Stre
Yoctopat
- Katılım
- 5 Eylül 2021
- Mesajlar
- 2
Daha fazla
- Cinsiyet
- Erkek
Merhaba, yaklaşık 4 5 aydır düzenli olarak mavi ekran ve durup dururken yeniden başlatma hatalarıyla karşı karşıyayım. Genelde bilgisayarı zorlamıyorum dizi ve film izlerken sistem bir anda donuyor ve aniden hiçbir hata vermeden yeniden başlatıyor. Aynı şekilde bazen kitlenip mavi ekran hatası veriyor. Oyunlarda ise bir anda hiçbir hata vermeden oyun kapanıyor. Recep Baltaş'ın videolarını izleyerek mavi ekran analizi yaptım ve sonuçları Google'dan arattım. Yine bu forumdaki konuları inceleyerek çözüm aradım ancak yaptıklarım herhangi bir sonuç vermedi. Şu an Memtest86 ile RAM testi yapıyorum aşağıya ekran görüntüsünü eklediğim hata ile karşılaştım ancak yaptığım araştırmalarda yeterince açık bir sonuca ulaşamadım. Şu ana kadar yaptıklarım şöyle: Temiz ve güncel bir Windows kurulumu yaparak bütün driverları özenle güncelledim. AIDA64 ile sistemin yükteki ve boştaki voltajlarını takip ettim gözüme bir sorun çarpmadı, sıcaklık değerlerini takip ettim termal macun yeniledim, BIOS'u sıfırladım ardından en son sürüme güncelledim ( başıma daha büyük bir sorun açtı garip şekilde bilgisayarı ilk başlattığımda bütün ışıklar yanmasına karşın ekrana görüntü gelmiyor ancak gücü kesip tekrar başlatınca görüntü alabiliyorum), başka bir bilgisayardan aynı değerlerde farklı bir RAM taktım, yeni bir SSD aldım ancak hiçbiri fayda etmedi. Memtest86'da aldığım hata ektedir, minidump dosyalarını birazdan yükleyeceğim. Şimdiden yardımlarınız için teşekkür ederim.
Sistem özelliklerim:
Ryzen 5 1600.
Sapphire RX580.
Corsair Vengeance LPX 8 GB 3000MHz DDR4.
Patriot Viper SteelSeries 8 GB 3000MHz DDR4 (RAM'i yeni aldım bütün bu sorunlar almadan önce de vardı.)
1. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80130c6d640, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff80130c6d598, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 45072
Key : Analysis.Init.CPU.mSec
Value: 405
Key : Analysis.Init.Elapsed.mSec
Value: 2726
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80130c6d640
BUGCHECK_P3: fffff80130c6d598
BUGCHECK_P4: 0
TRAP_FRAME: fffff80130c6d640 -- (.trap 0xfffff80130c6d640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc38b72f8b158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc38b6e87f158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012d412aa0 rsp=fffff80130c6d7d0 rbp=fffff80128d3e180
r8=0000000000000102 r9=0000000000000000 r10=fffff80128d41ac0
r11=0000001caed39d08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!KiTryUnwaitThread+0x1c6750:
fffff801`2d412aa0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80130c6d598 -- (.exr 0xfffff80130c6d598)
ExceptionAddress: fffff8012d412aa0 (nt!KiTryUnwaitThread+0x00000000001c6750)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff801`30c6d318 fffff801`2d407d69 : 00000000`00000139 00000000`00000003 fffff801`30c6d640 fffff801`30c6d598 : nt!KeBugCheckEx
fffff801`30c6d320 fffff801`2d408190 : 00000000`00000000 ffffc38b`6c7f86c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff801`30c6d460 fffff801`2d406523 : 00000000`00000000 fffff801`28d461c8 00000000`00012b84 ffffcf86`cd2cbc38 : nt!KiFastFailDispatch+0xd0
fffff801`30c6d640 fffff801`2d412aa0 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff801`30c6d7d0 fffff801`2d2452d6 : ffffc38b`72f8b188 00000000`00000000 ffffc38b`72f8b250 00000000`00000000 : nt!KiTryUnwaitThread+0x1c6750
fffff801`30c6d830 fffff801`2d244e7c : ffffc38b`72f8b180 00000000`00000000 fffff801`30c6db18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6
fffff801`30c6d8e0 fffff801`2d2072e9 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00072bcc : nt!KiProcessExpiredTimerList+0xdc
fffff801`30c6d9d0 fffff801`2d3f99ae : 00000000`00000000 fffff801`28d3e180 fffff801`2dd27600 ffffc38b`71383080 : nt!KiRetireDpcList+0x9d9
fffff801`30c6dc60 00000000`00000000 : fffff801`30c6e000 fffff801`30c68000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+1e6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1e6
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
2. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc8f110929f0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffc8f11092948, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3811
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3958
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 4653
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc8f110929f0
BUGCHECK_P3: fffffc8f11092948
BUGCHECK_P4: 0
TRAP_FRAME: fffffc8f110929f0 -- (.trap 0xfffffc8f110929f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb186e6d1e218 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb186e4c02840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023e84533b rsp=fffffc8f11092b80 rbp=0000000000000002
r8=fffffc8f11092e68 r9=0000000000000000 r10=fffff8023c3deac0
r11=00000046791902f9 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiTimerWaitTest+0x24b:
fffff802`3e84533b cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffc8f11092948 -- (.exr 0xfffffc8f11092948)
ExceptionAddress: fffff8023e84533b (nt!KiTimerWaitTest+0x000000000000024b)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DPC_STACK_BASE: FFFFFC8F11092FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffc8f`110926c8 fffff802`3ea07d69 : 00000000`00000139 00000000`00000003 fffffc8f`110929f0 fffffc8f`11092948 : nt!KeBugCheckEx
fffffc8f`110926d0 fffff802`3ea08190 : 00000000`00000006 00000001`00000000 00000001`ffffffff fffffff6`0000000d : nt!KiBugCheckDispatch+0x69
fffffc8f`11092810 fffff802`3ea06523 : 00000000`00000004 ffffb186`e5f6f080 00000000`00000246 fffff802`3e84b0b6 : nt!KiFastFailDispatch+0xd0
fffffc8f`110929f0 fffff802`3e84533b : ffffb186`df257ae8 00000000`00000000 ffffb186`e49090a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc8f`11092b80 fffff802`3e844e7c : ffffb186`e6d1e210 00000000`00000000 fffffc8f`11092e68 ffffb186`e4c02840 : nt!KiTimerWaitTest+0x24b
fffffc8f`11092c30 fffff802`3e8072e9 : ffffdd00`3ef00180 4d8b4800`00000000 00000000`00000000 00000000`00119e5e : nt!KiProcessExpiredTimerList+0xdc
fffffc8f`11092d20 fffff802`3e9fce85 : 8b481d74`77753987 ffffdd00`3ef00180 ffffb186`d74cac40 00000000`26e856b0 : nt!KiRetireDpcList+0x9d9
fffffc8f`11092fb0 fffff802`3e9fcc70 : fffff802`3e9f1f30 fffff802`3e8ec5ca 00000000`00000000 00000000`006aeff8 : nt!KxRetireDpcList+0x5
fffffc8f`12f7eac0 fffff802`3e9fc525 : 00000000`26e856b0 fffff802`3e9f7ed1 00000000`0c31fb14 00000000`2638f844 : nt!KiDispatchInterruptContinue
fffffc8f`12f7eaf0 fffff802`3e9f7ed1 : 00000000`0c31fb14 00000000`2638f844 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffc8f`12f7eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
SYMBOL_NAME: nt!KiTimerWaitTest+24b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 24b
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
3. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 000000000000809a, Incorrect checksum
Arg4: 0000000000007fe1, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3156
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11479
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 194037
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: 809a
BUGCHECK_P4: 7fe1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffff686`4339c2e8 fffff802`279a07ee : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`0000809a : nt!KeBugCheckEx
fffff686`4339c2f0 fffff802`279adc01 : 00000000`00000001 ffff8388`3d180050 00000001`6fbc5000 ffff8388`473b6000 : nt!PopHiberChecksumHiberFileData+0x103ae
fffff686`4339c350 fffff802`279ad5b6 : 00000000`00000000 ffff9508`11391f38 fffff686`4339c450 00000000`00000002 : nt!PopRequestRead+0x7d
fffff686`4339c3c0 fffff802`273856e4 : ffff9508`11391dd0 00000000`00000000 fffff802`25c51010 fffff802`272d2a97 : nt!PopDecompressCallback+0x16
fffff686`4339c3f0 fffff802`2758c602 : ffff8388`4759a4db 00000000`0000ff55 ffff8388`47596000 ffffc180`7db13000 : nt!RtlpMakeXpressCallback+0x24
fffff686`4339c420 fffff802`2758c43c : ffffc180`7db13000 fffff686`4339c600 00000000`00010000 00000012`3b6754ed : nt!RtlDecompressBufferXpressHuffProgress+0x1b2
fffff686`4339c4a0 fffff802`2799eacb : 00000000`00000001 fffff686`4339c600 00000000`00000000 00000000`00010000 : nt!RtlDecompressBufferProgress+0xbc
fffff686`4339c500 fffff802`2799fde4 : 00000001`94ae1000 ffff9508`11391f38 00000000`00000001 00000000`00000001 : nt!PopDecompressHiberBlocks+0x111df
fffff686`4339c720 fffff802`2798f5d0 : 00000012`2f58f32d ffff9508`11391f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x106bc
fffff686`4339c7b0 fffff802`2798f316 : fffff802`27c505a0 fffff686`4339c930 fffff802`27c505a0 00000000`00000100 : nt!PopHandleNextState+0x210
fffff686`4339c800 fffff802`2798f093 : 00000000`00000100 fffff802`27c505a0 00000000`0ad2eadd 00000000`00989680 : nt!PopIssueNextState+0x1a
fffff686`4339c830 fffff802`27991c99 : fffff686`4339cb20 00000000`00000000 00000000`00000000 fffff802`27991a1f : nt!PopInvokeSystemStateHandler+0x33b
fffff686`4339ca30 fffff802`2798c98a : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9
fffff686`4339caf0 fffff802`2798c675 : 00000000`00000000 00000000`00000000 00000000`00000001 ffff8388`3809b040 : nt!MmDuplicateMemory+0x2be
fffff686`4339cb80 fffff802`27317e85 : ffff8388`4415f000 ffff8388`4415f080 fffff802`2798c540 000f8067`bcbbbdff : nt!PopTransitionToSleep+0x135
fffff686`4339cc10 fffff802`273fd498 : ffffc180`7bf9d180 ffff8388`4415f080 fffff802`27317e30 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffff686`4339cc60 00000000`00000000 : fffff686`4339d000 fffff686`43397000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+103ae
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 103ae
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
4. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa88000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8062dc91580, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3425
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 195309
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa88000000000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8062dc91580
READ_ADDRESS: fffff8062e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa88000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffffe6010c3e93f0 -- (.trap 0xffffe6010c3e93f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa88000000000 rbx=0000000000000000 rcx=ffffa88000000000
rdx=ffff980c06143290 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062dc91580 rsp=ffffe6010c3e9588 rbp=ffffa88000000000
r8=0000000000120000 r9=0000000000120000 r10=00000007df5c9e10
r11=ffff980c141b8380 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff806`2dc91580 488b01 mov rax,qword ptr [rcx] ds:ffffa880`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffe601`0c3e92a8 fffff806`2de07d69 : 00000000`0000000a ffffa880`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe601`0c3e92b0 fffff806`2de04069 : ffffa8d4`6a3517e0 ffffe601`0c3e96c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe601`0c3e93f0 fffff806`2dc91580 : fffff806`2dd12d1a 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 : nt!KiPageFault+0x469
ffffe601`0c3e9588 fffff806`2dd12d1a : 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 ffffe601`0c3e96c0 : nt!MI_READ_PTE_LOCK_FREE
ffffe601`0c3e9590 fffff806`2dc1ee0b : ffff980c`06143290 ffffe601`0c3e96c0 ffffa8be`fb44f080 00000000`00000000 : nt!MiSkipFractionalPagefileRegion+0x62
ffffe601`0c3e95c0 fffff806`2dca4895 : 00000000`00000001 ffffe601`0c3e9848 00007df6`89e10000 00000000`001f3fff : nt!MiQueryAddressState+0x8fb
ffffe601`0c3e97d0 fffff806`2e03524c : ffffe601`0c3e0000 00000000`00000000 ffff980c`00000000 ffff980c`00000000 : nt!MiQueryAddressSpan+0x175
ffffe601`0c3e9890 fffff806`2e0349f5 : ffffa8d4`40838020 ffffa8d4`6a2041c0 ffffa8d4`6a351020 ffff980c`12131700 : nt!MmQueryVirtualMemory+0x83c
ffffe601`0c3e9a40 fffff806`2de077b8 : 00000000`00000000 00000000`00000000 00000000`00000000 000000fa`996fe9a8 : nt!NtQueryVirtualMemory+0x25
ffffe601`0c3e9a90 00007ffe`d068d184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fa`996feb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d068d184
SYMBOL_NAME: nt!MI_READ_PTE_LOCK_FREE+0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: AV_nt!MI_READ_PTE_LOCK_FREE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {46795dd4-7dde-8cf0-b2ba-3f69fbe2847b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa88000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8062dc91580, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3425
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 195309
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa88000000000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8062dc91580
READ_ADDRESS: fffff8062e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa88000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffffe6010c3e93f0 -- (.trap 0xffffe6010c3e93f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa88000000000 rbx=0000000000000000 rcx=ffffa88000000000
rdx=ffff980c06143290 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062dc91580 rsp=ffffe6010c3e9588 rbp=ffffa88000000000
r8=0000000000120000 r9=0000000000120000 r10=00000007df5c9e10
r11=ffff980c141b8380 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff806`2dc91580 488b01 mov rax,qword ptr [rcx] ds:ffffa880`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffe601`0c3e92a8 fffff806`2de07d69 : 00000000`0000000a ffffa880`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe601`0c3e92b0 fffff806`2de04069 : ffffa8d4`6a3517e0 ffffe601`0c3e96c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe601`0c3e93f0 fffff806`2dc91580 : fffff806`2dd12d1a 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 : nt!KiPageFault+0x469
ffffe601`0c3e9588 fffff806`2dd12d1a : 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 ffffe601`0c3e96c0 : nt!MI_READ_PTE_LOCK_FREE
ffffe601`0c3e9590 fffff806`2dc1ee0b : ffff980c`06143290 ffffe601`0c3e96c0 ffffa8be`fb44f080 00000000`00000000 : nt!MiSkipFractionalPagefileRegion+0x62
ffffe601`0c3e95c0 fffff806`2dca4895 : 00000000`00000001 ffffe601`0c3e9848 00007df6`89e10000 00000000`001f3fff : nt!MiQueryAddressState+0x8fb
ffffe601`0c3e97d0 fffff806`2e03524c : ffffe601`0c3e0000 00000000`00000000 ffff980c`00000000 ffff980c`00000000 : nt!MiQueryAddressSpan+0x175
ffffe601`0c3e9890 fffff806`2e0349f5 : ffffa8d4`40838020 ffffa8d4`6a2041c0 ffffa8d4`6a351020 ffff980c`12131700 : nt!MmQueryVirtualMemory+0x83c
ffffe601`0c3e9a40 fffff806`2de077b8 : 00000000`00000000 00000000`00000000 00000000`00000000 000000fa`996fe9a8 : nt!NtQueryVirtualMemory+0x25
ffffe601`0c3e9a90 00007ffe`d068d184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fa`996feb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d068d184
SYMBOL_NAME: nt!MI_READ_PTE_LOCK_FREE+0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: AV_nt!MI_READ_PTE_LOCK_FREE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {46795dd4-7dde-8cf0-b2ba-3f69fbe2847b}
Followup: MachineOwner
---------
Sistem özelliklerim:
Ryzen 5 1600.
Sapphire RX580.
Corsair Vengeance LPX 8 GB 3000MHz DDR4.
Patriot Viper SteelSeries 8 GB 3000MHz DDR4 (RAM'i yeni aldım bütün bu sorunlar almadan önce de vardı.)
1. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80130c6d640, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff80130c6d598, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 45072
Key : Analysis.Init.CPU.mSec
Value: 405
Key : Analysis.Init.Elapsed.mSec
Value: 2726
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80130c6d640
BUGCHECK_P3: fffff80130c6d598
BUGCHECK_P4: 0
TRAP_FRAME: fffff80130c6d640 -- (.trap 0xfffff80130c6d640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc38b72f8b158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc38b6e87f158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012d412aa0 rsp=fffff80130c6d7d0 rbp=fffff80128d3e180
r8=0000000000000102 r9=0000000000000000 r10=fffff80128d41ac0
r11=0000001caed39d08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!KiTryUnwaitThread+0x1c6750:
fffff801`2d412aa0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80130c6d598 -- (.exr 0xfffff80130c6d598)
ExceptionAddress: fffff8012d412aa0 (nt!KiTryUnwaitThread+0x00000000001c6750)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff801`30c6d318 fffff801`2d407d69 : 00000000`00000139 00000000`00000003 fffff801`30c6d640 fffff801`30c6d598 : nt!KeBugCheckEx
fffff801`30c6d320 fffff801`2d408190 : 00000000`00000000 ffffc38b`6c7f86c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff801`30c6d460 fffff801`2d406523 : 00000000`00000000 fffff801`28d461c8 00000000`00012b84 ffffcf86`cd2cbc38 : nt!KiFastFailDispatch+0xd0
fffff801`30c6d640 fffff801`2d412aa0 : 00000000`00000000 00000000`00989680 00000000`00000002 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff801`30c6d7d0 fffff801`2d2452d6 : ffffc38b`72f8b188 00000000`00000000 ffffc38b`72f8b250 00000000`00000000 : nt!KiTryUnwaitThread+0x1c6750
fffff801`30c6d830 fffff801`2d244e7c : ffffc38b`72f8b180 00000000`00000000 fffff801`30c6db18 00000000`00000000 : nt!KiTimerWaitTest+0x1e6
fffff801`30c6d8e0 fffff801`2d2072e9 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00072bcc : nt!KiProcessExpiredTimerList+0xdc
fffff801`30c6d9d0 fffff801`2d3f99ae : 00000000`00000000 fffff801`28d3e180 fffff801`2dd27600 ffffc38b`71383080 : nt!KiRetireDpcList+0x9d9
fffff801`30c6dc60 00000000`00000000 : fffff801`30c6e000 fffff801`30c68000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+1e6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1e6
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
2. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffc8f110929f0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffc8f11092948, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3811
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3958
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 4653
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffc8f110929f0
BUGCHECK_P3: fffffc8f11092948
BUGCHECK_P4: 0
TRAP_FRAME: fffffc8f110929f0 -- (.trap 0xfffffc8f110929f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb186e6d1e218 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb186e4c02840 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023e84533b rsp=fffffc8f11092b80 rbp=0000000000000002
r8=fffffc8f11092e68 r9=0000000000000000 r10=fffff8023c3deac0
r11=00000046791902f9 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiTimerWaitTest+0x24b:
fffff802`3e84533b cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffc8f11092948 -- (.exr 0xfffffc8f11092948)
ExceptionAddress: fffff8023e84533b (nt!KiTimerWaitTest+0x000000000000024b)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
DPC_STACK_BASE: FFFFFC8F11092FB0
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffc8f`110926c8 fffff802`3ea07d69 : 00000000`00000139 00000000`00000003 fffffc8f`110929f0 fffffc8f`11092948 : nt!KeBugCheckEx
fffffc8f`110926d0 fffff802`3ea08190 : 00000000`00000006 00000001`00000000 00000001`ffffffff fffffff6`0000000d : nt!KiBugCheckDispatch+0x69
fffffc8f`11092810 fffff802`3ea06523 : 00000000`00000004 ffffb186`e5f6f080 00000000`00000246 fffff802`3e84b0b6 : nt!KiFastFailDispatch+0xd0
fffffc8f`110929f0 fffff802`3e84533b : ffffb186`df257ae8 00000000`00000000 ffffb186`e49090a0 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffc8f`11092b80 fffff802`3e844e7c : ffffb186`e6d1e210 00000000`00000000 fffffc8f`11092e68 ffffb186`e4c02840 : nt!KiTimerWaitTest+0x24b
fffffc8f`11092c30 fffff802`3e8072e9 : ffffdd00`3ef00180 4d8b4800`00000000 00000000`00000000 00000000`00119e5e : nt!KiProcessExpiredTimerList+0xdc
fffffc8f`11092d20 fffff802`3e9fce85 : 8b481d74`77753987 ffffdd00`3ef00180 ffffb186`d74cac40 00000000`26e856b0 : nt!KiRetireDpcList+0x9d9
fffffc8f`11092fb0 fffff802`3e9fcc70 : fffff802`3e9f1f30 fffff802`3e8ec5ca 00000000`00000000 00000000`006aeff8 : nt!KxRetireDpcList+0x5
fffffc8f`12f7eac0 fffff802`3e9fc525 : 00000000`26e856b0 fffff802`3e9f7ed1 00000000`0c31fb14 00000000`2638f844 : nt!KiDispatchInterruptContinue
fffffc8f`12f7eaf0 fffff802`3e9f7ed1 : 00000000`0c31fb14 00000000`2638f844 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffc8f`12f7eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1
SYMBOL_NAME: nt!KiTimerWaitTest+24b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 24b
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {efb56395-a173-53f8-073d-d3c8cfd50e2b}
Followup: MachineOwner
---------
3. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 000000000000809a, Incorrect checksum
Arg4: 0000000000007fe1, Previous disk read's checksum
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3156
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11479
Key : Analysis.Init.CPU.mSec
Value: 515
Key : Analysis.Init.Elapsed.mSec
Value: 194037
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a0
BUGCHECK_P1: 10e
BUGCHECK_P2: a
BUGCHECK_P3: 809a
BUGCHECK_P4: 7fe1
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffff686`4339c2e8 fffff802`279a07ee : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`0000809a : nt!KeBugCheckEx
fffff686`4339c2f0 fffff802`279adc01 : 00000000`00000001 ffff8388`3d180050 00000001`6fbc5000 ffff8388`473b6000 : nt!PopHiberChecksumHiberFileData+0x103ae
fffff686`4339c350 fffff802`279ad5b6 : 00000000`00000000 ffff9508`11391f38 fffff686`4339c450 00000000`00000002 : nt!PopRequestRead+0x7d
fffff686`4339c3c0 fffff802`273856e4 : ffff9508`11391dd0 00000000`00000000 fffff802`25c51010 fffff802`272d2a97 : nt!PopDecompressCallback+0x16
fffff686`4339c3f0 fffff802`2758c602 : ffff8388`4759a4db 00000000`0000ff55 ffff8388`47596000 ffffc180`7db13000 : nt!RtlpMakeXpressCallback+0x24
fffff686`4339c420 fffff802`2758c43c : ffffc180`7db13000 fffff686`4339c600 00000000`00010000 00000012`3b6754ed : nt!RtlDecompressBufferXpressHuffProgress+0x1b2
fffff686`4339c4a0 fffff802`2799eacb : 00000000`00000001 fffff686`4339c600 00000000`00000000 00000000`00010000 : nt!RtlDecompressBufferProgress+0xbc
fffff686`4339c500 fffff802`2799fde4 : 00000001`94ae1000 ffff9508`11391f38 00000000`00000001 00000000`00000001 : nt!PopDecompressHiberBlocks+0x111df
fffff686`4339c720 fffff802`2798f5d0 : 00000012`2f58f32d ffff9508`11391f38 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x106bc
fffff686`4339c7b0 fffff802`2798f316 : fffff802`27c505a0 fffff686`4339c930 fffff802`27c505a0 00000000`00000100 : nt!PopHandleNextState+0x210
fffff686`4339c800 fffff802`2798f093 : 00000000`00000100 fffff802`27c505a0 00000000`0ad2eadd 00000000`00989680 : nt!PopIssueNextState+0x1a
fffff686`4339c830 fffff802`27991c99 : fffff686`4339cb20 00000000`00000000 00000000`00000000 fffff802`27991a1f : nt!PopInvokeSystemStateHandler+0x33b
fffff686`4339ca30 fffff802`2798c98a : ffffffff`00000000 ffffffff`ffffffff 00000000`00000000 00000000`00000000 : nt!PopEndMirroring+0x1e9
fffff686`4339caf0 fffff802`2798c675 : 00000000`00000000 00000000`00000000 00000000`00000001 ffff8388`3809b040 : nt!MmDuplicateMemory+0x2be
fffff686`4339cb80 fffff802`27317e85 : ffff8388`4415f000 ffff8388`4415f080 fffff802`2798c540 000f8067`bcbbbdff : nt!PopTransitionToSleep+0x135
fffff686`4339cc10 fffff802`273fd498 : ffffc180`7bf9d180 ffff8388`4415f080 fffff802`27317e30 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffff686`4339cc60 00000000`00000000 : fffff686`4339d000 fffff686`43397000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+103ae
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 103ae
FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}
Followup: MachineOwner
---------
4. Dosya:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa88000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8062dc91580, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3425
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 195309
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa88000000000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8062dc91580
READ_ADDRESS: fffff8062e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa88000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffffe6010c3e93f0 -- (.trap 0xffffe6010c3e93f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa88000000000 rbx=0000000000000000 rcx=ffffa88000000000
rdx=ffff980c06143290 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062dc91580 rsp=ffffe6010c3e9588 rbp=ffffa88000000000
r8=0000000000120000 r9=0000000000120000 r10=00000007df5c9e10
r11=ffff980c141b8380 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff806`2dc91580 488b01 mov rax,qword ptr [rcx] ds:ffffa880`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffe601`0c3e92a8 fffff806`2de07d69 : 00000000`0000000a ffffa880`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe601`0c3e92b0 fffff806`2de04069 : ffffa8d4`6a3517e0 ffffe601`0c3e96c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe601`0c3e93f0 fffff806`2dc91580 : fffff806`2dd12d1a 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 : nt!KiPageFault+0x469
ffffe601`0c3e9588 fffff806`2dd12d1a : 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 ffffe601`0c3e96c0 : nt!MI_READ_PTE_LOCK_FREE
ffffe601`0c3e9590 fffff806`2dc1ee0b : ffff980c`06143290 ffffe601`0c3e96c0 ffffa8be`fb44f080 00000000`00000000 : nt!MiSkipFractionalPagefileRegion+0x62
ffffe601`0c3e95c0 fffff806`2dca4895 : 00000000`00000001 ffffe601`0c3e9848 00007df6`89e10000 00000000`001f3fff : nt!MiQueryAddressState+0x8fb
ffffe601`0c3e97d0 fffff806`2e03524c : ffffe601`0c3e0000 00000000`00000000 ffff980c`00000000 ffff980c`00000000 : nt!MiQueryAddressSpan+0x175
ffffe601`0c3e9890 fffff806`2e0349f5 : ffffa8d4`40838020 ffffa8d4`6a2041c0 ffffa8d4`6a351020 ffff980c`12131700 : nt!MmQueryVirtualMemory+0x83c
ffffe601`0c3e9a40 fffff806`2de077b8 : 00000000`00000000 00000000`00000000 00000000`00000000 000000fa`996fe9a8 : nt!NtQueryVirtualMemory+0x25
ffffe601`0c3e9a90 00007ffe`d068d184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fa`996feb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d068d184
SYMBOL_NAME: nt!MI_READ_PTE_LOCK_FREE+0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: AV_nt!MI_READ_PTE_LOCK_FREE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {46795dd4-7dde-8cf0-b2ba-3f69fbe2847b}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa88000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8062dc91580, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3374
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3425
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 195309
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa88000000000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8062dc91580
READ_ADDRESS: fffff8062e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa88000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffffe6010c3e93f0 -- (.trap 0xffffe6010c3e93f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa88000000000 rbx=0000000000000000 rcx=ffffa88000000000
rdx=ffff980c06143290 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062dc91580 rsp=ffffe6010c3e9588 rbp=ffffa88000000000
r8=0000000000120000 r9=0000000000120000 r10=00000007df5c9e10
r11=ffff980c141b8380 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff806`2dc91580 488b01 mov rax,qword ptr [rcx] ds:ffffa880`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffe601`0c3e92a8 fffff806`2de07d69 : 00000000`0000000a ffffa880`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffe601`0c3e92b0 fffff806`2de04069 : ffffa8d4`6a3517e0 ffffe601`0c3e96c0 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe601`0c3e93f0 fffff806`2dc91580 : fffff806`2dd12d1a 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 : nt!KiPageFault+0x469
ffffe601`0c3e9588 fffff806`2dd12d1a : 00000000`00000000 ffffa8be`fb44f080 00000000`00000000 ffffe601`0c3e96c0 : nt!MI_READ_PTE_LOCK_FREE
ffffe601`0c3e9590 fffff806`2dc1ee0b : ffff980c`06143290 ffffe601`0c3e96c0 ffffa8be`fb44f080 00000000`00000000 : nt!MiSkipFractionalPagefileRegion+0x62
ffffe601`0c3e95c0 fffff806`2dca4895 : 00000000`00000001 ffffe601`0c3e9848 00007df6`89e10000 00000000`001f3fff : nt!MiQueryAddressState+0x8fb
ffffe601`0c3e97d0 fffff806`2e03524c : ffffe601`0c3e0000 00000000`00000000 ffff980c`00000000 ffff980c`00000000 : nt!MiQueryAddressSpan+0x175
ffffe601`0c3e9890 fffff806`2e0349f5 : ffffa8d4`40838020 ffffa8d4`6a2041c0 ffffa8d4`6a351020 ffff980c`12131700 : nt!MmQueryVirtualMemory+0x83c
ffffe601`0c3e9a40 fffff806`2de077b8 : 00000000`00000000 00000000`00000000 00000000`00000000 000000fa`996fe9a8 : nt!NtQueryVirtualMemory+0x25
ffffe601`0c3e9a90 00007ffe`d068d184 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fa`996feb68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d068d184
SYMBOL_NAME: nt!MI_READ_PTE_LOCK_FREE+0
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.928
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: AV_nt!MI_READ_PTE_LOCK_FREE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {46795dd4-7dde-8cf0-b2ba-3f69fbe2847b}
Followup: MachineOwner
---------
Son düzenleme: