Devran İ.
Decapat
- Katılım
- 19 Mayıs 2019
- Mesajlar
- 59
Son zamanlarda sıkça mavi ekran almaya başladım ve nedenini bilmiyorum, bilgisi olan varsa yardımcı olursa sevinirim.
Minidump dosyası: Yeni_WinRAR_arsivi
Minidump dosyası: Yeni_WinRAR_arsivi
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ff95af97d00
Arg3: 000000000000001d
Arg4: ffff858cbdba6b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5968
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10545
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ff95af97d00
BUGCHECK_P3: 1d
BUGCHECK_P4: ffff858cbdba6b00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffff858c`bdba6958 fffff807`0aa72c08 : 00000000`0000001a 00000000`00061941 00007ff9`5af97d00 00000000`0000001d : nt!KeBugCheckEx
ffff858c`bdba6960 fffff807`0aa0205e : ffff8f8f`a6164080 ffff8f8f`a7bcee60 00000000`00000000 ffff858c`bdba6b80 : nt!MmAccessFault+0x184488
ffff858c`bdba6b00 00007ff9`5af97d00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000d3`f71ffb38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`5af97d00
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80047fa71ac, Address of the instruction which caused the bugcheck
Arg3: fffffc05a26c9ac0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7984
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8040
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff80047fa71ac
BUGCHECK_P3: fffffc05a26c9ac0
BUGCHECK_P4: 0
CONTEXT: fffffc05a26c9ac0 -- (.cxr 0xfffffc05a26c9ac0)
rax=0000000000000010 rbx=ffff8007d1daea70 rcx=ffff8007d1daea70
rdx=ffff8007d69385c0 rsi=0000000000000000 rdi=00000000c0000016
rip=fffff80047fa71ac rsp=fffffc05a26ca4c8 rbp=fffffc05a26ca629
r8=ffff8007cc479101 r9=0000000000000000 r10=ffff8007cc7e35a0
r11=fffff80047fa0000 r12=ffffffff80000005 r13=0000000000000000
r14=ffff8007d69385c0 r15=ffff8007d5dbc320
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00040246
FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x76c:
fffff800`47fa71ac cc int 3
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
fffffc05`a26ca4c8 fffff800`47fa5052 : ffff8007`d1daea00 fffff800`49c69e00 ffff8007`d42f4080 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x76c
fffffc05`a26ca4d0 fffff800`47fa43bc : fffffc05`a26c5000 fffffc05`a26cb000 ffffffff`80000005 00000000`00000000 : FLTMGR!FltpPassThroughCompletionWorker+0x132
fffffc05`a26ca570 fffff800`49cc310e : ffff8007`00000000 ffff8007`d69385c0 000d21ef`9dffffff 00000000`d4fb56ff : FLTMGR!FltpPassThroughCompletion+0xc
fffffc05`a26ca5a0 fffff800`49cc2fd7 : ffff8007`d4eff301 00000000`00000002 ffff8007`d69385c0 ffff8007`d69385c0 : nt!IopfCompleteRequest+0x11e
fffffc05`a26ca690 fffff800`5869c871 : ffff8007`ccb62060 00000000`00000000 ffff8007`d4eff350 ffff8007`d69386d8 : nt!IofCompleteRequest+0x17
fffffc05`a26ca6c0 fffff800`49ccd805 : ffff8007`d1daea70 fffff800`47fa4b46 fffffc05`a26cb000 fffffc05`a26c5000 : Npfs!NpFsdFileSystemControl+0x51
fffffc05`a26ca6f0 fffff800`47fa6ccf : ffff8007`d4386080 00000000`00000000 fffff800`46f75180 fffffc05`a26caa78 : nt!IofCallDriver+0x55
fffffc05`a26ca730 fffff800`47fdcaf4 : fffffc05`a26ca7c0 ffff8007`d4eff350 00000000`000000e0 fffff800`4a0efe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffc05`a26ca7a0 fffff800`49ccd805 : fffff800`0000000a ffff8007`d69385c0 00000000`00000002 00000000`00000001 : FLTMGR!FltpFsControl+0x104
fffffc05`a26ca800 fffff800`4a0c2528 : ffff8007`d69385c0 00000000`00000000 00000000`00000000 ffff8007`d42f4080 : nt!IofCallDriver+0x55
fffffc05`a26ca840 fffff800`4a0c1df5 : 00000000`0011400c fffffc05`a26cab80 00000000`00040005 fffffc05`a26cab80 : nt!IopSynchronousServiceTail+0x1a8
fffffc05`a26ca8e0 fffff800`4a06c486 : 00000000`00000000 00000000`00000c18 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x5e5
fffffc05`a26caa20 fffff800`49e05fb8 : ffff8007`d4386080 00000000`0045e168 fffffc05`a26caaa8 00000000`00000000 : nt!NtFsControlFile+0x56
fffffc05`a26caa90 00000000`76f81cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0045ea78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f81cfc
SYMBOL_NAME: Npfs!NpFsdFileSystemControl+51
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr 0xfffffc05a26c9ac0 ; kb
BUCKET_ID_FUNC_OFFSET: 51
FAILURE_BUCKET_ID: 0x3B_80000003_Npfs!NpFsdFileSystemControl
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1941d3b4-e158-2b6f-e741-b67efa73c94c}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffaf0e00000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8000cb83808, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 23189
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffaf0e00000000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8000cb83808
READ_ADDRESS: fffff80008cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80008c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80008c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffaf0e00000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffffaf0e2f138a80 -- (.trap 0xffffaf0e2f138a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff870e25992010 rbx=0000000000000000 rcx=0000000000000001
rdx=ffff870e2c011460 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000cb83808 rsp=ffffaf0e2f138c10 rbp=ffffaf0e2f138d10
r8=0000000000000c42 r9=ffff870e2c8b2010 r10=0000000000000000
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
tcpip!WFPDatagramDataShimV4+0x2f4:
fffff800`0cb83808 498b06 mov rax,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffaf0e`2f138938 fffff800`08406569 : 00000000`0000000a ffffaf0e`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaf0e`2f138940 fffff800`08402869 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaf0e`2f138a80 fffff800`0cb83808 : 00000000`00000072 15e14d9e`2d5a4f00 ffff870e`256dd950 00000000`00000001 : nt!KiPageFault+0x469
ffffaf0e`2f138c10 fffff800`0cb1b97d : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000004 : tcpip!WFPDatagramDataShimV4+0x2f4
ffffaf0e`2f139050 fffff800`0ca9fb43 : ffff870e`25908d20 fffff800`0cdd1010 fffff800`0b874f90 fffff800`0b8758e8 : tcpip!ProcessALEForTransportPacket+0x7b54d
ffffaf0e`2f139220 fffff800`0ca941ad : 00000000`0000ff02 00000000`00000000 00000000`00010224 fffff800`085b33d0 : tcpip!WfpProcessOutTransportStackIndication+0x4db
ffffaf0e`2f139550 fffff800`0ca9322b : ffff870e`2592d988 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppInspectLocalDatagramsOut+0x87d
ffffaf0e`2f139820 fffff800`0ca92df0 : 00000000`00000000 00000000`00000000 fffff800`0cc58230 ffff870e`2cbbc5e0 : tcpip!IppSendDatagramsCommon+0x41b
ffffaf0e`2f1399a0 fffff800`0ca81cfd : 00000000`00001b1d ffff870e`25998a20 ffff870e`25991b1d ffff870e`25998a20 : tcpip!IpNlpSendDatagrams+0x40
ffffaf0e`2f1399e0 fffff800`0ca80ecc : 00000000`00000000 00000000`00000000 00000000`00000000 ffff870e`271a4500 : tcpip!UdpSendMessagesOnPath+0x7ad
ffffaf0e`2f139e80 fffff800`0ca80c15 : ffff870e`30ad6a01 fffff800`0ca80c00 ffffaf0e`2f13a300 ffffaf0e`2f13a300 : tcpip!UdpSendMessages+0x29c
ffffaf0e`2f13a1f0 fffff800`0820d468 : ffffaf0e`2f13a450 ffff870e`2cda9410 00000000`00000000 00000000`00000003 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffffaf0e`2f13a220 fffff800`0820d3dd : fffff800`0ca80c00 ffffaf0e`2f13a300 00000000`00000000 ffff870e`2ce37080 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffaf0e`2f13a290 fffff800`0cad230b : ffffaf0e`2f13a400 fffff800`0822e92b 00000000`00000001 fffff800`164520c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffaf0e`2f13a2d0 fffff800`1646d898 : ffffaf0e`2f13a640 ffffaf0e`2f13ab80 ffff870e`30ad6a20 ffffaf0e`2f13ab80 : tcpip!UdpTlProviderSendMessages+0x7b
ffffaf0e`2f13a350 fffff800`16451fb5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : afd!AfdFastDatagramSend+0x658
ffffaf0e`2f13a540 fffff800`086c1b92 : 00000000`00000000 00000000`00012023 ffffaf0e`2f13ab80 ffff870e`31185950 : afd!AfdFastIoDeviceControl+0x1825
ffffaf0e`2f13a8e0 fffff800`086c17f6 : 00000000`5a2a038c 00000000`00001344 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
ffffaf0e`2f13aa20 fffff800`08405fb8 : 00000000`00000020 fffff614`7a1fa3dd 00000000`00000000 0000027e`4e3ca060 : nt!NtDeviceIoControlFile+0x56
ffffaf0e`2f13aa90 00007ffd`e174be74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`316cdf78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e174be74
SYMBOL_NAME: tcpip!WFPDatagramDataShimV4+2f4
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
IMAGE_VERSION: 10.0.19041.1124
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2f4
FAILURE_BUCKET_ID: AV_tcpip!WFPDatagramDataShimV4
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0c899d51-01cb-21aa-999b-c157aeeed0eb}
Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffac84b3fc02c0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8014ebb1710, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.
Debugging Details:
------------------
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0358826.inf_amd64_a733916259ffcced\B358802\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6187
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 53178
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffffac84b3fc02c0
BUGCHECK_P2: fffff8014ebb1710
BUGCHECK_P3: ffffffffc0000001
BUGCHECK_P4: 3
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff930c`7b1339f8 fffff801`4931128e : 00000000`00000116 ffffac84`b3fc02c0 fffff801`4ebb1710 ffffffff`c0000001 : nt!KeBugCheckEx
ffff930c`7b133a00 fffff801`492b960b : fffff801`4ebb1710 ffffac84`b000b000 ffffac84`b000b0f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffff930c`7b133a40 fffff801`492ba3de : ffffac84`00000101 00000000`00002000 ffffac84`b000b000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffff930c`7b133a90 fffff801`493109b5 : 00000000`00000100 ffffac84`b000ba50 00000000`a8c9bcf0 00000000`00000200 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffff930c`7b133b10 fffff801`49310b27 : fffff801`3db24440 ffffac84`b2c4e010 00000000`00000000 00000000`00000200 : dxgkrnl!TdrResetFromTimeout+0x15
ffff930c`7b133b40 fffff801`3d0c1f15 : ffffac84`abcab040 fffff801`49310b00 ffffac84`a8c9bcf0 ffffac84`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffff930c`7b133b70 fffff801`3d066dd5 : ffffac84`abcab040 00000000`00000080 ffffac84`a8c92040 000f8067`bcbbbdff : nt!ExpWorkerThread+0x105
ffff930c`7b133c10 fffff801`3d1fb4f8 : fffff801`382c7180 ffffac84`abcab040 fffff801`3d066d80 b63fb63e`b63db63c : nt!PspSystemThreadStartup+0x55
ffff930c`7b133c60 00000000`00000000 : ffff930c`7b134000 ffff930c`7b12e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: amdkmdag+b1710
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x116_IMAGE_amdkmdag.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80242dea6f0, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6531
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 298147
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: d1
BUGCHECK_P1: 18
BUGCHECK_P2: 5
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80242dea6f0
READ_ADDRESS: fffff8022f8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8022f80f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8022f80f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000018
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: fffff802342f9810 -- (.trap 0xfffff802342f9810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff9903b5259030 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80242dea6f0 rsp=fffff802342f99a8 rbp=fffff802342f9a30
r8=ffff9903b5e896c4 r9=0000000000000000 r10=0000000000000000
r11=ffff9903b5e87020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
amdkmdag+0xca6f0:
fffff802`42dea6f0 488b4118 mov rax,qword ptr [rcx+18h] ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
fffff802`342f96c8 fffff802`2f005e69 : 00000000`0000000a 00000000`00000018 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
fffff802`342f96d0 fffff802`2f002169 : 00000000`00000000 fffff802`42d2485d 00000000`00486808 fffff802`4262eff0 : nt!KiBugCheckDispatch+0x69
fffff802`342f9810 fffff802`42dea6f0 : fffff802`42e20a57 fffff802`342f9ab0 fffff802`342f9a30 ffff9903`b5e87000 : nt!KiPageFault+0x469
fffff802`342f99a8 fffff802`42e20a57 : fffff802`342f9ab0 fffff802`342f9a30 ffff9903`b5e87000 fffff802`42f045b4 : amdkmdag+0xca6f0
fffff802`342f99b0 fffff802`342f9ab0 : fffff802`342f9a30 ffff9903`b5e87000 fffff802`42f045b4 00000000`00000000 : amdkmdag+0x100a57
fffff802`342f99b8 fffff802`342f9a30 : ffff9903`b5e87000 fffff802`42f045b4 00000000`00000000 00000000`00000000 : 0xfffff802`342f9ab0
fffff802`342f99c0 ffff9903`b5e87000 : fffff802`42f045b4 00000000`00000000 00000000`00000000 fffff802`00000001 : 0xfffff802`342f9a30
fffff802`342f99c8 fffff802`42f045b4 : 00000000`00000000 00000000`00000000 fffff802`00000001 00000000`00658b6d : 0xffff9903`b5e87000
fffff802`342f99d0 00000000`00000000 : 00000000`00000000 fffff802`00000001 00000000`00658b6d 00000000`00000000 : amdkmdag+0x1e45b4
SYMBOL_NAME: amdkmdag+ca6f0
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ca6f0
FAILURE_BUCKET_ID: AV_amdkmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c753a2f9-94a6-448f-1d0e-e079b3442215}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.