BerkeT
Megapat
- Katılım
- 7 Ağustos 2016
- Mesajlar
- 84
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
Merhaba,
MEmu kullandığımda bir süre sonra bazen 1 saat bazen 3 saat sonra mavi ekran hatası alıyorum.
Dump dosyası:
MEmu kullandığımda bir süre sonra bazen 1 saat bazen 3 saat sonra mavi ekran hatası alıyorum.
Dump dosyası:
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.109 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 43
Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\BerkeTuncsiper\Desktop\minidump\030825-23109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff800`d5a00000 PsLoadedModuleList = 0xfffff800`d68f4770
Debug session time: Sat Mar 8 02:42:28.502 2025 (UTC + 3:00)
System Uptime: 0 days 12:49:38.315
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................................................
.......
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00639018). Type ".hh dbgerr001" for details
Loading unloaded module list
..............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`d5eb8460 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff507`4ac91ed0=000000000000000a
2: kd> !analyze -v
*******************************************************************************
*
Bugcheck Analysis *
*
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000089b0504, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8008963e866, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3812
Key : Analysis.Elapsed.mSec
Value: 11585
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 1062
Key : Analysis.Init.Elapsed.mSec
Value: 10133
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.Version.DbgEng
Value: 10.0.27793.1000
Key : Analysis.Version.Description
Value: 10.2410.02.02 amd64fre
Key : Analysis.Version.Ext
Value: 1.2410.2.2
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_HPVR0!unknown_function
Key : Failure.Exception.IP.Address
Value: 0xfffff8008963e866
Key : Failure.Exception.IP.Module
Value: HPVR0
Key : Failure.Exception.IP.Offset
Value: 0xae866
Key : Failure.Hash
Value: {e497b095-5e4f-bcf6-67a9-cafdce39d07e}
BUGCHECK_CODE: d1
BUGCHECK_P1: 89b0504
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8008963e866
FILE_IN_CAB: 030825-23109-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffa802052450c0
WRITE_ADDRESS: fffff800d69c34b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000089b0504
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MEmuHeadless.e
TRAP_FRAME: fffff5074ac92010 -- (.trap 0xfffff5074ac92010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008843b000 rbx=0000000000000000 rcx=00000000089b04e0
rdx=000ffffffffff000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8008963e866 rsp=fffff5074ac921a0 rbp=000000008843b80a
r8=000000008843b80a r9=000000008843b80a r10=ffffbf8077740000
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
HPVR0+0xae866:
fffff800`8963e866 ff4124 inc dword ptr [rcx+24h] ds:00000000`089b0504=00000000
Resetting default scope
STACK_TEXT:
fffff507`4ac91ec8 fffff800`d608cee9 : 00000000`0000000a 00000000`089b0504 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff507`4ac91ed0 fffff800`d60881a8 : 024fa4ef`bd9bbfff fffff800`d6080eec fffff800`d6815340 ffffa802`052450c0 : nt!KiBugCheckDispatch+0x69
fffff507`4ac92010 fffff800`8963e866 : 00000000`00001000 ffffffff`a123b80a ffffffff`a123b80a 00000000`8843b80a : nt!KiPageFault+0x468
fffff507`4ac921a0 00000000`00001000 : ffffffff`a123b80a ffffffff`a123b80a 00000000`8843b80a 00000100`00000001 : HPVR0+0xae866
fffff507`4ac921a8 ffffffff`a123b80a : ffffffff`a123b80a 00000000`8843b80a 00000100`00000001 00000000`00000000 : 0x1000
fffff507`4ac921b0 ffffffff`a123b80a : 00000000`8843b80a 00000100`00000001 00000000`00000000 00000000`3376e000 : 0xffffffff`a123b80a
fffff507`4ac921b8 00000000`8843b80a : 00000100`00000001 00000000`00000000 00000000`3376e000 00000000`3376eff8 : 0xffffffff`a123b80a
fffff507`4ac921c0 00000100`00000001 : 00000000`00000000 00000000`3376e000 00000000`3376eff8 00000000`00000000 : 0x8843b80a
fffff507`4ac921c8 00000000`00000000 : 00000000`3376e000 00000000`3376eff8 00000000`00000000 00000000`33770000 : 0x00000100`00000001
SYMBOL_NAME: HPVR0+ae866
MODULE_NAME: HPVR0
IMAGE_NAME: HPVR0.r0
STACK_COMMAND: .process /r /p 0xffffa801f4cbb0c0; .thread 0xffffa802052450c0 ; kb
BUCKET_ID_FUNC_OFFSET: ae866
FAILURE_BUCKET_ID: AV_HPVR0!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e497b095-5e4f-bcf6-67a9-cafdce39d07e}
Followup: MachineOwner
---------
Son düzenleyen: Moderatör: