Windows 10 mavi ekran hatası

Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin. Belleklere test yapın.

BIOS güncelleyin. Ayrıca ağ sürücülerini de güncelleyin.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ff95af97d00
Arg3: 000000000000001d
Arg4: ffff858cbdba6b00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5968

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10545

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ff95af97d00

BUGCHECK_P3: 1d

BUGCHECK_P4: ffff858cbdba6b00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT:
ffff858c`bdba6958 fffff807`0aa72c08     : 00000000`0000001a 00000000`00061941 00007ff9`5af97d00 00000000`0000001d : nt!KeBugCheckEx
ffff858c`bdba6960 fffff807`0aa0205e     : ffff8f8f`a6164080 ffff8f8f`a7bcee60 00000000`00000000 ffff858c`bdba6b80 : nt!MmAccessFault+0x184488
ffff858c`bdba6b00 00007ff9`5af97d00     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000d3`f71ffb38 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`5af97d00


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------



SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80047fa71ac, Address of the instruction which caused the bugcheck
Arg3: fffffc05a26c9ac0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7984

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8040

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: 80000003

BUGCHECK_P2: fffff80047fa71ac

BUGCHECK_P3: fffffc05a26c9ac0

BUGCHECK_P4: 0

CONTEXT:  fffffc05a26c9ac0 -- (.cxr 0xfffffc05a26c9ac0)
rax=0000000000000010 rbx=ffff8007d1daea70 rcx=ffff8007d1daea70
rdx=ffff8007d69385c0 rsi=0000000000000000 rdi=00000000c0000016
rip=fffff80047fa71ac rsp=fffffc05a26ca4c8 rbp=fffffc05a26ca629
r8=ffff8007cc479101  r9=0000000000000000 r10=ffff8007cc7e35a0
r11=fffff80047fa0000 r12=ffffffff80000005 r13=0000000000000000
r14=ffff8007d69385c0 r15=ffff8007d5dbc320
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00040246
FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x76c:
fffff800`47fa71ac cc              int     3
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
fffffc05`a26ca4c8 fffff800`47fa5052     : ffff8007`d1daea00 fffff800`49c69e00 ffff8007`d42f4080 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x76c
fffffc05`a26ca4d0 fffff800`47fa43bc     : fffffc05`a26c5000 fffffc05`a26cb000 ffffffff`80000005 00000000`00000000 : FLTMGR!FltpPassThroughCompletionWorker+0x132
fffffc05`a26ca570 fffff800`49cc310e     : ffff8007`00000000 ffff8007`d69385c0 000d21ef`9dffffff 00000000`d4fb56ff : FLTMGR!FltpPassThroughCompletion+0xc
fffffc05`a26ca5a0 fffff800`49cc2fd7     : ffff8007`d4eff301 00000000`00000002 ffff8007`d69385c0 ffff8007`d69385c0 : nt!IopfCompleteRequest+0x11e
fffffc05`a26ca690 fffff800`5869c871     : ffff8007`ccb62060 00000000`00000000 ffff8007`d4eff350 ffff8007`d69386d8 : nt!IofCompleteRequest+0x17
fffffc05`a26ca6c0 fffff800`49ccd805     : ffff8007`d1daea70 fffff800`47fa4b46 fffffc05`a26cb000 fffffc05`a26c5000 : Npfs!NpFsdFileSystemControl+0x51
fffffc05`a26ca6f0 fffff800`47fa6ccf     : ffff8007`d4386080 00000000`00000000 fffff800`46f75180 fffffc05`a26caa78 : nt!IofCallDriver+0x55
fffffc05`a26ca730 fffff800`47fdcaf4     : fffffc05`a26ca7c0 ffff8007`d4eff350 00000000`000000e0 fffff800`4a0efe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffc05`a26ca7a0 fffff800`49ccd805     : fffff800`0000000a ffff8007`d69385c0 00000000`00000002 00000000`00000001 : FLTMGR!FltpFsControl+0x104
fffffc05`a26ca800 fffff800`4a0c2528     : ffff8007`d69385c0 00000000`00000000 00000000`00000000 ffff8007`d42f4080 : nt!IofCallDriver+0x55
fffffc05`a26ca840 fffff800`4a0c1df5     : 00000000`0011400c fffffc05`a26cab80 00000000`00040005 fffffc05`a26cab80 : nt!IopSynchronousServiceTail+0x1a8
fffffc05`a26ca8e0 fffff800`4a06c486     : 00000000`00000000 00000000`00000c18 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x5e5
fffffc05`a26caa20 fffff800`49e05fb8     : ffff8007`d4386080 00000000`0045e168 fffffc05`a26caaa8 00000000`00000000 : nt!NtFsControlFile+0x56
fffffc05`a26caa90 00000000`76f81cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0045ea78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f81cfc


SYMBOL_NAME:  Npfs!NpFsdFileSystemControl+51

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .cxr 0xfffffc05a26c9ac0 ; kb

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  0x3B_80000003_Npfs!NpFsdFileSystemControl

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1941d3b4-e158-2b6f-e741-b67efa73c94c}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffaf0e00000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8000cb83808, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 23189

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffaf0e00000000

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8000cb83808

READ_ADDRESS: fffff80008cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80008c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80008c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffaf0e00000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffaf0e2f138a80 -- (.trap 0xffffaf0e2f138a80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff870e25992010 rbx=0000000000000000 rcx=0000000000000001
rdx=ffff870e2c011460 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000cb83808 rsp=ffffaf0e2f138c10 rbp=ffffaf0e2f138d10
r8=0000000000000c42  r9=ffff870e2c8b2010 r10=0000000000000000
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!WFPDatagramDataShimV4+0x2f4:
fffff800`0cb83808 498b06          mov     rax,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffaf0e`2f138938 fffff800`08406569     : 00000000`0000000a ffffaf0e`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaf0e`2f138940 fffff800`08402869     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaf0e`2f138a80 fffff800`0cb83808     : 00000000`00000072 15e14d9e`2d5a4f00 ffff870e`256dd950 00000000`00000001 : nt!KiPageFault+0x469
ffffaf0e`2f138c10 fffff800`0cb1b97d     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000004 : tcpip!WFPDatagramDataShimV4+0x2f4
ffffaf0e`2f139050 fffff800`0ca9fb43     : ffff870e`25908d20 fffff800`0cdd1010 fffff800`0b874f90 fffff800`0b8758e8 : tcpip!ProcessALEForTransportPacket+0x7b54d
ffffaf0e`2f139220 fffff800`0ca941ad     : 00000000`0000ff02 00000000`00000000 00000000`00010224 fffff800`085b33d0 : tcpip!WfpProcessOutTransportStackIndication+0x4db
ffffaf0e`2f139550 fffff800`0ca9322b     : ffff870e`2592d988 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IppInspectLocalDatagramsOut+0x87d
ffffaf0e`2f139820 fffff800`0ca92df0     : 00000000`00000000 00000000`00000000 fffff800`0cc58230 ffff870e`2cbbc5e0 : tcpip!IppSendDatagramsCommon+0x41b
ffffaf0e`2f1399a0 fffff800`0ca81cfd     : 00000000`00001b1d ffff870e`25998a20 ffff870e`25991b1d ffff870e`25998a20 : tcpip!IpNlpSendDatagrams+0x40
ffffaf0e`2f1399e0 fffff800`0ca80ecc     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff870e`271a4500 : tcpip!UdpSendMessagesOnPath+0x7ad
ffffaf0e`2f139e80 fffff800`0ca80c15     : ffff870e`30ad6a01 fffff800`0ca80c00 ffffaf0e`2f13a300 ffffaf0e`2f13a300 : tcpip!UdpSendMessages+0x29c
ffffaf0e`2f13a1f0 fffff800`0820d468     : ffffaf0e`2f13a450 ffff870e`2cda9410 00000000`00000000 00000000`00000003 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
ffffaf0e`2f13a220 fffff800`0820d3dd     : fffff800`0ca80c00 ffffaf0e`2f13a300 00000000`00000000 ffff870e`2ce37080 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffaf0e`2f13a290 fffff800`0cad230b     : ffffaf0e`2f13a400 fffff800`0822e92b 00000000`00000001 fffff800`164520c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffaf0e`2f13a2d0 fffff800`1646d898     : ffffaf0e`2f13a640 ffffaf0e`2f13ab80 ffff870e`30ad6a20 ffffaf0e`2f13ab80 : tcpip!UdpTlProviderSendMessages+0x7b
ffffaf0e`2f13a350 fffff800`16451fb5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : afd!AfdFastDatagramSend+0x658
ffffaf0e`2f13a540 fffff800`086c1b92     : 00000000`00000000 00000000`00012023 ffffaf0e`2f13ab80 ffff870e`31185950 : afd!AfdFastIoDeviceControl+0x1825
ffffaf0e`2f13a8e0 fffff800`086c17f6     : 00000000`5a2a038c 00000000`00001344 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
ffffaf0e`2f13aa20 fffff800`08405fb8     : 00000000`00000020 fffff614`7a1fa3dd 00000000`00000000 0000027e`4e3ca060 : nt!NtDeviceIoControlFile+0x56
ffffaf0e`2f13aa90 00007ffd`e174be74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e5`316cdf78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`e174be74


SYMBOL_NAME:  tcpip!WFPDatagramDataShimV4+2f4

MODULE_NAME: tcpip

IMAGE_NAME:  tcpip.sys

IMAGE_VERSION:  10.0.19041.1124

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2f4

FAILURE_BUCKET_ID:  AV_tcpip!WFPDatagramDataShimV4

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0c899d51-01cb-21aa-999b-c157aeeed0eb}

Followup:     MachineOwner
---------



VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffac84b3fc02c0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8014ebb1710, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0358826.inf_amd64_a733916259ffcced\B358802\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6187

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 53178

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  116

BUGCHECK_P1: ffffac84b3fc02c0

BUGCHECK_P2: fffff8014ebb1710

BUGCHECK_P3: ffffffffc0000001

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff930c`7b1339f8 fffff801`4931128e     : 00000000`00000116 ffffac84`b3fc02c0 fffff801`4ebb1710 ffffffff`c0000001 : nt!KeBugCheckEx
ffff930c`7b133a00 fffff801`492b960b     : fffff801`4ebb1710 ffffac84`b000b000 ffffac84`b000b0f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffff930c`7b133a40 fffff801`492ba3de     : ffffac84`00000101 00000000`00002000 ffffac84`b000b000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffff930c`7b133a90 fffff801`493109b5     : 00000000`00000100 ffffac84`b000ba50 00000000`a8c9bcf0 00000000`00000200 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffff930c`7b133b10 fffff801`49310b27     : fffff801`3db24440 ffffac84`b2c4e010 00000000`00000000 00000000`00000200 : dxgkrnl!TdrResetFromTimeout+0x15
ffff930c`7b133b40 fffff801`3d0c1f15     : ffffac84`abcab040 fffff801`49310b00 ffffac84`a8c9bcf0 ffffac84`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffff930c`7b133b70 fffff801`3d066dd5     : ffffac84`abcab040 00000000`00000080 ffffac84`a8c92040 000f8067`bcbbbdff : nt!ExpWorkerThread+0x105
ffff930c`7b133c10 fffff801`3d1fb4f8     : fffff801`382c7180 ffffac84`abcab040 fffff801`3d066d80 b63fb63e`b63db63c : nt!PspSystemThreadStartup+0x55
ffff930c`7b133c60 00000000`00000000     : ffff930c`7b134000 ffff930c`7b12e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  amdkmdag+b1710

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_amdkmdag.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup:     MachineOwner
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80242dea6f0, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6531

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 298147

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: 18

BUGCHECK_P2: 5

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80242dea6f0

READ_ADDRESS: fffff8022f8fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8022f80f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8022f80f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000018

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: opera.exe

TRAP_FRAME:  fffff802342f9810 -- (.trap 0xfffff802342f9810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff9903b5259030 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80242dea6f0 rsp=fffff802342f99a8 rbp=fffff802342f9a30
r8=ffff9903b5e896c4 r9=0000000000000000 r10=0000000000000000
r11=ffff9903b5e87020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
amdkmdag+0xca6f0:
fffff802`42dea6f0 488b4118 mov rax,qword ptr [rcx+18h] ds:00000000`00000018=????????????????
Resetting default scope

STACK_TEXT:
fffff802`342f96c8 fffff802`2f005e69 : 00000000`0000000a 00000000`00000018 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
fffff802`342f96d0 fffff802`2f002169 : 00000000`00000000 fffff802`42d2485d 00000000`00486808 fffff802`4262eff0 : nt!KiBugCheckDispatch+0x69
fffff802`342f9810 fffff802`42dea6f0 : fffff802`42e20a57 fffff802`342f9ab0 fffff802`342f9a30 ffff9903`b5e87000 : nt!KiPageFault+0x469
fffff802`342f99a8 fffff802`42e20a57 : fffff802`342f9ab0 fffff802`342f9a30 ffff9903`b5e87000 fffff802`42f045b4 : amdkmdag+0xca6f0
fffff802`342f99b0 fffff802`342f9ab0 : fffff802`342f9a30 ffff9903`b5e87000 fffff802`42f045b4 00000000`00000000 : amdkmdag+0x100a57
fffff802`342f99b8 fffff802`342f9a30 : ffff9903`b5e87000 fffff802`42f045b4 00000000`00000000 00000000`00000000 : 0xfffff802`342f9ab0
fffff802`342f99c0 ffff9903`b5e87000 : fffff802`42f045b4 00000000`00000000 00000000`00000000 fffff802`00000001 : 0xfffff802`342f9a30
fffff802`342f99c8 fffff802`42f045b4 : 00000000`00000000 00000000`00000000 fffff802`00000001 00000000`00658b6d : 0xffff9903`b5e87000
fffff802`342f99d0 00000000`00000000 : 00000000`00000000 fffff802`00000001 00000000`00658b6d 00000000`00000000 : amdkmdag+0x1e45b4


SYMBOL_NAME: amdkmdag+ca6f0

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: ca6f0

FAILURE_BUCKET_ID: AV_amdkmdag!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c753a2f9-94a6-448f-1d0e-e079b3442215}

Followup: MachineOwner
---------
 
Son düzenleme:

Geri
Yukarı