analysis.Init.Elapsed.mSec Value: 11867 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081622-4390-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff800d993aef0 BUGCHECK_P3: ffffd000795e2430 BUGCHECK_P4: 0 CONTEXT: ffffd000795e2430 -- (.cxr 0xffffd000795e2430) rax=ffffd000795e2f30 rbx=ffffe0014a67d3f0 rcx=0000000000000000 rdx=ffffe0014a1dc3d0 rsi=0000000000000011 rdi=ffffe0014a1dc3d0 rip=fffff800d993aef0 rsp=ffffd000795e2e50 rbp=0000000000000000 r8=0000000000000003 r9=0000000000000000 r10=ffffd000795e2e50 r11=ffffd000795e2e40 r12=0000000000000000 r13=0000000000000000 r14=ffffe001495f1000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nvlddmkm+0x2fbef0: fffff800`d993aef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffffd000`795e2e50 ffffe001`4a67d3f0 : ffffe001`4a67d3f0 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 : nvlddmkm+0x2fbef0 ffffd000`795e2e58 ffffe001`4a67d3f0 : 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 : 0xffffe001`4a67d3f0 ffffd000`795e2e60 00000000`00000011 : ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 : 0xffffe001`4a67d3f0 ffffd000`795e2e68 ffffe001`4a67d988 : ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 : 0x11 ffffd000`795e2e70 ffffe001`00000000 : fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 : 0xffffe001`4a67d988 ffffd000`795e2e78 fffff800`00000001 : ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 : 0xffffe001`00000000 ffffd000`795e2e80 ffffe001`4a67d988 : ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 : 0xfffff800`00000001 ffffd000`795e2e88 ffffe001`4a67fe48 : 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 : 0xffffe001`4a67d988 ffffd000`795e2e90 00000000`00000000 : ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 00000000`00781dc9 : 0xffffe001`4a67fe48 SYMBOL_NAME: nvlddmkm+2fbef0 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffffd000795e2430 ; kb BUCKET_ID_FUNC_OFFSET: 2fbef0 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff8007f5beef0, Address of the instruction which caused the BugCheck Arg3: ffffd0005c16e340, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff80079d69308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1296 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 5868 Key : Analysis.Init.CPU.mSec Value: 390 Key : Analysis.Init.Elapsed.mSec Value: 11881 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081722-7468-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8007f5beef0 BUGCHECK_P3: ffffd0005c16e340 BUGCHECK_P4: 0 CONTEXT: ffffd0005c16e340 -- (.cxr 0xffffd0005c16e340) rax=ffffd0005c16ee40 rbx=ffffe00067aaa9a0 rcx=0000000000000000 rdx=ffffe00068356010 rsi=0000000000000009 rdi=ffffe00068356010 rip=fffff8007f5beef0 rsp=ffffd0005c16ed60 rbp=0000000000000000 r8=0000000000000003 r9=0000000000000000 r10=ffffd0005c16ed60 r11=ffffd0005c16ed50 r12=0000000000000000 r13=0000000000000000 r14=ffffe00067915000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nvlddmkm+0x2fbef0: fffff800`7f5beef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffffd000`5c16ed60 ffffe000`67aaa9a0 : ffffe000`67aaa9a0 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 : nvlddmkm+0x2fbef0 ffffd000`5c16ed68 ffffe000`67aaa9a0 : 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 : 0xffffe000`67aaa9a0 ffffd000`5c16ed70 00000000`00000009 : ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 : 0xffffe000`67aaa9a0 ffffd000`5c16ed78 ffffe000`67aaaf38 : ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 : 0x9 ffffd000`5c16ed80 ffffe000`00000000 : fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 : 0xffffe000`67aaaf38 ffffd000`5c16ed88 fffff800`00000001 : ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 : 0xffffe000`00000000 ffffd000`5c16ed90 ffffe000`67aaaf38 : ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 : 0xfffff800`00000001 ffffd000`5c16ed98 ffffe000`67aa7e48 : 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 : 0xffffe000`67aaaf38 ffffd000`5c16eda0 00000000`00000000 : ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 00000000`00781dc9 : 0xffffe000`67aa7e48 SYMBOL_NAME: nvlddmkm+2fbef0 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffffd0005c16e340 ; kb BUCKET_ID_FUNC_OFFSET: 2fbef0 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner ---------
Tamamdır teşekürler.Raporunuzu okudum hocam, Windows 8.1 cihaz kullanıyor arkadaş, oluşum sırası ve rapora göre NVIDIA kaynaklı bir hata ve yazmaçlar varlık kabul etmediği için "unknown" yani bilinmeyen durum atıyor.
Dediğiniz gibi kartın bozuk olduğunu ispatlar.
Son olarak IRQL hatası içinde ekran kartı okunmaya çalışmış fakat bozuk olduğundan bellek yazım hatası ile beraber sistem mavi ekrana düşmüş.
Recep abi yardımcı olduğun için sağol şimdi götürcem bu nasıl olmuş diye söyleyeceğim eğer yapmazsa size danışırım.Dökümlerinize baktım. Adam sizi 1500 TL kazıklayıp üstüne de çalışmayan bir ekran kartı ile bırakmış. Hakınızı aramak için yemeniz gereken kazığın boyutu nedir?
Kod:DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000009350, memory referenced Arg2: 000000000000000a, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8009ff27e80, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff801cf1d6308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1781 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 11741 Key : Analysis.Init.CPU.mSec Value: 483 Key : Analysis.Init.Elapsed.mSec Value: 13507 Key : Analysis.Memory.CommitPeak.Mb Value: 73 Key : Bugcheck.Code.DumpHeader Value: 0xd1 Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081822-7265-01.dmp BUGCHECK_CODE: d1 BUGCHECK_P1: 9350 BUGCHECK_P2: a BUGCHECK_P3: 0 BUGCHECK_P4: fffff8009ff27e80 READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff801cf1d62a8 GetUlongPtrFromAddress: unable to read from fffff801cf1d6530 0000000000009350 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff801d089eac0 -- (.trap 0xfffff801d089eac0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0011290e3a8 rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8009ff27e80 rsp=fffff801d089ec50 rbp=fffff801d089ed50 r8=000000000026a7cb r9=0000000000000000 r10=0000000000800002 r11=0000000000000007 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nvlddmkm+0xf3e80: fffff800`9ff27e80 4d8bb750930000 mov r14,qword ptr [r15+9350h] ds:00000000`00009350=???????????????? Resetting default scope STACK_TEXT: fffff801`d089e978 fffff801`cefd7769 : 00000000`0000000a 00000000`00009350 00000000`0000000a 00000000`00000000 : nt!KeBugCheckEx fffff801`d089e980 fffff801`cefd4ca8 : 00000000`80000103 fffff800`9fefa9e5 fffff801`d089ed00 00000000`0026a7cb : nt!KiBugCheckDispatch+0x69 fffff801`d089eac0 fffff800`9ff27e80 : 00000000`00000000 00000000`00000005 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x428 fffff801`d089ec50 00000000`00000000 : 00000000`00000005 00000000`00000000 00000000`00000002 fffff800`9ff27f60 : nvlddmkm+0xf3e80 SYMBOL_NAME: nvlddmkm+f3e80 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: f3e80 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff801867deef0, Address of the instruction which caused the BugCheck Arg3: ffffd000fe894340, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff80362f57308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1577 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 6795 Key : Analysis.Init.CPU.mSec Value: 374 Key : Analysis.Init.Elapsed.mSec Value: 11239 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081622-4562-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff801867deef0 BUGCHECK_P3: ffffd000fe894340 BUGCHECK_P4: 0 CONTEXT: ffffd000fe894340 -- (.cxr 0xffffd000fe894340) rax=ffffd000fe894e40 rbx=ffffe001ede80800 rcx=0000000000000000 rdx=ffffe001ed5bc3d0 rsi=0000000000000009 rdi=ffffe001ed5bc3d0 rip=fffff801867deef0 rsp=ffffd000fe894d60 rbp=0000000000000000 r8=0000000000000003 r9=0000000000000000 r10=ffffd000fe894d60 r11=ffffd000fe894d50 r12=0000000000000000 r13=0000000000000000 r14=ffffe001ec9b6000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nvlddmkm+0x2fbef0: fffff801`867deef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffffd000`fe894d60 ffffe001`ede80800 : ffffe001`ede80800 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 : nvlddmkm+0x2fbef0 ffffd000`fe894d68 ffffe001`ede80800 : 00000000`00000009 ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 : 0xffffe001`ede80800 ffffd000`fe894d70 00000000`00000009 : ffffe001`ede80d98 ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 : 0xffffe001`ede80800 ffffd000`fe894d78 ffffe001`ede80d98 : ffffe001`00000000 fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 : 0x9 ffffd000`fe894d80 ffffe001`00000000 : fffff801`00000001 ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 : 0xffffe001`ede80d98 ffffd000`fe894d88 fffff801`00000001 : ffffe001`ede80d98 ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 : 0xffffe001`00000000 ffffd000`fe894d90 ffffe001`ede80d98 : ffffe001`ede83e48 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 : 0xfffff801`00000001 ffffd000`fe894d98 ffffe001`ede83e48 : 00000000`00000000 ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 : 0xffffe001`ede80d98 ffffd000`fe894da0 00000000`00000000 : ffffe001`ede80d70 ffffe001`ede83d38 ffffe001`ede80d98 00000000`00781dc9 : 0xffffe001`ede83e48 SYMBOL_NAME: nvlddmkm+2fbef0 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffffd000fe894340 ; kb BUCKET_ID_FUNC_OFFSET: 2fbef0 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff800d993aef0, Address of the instruction which caused the BugCheck Arg3: ffffd000795e2430, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff801c05d7308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1359 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 10246 Key : Analysis.Init.CPU.mSec Value: 421 Key : Analysis.Init.Elapsed.mSec Value: 11867 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081622-4390-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff800d993aef0 BUGCHECK_P3: ffffd000795e2430 BUGCHECK_P4: 0 CONTEXT: ffffd000795e2430 -- (.cxr 0xffffd000795e2430) rax=ffffd000795e2f30 rbx=ffffe0014a67d3f0 rcx=0000000000000000 rdx=ffffe0014a1dc3d0 rsi=0000000000000011 rdi=ffffe0014a1dc3d0 rip=fffff800d993aef0 rsp=ffffd000795e2e50 rbp=0000000000000000 r8=0000000000000003 r9=0000000000000000 r10=ffffd000795e2e50 r11=ffffd000795e2e40 r12=0000000000000000 r13=0000000000000000 r14=ffffe001495f1000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nvlddmkm+0x2fbef0: fffff800`d993aef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffffd000`795e2e50 ffffe001`4a67d3f0 : ffffe001`4a67d3f0 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 : nvlddmkm+0x2fbef0 ffffd000`795e2e58 ffffe001`4a67d3f0 : 00000000`00000011 ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 : 0xffffe001`4a67d3f0 ffffd000`795e2e60 00000000`00000011 : ffffe001`4a67d988 ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 : 0xffffe001`4a67d3f0 ffffd000`795e2e68 ffffe001`4a67d988 : ffffe001`00000000 fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 : 0x11 ffffd000`795e2e70 ffffe001`00000000 : fffff800`00000001 ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 : 0xffffe001`4a67d988 ffffd000`795e2e78 fffff800`00000001 : ffffe001`4a67d988 ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 : 0xffffe001`00000000 ffffd000`795e2e80 ffffe001`4a67d988 : ffffe001`4a67fe48 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 : 0xfffff800`00000001 ffffd000`795e2e88 ffffe001`4a67fe48 : 00000000`00000000 ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 : 0xffffe001`4a67d988 ffffd000`795e2e90 00000000`00000000 : ffffe001`4a67d960 ffffe001`4a67fd38 ffffe001`4a67d988 00000000`00781dc9 : 0xffffe001`4a67fe48 SYMBOL_NAME: nvlddmkm+2fbef0 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffffd000795e2430 ; kb BUCKET_ID_FUNC_OFFSET: 2fbef0 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff8007f5beef0, Address of the instruction which caused the BugCheck Arg3: ffffd0005c16e340, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys GetUlongPtrFromAddress: unable to read from fffff80079d69308 KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1296 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 5868 Key : Analysis.Init.CPU.mSec Value: 390 Key : Analysis.Init.Elapsed.mSec Value: 11881 Key : Analysis.Memory.CommitPeak.Mb Value: 71 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: winblue_ltsb Key : WER.OS.Timestamp Value: 2021-04-05T17:00:00Z Key : WER.OS.Version Value: 8.1.9600.20012 FILE_IN_CAB: 081722-7468-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8007f5beef0 BUGCHECK_P3: ffffd0005c16e340 BUGCHECK_P4: 0 CONTEXT: ffffd0005c16e340 -- (.cxr 0xffffd0005c16e340) rax=ffffd0005c16ee40 rbx=ffffe00067aaa9a0 rcx=0000000000000000 rdx=ffffe00068356010 rsi=0000000000000009 rdi=ffffe00068356010 rip=fffff8007f5beef0 rsp=ffffd0005c16ed60 rbp=0000000000000000 r8=0000000000000003 r9=0000000000000000 r10=ffffd0005c16ed60 r11=ffffd0005c16ed50 r12=0000000000000000 r13=0000000000000000 r14=ffffe00067915000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nvlddmkm+0x2fbef0: fffff800`7f5beef0 448b4968 mov r9d,dword ptr [rcx+68h] ds:002b:00000000`00000068=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: csrss.exe STACK_TEXT: ffffd000`5c16ed60 ffffe000`67aaa9a0 : ffffe000`67aaa9a0 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 : nvlddmkm+0x2fbef0 ffffd000`5c16ed68 ffffe000`67aaa9a0 : 00000000`00000009 ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 : 0xffffe000`67aaa9a0 ffffd000`5c16ed70 00000000`00000009 : ffffe000`67aaaf38 ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 : 0xffffe000`67aaa9a0 ffffd000`5c16ed78 ffffe000`67aaaf38 : ffffe000`00000000 fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 : 0x9 ffffd000`5c16ed80 ffffe000`00000000 : fffff800`00000001 ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 : 0xffffe000`67aaaf38 ffffd000`5c16ed88 fffff800`00000001 : ffffe000`67aaaf38 ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 : 0xffffe000`00000000 ffffd000`5c16ed90 ffffe000`67aaaf38 : ffffe000`67aa7e48 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 : 0xfffff800`00000001 ffffd000`5c16ed98 ffffe000`67aa7e48 : 00000000`00000000 ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 : 0xffffe000`67aaaf38 ffffd000`5c16eda0 00000000`00000000 : ffffe000`67aaaf10 ffffe000`67aa7d38 ffffe000`67aaaf38 00000000`00781dc9 : 0xffffe000`67aa7e48 SYMBOL_NAME: nvlddmkm+2fbef0 MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .cxr 0xffffd0005c16e340 ; kb BUCKET_ID_FUNC_OFFSET: 2fbef0 FAILURE_BUCKET_ID: AV_nvlddmkm!unknown_function OS_VERSION: 8.1.9600.20012 BUILDLAB_STR: winblue_ltsb OSPLATFORM_TYPE: x64 OSNAME: Windows 8.1 FAILURE_ID_HASH: {7eea5677-f68d-2154-717e-887e07e55cd3} Followup: MachineOwner ---------