Hiç mavi ekran verdi mi? Minidump klasörüne bakar mısın ?
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190637
Arg2: ffffd000213656b8
Arg3: ffffd00021364ec0
Arg4: fffff800338f00a8
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_RECORD: ffffd000213656b8 -- (.exr 0xffffd000213656b8)
ExceptionAddress: fffff800338f00a8 (nt!FsRtlNotifyFilterReportChange+0x0000000000000154)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000100000001
Attempt to read from address 0000000100000001
CONTEXT: ffffd00021364ec0 -- (.cxr 0xffffd00021364ec0)
rax=0000000100000001 rbx=ffffe001c7edc460 rcx=ffffe001ca63a3b0
rdx=ffffe001c681b750 rsi=ffffe001ca63a380 rdi=0000000000000000
rip=fffff800338f00a8 rsp=ffffd000213658f0 rbp=ffffd000261358a0
r8=0000000000000000 r9=ffffc000827ea390 r10=ffffc0008488fc80
r11=ffffd00021365a28 r12=00000000000000a0 r13=0000000000000001
r14=ffffd000213659c0 r15=ffffe001c7606b70
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!FsRtlNotifyFilterReportChange+0x154:
fffff800`338f00a8 663938 cmp word ptr [rax],di ds:002b:00000001`00000001=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000100000001
READ_ADDRESS: fffff8003373ed60: Unable to get special pool info
fffff8003373ed60: Unable to get special pool info
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
0000000100000001
FOLLOWUP_IP:
Ntfs!NtfsReportDirNotify+de
fffff801`eb053aa2 488b9424f8000000 mov rdx,qword ptr [rsp+0F8h]
FAULTING_IP:
nt!FsRtlNotifyFilterReportChange+154
fffff800`338f00a8 663938 cmp word ptr [rax],di
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff801eb053aa2 to fffff800338f00a8
STACK_TEXT:
ffffd000`213658f0 fffff801`eb053aa2 : ffffe001`c7606b70 ffffe001`c681b750 ffffc000`8488fc80 00000000`000000a0 : nt!FsRtlNotifyFilterReportChange+0x154
ffffd000`21365a30 fffff801`eb101924 : ffffd000`26135610 ffffc000`8488fcf0 ffffc000`8488f920 ffffc000`8488fc80 : Ntfs!NtfsReportDirNotify+0xde
ffffd000`21365b20 fffff801`eb10f06d : ffffe001`cb9b9018 ffffe001`cb900bd0 ffffd000`26135588 ffffe001`c7edc080 : Ntfs!NtfsCommonCleanup+0x4269
ffffd000`21365f50 fffff800`335de5f7 : ffffd000`26135588 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCleanupCallout+0x19
ffffd000`21365f80 fffff800`335de5bd : ffffd000`26135600 00000000`00000000 00000000`00000002 fffff800`33553ad8 : nt!KxSwitchKernelStackCallout+0x27
ffffd000`26135430 fffff800`33553ad8 : ffffe001`00000006 ffffd000`26135600 00000000`00000006 00000000`00000000 : nt!KiSwitchKernelStackContinue
ffffd000`26135450 fffff801`eb11b1d5 : fffff801`eb10f054 ffffd000`26135588 ffffe001`cab24500 fffff800`334d709a : nt!KeExpandKernelStackAndCalloutInternal+0x218
ffffd000`26135540 fffff801`eaf60cf8 : ffffe001`cbc80d00 00000000`00000012 ffffe001`cab24580 ffffd000`26135808 : Ntfs!NtfsFsdCleanup+0x185
ffffd000`26135850 fffff801`eaf5f0b6 : ffffe001`c77aac70 00000000`00000000 ffffe001`cab24580 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x258
ffffd000`261358f0 fffff800`3385cab2 : ffffe001`cab24580 ffffe001`cb93f080 00000000`00000000 0000001e`00000000 : fltmgr!FltpDispatch+0xb6
ffffd000`26135950 fffff800`3385bb75 : ffffe001`ca15b500 ffffd000`26135a99 00000000`00007fdb 00000000`00007fdb : nt!IopCloseFile+0x152
ffffd000`261359e0 fffff800`335e64b3 : 00000000`00000001 00000000`00000bb4 00000000`0bb7fdb0 00000000`0bc7fa60 : nt!NtClose+0x1c5
ffffd000`26135b00 00000000`772f2772 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0bb7f058 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772f2772
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsReportDirNotify+de
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53d0b61c
STACK_COMMAND: .cxr 0xffffd00021364ec0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsReportDirNotify+de
BUCKET_ID: X64_0x24_Ntfs!NtfsReportDirNotify+de
Followup: MachineOwner
Dün bu hatayı verdi bilgisayar yeniden başladı ve Mem OK ışığı yandı görüntü gelmedi. Çok kez denememe rağmen açamadım. Bugün ikinci defa denediğimde açabildim bilgisayarımı.
Düzenleme: 18.11.2014 20:06 itibariyle bir kez daha mavi ekran almış bulunmaktayım.
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 0000000004922000
Arg3: 000000000000961f
Arg4: fffff58010804000
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
OVERLAPPED_MODULE: Address regions for 'NvStreamKms' and 'tunnel.sys' overlap
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: ekrn.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80202ffa22f to fffff80202fd3ca0
STACK_TEXT:
ffffd000`212eddd8 fffff802`02ffa22f : 00000000`0000001a 00000000`00041284 00000000`04922000 00000000`0000961f : nt!KeBugCheckEx
ffffd000`212edde0 fffff802`02ea4448 : e1f00000`ba6a4847 ffffd000`212edec9 ffffd000`210a9910 ffffc001`6809ed00 : nt! ?? ::FNODOBFM::`string'+0x1607f
ffffd000`212ede30 fffff802`02ea40f5 : fffff680`00024910 ffffd000`210a9910 ffffe000`adcbfc30 ffffd000`212edf78 : nt!MiBuildForkPte+0x100
ffffd000`212edf10 fffff802`03205737 : 00000000`0008b000 ffffd000`212ee219 00000000`0008b690 ffffe000`ad70a7c0 : nt!MiCloneVads+0x325
ffffd000`212ee140 fffff802`032bcdcc : ffffe000`b2c09900 ffffd000`212ee359 ffffe000`b2c09900 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x4f7
ffffd000`212ee280 fffff802`032b6fae : 00000000`000002a0 00000000`000002a0 ffffd000`212eeb80 00000000`00000001 : nt!MmInitializeProcessAddressSpace+0x404
ffffd000`212ee3c0 fffff802`0333421a : 00000000`00000000 00000000`00000080 ffffe000`aa620d40 ffffc001`57ca2001 : nt!PspAllocateProcess+0x131a
ffffd000`212ee790 fffff802`03206f03 : 00000000`0700fd00 ffffe000`ad6d9dd8 ffffe000`add2e080 00000000`00000000 : nt!PspCreateProcess+0x19a
ffffd000`212eea40 fffff802`02fdf4b3 : ffffffff`fffffffe ffffe000`add2e080 00000000`074ae068 fffff802`032bd494 : nt!NtCreateProcessEx+0x6f
ffffd000`212eea90 00007ffc`d00b1b4a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`074ae048 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ffc`d00b1b4a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+1607f
fffff802`02ffa22f cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+1607f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53d0b7c3
FAILURE_BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+1607f
BUCKET_ID: X64_0x1a_41284_nt!_??_::FNODOBFM::_string_+1607f
Followup: MachineOwner