Selamlar, rica etsem HD Tune 5.75 indirip sistemdeki tüm disklerin Health sekmelerinin ekran alıntısını paylaşır mısınız? Bu dediğime ek olarak Vanguard'ı kaldırırsanız sevinirim. Kaldırdıktan sonra tekrar kurabileceğinizi de hatırlatmak isterim. İyi akşamlar, kolay gelsin.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80703c28748, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 14499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 27479
Key : Analysis.Init.CPU.mSec
Value: 1015
Key : Analysis.Init.Elapsed.mSec
Value: 4376
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 020222-5875-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: ffffffffffffffff
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80703c28748
READ_ADDRESS: fffff807046fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffa28397a60460 -- (.trap 0xffffa28397a60460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8070464e480 rbx=0000000000000000 rcx=ffffffffffffffff
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80703c28748 rsp=ffffa28397a605f8 rbp=0000000000000001
r8=ffffffffffffffff r9=0000000000000000 r10=ffffe4000378b970
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiBuildWakeList+0x14:
fffff807`03c28748 4c8b01 mov r8,qword ptr [rcx] ds:ffffffff`ffffffff=????????????????
Resetting default scope
STACK_TEXT:
ffffa283`97a60318 fffff807`03e09269 : 00000000`0000000a ffffffff`ffffffff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa283`97a60320 fffff807`03e05569 : ffff0000`0000027f fffff807`04652800 80000001`283dd921 00000000`00001f80 : nt!KiBugCheckDispatch+0x69
ffffa283`97a60460 fffff807`03c28748 : fffff807`03c4ab1e 00000000`00000810 fffff807`03c4c386 ffff9205`2bcaf630 : nt!KiPageFault+0x469
ffffa283`97a605f8 fffff807`03c4ab1e : 00000000`00000810 fffff807`03c4c386 ffff9205`2bcaf630 fffff807`00000000 : nt!MiBuildWakeList+0x14
ffffa283`97a60600 fffff807`03c4787e : 00000000`00000001 00000000`00000001 ffff9205`2bcaf630 ffffa58b`00a998d8 : nt!MiCheckControlArea+0x27e
ffffa283`97a60680 fffff807`040975af : ffffb880`3ecc0000 ffffa58b`035bed50 ffff9205`00000000 fffff807`03c97901 : nt!MmUnmapViewInSystemCache+0x52e
ffffa283`97a607a0 fffff807`03cbecb6 : 00000000`00000000 ffff9205`2ce06da0 ffff9205`208d5000 00000000`00000000 : nt!CcUnmapVacb+0x63
ffffa283`97a607e0 fffff807`03cc6886 : 00000000`00000001 ffffa58b`00cc7100 00000000`00000000 ffffffff`ffffffff : nt!CcUnmapVacbArray+0x206
ffffa283`97a60850 fffff807`03cc66f4 : 00000000`00000000 ffffa283`97a60910 ffffa283`97a60910 ffff9205`2ce06da0 : nt!CcUnmapAndPurge+0x36
ffffa283`97a60890 fffff807`03cc44d3 : ffff9205`2ce06da0 ffffa283`97a60960 ffff9205`20722820 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x138
ffffa283`97a608e0 fffff807`07d08aa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcUninitializeCacheMap+0x2f3
ffffa283`97a609a0 fffff807`07cf76e0 : ffffa58b`00cc7000 ffffa58b`00cc7010 00000000`00000000 ffffa58b`00cc7170 : Ntfs+0x148aa4
ffffa283`97a609e0 fffff807`07bd61c5 : ffffa58b`00cc7010 ffffa58b`00cc7170 00000000`00000000 ffffa58b`00cc7170 : Ntfs+0x1376e0
ffffa283`97a60a40 fffff807`07cf73ac : ffffa283`97a60f30 ffff9205`266a8d60 ffffa58b`00cc7010 ffffa283`97a60e00 : Ntfs+0x161c5
ffffa283`97a60a80 fffff807`07cad0f7 : ffffa283`97a60f30 00000000`c000003a ffffa58b`00cc7528 ffffa58b`030a8510 : Ntfs+0x1373ac
ffffa283`97a60b00 fffff807`07ca2b58 : ffffa283`97a60f30 ffffa283`97a60e40 ffff9205`2733ca20 ffff9205`2683c001 : Ntfs+0xed0f7
ffffa283`97a60de0 fffff807`07ca29dc : 00000000`00000000 00000000`00000030 ffff9205`265b6010 ffff9205`2681f0a0 : Ntfs+0xe2b58
ffffa283`97a611d0 fffff807`01b0745e : 00000000`00000000 ffffa283`97a612e8 ffffa283`97a612a8 ffff9205`00000038 : Ntfs+0xe29dc
ffffa283`97a61200 fffff807`01b042bf : ffffa283`97a61310 ffffa283`97a612a8 ffff9205`2c5849a0 ffff9205`2c5848a0 : FLTMGR!FltpPerformFastIoCall+0x23e
ffffa283`97a61260 fffff807`01b3bc71 : ffffa283`97a62000 ffffa283`97a5c000 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0x25f
ffffa283`97a612e0 fffff807`040db314 : 00000000`000000f8 fffff807`043b11c4 00000000`00000003 ffff9205`2733ca20 : FLTMGR!FltpFastIoQueryOpen+0x131
ffffa283`97a61380 fffff807`04077060 : ffff9205`00000000 ffff9205`2672c8f0 ffff9205`2733ce50 ffffa283`00000000 : nt!IopQueryInformation+0x94
ffffa283`97a613e0 fffff807`03ff23ee : ffff9205`2672c8f0 00000000`00000000 ffff9205`2d4119a0 ffff9205`2d411901 : nt!IopParseDevice+0xf70
ffffa283`97a61550 fffff807`0409499a : ffff9205`2d411900 ffffa283`97a617b8 ffff9205`00000040 ffff9205`206f37a0 : nt!ObpLookupObjectName+0x3fe
ffffa283`97a61720 fffff807`0401694e : ffffa283`00000000 000000e4`b8afd960 00000000`00000000 000000e4`b8afd930 : nt!ObOpenObjectByNameEx+0x1fa
ffffa283`97a61850 fffff807`03e08cb5 : ffff9205`2d438000 00000000`00000000 ffff9205`2d438080 0000024c`de028f10 : nt!NtQueryFullAttributesFile+0x1ce
ffffa283`97a61b00 00007ff9`4004f624 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000e4`b8afd8d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`4004f624
SYMBOL_NAME: nt!MiBuildWakeList+14
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: AV_nt!MiBuildWakeList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {70cb3622-0f6b-871c-49a9-142d1e32a967}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MULTIPLE_IRP_COMPLETE_REQUESTS (44)
A driver has requested that an IRP be completed (IoCompleteRequest()), but
the packet has already been completed. This is a tough bug to find because
the easiest case, a driver actually attempted to complete its own packet
twice, is generally not what happened. Rather, two separate drivers each
believe that they own the packet, and each attempts to complete it. The
first actually works, and the second fails. Tracking down which drivers
in the system actually did this is difficult, generally because the trails
of the first driver have been covered by the second. However, the driver
stack for the current request can be found by examining the DeviceObject
fields in each of the stack locations.
Arguments:
Arg1: ffff8c8f81117190, Address of the IRP
Arg2: 0000000000001232
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8561
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10621
Key : Analysis.Init.CPU.mSec
Value: 921
Key : Analysis.Init.Elapsed.mSec
Value: 2032
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 020122-12937-01.dmp
BUGCHECK_CODE: 44
BUGCHECK_P1: ffff8c8f81117190
BUGCHECK_P2: 1232
BUGCHECK_P3: 0
BUGCHECK_P4: 0
IRP_ADDRESS: ffff8c8f81117190
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffdc81`ce4d1678 fffff806`4603c33e : 00000000`00000044 ffff8c8f`81117190 00000000`00001232 00000000`00000000 : nt!KeBugCheckEx
ffffdc81`ce4d1680 fffff806`45e84ec7 : ffff8c8f`8269b080 00000000`00000002 ffff8c8f`8404f530 ffff8c8f`00000000 : nt!IopfCompleteRequest+0x1b745e
ffffdc81`ce4d1770 fffff806`520bd873 : 00000000`00000000 000000f8`049ef640 ffff8c8f`81117190 ffff8c8f`8269b080 : nt!IofCompleteRequest+0x17
ffffdc81`ce4d17a0 fffff806`45e8f825 : ffff8c8f`79391510 ffff8c8f`79391510 00000000`00000001 ffff8c8f`81117190 : Npfs!NpFsdWrite+0xd3
ffffdc81`ce4d1810 fffff806`420a46a6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver+0x55
ffffdc81`ce4d1850 fffff806`45e8f825 : ffff8c8f`81117190 ffffcb00`ddfe9180 ffff8c8f`8269b080 fffff806`45e0bd2f : FLTMGR!FltpDispatch+0xd6
ffffdc81`ce4d18b0 fffff806`46275b58 : ffff8c8f`81117190 00000000`00000000 ffff8c8f`81117190 00000000`00000000 : nt!IofCallDriver+0x55
ffffdc81`ce4d18f0 fffff806`4628bddf : ffffa007`00000000 ffffdc81`ce4d1b80 000000dd`eb5fe990 ffffdc81`ce4d1b80 : nt!IopSynchronousServiceTail+0x1a8
ffffdc81`ce4d1990 fffff806`46008cb5 : 00000000`00000000 00000000`00000000 00000000`00000000 000000f8`01fe3b98 : nt!NtWriteFile+0x66f
ffffdc81`ce4d1a90 00007ffe`7ce6ce74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000dd`eb5fe918 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`7ce6ce74
SYMBOL_NAME: Npfs!NpFsdWrite+d3
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: d3
FAILURE_BUCKET_ID: 0x44_Npfs!NpFsdWrite
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {947b2e94-712f-fbfc-7620-19ee913c5b76}
Followup: MachineOwner
---------[/CODE]