Çözüldü Valorant'a girince mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10
Çözüm
Evet şimdi bir problem yok.

* BIOS güncel.
* Ekran kartı sürücüleri ile alakalı bir problem var gibi.

* Ekran kartı sürücünüz 17 Mart 2023'ten kalma.
Rich (BB code):
    Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispig.inf_amd64_50916785244854f2\nvlddmkm.sys
    Image name: nvlddmkm.sys
    Browse all global symbols  functions  data
    Timestamp:        Fri Mar 17 02:16:07 2023 (6413A337)
    CheckSum:         037956CA
    ImageSize:        03897000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:


* İlk etapta onu güncelleyerek başlayın.
* Garanti olsun diyorsanız Rehber: DDU ile Sürücü Kaldırma Rehberi bu rehberi takip ederek sürücüleri temizleyin ve yenisini yükleyin.
* Zorunlu değil, ama öneririm.

Güncel sürüm:


Ekran kartı sürücü güncellemesinden sonra mavi ekran alırsanız yeni minidump dosyalarınızı paylaşın.



* Buradan sonrasını yapmasanız da olur, genel performans ve güncel olmak adına öneriyorum.

* Ses sürücünüz eski kalmış, güncelleyebilirsiniz.

SSD'niz Adata Legend 700 512GBPCIe Gen3 x4 M.2 NVMe SSD mi?

* Adata'nın yazılımı var mı sistemde? Varsa firmware güncellemelerini kontrol edin.
* Yoksa indirip kurun, firmware güncellemesi var mı diye bir bakın.
* Sağlığını da bir kontrol edin.
ADATA SSD ToolBox


* Windows eski görünüyor. Bazen dökümlerden güncel mi değil mi anlaşılmıyor, güncel değilse Windows Update aracılığıyla güncelleyin işletim sisteminizi.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa9405d6bf558, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8064be57804, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1499

    Key  : Analysis.Elapsed.mSec
    Value: 4078

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9793

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 137

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_nt!ExpAllocateHandleTableEntry

    Key  : Failure.Hash
    Value: {057ca722-8246-3c91-57a3-2501ef38bce9}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa9405d6bf558

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8064be57804

BUGCHECK_P4: 2

FILE_IN_CAB:  060423-7359-01.dmp.dmp

READ_ADDRESS: fffff8064c4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa9405d6bf558

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  StartMenuExperienceHost.exe

TRAP_FRAME:  ffffa202b34474a0 -- (.trap 0xffffa202b34474a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff920b731832c0
rdx=ffffa9005aec5b40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064be57804 rsp=ffffa202b3447630 rbp=0000000000000008
 r8=ffffa202b3447640  r9=0000000000000000 r10=0000000000000000
r11=ffffa900619914b6 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpAllocateHandleTableEntry+0xe4:
fffff806`4be57804 498b4708        mov     rax,qword ptr [r15+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffffa202`b34471f8 fffff806`4bc4af53     : 00000000`00000050 ffffa940`5d6bf558 00000000`00000000 ffffa202`b34474a0 : nt!KeBugCheckEx
ffffa202`b3447200 fffff806`4ba6e7b0     : 00000000`00000000 00000000`00000000 ffffa202`b3447520 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffa202`b3447300 fffff806`4bc0bad8     : ffffa900`619d4030 ffffa202`b34476a0 ffffa900`5d606980 ffffa202`b34477f0 : nt!MmAccessFault+0x400
ffffa202`b34474a0 fffff806`4be57804     : ffffa900`5aec5b40 00000000`00000001 00000000`00000000 00000000`00000006 : nt!KiPageFault+0x358
ffffa202`b3447630 fffff806`4be576a8     : 00000000`00000400 00000000`00000000 ffffa900`5aec5b00 ffff920b`731832c0 : nt!ExpAllocateHandleTableEntry+0xe4
ffffa202`b3447680 fffff806`4becebd6     : 00000000`00000000 00000000`00000000 ffffa202`b3447ac0 ffff920b`00000000 : nt!ExCreateHandleEx+0x78
ffffa202`b34476d0 fffff806`4ba33d8c     : 00000000`00000000 ffffa900`61991450 00000000`00000000 0000004f`c8cfd1d0 : nt!RtlpInsertStringAtom+0x2a
ffffa202`b3447710 fffff806`4bec4034     : ffffa900`5aed6630 00000000`00000026 0000004f`c8cfd1c0 0000004f`c8cfd1c0 : nt!RtlAddAtomToAtomTableEx+0x13c
ffffa202`b34477b0 fffff806`4bc0f7f5     : ffff920b`731832c0 000001ea`75350000 ffffa202`b3447ac0 ffff920b`730a3080 : nt!NtAddAtomEx+0x124
ffffa202`b3447a40 00007fff`0a98ddc4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004f`c8cfd118 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0a98ddc4


SYMBOL_NAME:  nt!ExpAllocateHandleTableEntry+e4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.3031

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  AV_R_(null)_nt!ExpAllocateHandleTableEntry

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {057ca722-8246-3c91-57a3-2501ef38bce9}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff9f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8059da8cda6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1531

    Key  : Analysis.Elapsed.mSec
    Value: 4122

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 187

    Key  : Analysis.Init.Elapsed.mSec
    Value: 22410

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_dxgmms2!VidSchiProfilePerformanceTick

    Key  : Failure.Hash
    Value: {cb0b1289-fb87-52e2-f284-4f9f64401311}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffffffffffff9f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8059da8cda6

FILE_IN_CAB:  060423-7125-01.dmp.dmp

READ_ADDRESS: fffff805650fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffff9f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffff8806cca8a1e0 -- (.trap 0xffff8806cca8a1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=3e2f5f2515890000
rdx=000000000000000e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8059da8cda6 rsp=ffff8806cca8a370 rbp=0000000000000000
 r8=ffff8806cca89ee0  r9=0000000000000000 r10=0000000000000000
r11=fffff8059dab2680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
dxgmms2!VidSchiProfilePerformanceTick+0x12926:
fffff805`9da8cda6 4c8b559f        mov     r10,qword ptr [rbp-61h] ss:0018:ffffffff`ffffff9f=????????????????
Resetting default scope

STACK_TEXT:
ffff8806`cca8a098 fffff805`64810029     : 00000000`0000000a ffffffff`ffffff9f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8806`cca8a0a0 fffff805`6480bbe3     : 00000000`00000000 fffff805`9da93d62 00000000`00000000 fffff805`7f2cd5cf : nt!KiBugCheckDispatch+0x69
ffff8806`cca8a1e0 fffff805`9da8cda6     : ffffca03`bd5b9000 00000000`00000001 ffff8806`cca8a418 ffffca03`c5f5a240 : nt!KiPageFault+0x463
ffff8806`cca8a370 fffff805`9daabf1c     : ffffca03`c2bfc630 ffff8806`cca8a4b4 ffffca03`c693f010 ffffca03`bd5b9000 : dxgmms2!VidSchiProfilePerformanceTick+0x12926
ffff8806`cca8a490 fffff805`9daaa0ca     : ffffca03`c693f010 ffffca03`bd561000 ffffca03`c693f120 ffffca03`c2d99010 : dxgmms2!VidSchiSubmitCommandPacketToHwQueue+0xc8
ffff8806`cca8a510 fffff805`7f4fee0c     : 00000000`00000000 00000000`00000000 00000000`08000000 ffffca03`c2d99010 : dxgmms2!VidSchSubmitCommandToHwQueue+0x2da
ffff8806`cca8a570 fffff805`7f501c6a     : ffff8806`cca8aac0 ffff8806`cca8a908 ffff8806`cca8a908 ffff8806`cca8a941 : dxgkrnl!DXGHWQUEUE::SubmitCommand+0x5d4
ffff8806`cca8a880 fffff805`7f5018db     : 000000a6`79ccfa80 ffffca03`c4ace080 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueueInternal+0x382
ffff8806`cca8aa10 fffff805`6480ff9a     : ffffca03`c4ace080 ffffca03`c36e82e0 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueue+0xb
ffff8806`cca8aa40 00007ffc`aa5e5b04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000a6`79ccf9e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`aa5e5b04


SYMBOL_NAME:  dxgmms2!VidSchiProfilePerformanceTick+12926

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  12926

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiProfilePerformanceTick

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {cb0b1289-fb87-52e2-f284-4f9f64401311}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa40d609a1378, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff804e473220b, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 1437

    Key  : Analysis.Elapsed.mSec
    Value: 3899

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13946

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 134

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Failure.Bucket
    Value: AV_R_(null)_WdNisDrv!unknown_function

    Key  : Failure.Hash
    Value: {277a463a-5282-a91c-e1d6-c17eaf8303e7}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa40d609a1378

BUGCHECK_P2: 0

BUGCHECK_P3: fffff804e473220b

BUGCHECK_P4: 2

FILE_IN_CAB:  060423-7390-01.dmp.dmp

READ_ADDRESS: fffff8046d2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa40d609a1378

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffffb58d5332d980 -- (.trap 0xffffb58d5332d980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa40f5feb8480 rbx=0000000000000000 rcx=0000000000000136
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804e473220b rsp=ffffb58d5332db10 rbp=ffffb58d5332dc60
 r8=ffffb58d5332db80  r9=0000000000000108 r10=ffffa40d609a1350
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
WdNisDrv+0x220b:
fffff804`e473220b 418b7a28        mov     edi,dword ptr [r10+28h] ds:ffffa40d`609a1378=????????
Resetting default scope

STACK_TEXT:
ffffb58d`5332d6d8 fffff804`6ca4af53     : 00000000`00000050 ffffa40d`609a1378 00000000`00000000 ffffb58d`5332d980 : nt!KeBugCheckEx
ffffb58d`5332d6e0 fffff804`6c86e7b0     : 00000000`00000008 00000000`00000000 ffffb58d`5332da00 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffb58d`5332d7e0 fffff804`6ca0bad8     : ffffa40f`627dc790 ffffa40f`627dc790 ffffa40f`627d020c 00000000`00000000 : nt!MmAccessFault+0x400
ffffb58d`5332d980 fffff804`e473220b     : ffffb58d`5332db98 ffffb58d`5332db90 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
ffffb58d`5332db10 ffffb58d`5332db98     : ffffb58d`5332db90 00000000`00000000 00000000`00000000 00000000`00000000 : WdNisDrv+0x220b
ffffb58d`5332db18 ffffb58d`5332db90     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xffffb58d`5332db98
ffffb58d`5332db20 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa40f`627d020c : 0xffffb58d`5332db90


SYMBOL_NAME:  WdNisDrv+220b

MODULE_NAME: WdNisDrv

IMAGE_NAME:  WdNisDrv.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  220b

FAILURE_BUCKET_ID:  AV_R_(null)_WdNisDrv!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {277a463a-5282-a91c-e1d6-c17eaf8303e7}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc40a62bc92b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021f6b4694, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1593

    Key  : Analysis.Elapsed.mSec
    Value: 3467

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 186

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11339

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 145

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa

    Key  : Failure.Bucket
    Value: AV_nt!MiGetPageProtection

    Key  : Failure.Hash
    Value: {41372a35-237d-1281-82f6-8f5f9bf6044a}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffffc40a62bc92b0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8021f6b4694

FILE_IN_CAB:  060223-7812-01.dmp.dmp

READ_ADDRESS: fffff802200fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc40a62bc92b0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WmiPrvSE.exe

TRAP_FRAME:  ffffec854bb872f0 -- (.trap 0xffffec854bb872f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40a62bc92b0 rbx=0000000000000000 rcx=00000000ffffffff
rdx=00000000000003ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021f6b4694 rsp=ffffec854bb87480 rbp=0000000000000000
 r8=ffffec854bb87558  r9=ffffec854bb87554 r10=fffff77bbddee7f8
r11=fffff77bbddee000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiGetPageProtection+0x4d4:
fffff802`1f6b4694 488b08          mov     rcx,qword ptr [rax] ds:ffffc40a`62bc92b0=????????????????
Resetting default scope

STACK_TEXT:
ffffec85`4bb871a8 fffff802`1f810029     : 00000000`0000000a ffffc40a`62bc92b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffec85`4bb871b0 fffff802`1f80bbe3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffec85`4bb872f0 fffff802`1f6b4694     : 0000007f`fffffff8 00000000`00000000 ffff8802`e740e038 00000000`00000000 : nt!KiPageFault+0x463
ffffec85`4bb87480 fffff802`1f6b3005     : 00000000`00000000 00000000`00000000 ffffec85`4bb87558 ffffec85`4bb87554 : nt!MiGetPageProtection+0x4d4
ffffec85`4bb87500 fffff802`1f62c2bf     : 00000000`00000000 0000024f`76e60000 c40263f5`b050ff4d 00000000`00001400 : nt!MiQueryAddressState+0x4b5
ffffec85`4bb87710 fffff802`1fa22a6c     : ffffec85`4bb80000 00000000`00000000 ffffc402`00000000 ffffc402`00000000 : nt!MiQueryAddressSpan+0xcf
ffffec85`4bb877d0 fffff802`1fa22215     : ffffeb03`b6b8ca6c 00000000`00000000 00000192`99f5e7c0 00000000`00001634 : nt!MmQueryVirtualMemory+0x83c
ffffec85`4bb87980 fffff802`1f80f7f5     : 00000000`00000000 00000192`99f5e7b8 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
ffffec85`4bb879d0 00007fff`60e8d514     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004c`6197d3e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`60e8d514


SYMBOL_NAME:  nt!MiGetPageProtection+4d4

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.3031

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  4d4

FAILURE_BUCKET_ID:  AV_nt!MiGetPageProtection

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {41372a35-237d-1281-82f6-8f5f9bf6044a}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8006c063d37, Address of the instruction which caused the BugCheck
Arg3: ffffc686ae06e1b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1530

    Key  : Analysis.Elapsed.mSec
    Value: 5004

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 202

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12901

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 154

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Failure.Bucket
    Value: AV_dxgmms2!McGenEventWrite_EtwWriteTransfer

    Key  : Failure.Hash
    Value: {5f66c0bb-d30c-22d8-775d-3fe51eb41150}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8006c063d37

BUGCHECK_P3: ffffc686ae06e1b0

BUGCHECK_P4: 0

FILE_IN_CAB:  060123-7531-01.dmp.dmp

CONTEXT:  ffffc686ae06e1b0 -- (.cxr 0xffffc686ae06e1b0)
rax=0000000000000002 rbx=0000000000000000 rcx=ffff908ad6514310
rdx=fffff8006c082d50 rsi=0000000000000004 rdi=ffff908a83ca2520
rip=fffff8006c063d37 rsp=ffffc686ae06ebb0 rbp=ffffc686ae06ec59
 r8=ffffc686ae06ec20  r9=0000000000000006 r10=0000000000002df4
r11=0000000000000006 r12=0000000000000000 r13=0000000000160000
r14=ffff908a83ca2548 r15=0000000000160000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27:
fffff800`6c063d37 450fb70a        movzx   r9d,word ptr [r10] ds:002b:00000000`00002df4=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

STACK_TEXT:
ffffc686`ae06ebb0 fffff800`6c067e27     : 00000000`00000000 ffffc686`ae06fa40 00000000`00000004 00000000`00802000 : dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27
ffffc686`ae06ebf0 fffff800`6c0d6b20     : ffff908a`83ca2520 00000000`00010001 00000000`00000004 0000020b`a7d20000 : dxgmms2!McTemplateK0pxqqt_EtwWriteTransfer+0x8b
ffffc686`ae06eca0 fffff800`6c0a0292     : ffffc686`ae06edf0 00000000`02000000 ffff908a`83ca2520 fffff800`6c063d62 : dxgmms2!VIDMM_RECYCLE_BLOCK::Allocate+0x36860
ffffc686`ae06ed00 fffff800`6c0a05da     : 00000000`00000000 00000000`00010000 ffffe084`dd3ac978 ffffe084`dd3ac920 : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockForType+0x66
ffffc686`ae06ed30 fffff800`6c0a1fa8     : 00000000`00000000 00000000`00010000 00000000`00000001 ffffc686`0000001c : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockAndRange+0x42
ffffc686`ae06eda0 fffff800`6c0a1d87     : ffffe084`dd3ac978 00000000`00160000 00000000`00000001 ffffc686`ae06ef70 : dxgmms2!VIDMM_RECYCLE_HEAP::Allocate+0x128
ffffc686`ae06ee70 fffff800`6c0ba1c8     : ffffe084`ce010300 00000000`00000000 ffffe084`ce013900 00000000`00000002 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Allocate+0x127
ffffc686`ae06ef00 fffff800`6c0b9b36     : 00000000`00000001 00000000`33306956 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::CommitLocalBackingStore+0x498
ffffc686`ae06f000 fffff800`6c0b91fd     : ffffe084`e2e87490 00000000`00000002 ffffb600`00000000 ffff908a`db8f0010 : dxgmms2!VIDMM_GLOBAL::OpenLocalAllocation+0x116
ffffc686`ae06f0c0 fffff800`6c0b8d96     : ffffc686`ae06f388 ffffe084`e39adbd0 ffff908a`db8f0010 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::OpenOneAllocation+0x42d
ffffc686`ae06f240 fffff800`6c052523     : 00000000`00000000 00000000`01001002 00000000`00000000 ffffc686`00000005 : dxgmms2!VIDMM_GLOBAL::OpenAllocation+0x52
ffffc686`ae06f290 fffff800`4e55067e     : 00000000`00000000 fffff692`9fee79ff ffff908a`851055c0 00000000`00000000 : dxgmms2!VidMmOpenAllocation+0x53
ffffc686`ae06f2f0 fffff800`4e4f3a9e     : 00000000`00000000 ffffc686`ae06f830 ffff908a`80598860 ffff908a`80598b30 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations+0x8ee
ffffc686`ae06f400 fffff800`4e4f01f3     : ffffe084`d8b96c30 ffffc686`ae06fac0 00000000`00000000 ffff908a`88d2a820 : dxgkrnl!DXGDEVICE::CreateAllocation+0x124e
ffffc686`ae06f770 fffff800`4e5574ed     : ffffe084`ddac0f34 00000000`00501802 ffffe084`ddac35c0 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0xbd3
ffffc686`ae06fa00 fffff800`3440ff9a     : ffffe084`ddac35c0 ffffe084`e2cc5260 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkCreateAllocation+0xd
ffffc686`ae06fa40 00007ff8`f7d94784     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000ea`f2bdb258 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f7d94784


SYMBOL_NAME:  dxgmms2!McGenEventWrite_EtwWriteTransfer+27

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr 0xffffc686ae06e1b0 ; kb

BUCKET_ID_FUNC_OFFSET:  27

FAILURE_BUCKET_ID:  AV_dxgmms2!McGenEventWrite_EtwWriteTransfer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5f66c0bb-d30c-22d8-775d-3fe51eb41150}

Followup:     MachineOwner
---------

Yeni konular

Geri
Yukarı