i7-4710HQ sistemde PFN_LIST_CORRUPT mavi ekran hatası

İşletim sistemi
Windows 10

cenkyalgn

Centipat
Katılım
2 Mart 2021
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Merhaba bu hatayı yaklaşık olarak 7-8 aydır alıyorum daha önce Memtest86 ile belleklerimi kontrol ettim ancak herhangi bir sorun bulunamadı artık bu hata çok canımı sıkmaya başladı. Bazen laptop kapağını hareket ettirdiğimde bazen aşırı ısınmada bazen de Microsoft Edge'de surf yaparken bu hatayla karşılaşıyorum. Daha önce bu hata haricinde farklı 2 hata daha aldım onları hatırlamıyorum ama bir tanesi bilgisayarımın tamamen açılmamasına neden olmuştu her başlangıçta hata alıyordum ve format attım hepsi çözüldü ama bu hata devam ediyor. Rica etsem kontrol eder misiniz?

Link: minidump.rar

Sistem özellikleri;

İşlemci: Intel(r) Core(tm) i7-4710HQ CPU @ 2.50GHz 2.50 GHz.
Ekran kartı: NVIDIA GeForce GTX 860M.
RAM: 16 GB 1600MHz DDR3L.
İşletim sistemi: Windows 10 Home Single Language 64 Bit (sürüm: 20h2)
HDD: 1TB 5400RPM.
SSHD: 8MB.
 
Logitech harici kamera kullanıyor musunuz? Kullanıyorsanız çıkarın ve mümkünse sürücüsünü kaldırın, kullanmıyorsanız mümkünse eski sürücüyü kaldırın ve Lenovo'nun sitesinde paylaşılan bu sürücüyü yükleyin.

Kod:
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc2e762051d58, Virtual address for the attempted write.
Arg2: 8a00000000200021, PTE contents.
Arg3: ffffe880a46ead80, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4562

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15694

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffffc2e762051d58

BUGCHECK_P2: 8a00000000200021

BUGCHECK_P3: ffffe880a46ead80

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  msedge.exe

TRAP_FRAME:  ffffe880a46ead80 -- (.trap 0xffffe880a46ead80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc2e762051d40
rdx=0000000000000005 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80224b44161 rsp=ffffe880a46eaf10 rbp=ffffc2e762051d40
r8=0000000000018031  r9=ffffd6bffcb70030 r10=0000000000000000
r11=ffffd68000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiLockSetPfnPriority+0x11:
fffff802`24b44161 f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffffc2e7`62051d58=????????????????
Resetting default scope

STACK_TEXT:
ffffe880`a46eab88 fffff802`24c63110     : 00000000`000000be ffffc2e7`62051d58 8a000000`00200021 ffffe880`a46ead80 : nt!KeBugCheckEx
ffffe880`a46eab90 fffff802`24a0ca4f     : 8a000000`00200021 00000000`00000003 ffffe880`a46eae00 00000000`00000000 : nt!MiRaisedIrqlFault+0x16ccf4
ffffe880`a46eabe0 fffff802`24c03c5e     : 00000000`00000000 00000000`00000000 ffffc50d`5d53e7e8 ffffc180`0bf325f0 : nt!MmAccessFault+0x4ef
ffffe880`a46ead80 fffff802`24b44161     : ffffc50d`57775700 00000000`00000001 ffffd6bf`fcb70030 ffffd6bf`fcb70030 : nt!KiPageFault+0x35e
ffffe880`a46eaf10 fffff802`24a9dc71     : ffffc180`00000000 00000000`00000000 ffffc180`00000000 fffff802`24a937b0 : nt!MiLockSetPfnPriority+0x11
ffffe880`a46eaf40 fffff802`24a9da9f     : ffffe880`a46eb560 ffffd6bf`fcb70030 ffffc2e7`62051d40 00000000`00000000 : nt!MiAgePteWorker+0x1a1
ffffe880`a46eafa0 fffff802`24a0b9e6     : ffffe880`a46eb560 ffffd6bf`fcb70030 00000000`00000000 b19177cb`5709c62d : nt!MiAgePte+0x51f
ffffe880`a46eb040 fffff802`24a0bafb     : ffffd6eb`00000000 ffffc50d`57775700 00000000`00000000 ffffe880`a46eb5b0 : nt!MiWalkPageTablesRecursively+0x776
ffffe880`a46eb0e0 fffff802`24a0bafb     : ffffd6eb`75afff28 ffffc50d`57775700 00000000`00000001 ffffe880`a46eb5c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffe880`a46eb180 fffff802`24a0bafb     : ffffd6eb`75aff000 ffffc50d`57775700 00000000`00000002 ffffe880`a46eb5d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffe880`a46eb220 fffff802`24a5de6b     : 00000000`56000002 ffffc50d`57775700 ffffe880`00000003 ffffe880`a46eb5e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffe880`a46eb2c0 fffff802`24a5d901     : ffffe880`a46eb560 00000000`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffe880`a46eb3c0 fffff802`24a5d009     : 00000000`00000000 00000000`00000000 ffff8580`1baf51c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffe880`a46eb8d0 fffff802`24a5c817     : 00000000`00000000 ffffe880`a46eba80 ffffe880`a46eba40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffe880`a46eb9c0 fffff802`24a40560     : fffff802`25450bc0 ffffe880`a46eba80 00000000`0000498c ffff8580`00000200 : nt!MiProcessWorkingSets+0x227
ffffe880`a46eba60 fffff802`24bb4ec7     : 00000000`00000004 00000000`00000004 00000000`ffffffff ffff8580`1afc4180 : nt!MiWorkingSetManager+0x110
ffffe880`a46ebb20 fffff802`24b17e25     : ffffc50d`4cd10040 00000000`00000080 fffff802`24bb4d70 fffff802`24800000 : nt!KeBalanceSetManager+0x157
ffffe880`a46ebc10 fffff802`24bfd0d8     : ffff8580`1b140180 ffffc50d`4cd10040 fffff802`24b17dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe880`a46ebc60 00000000`00000000     : ffffe880`a46ec000 ffffe880`a46e6000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiRaisedIrqlFault+16ccf4

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.804

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  16ccf4

FAILURE_BUCKET_ID:  0xBE_nt!MiRaisedIrqlFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000045b5c5
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rtsuvc.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22753

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 9a

BUGCHECK_P2: 45b5c5

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

LOCK_ADDRESS:  fffff80353e44bc0 -- (!locks fffff80353e44bc0)

Resource @ nt!PiEngineLock (0xfffff80353e44bc0)    Exclusively owned
    Contention Count = 39
     Threads: ffff8b889c7e4040-01<*>
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff80353e44bc0
    Thread Count  : 1
    Thread address: 0xffff8b889c7e4040
    Thread wait   : 0x568ce6

STACK_TEXT:
ffffc70c`4176ac28 fffff803`5366136f     : 00000000`0000004e 00000000`0000009a 00000000`0045b5c5 00000000`00000006 : nt!KeBugCheckEx
ffffc70c`4176ac30 fffff803`534f1f2e     : ffff8245`c4490680 ffffc70c`4176ada0 00000000`00000002 ffff8241`00000000 : nt!MiDeleteNonPagedPoolPte+0x16f30f
ffffc70c`4176aca0 fffff803`534ac256     : ffff8b88`8e767000 00000000`00004000 00000000`00000017 00000000`000000e9 : nt!MiClearNonPagedPtes+0x162
ffffc70c`4176aed0 fffff803`534ac07a     : 00000000`00000000 ffffc70c`4176b041 ffffffff`ffffff3f 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
ffffc70c`4176af50 fffff803`534ab5c6     : 00000000`00000000 00000000`00000000 ffff8b88`8e800100 00000000`00000020 : nt!RtlpHpEnvFreeVA+0x12
ffffc70c`4176af80 fffff803`534b0d33     : fffff803`00000000 ffff8b88`00000002 00000000`00000000 ffffc70c`4176afe0 : nt!RtlpHpFreeVA+0x3a
ffffc70c`4176afc0 fffff803`534b09de     : ffffc70c`4176b100 00000000`ffffff3f 00000000`00000000 00000000`fffff010 : nt!RtlpHpSegMgrCommit+0x1e3
ffffc70c`4176b090 fffff803`534b2e01     : ffff8b88`00000010 ffff8b88`92000020 ffff8b88`00000000 fffff803`000000c1 : nt!RtlpHpSegPageRangeCommit+0x1ee
ffffc70c`4176b130 fffff803`534b289b     : ffffffff`ffffffff 00000000`0000000d ffffffff`ffffffff ffff8b88`8e764ea0 : nt!RtlpHpSegPageRangeCoalesce+0x1b1
ffffc70c`4176b1b0 fffff803`5344ce42     : 00000000`00000000 ffff8b88`8e8001c0 00000000`92000000 00000000`00000000 : nt!RtlpHpSegPageRangeShrink+0xeb
ffffc70c`4176b220 fffff803`53bb1019     : ffffc984`00000000 ffff8b88`985af120 fffff803`6cebf0e0 01000000`00100000 : nt!ExFreeHeapPool+0x6b2
ffffc70c`4176b300 fffff803`75646b73     : ffff8b88`920109c0 ffff8b88`920109c0 ffff8b88`985af120 00000000`00000001 : nt!ExFreePool+0x9
ffffc70c`4176b330 ffff8b88`920109c0     : ffff8b88`920109c0 ffff8b88`985af120 00000000`00000001 00000000`00000001 : rtsuvc+0x226b73
ffffc70c`4176b338 ffff8b88`920109c0     : ffff8b88`985af120 00000000`00000001 00000000`00000001 fffff803`6ced23bd : 0xffff8b88`920109c0
ffffc70c`4176b340 ffff8b88`985af120     : 00000000`00000001 00000000`00000001 fffff803`6ced23bd ffffc984`557767d0 : 0xffff8b88`920109c0
ffffc70c`4176b348 00000000`00000001     : 00000000`00000001 fffff803`6ced23bd ffffc984`557767d0 fffff803`00000000 : 0xffff8b88`985af120
ffffc70c`4176b350 00000000`00000001     : fffff803`6ced23bd ffffc984`557767d0 fffff803`00000000 ffff8b88`00000000 : 0x1
ffffc70c`4176b358 fffff803`6ced23bd     : ffffc984`557767d0 fffff803`00000000 ffff8b88`00000000 ffffb381`ee2e5100 : 0x1
ffffc70c`4176b360 fffff803`6ced22d1     : ffffc984`62a16d30 ffffc984`557767d0 ffffc984`67c7e140 00000000`00000017 : ks!KspReleaseDeviceBagEntry+0x9d
ffffc70c`4176b3a0 fffff803`6cee6fd9     : ffff8b88`9efe7e10 fffff803`6cebf0e0 00000000`00000000 00000000`00000000 : ks!KspTerminateObjectBag+0xe1
ffffc70c`4176b3e0 fffff803`6cee7104     : 00000000`00000001 ffff8b88`9c03fa50 ffff8b88`9ebd3670 00000000`00000000 : ks!CKsDevice::~CKsDevice+0xa9
ffffc70c`4176b410 fffff803`6ced926c     : ffff8b88`985af000 fffff803`53bb1019 00000000`00000000 ffff8b88`a07a8b90 : ks!CKsDevice::`vector deleting destructor'+0x14
ffffc70c`4176b440 fffff803`6cee9924     : ffff8b88`985af0d8 ffff8b88`00000000 ffff8b88`9c03fa50 ffff8b88`985af0d8 : ks!CBaseUnknown::NonDelegatedRelease+0x3c
ffffc70c`4176b480 fffff803`6ceea153     : fffff803`7569a400 00000000`00003800 00000000`00000000 ffff8b88`985af0d8 : ks!CKsDevice::Release+0x14
ffffc70c`4176b4b0 fffff803`6ced6db7     : ffff8b88`9c972010 ffff8b88`9c03fa50 ffff8b88`9c972560 ffff8b88`9c03fa50 : ks!KsTerminateDevice+0x73
ffffc70c`4176b4e0 fffff803`53452f55     : ffffc70c`4176b5e0 ffff8b88`a07a8b90 ffff8b88`9ebd3670 fffff803`53bb1094 : ks!CKsDevice::DispatchPnp+0x4f7
ffffc70c`4176b550 fffff803`71da15de     : fffff803`00000000 fffff803`5395ba05 00000000`00000000 00000000`00000500 : nt!IofCallDriver+0x55
ffffc70c`4176b590 fffff803`71da1023     : ffff8b88`a076f5a0 ffffc70c`4176b710 ffff8b88`00000000 ffff8b88`9c972010 : ksthunk!CKernelFilterDevice::DispatchIrp+0x15a
ffffc70c`4176b5f0 fffff803`53452f55     : 00000000`00000000 fffff803`534e0ed3 00000000`00000012 00000000`69706e00 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13
ffffc70c`4176b620 fffff803`53887bd0     : 00000000`00000000 ffff8b88`a076f5a0 ffffc70c`4176b710 fffff803`5393457c : nt!IofCallDriver+0x55
ffffc70c`4176b660 fffff803`53934269     : ffff8b88`9ebd3670 ffff8b88`9ebd3670 ffff8b88`a039dc30 00000000`00000002 : nt!IopSynchronousCall+0xf8
ffffc70c`4176b6d0 fffff803`5356c654     : ffffc984`54741590 ffff8b88`a039dc30 00000000`00000001 00000000`0000000a : nt!IopRemoveDevice+0x105
ffffc70c`4176b780 fffff803`53933e32     : ffff8b88`a039dc30 00000000`00000000 00000000`00000000 fffff803`53e44ba0 : nt!PnpRemoveLockedDeviceNode+0x1ac
ffffc70c`4176b7e0 fffff803`53933b67     : ffff8b88`a039dc30 ffffc70c`4176b860 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNode+0x4e
ffffc70c`4176b820 fffff803`539371ed     : ffff8b88`90fb5a70 00000000`00000002 ffff8b88`9d6c5710 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
ffffc70c`4176b8a0 fffff803`53937484     : 00000000`00000000 ffffc70c`4176b920 ffff8b88`90fb5a70 00000000`00000000 : nt!PipRemoveDevicesInRelationList+0x8d
ffffc70c`4176b8f0 fffff803`53937325     : ffff8b88`9d6c5710 00000000`00000001 ffff8b88`9d6c5710 00000000`00000001 : nt!PnpDelayedRemoveWorker+0x114
ffffc70c`4176b930 fffff803`5356d818     : 00000000`00000001 00000000`00000001 00000000`00000000 ffff8b88`9dc0bc50 : nt!PnpChainDereferenceComplete+0xfd
ffffc70c`4176b960 fffff803`53932a56     : 00000000`00000002 ffffc70c`4176ba59 ffffc984`670c9cb0 00000000`00000001 : nt!PnpIsChainDereferenced+0xac
ffffc70c`4176b9e0 fffff803`53930b27     : ffffc70c`4176bb20 ffff8b88`9dc0bc00 ffffc70c`4176bb00 ffffc984`00000002 : nt!PnpProcessQueryRemoveAndEject+0x28a
ffffc70c`4176bac0 fffff803`5390a41e     : ffffc984`54741590 ffffc984`4d1da610 ffff8b88`8ec93c00 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb
ffffc70c`4176baf0 fffff803`53425975     : ffff8b88`9c7e4040 ffff8b88`9c7e4040 ffff8b88`8ec93c70 ffff8b88`9fac5520 : nt!PnpDeviceEventWorker+0x2ce
ffffc70c`4176bb70 fffff803`53517e25     : ffff8b88`9c7e4040 00000000`00000080 ffff8b88`8ec9f040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffc70c`4176bc10 fffff803`535fd0d8     : ffffb381`edf40180 ffff8b88`9c7e4040 fffff803`53517dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc70c`4176bc60 00000000`00000000     : ffffc70c`4176c000 ffffc70c`41766000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  rtsuvc+226b73

MODULE_NAME: rtsuvc

IMAGE_NAME:  rtsuvc.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  226b73

FAILURE_BUCKET_ID:  0x4E_9a_rtsuvc!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6d83ce9d-2fd9-f756-e19f-c20fb7e9a1cc}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff928d0c912000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff807746c6be5, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rtsuvc.sys

Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7765

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 54516

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff928d0c912000

BUGCHECK_P2: 0

BUGCHECK_P3: fffff807746c6be5

BUGCHECK_P4: 2

READ_ADDRESS: fffff8075ecfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075ec0f330: Unable to get Flags value from nt!KdVersionBlock
fffff8075ec0f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff928d0c912000

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc507d984a730 -- (.trap 0xffffc507d984a730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000090 rbx=0000000000000000 rcx=ffff928d0c90c6b0
rdx=0000000000005932 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807746c6be5 rsp=ffffc507d984a8c8 rbp=0000000032315244
r8=0000000000000010  r9=0000000000000004 r10=0000000043737452
r11=ffff928d0c90c6b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
rtsuvc+0x266be5:
fffff807`746c6be5 f30f6f4c0a10    movdqu  xmm1,xmmword ptr [rdx+rcx+10h] ds:ffff928d`0c911ff2=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffffc507`d984a488 fffff807`5e41ebbb     : 00000000`00000050 ffff928d`0c912000 00000000`00000000 ffffc507`d984a730 : nt!KeBugCheckEx
ffffc507`d984a490 fffff807`5e20c960     : ffff928d`1a4adf28 00000000`00000000 ffffc507`d984a7b0 00000000`00000000 : nt!MiSystemFault+0x1f43ab
ffffc507`d984a590 fffff807`5e403c5e     : 00000000`00000000 fffff807`5e2507bf 00000000`00000000 ffffc507`000000b0 : nt!MmAccessFault+0x400
ffffc507`d984a730 fffff807`746c6be5     : fffff807`746b7efa ffff928d`0c911e00 00000000`32315244 ffff928d`0c911eb0 : nt!KiPageFault+0x35e
ffffc507`d984a8c8 fffff807`746b7efa     : ffff928d`0c911e00 00000000`32315244 ffff928d`0c911eb0 ffff928d`00000000 : rtsuvc+0x266be5
ffffc507`d984a8d0 ffff928d`0c911e00     : 00000000`32315244 ffff928d`0c911eb0 ffff928d`00000000 00000000`00000000 : rtsuvc+0x257efa
ffffc507`d984a8d8 00000000`32315244     : ffff928d`0c911eb0 ffff928d`00000000 00000000`00000000 ffff928d`0c90c111 : 0xffff928d`0c911e00
ffffc507`d984a8e0 ffff928d`0c911eb0     : ffff928d`00000000 00000000`00000000 ffff928d`0c90c111 00000000`00000000 : 0x32315244
ffffc507`d984a8e8 ffff928d`00000000     : 00000000`00000000 ffff928d`0c90c111 00000000`00000000 fffff807`746ba565 : 0xffff928d`0c911eb0
ffffc507`d984a8f0 00000000`00000000     : ffff928d`0c90c111 00000000`00000000 fffff807`746ba565 00000000`00000000 : 0xffff928d`00000000


SYMBOL_NAME:  rtsuvc+266be5

MODULE_NAME: rtsuvc

IMAGE_NAME:  rtsuvc.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  266be5

FAILURE_BUCKET_ID:  AV_R_INVALID_rtsuvc!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b4a78d87-2338-86ef-2b06-a3a270711b4b}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000045b59c
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rtsuvc.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 29069

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 9a

BUGCHECK_P2: 45b59c

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

LOCK_ADDRESS:  fffff80706c44bc0 -- (!locks fffff80706c44bc0)

Resource @ nt!PiEngineLock (0xfffff80706c44bc0)    Exclusively owned
    Contention Count = 39
     Threads: ffff808bcb6bb040-01<*>
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff80706c44bc0
    Thread Count  : 1
    Thread address: 0xffff808bcb6bb040
    Thread wait   : 0x6961bb

STACK_TEXT:
fffff909`6ea28e68 fffff807`0646136f     : 00000000`0000004e 00000000`0000009a 00000000`0045b59c 00000000`00000006 : nt!KeBugCheckEx
fffff909`6ea28e70 fffff807`062f1f2e     : ffffb6c0`45de8680 fffff909`6ea28fe0 00000000`00000002 ffffb6db`00000000 : nt!MiDeleteNonPagedPoolPte+0x16f30f
fffff909`6ea28ee0 fffff807`062ac256     : fffff807`27c3a430 ffffcac6`1f3dece8 fffff807`27c26f00 ffffcac6`1f3decf8 : nt!MiClearNonPagedPtes+0x162
fffff909`6ea29110 fffff807`062ac07a     : 00000000`00000000 fffff909`6ea29281 ffffffff`ffffff3f 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
fffff909`6ea29190 fffff807`062ab5c6     : fffff909`6ea292e0 fffff807`0000010a fffff807`27ca6645 fffff807`00000529 : nt!RtlpHpEnvFreeVA+0x12
fffff909`6ea291c0 fffff807`062b0d33     : fffff807`27ca660a fffff807`27c23615 00000000`00000565 fffff807`27c129ff : nt!RtlpHpFreeVA+0x3a
fffff909`6ea29200 fffff807`062b09de     : 00000004`00000000 00000000`ffffff3f 00000000`00000000 00000000`fffff010 : nt!RtlpHpSegMgrCommit+0x1e3
fffff909`6ea292d0 fffff807`062b2e01     : ffff808b`00000010 ffff808b`bd000020 ffff808b`00000000 fffff807`000000c1 : nt!RtlpHpSegPageRangeCommit+0x1ee
fffff909`6ea29370 fffff807`062b289b     : ffffffff`ffffffff 00000000`0000000d ffffffff`ffffffff ffff808b`b8d63d10 : nt!RtlpHpSegPageRangeCoalesce+0x1b1
fffff909`6ea293f0 fffff807`0624ce42     : 00000000`00000000 ffff808b`b8e001c0 00000000`bd000000 00000000`00000000 : nt!RtlpHpSegPageRangeShrink+0xeb
fffff909`6ea29460 fffff807`069b1019     : ffffc108`00000000 ffff808b`c64c3120 fffff807`21e1f0e0 01000000`00100000 : nt!ExFreeHeapPool+0x6b2
fffff909`6ea29540 fffff807`27be6b73     : ffff808b`bd0109c0 ffff808b`bd0109c0 ffff808b`c64c3120 00000000`00000001 : nt!ExFreePool+0x9
fffff909`6ea29570 ffff808b`bd0109c0     : ffff808b`bd0109c0 ffff808b`c64c3120 00000000`00000001 00000000`00000001 : rtsuvc+0x226b73
fffff909`6ea29578 ffff808b`bd0109c0     : ffff808b`c64c3120 00000000`00000001 00000000`00000001 fffff807`21e323bd : 0xffff808b`bd0109c0
fffff909`6ea29580 ffff808b`c64c3120     : 00000000`00000001 00000000`00000001 fffff807`21e323bd ffffc108`02336b90 : 0xffff808b`bd0109c0
fffff909`6ea29588 00000000`00000001     : 00000000`00000001 fffff807`21e323bd ffffc108`02336b90 fffff807`00000000 : 0xffff808b`c64c3120
fffff909`6ea29590 00000000`00000001     : fffff807`21e323bd ffffc108`02336b90 fffff807`00000000 ffff808b`00000000 : 0x1
fffff909`6ea29598 fffff807`21e323bd     : ffffc108`02336b90 fffff807`00000000 ffff808b`00000000 ffff9701`f999f100 : 0x1
fffff909`6ea295a0 fffff807`21e322d1     : ffffc108`16e77e20 ffffc108`02336b90 ffffc108`0a1e9a30 00000000`00000017 : ks!KspReleaseDeviceBagEntry+0x9d
fffff909`6ea295e0 fffff807`21e46fd9     : ffff808b`cd491a80 fffff807`21e1f0e0 00000000`00000000 00000000`00000000 : ks!KspTerminateObjectBag+0xe1
fffff909`6ea29620 fffff807`21e47104     : 00000000`00000001 ffff808b`c8f84b20 ffff808b`cb6f7450 00000000`00000000 : ks!CKsDevice::~CKsDevice+0xa9
fffff909`6ea29650 fffff807`21e3926c     : ffff808b`c64c3000 fffff807`069b1019 00000000`00000000 ffff808b`cc6cda10 : ks!CKsDevice::`vector deleting destructor'+0x14
fffff909`6ea29680 fffff807`21e49924     : ffff808b`c64c30d8 ffff808b`00000000 ffff808b`c8f84b20 ffff808b`c64c30d8 : ks!CBaseUnknown::NonDelegatedRelease+0x3c
fffff909`6ea296c0 fffff807`21e4a153     : fffff807`27c3a400 00000000`00000900 00000000`00000000 ffff808b`c64c30d8 : ks!CKsDevice::Release+0x14
fffff909`6ea296f0 fffff807`21e36db7     : ffff808b`ce0fb010 ffff808b`c8f84b20 ffff808b`ce0fb560 ffff808b`c8f84b20 : ks!KsTerminateDevice+0x73
fffff909`6ea29720 fffff807`06252f55     : fffff909`6ea29820 ffff808b`cc6cda10 ffff808b`cb6f7450 fffff807`069b1094 : ks!CKsDevice::DispatchPnp+0x4f7
fffff909`6ea29790 fffff807`20ba15de     : fffff807`00000000 fffff807`0675ba05 00000000`00000000 00000000`00000500 : nt!IofCallDriver+0x55
fffff909`6ea297d0 fffff807`20ba1023     : ffff808b`cd9d3a50 fffff909`6ea29950 ffff808b`00000000 ffff808b`ce0fb010 : ksthunk!CKernelFilterDevice::DispatchIrp+0x15a
fffff909`6ea29830 fffff807`06252f55     : 00000000`00000000 fffff807`062e0ed3 00000000`00000012 00000000`69706e00 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13
fffff909`6ea29860 fffff807`06687bd0     : 00000000`00000000 ffff808b`cd9d3a50 fffff909`6ea29950 fffff807`0673457c : nt!IofCallDriver+0x55
fffff909`6ea298a0 fffff807`06734269     : ffff808b`cb6f7450 ffff808b`cb6f7450 ffff808b`cb7d2cb0 00000000`00000002 : nt!IopSynchronousCall+0xf8
fffff909`6ea29910 fffff807`0636c654     : ffffc108`192c4ea0 ffff808b`cb7d2cb0 00000000`00000001 00000000`0000000a : nt!IopRemoveDevice+0x105
fffff909`6ea299c0 fffff807`06733e32     : ffff808b`cb7d2cb0 ffff9701`00000000 00000000`00000000 fffff807`06c44ba0 : nt!PnpRemoveLockedDeviceNode+0x1ac
fffff909`6ea29a20 fffff807`06733b67     : ffff808b`cb7d2cb0 fffff909`6ea29aa0 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNode+0x4e
fffff909`6ea29a60 fffff807`067371ed     : ffff808b`c8691a10 00000000`00000002 ffff808b`c55dd910 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
fffff909`6ea29ae0 fffff807`06737484     : 00000000`00000000 fffff909`6ea29b60 ffff808b`b92e6a20 00000000`00000000 : nt!PipRemoveDevicesInRelationList+0x8d
fffff909`6ea29b30 fffff807`06225975     : ffff808b`cb6bb040 fffff807`06c452c0 ffff808b`b92e6a20 fffff807`00000000 : nt!PnpDelayedRemoveWorker+0x114
fffff909`6ea29b70 fffff807`06317e25     : ffff808b`cb6bb040 00000000`00000080 ffff808b`b929f040 00000000`00000001 : nt!ExpWorkerThread+0x105
fffff909`6ea29c10 fffff807`063fd0d8     : ffff9701`f958a180 ffff808b`cb6bb040 fffff807`06317dd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffff909`6ea29c60 00000000`00000000     : fffff909`6ea2a000 fffff909`6ea24000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  rtsuvc+226b73

MODULE_NAME: rtsuvc

IMAGE_NAME:  rtsuvc.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  226b73

FAILURE_BUCKET_ID:  0x4E_9a_rtsuvc!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6d83ce9d-2fd9-f756-e19f-c20fb7e9a1cc}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000045b4e5
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rtsuvc.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8937

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 32989

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 9a

BUGCHECK_P2: 45b4e5

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

LOCK_ADDRESS:  fffff80139e44bc0 -- (!locks fffff80139e44bc0)

Resource @ nt!PiEngineLock (0xfffff80139e44bc0)    Exclusively owned
    Contention Count = 35
     Threads: ffff918c380a3040-01<*>
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff80139e44bc0
    Thread Count  : 1
    Thread address: 0xffff918c380a3040
    Thread wait   : 0x2e221d

STACK_TEXT:
ffffd388`332f3c28 fffff801`3966136f     : 00000000`0000004e 00000000`0000009a 00000000`0045b4e5 00000000`00000006 : nt!KeBugCheckEx
ffffd388`332f3c30 fffff801`394f1f2e     : ffffea48`c6170680 ffffd388`332f3da0 fffff801`00000002 ffffea75`00000000 : nt!MiDeleteNonPagedPoolPte+0x16f30f
ffffd388`332f3ca0 fffff801`394ac256     : 00000000`02000103 00000000`00000000 ffff918c`2a600100 fffff801`394b0d33 : nt!MiClearNonPagedPtes+0x162
ffffd388`332f3ed0 fffff801`394ac07a     : 00000000`00000000 ffffd388`332f4041 ffffffff`ffffff3f 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
ffffd388`332f3f50 fffff801`394ab5c6     : ffffd388`332f409d fffff801`0000010d 00000000`00000010 00000000`00000062 : nt!RtlpHpEnvFreeVA+0x12
ffffd388`332f3f80 fffff801`394b0d33     : fffff801`5b773200 00000000`fffffffa 00000000`0000000a 00000000`fffffffa : nt!RtlpHpFreeVA+0x3a
ffffd388`332f3fc0 fffff801`394b09de     : 00000000`00000000 00000000`ffffff3f 00000000`00000000 00000000`fffff010 : nt!RtlpHpSegMgrCommit+0x1e3
ffffd388`332f4090 fffff801`394b2e01     : ffff918c`00000010 ffff918c`2e000020 ffff918c`00000000 fffff801`000000c1 : nt!RtlpHpSegPageRangeCommit+0x1ee
ffffd388`332f4130 fffff801`394b289b     : ffffffff`ffffffff 00000000`0000000d ffffffff`ffffffff ffff918c`2a5baef0 : nt!RtlpHpSegPageRangeCoalesce+0x1b1
ffffd388`332f41b0 fffff801`3944ce42     : 00000000`00000000 ffff918c`2a6001c0 00000000`2e000000 00000000`00000000 : nt!RtlpHpSegPageRangeShrink+0xeb
ffffd388`332f4220 fffff801`39bb1019     : ffff800b`00000000 ffff918c`3cad4120 fffff801`5281f0e0 01000000`00100000 : nt!ExFreeHeapPool+0x6b2
ffffd388`332f4300 fffff801`5b6b6b73     : ffff918c`2e0109c0 ffff918c`2e0109c0 ffff918c`3cad4120 00000000`00000001 : nt!ExFreePool+0x9
ffffd388`332f4330 ffff918c`2e0109c0     : ffff918c`2e0109c0 ffff918c`3cad4120 00000000`00000001 00000000`00000001 : rtsuvc+0x226b73
ffffd388`332f4338 ffff918c`2e0109c0     : ffff918c`3cad4120 00000000`00000001 00000000`00000001 fffff801`528323bd : 0xffff918c`2e0109c0
ffffd388`332f4340 ffff918c`3cad4120     : 00000000`00000001 00000000`00000001 fffff801`528323bd ffff800b`fd06a590 : 0xffff918c`2e0109c0
ffffd388`332f4348 00000000`00000001     : 00000000`00000001 fffff801`528323bd ffff800b`fd06a590 fffff801`00000000 : 0xffff918c`3cad4120
ffffd388`332f4350 00000000`00000001     : fffff801`528323bd ffff800b`fd06a590 fffff801`00000000 ffff918c`00000000 : 0x1
ffffd388`332f4358 fffff801`528323bd     : ffff800b`fd06a590 fffff801`00000000 ffff918c`00000000 ffffa700`37f40100 : 0x1
ffffd388`332f4360 fffff801`528322d1     : ffff800b`f91a8bb0 ffff800b`fd06a590 ffff800b`fe63c380 00000000`00000017 : ks!KspReleaseDeviceBagEntry+0x9d
ffffd388`332f43a0 fffff801`52846fd9     : ffff918c`343a7e10 fffff801`5281f0e0 00000000`00000000 00000000`00000000 : ks!KspTerminateObjectBag+0xe1
ffffd388`332f43e0 fffff801`52847104     : 00000000`00000001 ffff918c`3494f650 ffff918c`3b34f400 00000000`00000000 : ks!CKsDevice::~CKsDevice+0xa9
ffffd388`332f4410 fffff801`5283926c     : ffff918c`3cad4000 fffff801`39bb1019 00000000`00000000 ffff918c`34484880 : ks!CKsDevice::`vector deleting destructor'+0x14
ffffd388`332f4440 fffff801`52849924     : ffff918c`3cad40d8 ffff918c`00000000 ffff918c`3494f650 ffff918c`3cad40d8 : ks!CBaseUnknown::NonDelegatedRelease+0x3c
ffffd388`332f4480 fffff801`5284a153     : fffff801`5b70a400 00000000`00003c00 00000000`00000000 ffff918c`3cad40d8 : ks!CKsDevice::Release+0x14
ffffd388`332f44b0 fffff801`52836db7     : ffff918c`366dc010 ffff918c`3494f650 ffff918c`366dc560 ffff918c`3494f650 : ks!KsTerminateDevice+0x73
ffffd388`332f44e0 fffff801`39452f55     : ffffd388`332f45e0 ffff918c`34484880 ffff918c`3b34f400 fffff801`39bb1094 : ks!CKsDevice::DispatchPnp+0x4f7
ffffd388`332f4550 fffff801`580915de     : fffff801`00000000 fffff801`3995ba05 00000000`00000000 00000000`00000500 : nt!IofCallDriver+0x55
ffffd388`332f4590 fffff801`58091023     : ffff918c`39fd2820 ffffd388`332f4710 ffff918c`00000000 ffff918c`366dc010 : ksthunk!CKernelFilterDevice::DispatchIrp+0x15a
ffffd388`332f45f0 fffff801`39452f55     : 00000000`00000000 fffff801`394e0ed3 00000000`00000012 00000000`69706e00 : ksthunk!CKernelFilterDevice::DispatchIrpBridge+0x13
ffffd388`332f4620 fffff801`39887bd0     : 00000000`00000000 ffff918c`39fd2820 ffffd388`332f4710 fffff801`3993457c : nt!IofCallDriver+0x55
ffffd388`332f4660 fffff801`39934269     : ffff918c`3b34f400 ffff918c`3b34f400 ffff918c`345dd2e0 00000000`00000002 : nt!IopSynchronousCall+0xf8
ffffd388`332f46d0 fffff801`3956c654     : ffff800c`0312aa10 ffff918c`345dd2e0 00000000`00000001 00000000`0000000a : nt!IopRemoveDevice+0x105
ffffd388`332f4780 fffff801`39933e32     : ffff918c`345dd2e0 00000000`00000000 00000000`00000000 fffff801`39e44ba0 : nt!PnpRemoveLockedDeviceNode+0x1ac
ffffd388`332f47e0 fffff801`39933b67     : ffff918c`345dd2e0 ffffd388`332f4860 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNode+0x4e
ffffd388`332f4820 fffff801`399371ed     : ffff918c`384c2b40 00000000`00000002 ffff918c`36c0df10 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xf7
ffffd388`332f48a0 fffff801`39937484     : 00000000`00000000 ffffd388`332f4920 ffff918c`384c2b40 00000000`00000000 : nt!PipRemoveDevicesInRelationList+0x8d
ffffd388`332f48f0 fffff801`39937325     : ffff918c`36c0df10 00000000`00000001 ffff918c`36c0df10 00000000`00000001 : nt!PnpDelayedRemoveWorker+0x114
ffffd388`332f4930 fffff801`3956d818     : 00000000`00000001 00000000`00000001 00000000`00000000 ffff918c`39a0e6e0 : nt!PnpChainDereferenceComplete+0xfd
ffffd388`332f4960 fffff801`39932a56     : 00000000`00000002 ffffd388`332f4a59 ffff800c`0d0e3cb0 00000000`00000001 : nt!PnpIsChainDereferenced+0xac
ffffd388`332f49e0 fffff801`39930b27     : ffffd388`332f4b20 ffff918c`39a0e600 ffffd388`332f4b00 ffff800c`00000002 : nt!PnpProcessQueryRemoveAndEject+0x28a
ffffd388`332f4ac0 fffff801`3990a41e     : ffff800c`0312aa10 ffff800c`042b6ae0 ffff918c`2aab6a00 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0xeb
ffffd388`332f4af0 fffff801`39425975     : ffff918c`380a3040 ffff918c`380a3040 ffff918c`2aab6a20 ffff918c`3a3d74e0 : nt!PnpDeviceEventWorker+0x2ce
ffffd388`332f4b70 fffff801`39517e25     : ffff918c`380a3040 00000000`00000080 ffff918c`2aa9f040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffd388`332f4c10 fffff801`395fd0d8     : ffffa700`37f8a180 ffff918c`380a3040 fffff801`39517dd0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd388`332f4c60 00000000`00000000     : ffffd388`332f5000 ffffd388`332ef000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  rtsuvc+226b73

MODULE_NAME: rtsuvc

IMAGE_NAME:  rtsuvc.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  226b73

FAILURE_BUCKET_ID:  0x4E_9a_rtsuvc!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6d83ce9d-2fd9-f756-e19f-c20fb7e9a1cc}

Followup:     MachineOwner
---------

Sorununuz çözülürse belirtin, çözülmezse yeni dosyaları paylaşın.
 
Son düzenleme:
Logitech kamerası da harici bir kamera da kullanmıyorum yalnız dahili laptop kamerası mevcut. Dediğiniz gibi sürücüyü kaldırıp önerdiğiniz sürücüyü yükledim ancak 5 kez daha mavi ekran hatası aldım ve şimdi onların da minidump dosyalarını paylaşıyorum. Bir minidump dosyası kopyalanamıyordu onun ve kameramda aldığım hatanın görsellerini ekledim. Kamera hatasını önerdiğiniz sürücüyü yüklemeden önce de alıyordum bazı zamanlar kamera çalışabiliyor.

Link: minidump-driver güncellemesi sonrası.rar
Aldığım son hatalar bunlar;
Link: minidump.rar
 

Dosya Ekleri

  • kamera hatası.jpg
    kamera hatası.jpg
    28,7 KB · Görüntüleme: 19
  • kopyalama.jpg
    kopyalama.jpg
    15 KB · Görüntüleme: 13
Son düzenleme:

Yeni konular

Geri
Yukarı