Çözüldü Zula "UNEXPECTED_KERNEL_MODE_TRAP" mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Çözüm
BattleEye sorun çıkartmış, yazılımı kaldır veya güncelle. Anti-virüs programı var mı? Belki onunla çakışıyordur. Varsa kaldır.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801cac00
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 1

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 1

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffffff801cac00

BUGCHECK_P3: 0

BUGCHECK_P4: 0

STACK_OVERFLOW: Stack Limit: 86edd000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xffffffffbb81766a was blamed for the stack overflow. It is using 5752 bytes of stack.

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
86edd058 8604a296 0000844f 00000000 86edd0b0 Ntfs!_SEH_prolog4+0x1a
86edd0bc 8604d0dc 891511f8 0844f000 00000000 Ntfs!NtfsPrepareSimpleBuffers+0x185
86edd0fc 860498ed 891511f8 0844f000 00000000 Ntfs!NtfsPrepareBuffers+0x71
86edd2d4 86054bb8 891511f8 0844f000 00000000 Ntfs!NtfsNonCachedIo+0x395
86edd3e8 8604d507 0108070a 00000000 00000001 Ntfs!NtfsCommonRead+0x1595
86edd560 814bbc90 8e45c018 a686e530 a686e530 Ntfs!NtfsFsdRead+0x1d4
86edd580 85af795e a686e530 891516c8 af282a03 nt!IofCallDriver+0x40
86edd5bc 85af7683 00000000 00000000 891516c8 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x266
86edd5e8 814bbc90 891516c8 a686e530 a686e708 fltmgr!FltpDispatch+0xb1
86edd608 814dc47f 8711e762 af282980 af2829b0 nt!IofCallDriver+0x40
86edd624 814dc2ca a686e708 00000043 af2829b8 nt!IoPageRead+0x15f
86edd654 815cac41 80322b88 c57d11ac 00000101 nt!MiIssueHardFaultIO+0xc4
86edd6cc 814a2095 af282980 00000000 00000000 nt!MiIssueHardFault+0x16b
86edd740 8150e5d5 00000000 b5dcf000 00000000 nt!MmAccessFault+0x575
86edd858 814b29e6 00000000 86edd876 00000400 nt!MmCheckCachedPageStates+0x435
86edd888 816d3a26 00000001 b5dcf000 a7b7aabb nt!CcMapAndRead+0xd6
86edd8c0 860b5eec 8711e760 86edd8f8 00000400 nt!CcMapData+0x76
86edd8f0 860b5d61 0844fc00 00000000 00000400 Ntfs!NtfsMapStream+0x59
86edd99c 860b5ba5 a25ddc68 a25ddc68 00000001 Ntfs!NtfsReadMftRecord+0xd4
86edda08 860b562c a25ddc60 a25ddc68 00000000 Ntfs!NtfsReadFileRecord+0x66
86edda50 860f2205 a25ddc68 00000030 00000000 Ntfs!NtfsLookupInFileRecord+0x45
86eddae4 860afaf9 aeebf00c a25ddc60 86eddb08 Ntfs!NtfsReadUsnWorker+0x53
86eddb80 860c7aee af1f8810 00000000 aeebf00c Ntfs!NtfsReadFileUsnData+0x13d
86eddb90 860ba05f aeebf00c 00000000 af1f8810 Ntfs!NtfsUserFsRequest+0x15c
86eddc04 860b7b83 06b418d4 00000000 8e45c018 Ntfs!NtfsCommonFileSystemControl+0x37
86eddc68 814bbc90 8e45c018 af1f8810 af1f8810 Ntfs!NtfsFsdFileSystemControl+0xae
86eddc88 85af795e af1a7c58 00000000 871335d0 nt!IofCallDriver+0x40
86eddcc4 85afbaed 00000000 00000000 af2ac1f4 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x266
86eddd2c 85b13eea af2ac1f4 39de4899 8240c8b8 fltmgr!FltPerformSynchronousIo+0x27c
86eddd88 85b14117 00000003 00000672 000900eb fltmgr!IssueControlOperation+0x103
86edddb0 85b958c9 871335c8 af1a7c58 000900eb fltmgr!FltFsControlFile+0x25
86edde7c 85b804e0 86ede000 00000003 00000000 WdFilter!MpScanFile+0x39b
86eddf7c 85b7f6d1 00000040 00000000 86eddfa4 WdFilter!MpAmPostCreate+0xb50
86eddfa8 85af6c89 97618084 86ede000 00000040 WdFilter!MpPostCreate+0x2a1
86ede018 85af8802 abf4de00 abf4dfd8 97618008 fltmgr!FltpPerformPostCallbacks+0x270
86ede038 85af79d3 97618008 00000000 891516c8 fltmgr!FltpPassThroughCompletionWorker+0x66
86ede07c 85b112d8 00000000 00000000 891516c8 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2db
86ede0d4 814bbc90 891516c8 abf4de00 abf4de00 fltmgr!FltpCreate+0x2cb
86ede0f4 816e08fb a7b79073 aefafe84 8e537e08 nt!IofCallDriver+0x40
86ede208 817716cd 8e537e08 80336560 aefafd20 nt!IopParseDevice+0x51b
86ede2ac 816dac3a 82401148 80336560 816dec00 nt!ObpLookupObjectName+0x5cd
86ede324 81769117 86edfadc 80336560 816dec00 nt!ObOpenObjectByName+0x18a
86ede3b0 81726998 86edfadc 86ede568 00000000 nt!IopCreateFile+0x867
86ede3f0 81565e2b 86ede598 80000000 86edfadc nt!NtOpenFile+0x2a
86ede3f0 81553dad 86ede598 80000000 86edfadc nt!KiSystemServicePostCall
86ede480 bb81766a 86ede598 80000000 86edfadc nt!ZwOpenFile+0x11
WARNING: Stack unwind information not available. Following frames may be wrong.
86edfaf8 8172d420 abf45df0 af38e000 80ac8cf0 BEDaisy+0xa66a
86edfcd8 8172cd32 00000000 86edfcf4 80ac8cf0 nt!IopLoadDriver+0x632
86edfcfc 8152a1dd 80ac8cf0 00000000 80322880 nt!IopLoadUnloadDriver+0x46
86edfd68 814e3c19 8163e1a0 a7b78fcb 00000000 nt!ExpWorkerThread+0x6b5
86edfdb0 8156e40d 81529b28 8163e1a0 00000000 nt!PspSystemThreadStartup+0x17f
86edfdbc 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x15


SYMBOL_NAME:  BEDaisy+a66a

MODULE_NAME: BEDaisy

IMAGE_NAME:  BEDaisy.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a66a

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_BEDaisy!unknown_function

OS_VERSION:  8.1.9600.19761

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {e7e6e20d-61d9-e646-e80d-6ce996a3e106}

Followup:     MachineOwner
---------


Windows 10'a neden geçmiyorsun?

Minidump dosyalarını paylaşınız.
 
UNEXPECTED_KERNEL_MODE_TRAP hatası genelde bir donanım hatasıdır. Bazı durumlarda güncel olmayan bir sürücü de UNEXPECTED_KERNEL_MODE_TRAP hatasına yol açabilir.

UNEXPECTED_KERNEL_MODE_TRAP mavi ekran hatası genelde şağıdaki donanımlarda bir sorun varsa ortaya çıkar

  • Bozuk veya hatalı bellek
  • Ömrü bitmek üzere olan sabitdisk HDD
Son zamanlarda bir donanım birimi eklediyseniz, örneğin yeni bir RAM takmak gibi, bu donanımı çıkartın.

Overclock yaptıysanız bu UNEXPECTED_KERNEL_MODE_TRAP hatasına sebep olabilir. Overclock işlemini geri alın.

Güncel olmayan sürücüleri güncelleyin. yine güncel olmayan bir sürücü UNEXPECTED_KERNEL_MODE_TRAP hatasıne sebep olabilir.

Eğer bilgisayarınız bir masaüstü bilgisayar ise kasasını açın şöyle bir tozunu alın oynayan hareket eden bir kablo, kart var mı kontrol edin.

UNEXPECTED_KERNEL_MODE_TRAP gibi mavi ekran hatalarının yukarıda yazdığım gibi pek çok sebebi olabilir.
 

Minidump dosyalarını paylaşınız.
 
BattleEye sorun çıkartmış, yazılımı kaldır veya güncelle. Anti-virüs programı var mı? Belki onunla çakışıyordur. Varsa kaldır.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 801cac00
Arg3: 00000000
Arg4: 00000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 1

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-VFOM7MS

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 1

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffffff801cac00

BUGCHECK_P3: 0

BUGCHECK_P4: 0

STACK_OVERFLOW: Stack Limit: 86edd000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xffffffffbb81766a was blamed for the stack overflow. It is using 5752 bytes of stack.

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
86edd058 8604a296 0000844f 00000000 86edd0b0 Ntfs!_SEH_prolog4+0x1a
86edd0bc 8604d0dc 891511f8 0844f000 00000000 Ntfs!NtfsPrepareSimpleBuffers+0x185
86edd0fc 860498ed 891511f8 0844f000 00000000 Ntfs!NtfsPrepareBuffers+0x71
86edd2d4 86054bb8 891511f8 0844f000 00000000 Ntfs!NtfsNonCachedIo+0x395
86edd3e8 8604d507 0108070a 00000000 00000001 Ntfs!NtfsCommonRead+0x1595
86edd560 814bbc90 8e45c018 a686e530 a686e530 Ntfs!NtfsFsdRead+0x1d4
86edd580 85af795e a686e530 891516c8 af282a03 nt!IofCallDriver+0x40
86edd5bc 85af7683 00000000 00000000 891516c8 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x266
86edd5e8 814bbc90 891516c8 a686e530 a686e708 fltmgr!FltpDispatch+0xb1
86edd608 814dc47f 8711e762 af282980 af2829b0 nt!IofCallDriver+0x40
86edd624 814dc2ca a686e708 00000043 af2829b8 nt!IoPageRead+0x15f
86edd654 815cac41 80322b88 c57d11ac 00000101 nt!MiIssueHardFaultIO+0xc4
86edd6cc 814a2095 af282980 00000000 00000000 nt!MiIssueHardFault+0x16b
86edd740 8150e5d5 00000000 b5dcf000 00000000 nt!MmAccessFault+0x575
86edd858 814b29e6 00000000 86edd876 00000400 nt!MmCheckCachedPageStates+0x435
86edd888 816d3a26 00000001 b5dcf000 a7b7aabb nt!CcMapAndRead+0xd6
86edd8c0 860b5eec 8711e760 86edd8f8 00000400 nt!CcMapData+0x76
86edd8f0 860b5d61 0844fc00 00000000 00000400 Ntfs!NtfsMapStream+0x59
86edd99c 860b5ba5 a25ddc68 a25ddc68 00000001 Ntfs!NtfsReadMftRecord+0xd4
86edda08 860b562c a25ddc60 a25ddc68 00000000 Ntfs!NtfsReadFileRecord+0x66
86edda50 860f2205 a25ddc68 00000030 00000000 Ntfs!NtfsLookupInFileRecord+0x45
86eddae4 860afaf9 aeebf00c a25ddc60 86eddb08 Ntfs!NtfsReadUsnWorker+0x53
86eddb80 860c7aee af1f8810 00000000 aeebf00c Ntfs!NtfsReadFileUsnData+0x13d
86eddb90 860ba05f aeebf00c 00000000 af1f8810 Ntfs!NtfsUserFsRequest+0x15c
86eddc04 860b7b83 06b418d4 00000000 8e45c018 Ntfs!NtfsCommonFileSystemControl+0x37
86eddc68 814bbc90 8e45c018 af1f8810 af1f8810 Ntfs!NtfsFsdFileSystemControl+0xae
86eddc88 85af795e af1a7c58 00000000 871335d0 nt!IofCallDriver+0x40
86eddcc4 85afbaed 00000000 00000000 af2ac1f4 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x266
86eddd2c 85b13eea af2ac1f4 39de4899 8240c8b8 fltmgr!FltPerformSynchronousIo+0x27c
86eddd88 85b14117 00000003 00000672 000900eb fltmgr!IssueControlOperation+0x103
86edddb0 85b958c9 871335c8 af1a7c58 000900eb fltmgr!FltFsControlFile+0x25
86edde7c 85b804e0 86ede000 00000003 00000000 WdFilter!MpScanFile+0x39b
86eddf7c 85b7f6d1 00000040 00000000 86eddfa4 WdFilter!MpAmPostCreate+0xb50
86eddfa8 85af6c89 97618084 86ede000 00000040 WdFilter!MpPostCreate+0x2a1
86ede018 85af8802 abf4de00 abf4dfd8 97618008 fltmgr!FltpPerformPostCallbacks+0x270
86ede038 85af79d3 97618008 00000000 891516c8 fltmgr!FltpPassThroughCompletionWorker+0x66
86ede07c 85b112d8 00000000 00000000 891516c8 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2db
86ede0d4 814bbc90 891516c8 abf4de00 abf4de00 fltmgr!FltpCreate+0x2cb
86ede0f4 816e08fb a7b79073 aefafe84 8e537e08 nt!IofCallDriver+0x40
86ede208 817716cd 8e537e08 80336560 aefafd20 nt!IopParseDevice+0x51b
86ede2ac 816dac3a 82401148 80336560 816dec00 nt!ObpLookupObjectName+0x5cd
86ede324 81769117 86edfadc 80336560 816dec00 nt!ObOpenObjectByName+0x18a
86ede3b0 81726998 86edfadc 86ede568 00000000 nt!IopCreateFile+0x867
86ede3f0 81565e2b 86ede598 80000000 86edfadc nt!NtOpenFile+0x2a
86ede3f0 81553dad 86ede598 80000000 86edfadc nt!KiSystemServicePostCall
86ede480 bb81766a 86ede598 80000000 86edfadc nt!ZwOpenFile+0x11
WARNING: Stack unwind information not available. Following frames may be wrong.
86edfaf8 8172d420 abf45df0 af38e000 80ac8cf0 BEDaisy+0xa66a
86edfcd8 8172cd32 00000000 86edfcf4 80ac8cf0 nt!IopLoadDriver+0x632
86edfcfc 8152a1dd 80ac8cf0 00000000 80322880 nt!IopLoadUnloadDriver+0x46
86edfd68 814e3c19 8163e1a0 a7b78fcb 00000000 nt!ExpWorkerThread+0x6b5
86edfdb0 8156e40d 81529b28 8163e1a0 00000000 nt!PspSystemThreadStartup+0x17f
86edfdbc 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x15


SYMBOL_NAME:  BEDaisy+a66a

MODULE_NAME: BEDaisy

IMAGE_NAME:  BEDaisy.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a66a

FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_BEDaisy!unknown_function

OS_VERSION:  8.1.9600.19761

BUILDLAB_STR:  winblue_ltsb

OSPLATFORM_TYPE:  x86

OSNAME:  Windows 8.1

FAILURE_ID_HASH:  {e7e6e20d-61d9-e646-e80d-6ce996a3e106}

Followup:     MachineOwner
---------


Windows 10'a neden geçmiyorsun?
 
Çözüm
BattleEye sorun çıkartmış, yazılımı kaldır veya güncelle. Anti-Virüs programı var mı? Belki onunla çakışıyordur. Varsa kaldır.

Kod:
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT.
Arg2: 801cac00.
Arg3: 00000000.
Arg4: 00000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.Sec.
Value: 1.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-VFOM7MS.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.Sec.
Value: 1.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 72.

Key : Analysis.System.
Value: CreateObject.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 7f.

BUGCHECK_P1: 8.

BUGCHECK_P2: ffffffff801cac00.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

STACK_OVERFLOW: Stack Limit: 86edd000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xffffffffbb81766a was blamed for the stack overflow. It is using 5752 bytes of stack.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
86edd058 8604a296 0000844f 00000000 86edd0b0 Ntfs!_SEH_prolog4+0x1a.
86edd0bc 8604d0dc 891511f8 0844f000 00000000 Ntfs!NtfsPrepareSimpleBuffers+0x185.
86edd0fc 860498ed 891511f8 0844f000 00000000 Ntfs!NtfsPrepareBuffers+0x71.
86edd2d4 86054bb8 891511f8 0844f000 00000000 Ntfs!NtfsNonCachedIo+0x395.
86edd3e8 8604d507 0108070a 00000000 00000001 Ntfs!NtfsCommonRead+0x1595.
86edd560 814bbc90 8e45c018 a686e530 a686e530 Ntfs!NtfsFsdRead+0x1d4.
86edd580 85af795e a686e530 891516c8 af282a03 nt!IofCallDriver+0x40.
86edd5bc 85af7683 00000000 00000000 891516c8 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x266.
86edd5e8 814bbc90 891516c8 a686e530 a686e708 fltmgr!FltpDispatch+0xb1.
86edd608 814dc47f 8711e762 af282980 af2829b0 nt!IofCallDriver+0x40.
86edd624 814dc2ca a686e708 00000043 af2829b8 nt!IoPageRead+0x15f.
86edd654 815cac41 80322b88 c57d11ac 00000101 nt!MiIssueHardFaultIO+0xc4.
86edd6cc 814a2095 af282980 00000000 00000000 nt!MiIssueHardFault+0x16b.
86edd740 8150e5d5 00000000 b5dcf000 00000000 nt!MmAccessFault+0x575.
86edd858 814b29e6 00000000 86edd876 00000400 nt!MmCheckCachedPageStates+0x435.
86edd888 816d3a26 00000001 b5dcf000 a7b7aabb nt!CcMapAndRead+0xd6.
86edd8c0 860b5eec 8711e760 86edd8f8 00000400 nt!CcMapData+0x76.
86edd8f0 860b5d61 0844fc00 00000000 00000400 Ntfs!NtfsMapStream+0x59.
86edd99c 860b5ba5 a25ddc68 a25ddc68 00000001 Ntfs!NtfsReadMftRecord+0xd4.
86edda08 860b562c a25ddc60 a25ddc68 00000000 Ntfs!NtfsReadFileRecord+0x66.
86edda50 860f2205 a25ddc68 00000030 00000000 Ntfs!NtfsLookupInFileRecord+0x45.
86eddae4 860afaf9 aeebf00c a25ddc60 86eddb08 Ntfs!NtfsReadUsnWorker+0x53.
86eddb80 860c7aee af1f8810 00000000 aeebf00c Ntfs!NtfsReadFileUsnData+0x13d.
86eddb90 860ba05f aeebf00c 00000000 af1f8810 Ntfs!NtfsUserFsRequest+0x15c.
86eddc04 860b7b83 06b418d4 00000000 8e45c018 Ntfs!NtfsCommonFileSystemControl+0x37.
86eddc68 814bbc90 8e45c018 af1f8810 af1f8810 Ntfs!NtfsFsdFileSystemControl+0xae.
86eddc88 85af795e af1a7c58 00000000 871335d0 nt!IofCallDriver+0x40.
86eddcc4 85afbaed 00000000 00000000 af2ac1f4 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x266.
86eddd2c 85b13eea af2ac1f4 39de4899 8240c8b8 fltmgr!FltPerformSynchronousIo+0x27c.
86eddd88 85b14117 00000003 00000672 000900eb fltmgr!IssueControlOperation+0x103.
86edddb0 85b958c9 871335c8 af1a7c58 000900eb fltmgr!FltFsControlFile+0x25.
86edde7c 85b804e0 86ede000 00000003 00000000 WdFilter!MpScanFile+0x39b.
86eddf7c 85b7f6d1 00000040 00000000 86eddfa4 WdFilter!MpAmPostCreate+0xb50.
86eddfa8 85af6c89 97618084 86ede000 00000040 WdFilter!MpPostCreate+0x2a1.
86ede018 85af8802 abf4de00 abf4dfd8 97618008 fltmgr!FltpPerformPostCallbacks+0x270.
86ede038 85af79d3 97618008 00000000 891516c8 fltmgr!FltpPassThroughCompletionWorker+0x66.
86ede07c 85b112d8 00000000 00000000 891516c8 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2db.
86ede0d4 814bbc90 891516c8 abf4de00 abf4de00 fltmgr!FltpCreate+0x2cb.
86ede0f4 816e08fb a7b79073 aefafe84 8e537e08 nt!IofCallDriver+0x40.
86ede208 817716cd 8e537e08 80336560 aefafd20 nt!IopParseDevice+0x51b.
86ede2ac 816dac3a 82401148 80336560 816dec00 nt!ObpLookupObjectName+0x5cd.
86ede324 81769117 86edfadc 80336560 816dec00 nt!ObOpenObjectByName+0x18a.
86ede3b0 81726998 86edfadc 86ede568 00000000 nt!IopCreateFile+0x867.
86ede3f0 81565e2b 86ede598 80000000 86edfadc nt!NtOpenFile+0x2a.
86ede3f0 81553dad 86ede598 80000000 86edfadc nt!KiSystemServicePostCall.
86ede480 bb81766a 86ede598 80000000 86edfadc nt!ZwOpenFile+0x11.
WARNING: Stack unwind information not available. Following frames may be wrong.
86edfaf8 8172d420 abf45df0 af38e000 80ac8cf0 BEDaisy+0xa66a.
86edfcd8 8172cd32 00000000 86edfcf4 80ac8cf0 nt!IopLoadDriver+0x632.
86edfcfc 8152a1dd 80ac8cf0 00000000 80322880 nt!IopLoadUnloadDriver+0x46.
86edfd68 814e3c19 8163e1a0 a7b78fcb 00000000 nt!ExpWorkerThread+0x6b5.
86edfdb0 8156e40d 81529b28 8163e1a0 00000000 nt!PspSystemThreadStartup+0x17f.
86edfdbc 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x15.

SYMBOL_NAME: BEDaisy+a66a.

MODULE_NAME: BEDaisy.

IMAGE_NAME: BEDaisy.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: a66a.

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_BEDaisy!unknown_function.

OS_VERSION: 8.1.9600.19761.

BUILDLAB_STR: winblue_ltsb.

OSPLATFORM_TYPE: x86.

OSNAME: Windows 8.1.

FAILURE_ID_HASH: {e7e6e20d-61d9-e646-e80d-6ce996a3e106}

Followup: MachineOwner.
---------


Windows 10'a neden geçmiyorsun?

Windows 10'un bilgisayarımda donma yapacağını düşünüyorum.
 

Yeni konular

Geri
Yukarı