************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.281 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 44
Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\AseL\Desktop\042425-7031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff807`5f400000 PsLoadedModuleList = 0xfffff807`6002a350
Debug session time: Thu Apr 24 17:39:47.056 2025 (UTC + 3:00)
System Uptime: 0 days 23:24:21.690
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`5f7fdf30 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffd0e`a988b630=000000000000000a
8: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000001f0, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000ff, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8075f6415e7, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1328
Key : Analysis.Elapsed.mSec
Value: 5839
Key : Analysis.IO.Other.Mb
Value: 17
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 19
Key : Analysis.Init.CPU.mSec
Value: 500
Key : Analysis.Init.Elapsed.mSec
Value: 33605
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.Version.DbgEng
Value: 10.0.27829.1001
Key : Analysis.Version.Description
Value: 10.2503.24.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2503.24.1
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Bugcheck.Code.TargetModel
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 0x8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_CODE_AV_nt!PpmIdlePrepare
Key : Failure.Exception.IP.Address
Value: 0xfffff8075f6415e7
Key : Failure.Exception.IP.Module
Value: nt
Key : Failure.Exception.IP.Offset
Value: 0x2415e7
Key : Failure.Hash
Value: {0722116b-c23b-c6c2-0c96-05693152d11a}
BUGCHECK_CODE: a
BUGCHECK_P1: 1f0
BUGCHECK_P2: ff
BUGCHECK_P3: ff
BUGCHECK_P4: fffff8075f6415e7
FILE_IN_CAB: 042425-7031-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
FAULTING_THREAD: ffffc281199f6340
WRITE_ADDRESS: fffff807600fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000000000001f0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffffd0e`a988b628 fffff807`5f8127a9 : 00000000`0000000a 00000000`000001f0 00000000`000000ff 00000000`000000ff : nt!KeBugCheckEx
fffffd0e`a988b630 fffff807`5f80e178 : 00000003`00000000 000000c4`3111a1b6 00000000`00000000 ffffe583`10cbd100 : nt!KiBugCheckDispatch+0x69
fffffd0e`a988b770 fffff807`5f6415e7 : 00000000`00000000 00000000`00989680 00000000`00000000 00000000`02cbad82 : nt!KiPageFault+0x478
fffffd0e`a988b900 fffff807`5f63e6b7 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x167
fffffd0e`a988baf0 fffff807`5f8029e4 : ffffffff`00000000 ffffc281`199f6340 ffffe583`164bb080 00000000`00000948 : nt!PoIdle+0x1f7
fffffd0e`a988bc60 00000000`00000000 : fffffd0e`a988c000 fffffd0e`a9886000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdlePrepare+167
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.5737
STACK_COMMAND: .process /r /p 0xfffff80760124a00; .thread 0xffffc281199f6340 ; kb
BUCKET_ID_FUNC_OFFSET: 167
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdlePrepare
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0722116b-c23b-c6c2-0c96-05693152d11a}
Followup: MachineOwner
---------
8: kd> .process /r /p 0xfffff80760124a00; .thread 0xffffc281199f6340 ; kb
Implicit process is now fffff807`60124a00
Loading User Symbols
Unable to get PEB pointer
Implicit thread is now ffffc281`199f6340
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 fffff807`5f8127a9 : 00000000`0000000a 00000000`000001f0 00000000`000000ff 00000000`000000ff : nt!KeBugCheckEx
01 fffff807`5f80e178 : 00000003`00000000 000000c4`3111a1b6 00000000`00000000 ffffe583`10cbd100 : nt!KiBugCheckDispatch+0x69
02 fffff807`5f6415e7 : 00000000`00000000 00000000`00989680 00000000`00000000 00000000`02cbad82 : nt!KiPageFault+0x478
03 fffff807`5f63e6b7 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdlePrepare+0x167
04 fffff807`5f8029e4 : ffffffff`00000000 ffffc281`199f6340 ffffe583`164bb080 00000000`00000948 : nt!PoIdle+0x1f7
05 00000000`00000000 : fffffd0e`a988c000 fffffd0e`a9886000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
8: kd> .thread /r /p ffffc281199f6340
Implicit thread is now ffffc281`199f6340
Implicit process is now ffffe583`0a8d0080
Loading User Symbols
arkadaslar bunu okuyabilen varsa yardımcı olabilir mi sürekli mavi ekran veriyor hata neyden kaynaklı acaba