Mavi ekran hatası

İşletim sistemi
Windows 10
Katılım
31 Mart 2023
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
4 tane minidump dosyam var.

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to Access'a pageable (or completely invalid) address at an.
İnterrupt request level (IRQL) that is too high. This is usually.
Caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000002, Memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield:
Bit 0: Value 0 = read operation, 1 = write operation.
Bit 3: Value 0 = not an execute operation, 1 = execute operation (only on chips which Support this level of status)
Arg4: FffFF8011DE8EAC7, address which referenced Memory.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 2578.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 2585.

Key: Analysis. IO. Other. MB.
Value: 17.

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 29.

Key: Analysis. Init. CPU. Msec.
Value: 19233.

Key: Analysis. Init. Elapsed. Msec.
Value: 698102.

Key: Analysis. Memory.commitpeak. MB.
Value: 98.

Key: Bugcheck. Code. Dumpheader.
Value: 0xa.

Key: Bugcheck. Code. Register.
Value: 0xa.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Fıle_ın_cab: 032623-13796-01.dmp

Bugcheck_code: A

Bugcheck_p1: 2

Bugcheck_p2: 2

Bugcheck_p3: 0

Bugcheck_p4: FffFF8011DE8EAC7.

Read_address: Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
0000000000000002.

Customer_crash_count: 1

Process_name: GTA5.exe

Trap_frame: FFFFA4803442F730 -- (.trap 0xffffa4803442f730)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000000001 rbx = 0000000000000000 rcx = 0000000000000002.
Rdx = 0000000000000000 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8011DE8EAC7 rsp = FFFFA4803442F8C0 rbp = FFFFA60052E00180.
R8 = 0000000000000000 R9 = 0000000000000000 R10 = FFFFF8011E218800.
R11 = FFFF920458BF55C0 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei pl nzna pe nc.
NT! Kitryunwaitthread+0x1F7:
Fffff801'1de8EAC7 0FB601 movzx eax, byte ptr [rcx] DS: 00000000'00000002=?
Resetting default scope.

Stack_text:
Ffffa480'3442F5E8 fffff801'1E00E129: 00000000'0000000A 00000000'00000002 00000000'00000002 00000000'00000000: NT! Kebugcheckex.
Ffffa480'3442F5F0 fffff801'1E009CE3: Ffffa480'3442F900 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kibugcheckdispatch+0x69
Ffffa480'3442F730 fffff801'1de8EAC7: 00000000'00000001 ffffbd06'FFA413e8 ffffbd06'FFA413e8 00000000'00000000: NT! Kipagefault+0x463
Ffffa480'3442F8C0 fffff801'1de1b713: Ffffbd06'FE7b5060 000000D4'00000000 ffffa600'52e00180 ffffbd06'F5a111C0: NT! Kitryunwaitthread+0x1F7
Ffffa480'3442F920 fffff801'1E2188DB: 00000000'00000000 00000000'00000000 ffffa480'3442FA80 ffffbd06'FE7b5060: NT! Kereleasesemaphore+0xd3
Ffffa480'3442F9A0 fffff801'1E00D8F5: Ffffbd06'F8D0a080 000002D3'fdc4a850 00000000'00000000 ffffbd06'00000001: NT! Ntreleasesemaphore+0x9b
Ffffa480'3442FA00 00007FFE'60b6D204: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x25
000000D4'C21df338 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffe`60b6d204

Symbol_name: NT! Kitryunwaitthread+1F7

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.19041.2728

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: 1F7.

Faılure_bucket_ıd: Av_nt! Kitryunwaitthread.

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {BA6F35C9-2379-7D7D-3C94-4DC6394D2e20}

Followup: Machineowner.
---------

2. minidump.

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, a corrupt pte has been detected. Parameter 2 contains the address of.
The pte. Parameters 3/4 contain the low/high parts of the pte.
Arg2: FFFFF100F4C97500.
Arg3: 0000000000000002.
Arg4: 0000000000000000.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 2812.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 186692.

Key: Analysis. IO. Other. MB.
Value: 19.

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 30.

Key: Analysis. Init. CPU. Msec.
Value: 577.

Key: Analysis. Init. Elapsed. Msec.
Value: 518847.

Key: Analysis. Memory.commitpeak. MB.
Value: 87.

Key: Bugcheck. Code. Dumpheader.
Value: 0x1a.

Key: Bugcheck. Code. Register.
Value: 0x1a.

Key: Memorymanagement. Pfn.
Value: 0

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Fıle_ın_cab: 033123-9593-01.dmp

Bugcheck_code: 1A.

Bugcheck_p1: 41792.

Bugcheck_p2: FFFFF100F4C97500.

Bugcheck_p3: 2

Bugcheck_p4: 0

Memory_corruptor: One_bıt.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: crash_reporter.exe

Stack_text:
Ffffbd83'A1175348 fffff805'22F1ba3a: 00000000'0000001A 00000000'00041792 fffff100'F4C97500 00000000'00000002: NT! Kebugcheckex.
Ffffbd83'A1175350 fffff805'22F1a26F: Ffff860D'7E991940 00000000'00000000 00000000'00000002 00000000'00000000: NT! Mideleteva+0x153a
Ffffbd83'A1175450 fffff805'22F24480: 00000000'00000001 ffffbd83'00000000 ffff860D'7E991790 ffffffff'ffffffff: NT! Mideletepagablepterange+0x48F
Ffffbd83'A1175760 fffff805'232FE339: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Mideletevad+0x360
Ffffbd83'A1175870 fffff805'232FE112: Ffff860D'801C84C0 00000000'00000000 ffff860D'7E9912C0 00000000'00000000: NT! Miunmapvad+0x49
Ffffbd83'A11758A0 fffff805'232fdf89: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Miunmapviewofsection+0x152
Ffffbd83'A1175980 fffff805'2323D0DC: Ffff860D'80050080 0000003F'4E0FE0F0 00000000'00000000 ffff860D'7E9912C0: NT! Ntunmapviewofsectionex+0x99
Ffffbd83'A11759D0 fffff805'2300D8F5: Ffff860D'80050080 00000000'00000000 ffff860D'80050080 00000000'00000000: NT! Ntunmapviewofsection+0xc
Ffffbd83'A1175A00 00007FFD'F3e2D604: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x25
0000003F'4E0fdc78 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffd`f3e2d604

Module_name: Hardware.

Image_name: Memory_corruption.

Stack_command: Cxr. Ecxr; KB.

Faılure_bucket_ıd: Memory_corruptıon_one_bıt

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {e3FAF315-C3D0-81DB-819a-6C43D23C63A7}

Followup: Machineowner.
---------

3. minidump.

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, a corrupt pte has been detected. Parameter 2 contains the address of.
The pte. Parameters 3/4 contain the low/high parts of the pte.
Arg2: FFFFC680F01B8550.
Arg3: 0000000000000002.
Arg4: 0000000000000000.

Debugging details:
------------------

*** Warnıng: Unable to verify checksum for win32k.sys

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 3437.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 149432.

Key: Analysis. IO. Other. MB.
Value: 17.

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 28.

Key: Analysis. Init. CPU. Msec.
Value: 686.

Key: Analysis. Init. Elapsed. Msec.
Value: 539300.

Key: Analysis. Memory.commitpeak. MB.
Value: 98.

Key: Bugcheck. Code. Dumpheader.
Value: 0x1a.

Key: Bugcheck. Code. Register.
Value: 0x1a.

Key: Memorymanagement. Pfn.
Value: 0

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Fıle_ın_cab: 033123-10328-01.dmp

Bugcheck_code: 1A.

Bugcheck_p1: 41792.

Bugcheck_p2: FFFFC680F01B8550.

Bugcheck_p3: 2

Bugcheck_p4: 0

Memory_corruptor: One_bıt.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: crash_reporter.exe

Stack_text:
Ffffed04'36aa6ff8 fffff805'0D51BA3A: 00000000'0000001A 00000000'00041792 ffffc680'F01b8550 00000000'00000002: NT! Kebugcheckex.
Ffffed04'36aa7000 fffff805'0D4a3df6: 00000000'00000000 ffff838D'9A071700 00000000'00000020 ffffc680'F01b8550: NT! Mideleteva+0x153a
Ffffed04'36aa7100 fffff805'0D4a3F0b: Ffffc6e3'00000000 ffff838D'9A071700 ffffed04'00000000 ffffed04'36aa7570: NT! Miwalkpagetablesrecursively+0x776
Ffffed04'36aa71a0 fffff805'0D4a3F0b: Ffffc6e3'71a03C00 ffff838D'9A071700 ffffed04'00000001 ffffed04'36aa7580: NT! Miwalkpagetablesrecursively+0x88b
Ffffed04'36aa7240 fffff805'0D4a3F0b: Ffffc6e3'71a03000 ffff838D'9A071700 ffffed04'00000002 ffffed04'36aa7590: NT! Miwalkpagetablesrecursively+0x88b
Ffffed04'36aa72e0 fffff805'0D476B3B: 00000000'00000000 ffff838D'9A071700 00000000'00000003 ffffed04'36aa75a0: NT! Miwalkpagetablesrecursively+0x88b
Ffffed04'36aa7380 fffff805'0D51A2D1: Ffffed04'36aa7520 ffff838D'00000000 1A000001'00000002 ffff838D'00000000: NT! Miwalkpagetables+0x36b
Ffffed04'36aa7480 fffff805'0D524480: 00000000'00000001 ffffed04'00000000 ffff838D'9A071550 ffffffff'ffffffff: NT! Mideletepagablepterange+0x4F1
Ffffed04'36aa7790 fffff805'0D8FE339: 00000000'00000000 00000000'00000000 000001E0'00000000 00000000'00000000: NT! Mideletevad+0x360
Ffffed04'36aa78a0 fffff805'0D8FE112: Ffff838D'9B5707E0 00000000'00000000 ffff838D'9A071080 00000000'00000000: NT! Miunmapvad+0x49
Ffffed04'36aa78D0 fffff805'0D8fdf89: Ffff0ab8'B50C7363 000000CF'66cfe000 00000000'00000002 00000000'00000000: NT! Miunmapviewofsection+0x152
Ffffed04'36aa79b0 fffff805'0D60D8F5: Ffff838D'9785C080 000001E0'36fc0000 ffffed04'36aa7a80 ffff838D'9A071080: NT! Ntunmapviewofsectionex+0x99
Ffffed04'36aa7a00 00007FFE'CF9D0a34: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x25
000000CF'66cfe328 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffe`cf9d0a34

Module_name: Hardware.

Image_name: Memory_corruption.

Stack_command: Cxr. Ecxr; KB.

Faılure_bucket_ıd: Memory_corruptıon_one_bıt

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {e3FAF315-C3D0-81DB-819a-6C43D23C63A7}

Followup: Machineowner.
---------

Ve son olarak 4. minidump.

DRIVER_IRQL_NOT_LESS_OR_EQUAL (D1)
An attempt was made to Access'a pageable (or completely invalid) address at an.
İnterrupt request level (IRQL) that is too high. This is usually.
Caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000062, Memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, Value 0 = read operation, 1 = write operation.
Arg4: FffFF801753305BF, address which referenced Memory.

Debugging details:
------------------

*** Warnıng: Unable to verify checksum for win32k.sys

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4499.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 80295.

Key: Analysis. IO. Other. MB.
Value: 14.

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 22.

Key: Analysis. Init. CPU. Msec.
Value: 609.

Key: Analysis. Init. Elapsed. Msec.
Value: 646825.

Key: Analysis. Memory.commitpeak. MB.
Value: 98.

Key: Bugcheck. Code. Dumpheader.
Value: 0xd1.

Key: Bugcheck. Code. Register.
Value: 0xa.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Fıle_ın_cab: 033123-21093-01.dmp

Bugcheck_code: D1.

Bugcheck_p1: 62.

Bugcheck_p2: 2

Bugcheck_p3: 0

Bugcheck_p4: FffFF801753305BF.

Read_address: FffFF801774fb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
0000000000000062.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: System.

Trap_frame: FFFFB90D1D2A8850 -- (.trap 0xffffb90d1d2a8850)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000000420 rbx = 0000000000000000 rcx = 0000000000000002.
Rdx = 0000000000000001 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF801753305BF rsp = fffFB90D1D2a89e0 rbp = FFFF8084C214D000.
R8 = 0000000000000000 R9 = 0000000000000000 R10 = 0000000000000000.
R11 = fffFB90D1D2a8A60 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna pe nc.
Dxgmms2! Vidschidecrementcontextreference+0XF:
Fffff801'753305BF 488B4160 mov rax, qword ptr [rcx+60h] DS: 00000000'00000062=?
Resetting default scope.

Stack_text:
Ffffb90D'1D2a8708 fffff801'76C0e129: 00000000'0000000A 00000000'00000062 00000000'00000002 00000000'00000000: NT! Kebugcheckex.
Ffffb90D'1D2a8710 fffff801'76C09CE3: 00000000'00000000 00000000'00000000 00000000'00000000 fffff801'76bfb743: NT! Kibugcheckdispatch+0x69
Ffffb90D'1D2a8850 fffff801'753305BF: 00000000'00000000 00000000'00000000 ffff8084'C214D000 fffff801'76C1a4b8: NT! Kipagefault+0x463
Ffffb90D'1D2a89e0 fffff801'75340766: 00000000'00000000 ffffb90D'1D2a8a30 00000000'00000000 00000000'00000000: Dxgmms2! Vidschidecrementcontextreference+0XF
Ffffb90D'1D2a8a30 fffff801'753ad480: Ffff8084'D0b26010 ffff8084'C8b40010 ffff8084'D0077BF0 00000000'00000000: Dxgmms2! Vidschisettransfercontextrunningtime+0xcba6
Ffffb90D'1D2a8a80 fffff801'753ad3ba: Ffff8084'C214D400 fffff801'753ad2F0 ffff8084'C214D000 ffffd000'A278A100: Dxgmms2! Vidschirun_prioritytable+0xb0
Ffffb90D'1D2a8ad0 fffff801'76A55485: Ffff8084'C2150280 fffff801'00000001 ffff8084'C214D000 000fa4ef'BD9bbfff: Dxgmms2! Vidschiworkerthread+0xca
Ffffb90D'1D2a8B10 fffff801'76C02D48: Ffffd000'A278A180 ffff8084'C2150280 fffff801'76A55430 05b98b88'0000005A: NT! Pspsystemthreadstartup+0x55
Ffffb90D'1D2a8b60 00000000'00000000: Ffffb90D'1D2A9000 ffffb90D'1D2a2000 00000000'00000000 00000000'00000000: NT! Kistartsystemthread+0x28

Symbol_name: Dxgmms2! Vidschidecrementcontextreference+F

Module_name: Dxgmms2.

Image_name: dxgmms2.sys

Image_versıon: 10.0.19041.2728

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: F

Faılure_bucket_ıd: Av_dxgmms2! Vidschidecrementcontextreference

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {beedad14-AB83-F135-D3A5-98DF814C1595}

Followup: Machineowner.
---------
 
Son düzenleyen: Moderatör:

Technopat Haberler

Yeni konular

Geri
Yukarı