Windows Wi-Fi sürücüsü çöküyor | Technopat Sosyal

Microsoft (r) Windows debugger version 10.0.25200.1003 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.

Loading dump file [C:UsersAdministratorAppDataLocalTempRar$DIa5020.1395062523-9875-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (16 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Machine name:
Kernel base = 0xfffff802`54200000 psloadedmodulelist = 0xfffff802`54e2a2d0
Debug session time: Sun jun 25 20:24:55.707 2023 (utc + 3:00)
System uptime: 0 days 0:01:19.317
Loading kernel symbols.

Press CTRL-C (cdb, kd, ntsd) or CTRL-break (WinDbg) to abort symbol loads that take too long.
Run! Sym noisy before. Reload to track down problems loading symbols.

Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff802’545fc030 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffff581’E91eb580 = 000000000000000A.
12: Kd>!analyze -v
* *
* Bugcheck analysis *
* *

An attempt was made to Access’a pageable (or completely invalid) address at an.
İnterrupt request level (IRQL) that is too high. This is usually.
Caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arg1: 0000000000000000, Memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, Value 0 = read operation, 1 = write operation.
Arg4: FffFF804A1Aaff66, address which referenced Memory.

Debugging details:

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4452.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 5882.

Key: Analysis. IO. Other. MB.
Value: 0

Key: Analysis. IO. Read. MB.
Value: 0

Key: Analysis. IO. Write. MB.
Value: 0

Key: Analysis. Init. CPU. Msec.
Value: 843.

Key: Analysis. Init. Elapsed. Msec.
Value: 9270.

Key: Analysis. Memory.commitpeak. MB.
Value: 97.

Key: Bugcheck. Code. Dumpheader.
Value: 0xd1.

Key: Bugcheck. Code. Register.
Value: 0xa.

Key: Dump. Attributes. Asulong.
Value: 8

Key: Dump. Attributes. Kernelgeneratedtriagedump
Value: 1

Fıle_ın_cab: 062523-9875-01.dmp

Dump_fıle_attrıbutes: 0x8.
Kernel generated triage dump.

Bugcheck_code: D1.

Bugcheck_p1: 0

Bugcheck_p2: 2

Bugcheck_p3: 0

Bugcheck_p4: FffFF804A1Aaff66.

Read_address: FffFF80254Efb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: System.

Trap_frame: FffFF581E91eb6C0 — (.trap 0xfffff581e91eb6c0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000000005 rbx = 0000000000000000 rcx = fffFF804A1B7F040.
Rdx = 0000000000000000 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF804A1Aaff66 rsp = fffFF581E91eb850 rbp = 0000000000000000.
R8 = 0000000000000000 R9 = fffFD00BB1C230A8 R10 = fffFF804A1B77A30.
R11 = fffFF581E91eb880 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei pl zr AC po nc.
Wdiwifi! Ctxentrytable: Getnexttxentry+0xbe:
Fffff804’a1aaff66 42803C0701 cmp byte ptr [rdi+r8],1 DS: 00000000’00000000=?
Resetting default scope.

Fffff581’E91eb578 fffff802’54610029: 00000000’0000000A 00000000’00000000 00000000’00000002 00000000’00000000: NT! Kebugcheckex.
Fffff581’E91eb580 fffff802’5460BBE3: 00000000’00000000 00000000’00000000 ffffd00b’a3AE8048 00000013’545a0126: NT! Kibugcheckdispatch+0x69
Fffff581’E91eb6C0 fffff804’a1aaff66: 00000000’00000004 fffff581’E91eb8D8 00000000’00000004 fffff581’E91eb8e0: NT! Kipagefault+0x463
Fffff581’E91eb850 fffff804’a1ab83F5: Ffffd00b’BE99D230 fffff581’E91eb910 00000000’00000000 fffff802’4ef176e0: Wdiwifi! Ctxentrytable: Getnexttxentry+0xbe
Fffff581’E91eb8a0 fffff804’a1aa7ff8: Ffffd00b’A4010000 00000000’00000003 00000000’00000001 fffff804’0000001F: Wdiwifi! Ctxmgr: Txsendpauseınd+0x4e1
Fffff581’E91eb940 fffff804’A19621A9: Ffffd00b’A4010000 fffff804’a1a7a000 00000000’00000000 00000000’00000000: Wdiwifi! Adaptertxsendpauseınd+0x18
Fffff581’E91eb980 ffffd00b’A4010000: Fffff804’a1a7a000 00000000’00000000 00000000’00000000 00000000’00000001: Mtkwl6ex+0x621A9
Fffff581’E91eb988 fffff804’a1a7a000: 00000000’00000000 00000000’00000000 00000000’00000001 00000000’000F4240: 0xffffd00b`a4010000
Fffff581’E91eb990 00000000’00000000: 00000000’00000000 00000000’00000001 00000000’000F4240 ffffd00b’A4010108: Mtkwl6ex+0x17A000

Symbol_name: Wdiwifi! Ctxentrytable: Getnexttxentry+be

Module_name: Wdiwifi.

Image_name: wdiwifi.sys

Image_versıon: 10.0.19041.2965

Stack_command: Cxr. Ecxr; KB.

Bucket_ıd_func_offset: Be.

Faılure_bucket_ıd: Av_wdiwifi! Ctxentrytable: Getnexttxentry.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {a9D3D045-C30e-FAEA-A006-7D8965F3fbd9}

Followup: Machineowner.