Çözüldü Ryzen 3600 sistem mavi ekran hataları

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Alper Gökmen

Hectopat
Katılım
23 Temmuz 2020
Mesajlar
34
Çözümler
2
Sürekli Google üzerinden video izlerken (YouTube'da) veya film falan izlerken (Chrome üzerinden yine) mavi ekran hatası alıyorum.
(Minidump Dosyası linki) işlemci ve anakartı servise gönderdim bir şey çıkmadı.

Sistem özellikleri:

AMD Ryzen 5 3600.

MSI RTX 2060 Super Gaming X.

Corsair vegeance 3200 MHz (8x2)

Seagate Barracuda 1 TB 7200 RPM HDD.

Corsair MP510 480GB SSD.

Cooler Master Elite V3.
 
Son düzenleyen: Moderatör:
Çözüm
Sonuç olarak çözüm bulamadınız hala o zaman?

Maalesef mavi ekran almam çok sayıda azaldı ama hala alıyorum haftada 3 bazen hiç, bu konuyu açtığım zamanlarda 15 20'şer dakikada 1 hata alıyordum Google'dan YouTube'dan video vs izleyemiyordum.

Sistemi DDR5'e geçirme kararı verdim zaten anakart ve işlemci kaynaklı bir problem olduğunu düşünüyordum ve bu yükseltme sonrası mavi ekran sorunun ortadan kalktı bu tarz sorunu olan bir arkadaş varsa (oyun açıkken mavi ekran yemeyip PC boştayken ya da basit işler için kullanılırken sürekli mavi ekran yiyorsa) bu 2 parçadan birinden şüphelenebilirler.
Bende de aynı şey daha dün oldu ama başka bir şekilde. Ekrandaki görüntü vs. bozuldu. Ama virüs değildi GPU'yu 3 saat durmadan 100% çalıştıracak bir uygulama çalıştırdığım için muhtemelen yüksek ısıdan veya o programdaki hata.

Belki de eğer fazla ısındıysa zarar görmüş olabilir. Dediğimiz gibi emojinin altında yazanı bize aktarabilirseniz veya direk mavi ekranı aktarabilirseniz daha kolay yardımcı oluruz. Şu an bir sürü ihtimal var.
 
Arkadaşlar Öncelikle Teşekkürler Yardımlarınız İçin teşekkür ederim öncelikle Sistemi 0 Topladım Yani Herhangi Bir Upgrade yapmadım bir tek sonradan SSD aldım fakat SSD almadan önce de hata veriyordu performanstan yana sıkıntım yok tek kötü yanı dediğim gibi Chrome üzerindeyken alıyorum %99 oyun oynarken veya performans testlerindeyken bir sıkıntı yok (işletim sistemi kurarken de vermişti önceden ondan 7 8 kere baştan kurarak yapmayı denedim şuanki kullandığımda vermeden kurdum)

(Bir de ek olarak HDD'den kaynaklı düşünebilirsiniz HDD takılı değilken sadece SSD takılıyken de hata alıyordum yani depolama birimleri ayrı ayrı takılıyken de aynı anda takılıyken de mavi ekran alıyorum)
Hata Kodları; / IRQL_NOT_LESS_OR_EQUAL / KMODE_EXCEPTION_NOT_HANDLED / IRQL_NOT_LESS_OR_EQUAL en son aldığım hatada kod bildirilmiyor (BlueScreenView üzerinden)
Arkadaşlar şimdi WinDbg Preview diye bir program ile kontrol ediyorum tahminlerimde RAM veya ekran kartı vardı WinDbg Preview'den 1 dump dosyasına baktım ondaki hatayada bu 2 parçadan 1'i neden oluyormuş yarın diğer 4 dosyaya bakacağım ona göre karar verip parçayı servise göndereceğim
Arkadaşlar sorun ekran kartında olduğunu düşünüyorum şimdi hatırladım Memtest86 programı ile birkaçsaatlik test ettim ve sorun olmamıştı herhangi bir hata vermemişti yine de diğer dump dosyalarını WinDbg Preview ile kontrol edeceğim.
 
Son düzenleyen: Moderatör:
İlk olarak Vanguard kaldırın, MSI araçlarını kaldırın CCleaner ile temizlik yapıp kaldırın.

BIOS default edip kaydedin BIOS'da boost özelliği varsa açıksa kapatın.

Klavye ve fare hariç tüm USB kablolarını çıkartın kullanmayın. USB ses cihazı var gözüküyor (Razer oılabilir) yazılım veya sürücüleri varsa kaldırın.
 
İlk olarak Vanguard kaldırın, MSI araçlarını kaldırın CCleaner ile temizlik yapıp kaldırın.

BIOS default edip kaydedin BIOS'da Boost özelliği varsa açıksa kapatın.

Klavye ve fare hariç tüm USB kablolarını çıkartın kullanmayın. USB ses cihazı var gözüküyor (Razer oılabilir) yazılım veya sürücüleri varsa kaldırın.

Ürünlerimi Direk Söyleyeyim Razer Mamba Elite, Razer Ornata, Gamepower Luna Kulaklık
Bir de anakartı yazmayı unutmuşum MSI B450 Tomahawk.
 
Son düzenleyen: Moderatör:
Arkadaşlar RAM'leri Windows aracılığıyla tekrar test ettim sorun çıkmadı. Yakın zamanda ekran kartını servise göndereceğim ona göre sizlere bildiririm düzelip düzelmediğini. Yardımlarınızdan dolayı teşekkür ederim.
 
Son düzenleyen: Moderatör:
Yakın zamanda işlemci ve başka önemli bir parçayı değiştirdiysen Driver uyuşmazlığından da olabiliyor. Mavi ekran çıktığında genelde üzgün emojisinin altında ne olduğu yazar. Bir dahakine oraya bakıp buraya yazarsan daha kolay çözüm buluruz.
Adam Minidump atmış, daha ne atsın? Açıp oradan öğrenebilirsin kodları. Konusunu okdunuz mu bu cevabı yazmadan önce?
Bellek sorunu gibi.
  • Anakart nedir?
  • XMP açık mı?
  • BIOS güncel mi?
Memtest testi yapıp sonucu paylaşın:


Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe80963ad4460, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000009e, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031a6cbd9c, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7171

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffe80963ad4460

BUGCHECK_P2: ff

BUGCHECK_P3: 9e

BUGCHECK_P4: fffff8031a6cbd9c

READ_ADDRESS: fffff8031b0fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffe80963ad4460

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8a8241629960 -- (.trap 0xffff8a8241629960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
 r8=0000000000002715  r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128        add     qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
Resetting default scope

STACK_TEXT: 
ffff8a82`41629818 fffff803`1a7ef929     : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
ffff8a82`41629820 fffff803`1a7ebc29     : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
ffff8a82`41629960 fffff803`1a6cbd9c     : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
ffff8a82`41629af0 fffff803`1a7e1544     : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
ffff8a82`41629c60 00000000`00000000     : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PoIdle+fc

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fc

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PoIdle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e4da1044-dba7-2394-a0c7-af0e27cae716}

Followup:     MachineOwner
---------

1: kd> .bugcheck
Bugcheck code 0000000A
Arguments ffffe809`63ad4460 00000000`000000ff 00000000`0000009e fffff803`1a6cbd9c
1: kd> kb
 # RetAddr               : Args to Child                                                           : Call Site
00 fffff803`1a7ef929     : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 fffff803`1a7ebc29     : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 fffff803`1a6cbd9c     : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
03 fffff803`1a7e1544     : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 00000000`00000000     : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> kv
 # Child-SP          RetAddr               : Args to Child                                                           : Call Site
00 ffff8a82`41629818 fffff803`1a7ef929     : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 ffff8a82`41629820 fffff803`1a7ebc29     : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 ffff8a82`41629960 fffff803`1a6cbd9c     : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469 (TrapFrame @ ffff8a82`41629960)
03 ffff8a82`41629af0 fffff803`1a7e1544     : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 ffff8a82`41629c60 00000000`00000000     : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> .trap ffff8a82`41629960
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
 r8=0000000000002715  r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128        add     qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80330accb61, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 000000000000031c, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9514

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80330accb61

BUGCHECK_P3: 1

BUGCHECK_P4: 31c

WRITE_ADDRESS: fffff803314fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000000000031c

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  000000000000031c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8033666b590 -- (.trap 0xfffff8033666b590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330b84ee0 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80330accb61 rsp=fffff8033666b720 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000001 r10=00000000ffffffff
r11=ffff917e69c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!PpmIdleExecuteTransition+0x9d1:
fffff803`30accb61 899e1c030000    mov     dword ptr [rsi+31Ch],ebx ds:00000000`0000031c=????????
Resetting default scope

STACK_TEXT: 
fffff803`3666a558 fffff803`30d00c3e     : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
fffff803`3666a560 fffff803`30be68e2     : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff803`3666a5a0 fffff803`30a32fb7     : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
fffff803`3666a5d0 fffff803`30a7b226     : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
fffff803`3666acf0 fffff803`30befa6c     : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
fffff803`3666b3b0 fffff803`30bebc03     : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
fffff803`3666b590 fffff803`30accb61     : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
fffff803`3666b720 fffff803`30acc014     : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
fffff803`3666baf0 fffff803`30be1544     : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
fffff803`3666bc60 00000000`00000000     : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PpmIdleExecuteTransition+9d1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9d1

FAILURE_BUCKET_ID:  0x1E_c0000005_W_nt!PpmIdleExecuteTransition

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {33165129-5eba-df70-5004-10486d097d7a}

Followup:     MachineOwner
---------

0: kd> kb
 # RetAddr               : Args to Child                                                           : Call Site
00 fffff803`30d00c3e     : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
01 fffff803`30be68e2     : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
02 fffff803`30a32fb7     : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
03 fffff803`30a7b226     : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
04 fffff803`30befa6c     : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
05 fffff803`30bebc03     : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
06 fffff803`30accb61     : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
07 fffff803`30acc014     : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
08 fffff803`30be1544     : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
09 00000000`00000000     : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff9f8625e57080, The address of the thread.
Arg2: ffffce8e811b3b80, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4717

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  192

BUGCHECK_P1: ffff9f8625e57080

BUGCHECK_P2: ffffce8e811b3b80

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

STACK_TEXT: 
ffffc68b`b986f558 fffff807`1f425a7b     : 00000000`00000192 ffff9f86`25e57080 ffffce8e`811b3b80 00000000`00000000 : nt!KeBugCheckEx
ffffc68b`b986f560 fffff807`1f7f35e2     : 00000000`00000000 ffff9f86`25b24230 ffffce8e`00000000 ffff9f86`25b24230 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffc68b`b986f5a0 fffff807`1f81350d     : ffff9f86`1b010340 ffff9f86`1b012900 ffff9f86`1b015d80 00000000`00000080 : nt!ObpCreateHandle+0x3f2
ffffc68b`b986f790 fffff807`1f812741     : 00000000`00000001 ffffc68b`b986fb80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x13d
ffffc68b`b986fa20 fffff807`1f5ef478     : ffff9f86`25e57080 000000b6`c2dff978 ffffc68b`b986faa8 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffc68b`b986fa90 00007ffb`b5eeb694     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`c2dff958 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b5eeb694


SYMBOL_NAME:  nt!ExAcquirePushLockExclusiveEx+14b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14b

FAILURE_BUCKET_ID:  0x192_nt!ExAcquirePushLockExclusiveEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {70f07b19-205c-f6b9-7ad5-00ec20680212}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80676436c74, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6228

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80676436c74

READ_ADDRESS: fffff80676efa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000001

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80679c6b6a0 -- (.trap 0xfffff80679c6b6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676436c74 rsp=fffff80679c6b830 rbp=0000000000000001
 r8=0000000000000102  r9=0000000000000000 r10=fffff80671b27ac0
r11=0000000f8dcdabea r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiTimerWaitTest+0x1c4:
fffff806`76436c74 4d8b36          mov     r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
fffff806`79c6b558 fffff806`765ef929     : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`79c6b560 fffff806`765ebc29     : fffff806`79c6b6b8 00000000`00000018 fffff806`76551a00 fffff806`84d41101 : nt!KiBugCheckDispatch+0x69
fffff806`79c6b6a0 fffff806`76436c74     : ffffc80a`b2b0c408 00000000`00000000 ffffc80a`b2b0c4d0 00000000`00000000 : nt!KiPageFault+0x469
fffff806`79c6b830 fffff806`7643683c     : ffffc80a`b2b0c400 00000000`00000000 fffff806`79c6bb18 00000000`00000000 : nt!KiTimerWaitTest+0x1c4
fffff806`79c6b8e0 fffff806`7643a169     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003e38b : nt!KiProcessExpiredTimerList+0xdc
fffff806`79c6b9d0 fffff806`765e158e     : 00000000`00000000 fffff806`71b24180 fffff806`76f26600 ffffc80a`b6a22080 : nt!KiRetireDpcList+0x9d9
fffff806`79c6bc60 00000000`00000000     : fffff806`79c6c000 fffff806`79c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiTimerWaitTest+1c4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c4

FAILURE_BUCKET_ID:  AV_nt!KiTimerWaitTest

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup:     MachineOwner
---------
 
Son düzenleme:
  • Anakart nedir?
  • XMP açık mı?
  • BIOS güncel mi?
Memtest testi yapıp sonucu paylaşın:


Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe80963ad4460, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000009e, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031a6cbd9c, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3608

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7171

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: ffffe80963ad4460

BUGCHECK_P2: ff

BUGCHECK_P3: 9e

BUGCHECK_P4: fffff8031a6cbd9c

READ_ADDRESS: fffff8031b0fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe80963ad4460

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8a8241629960 -- (.trap 0xffff8a8241629960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
r8=0000000000002715  r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128        add     qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
Resetting default scope

STACK_TEXT:
ffff8a82`41629818 fffff803`1a7ef929     : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
ffff8a82`41629820 fffff803`1a7ebc29     : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
ffff8a82`41629960 fffff803`1a6cbd9c     : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
ffff8a82`41629af0 fffff803`1a7e1544     : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
ffff8a82`41629c60 00000000`00000000     : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PoIdle+fc

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fc

FAILURE_BUCKET_ID:  AV_CODE_AV_nt!PoIdle

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e4da1044-dba7-2394-a0c7-af0e27cae716}

Followup:     MachineOwner
---------

1: kd> .bugcheck
Bugcheck code 0000000A
Arguments ffffe809`63ad4460 00000000`000000ff 00000000`0000009e fffff803`1a6cbd9c
1: kd> kb
# RetAddr               : Args to Child                                                           : Call Site
00 fffff803`1a7ef929     : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 fffff803`1a7ebc29     : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 fffff803`1a6cbd9c     : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
03 fffff803`1a7e1544     : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 00000000`00000000     : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> kv
# Child-SP          RetAddr               : Args to Child                                                           : Call Site
00 ffff8a82`41629818 fffff803`1a7ef929     : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 ffff8a82`41629820 fffff803`1a7ebc29     : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 ffff8a82`41629960 fffff803`1a6cbd9c     : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469 (TrapFrame @ ffff8a82`41629960)
03 ffff8a82`41629af0 fffff803`1a7e1544     : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 ffff8a82`41629c60 00000000`00000000     : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> .trap ffff8a82`41629960
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
r8=0000000000002715  r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128        add     qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80330accb61, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 000000000000031c, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6202

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9514

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80330accb61

BUGCHECK_P3: 1

BUGCHECK_P4: 31c

WRITE_ADDRESS: fffff803314fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000031c

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  000000000000031c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8033666b590 -- (.trap 0xfffff8033666b590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330b84ee0 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80330accb61 rsp=fffff8033666b720 rbp=0000000000000000
r8=0000000000000000  r9=0000000000000001 r10=00000000ffffffff
r11=ffff917e69c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!PpmIdleExecuteTransition+0x9d1:
fffff803`30accb61 899e1c030000    mov     dword ptr [rsi+31Ch],ebx ds:00000000`0000031c=????????
Resetting default scope

STACK_TEXT:
fffff803`3666a558 fffff803`30d00c3e     : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
fffff803`3666a560 fffff803`30be68e2     : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff803`3666a5a0 fffff803`30a32fb7     : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
fffff803`3666a5d0 fffff803`30a7b226     : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
fffff803`3666acf0 fffff803`30befa6c     : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
fffff803`3666b3b0 fffff803`30bebc03     : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
fffff803`3666b590 fffff803`30accb61     : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
fffff803`3666b720 fffff803`30acc014     : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
fffff803`3666baf0 fffff803`30be1544     : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
fffff803`3666bc60 00000000`00000000     : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PpmIdleExecuteTransition+9d1

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9d1

FAILURE_BUCKET_ID:  0x1E_c0000005_W_nt!PpmIdleExecuteTransition

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {33165129-5eba-df70-5004-10486d097d7a}

Followup:     MachineOwner
---------

0: kd> kb
# RetAddr               : Args to Child                                                           : Call Site
00 fffff803`30d00c3e     : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
01 fffff803`30be68e2     : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
02 fffff803`30a32fb7     : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
03 fffff803`30a7b226     : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
04 fffff803`30befa6c     : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
05 fffff803`30bebc03     : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
06 fffff803`30accb61     : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
07 fffff803`30acc014     : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
08 fffff803`30be1544     : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
09 00000000`00000000     : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff9f8625e57080, The address of the thread.
Arg2: ffffce8e811b3b80, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 4717

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  192

BUGCHECK_P1: ffff9f8625e57080

BUGCHECK_P2: ffffce8e811b3b80

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  nvcontainer.exe

STACK_TEXT:
ffffc68b`b986f558 fffff807`1f425a7b     : 00000000`00000192 ffff9f86`25e57080 ffffce8e`811b3b80 00000000`00000000 : nt!KeBugCheckEx
ffffc68b`b986f560 fffff807`1f7f35e2     : 00000000`00000000 ffff9f86`25b24230 ffffce8e`00000000 ffff9f86`25b24230 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffc68b`b986f5a0 fffff807`1f81350d     : ffff9f86`1b010340 ffff9f86`1b012900 ffff9f86`1b015d80 00000000`00000080 : nt!ObpCreateHandle+0x3f2
ffffc68b`b986f790 fffff807`1f812741     : 00000000`00000001 ffffc68b`b986fb80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x13d
ffffc68b`b986fa20 fffff807`1f5ef478     : ffff9f86`25e57080 000000b6`c2dff978 ffffc68b`b986faa8 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffc68b`b986fa90 00007ffb`b5eeb694     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`c2dff958 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b5eeb694


SYMBOL_NAME:  nt!ExAcquirePushLockExclusiveEx+14b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14b

FAILURE_BUCKET_ID:  0x192_nt!ExAcquirePushLockExclusiveEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {70f07b19-205c-f6b9-7ad5-00ec20680212}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80676436c74, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6228

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80676436c74

READ_ADDRESS: fffff80676efa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000001

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80679c6b6a0 -- (.trap 0xfffff80679c6b6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676436c74 rsp=fffff80679c6b830 rbp=0000000000000001
r8=0000000000000102  r9=0000000000000000 r10=fffff80671b27ac0
r11=0000000f8dcdabea r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiTimerWaitTest+0x1c4:
fffff806`76436c74 4d8b36          mov     r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
fffff806`79c6b558 fffff806`765ef929     : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`79c6b560 fffff806`765ebc29     : fffff806`79c6b6b8 00000000`00000018 fffff806`76551a00 fffff806`84d41101 : nt!KiBugCheckDispatch+0x69
fffff806`79c6b6a0 fffff806`76436c74     : ffffc80a`b2b0c408 00000000`00000000 ffffc80a`b2b0c4d0 00000000`00000000 : nt!KiPageFault+0x469
fffff806`79c6b830 fffff806`7643683c     : ffffc80a`b2b0c400 00000000`00000000 fffff806`79c6bb18 00000000`00000000 : nt!KiTimerWaitTest+0x1c4
fffff806`79c6b8e0 fffff806`7643a169     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003e38b : nt!KiProcessExpiredTimerList+0xdc
fffff806`79c6b9d0 fffff806`765e158e     : 00000000`00000000 fffff806`71b24180 fffff806`76f26600 ffffc80a`b6a22080 : nt!KiRetireDpcList+0x9d9
fffff806`79c6bc60 00000000`00000000     : fffff806`79c6c000 fffff806`79c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiTimerWaitTest+1c4

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.329

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1c4

FAILURE_BUCKET_ID:  AV_nt!KiTimerWaitTest

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup:     MachineOwner
---------
[/QUOTE]

(Öncelikle her kelimenin baş harfini büyük yazmam alışkanlık olmuş bende her şeyde böyle yazıyorum o yüzden kusura bakmayın dikkat edeceğim)

Anakart modelim MSI B450 Tomahawk
BIOS sürüm / 7C02V1E
XMP Kapalı benim şüphelendiğim RAM ile ekran kartıydı ve haklı çıktım Windbg Preview (sizin en son videonuz aracılığıyla öğrendiğim program) üzerinden kontrol edince, RAM'leri Windows'un bellek tanılama testini yaptım (birkaç ay önceden de yapmıştım)
Sorun çıkmadı yine Memtest 86 testi yapmıştım (birkaç ay önce, en kapsamlı test ile birkaç saat test edildi) ondanda bir hata sonucu almamıştım bundan dolayı ekran kartımdan şüpheleniyorum
Ayrıca konumu görüp yardım etmenize ayrı bir mutlu oldum çok teşekkür ederim
Şimdi eve geldim bellek tanılama sonuçlarını atayım bide telefonda bulursam birkaç ay önce yaptığım memtest 86 test sonucunu bulayım
Bellek tanılama sonucu
Günlük Adı: System
Kaynak: Microsoft-Windows-MemoryDiagnostics-Results
Tarih: 24.07.2020 13:29:17
Olay Kimliği: 1101
Görev Kategorisi:Yok
Düzey: Bilgi
Anahtar sözcükler:
Kullanıcı: SYSTEM
Bilgisayar: DESKTOP-RP9LE0O
Açıklama:
Günlük Adı: System
Kaynak: Microsoft-Windows-MemoryDiagnostics-Results
Tarih: 24.07.2020 13:29:17
Olay Kimliği: 1101
Görev Kategorisi:Yok
Düzey: Bilgi
Anahtar sözcükler:
Kullanıcı: SYSTEM
Bilgisayar: DESKTOP-RP9LE0O
Açıklama:
The Windows Memory Diagnostic tested the computer's memory and detected no errors
Olay Xml'si:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-MemoryDiagnostics-Results" Guid="{5f92bc59-248f-4111-86a9-e393e12c6139}" />
<EventID>1101</EventID>
<Version>0</Version>
<Level>4</Level>
<Task>0</Task>
<Opcode>0</Opcode>
<Keywords>0x8000000000000000</Keywords>
<TimeCreated SystemTime="2020-07-24T10:29:17.0673302Z" />
<EventRecordID>3581</EventRecordID>
<Correlation />
<Execution ProcessID="7220" ThreadID="7224" />
<Channel>System</Channel>
<Computer>DESKTOP-RP9LE0O</Computer>
<Security UserID="S-1-5-18" />
</System>
<UserData>
<Results xmlns="http://manifests.microsoft.com/win/2005/08/windows/Reliability/Postboot/Events">
<LaunchType>Manual</LaunchType>
<CompletionType>Pass</CompletionType>
<MemorySize>16333</MemorySize>
<TestType>10</TestType>
<TestDuration>1903</TestDuration>
<TestCount>12</TestCount>
<NumPagesTested>4156536</NumPagesTested>
<NumPagesUnTested>1731</NumPagesUnTested>
<NumBadPages>0</NumBadPages>
<T1NumBadPages>0</T1NumBadPages>
<T2NumBadPages>0</T2NumBadPages>
<T3NumBadPages>0</T3NumBadPages>
<T4NumBadPages>0</T4NumBadPages>
<T5NumBadPages>0</T5NumBadPages>
<T6NumBadPages>0</T6NumBadPages>
<T7NumBadPages>0</T7NumBadPages>
<T8NumBadPages>0</T8NumBadPages>
<T9NumBadPages>0</T9NumBadPages>
<T10NumBadPages>0</T10NumBadPages>
<T11NumBadPages>0</T11NumBadPages>
<T12NumBadPages>0</T12NumBadPages>
<T13NumBadPages>0</T13NumBadPages>
<T14NumBadPages>0</T14NumBadPages>
<T15NumBadPages>0</T15NumBadPages>
<T16NumBadPages>0</T16NumBadPages>
</Results>
</UserData>
</Event>

-----------------------------------
Memtest86 elimde bulunan screenshot
WhatsApp Image 2020-07-25 at 00.31.56.jpeg

(bu testi yaptığım zamanlarda xmp açık olabilir)(bilgisayarı toplam 6 7 kere format atmam gerekti çünkü windows kurarkende hata veriyordu zor bela hata vermeden 1 kez kurdum win 10 pro ondan sonrada tekrar home kurdum bu test pro versiyonundayken olabilir)(yaklaşık 2- 3 kere memtest86 testi yapmıştım en kapsamlısı bu olmak üzere diğerlerindede bundada bir hata görmedim)
Yeni daha fazla hatanın neden olduğu kaynağı bulmak için youtubede zaman geçiriyorum ve memory_management hatası aldım preview sonuçları


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`40600000 PsLoadedModuleList = 0xfffff806`4122a310
Debug session time: Sat Jul 25 15:03:01.235 2020 (UTC + 3:00)
System Uptime: 0 days 1:20:18.942
Loading Kernel Symbols
...............................................................
....Page 385364 not present in the dump file. Type ".hh dbgerr004" for details
............................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000bc`93c75018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`409ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff9f04`2d9f5960=000000000000001a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 0000028931e77000
Arg3: 000000000000000f
Arg4: ffff9f042d9f5b00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1811

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 1808

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 28931e77000

BUGCHECK_P3: f

BUGCHECK_P4: ffff9f042d9f5b00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffff9f04`2d9f5958 fffff806`40a020a6 : 00000000`0000001a 00000000`00061941 00000289`31e77000 00000000`0000000f : nt!KeBugCheckEx
ffff9f04`2d9f5960 fffff806`409ebc1e : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd78c`00000000 : nt!MmAccessFault+0x1ef7a6
ffff9f04`2d9f5b00 00007ff9`dcaf0cf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000bc`9b7ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dcaf0cf4


MODULE_NAME: hardware

IMAGE_NAME: hardware_ram

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup: MachineOwner
---------
Sorunun neyden kaynaklandığını hala anlayabilmiş değilim yardımlarınızı bekliyorum
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`23000000 PsLoadedModuleList = 0xfffff803`23c2a310
Debug session time: Sat Jul 25 16:25:57.428 2020 (UTC + 3:00)
System Uptime: 0 days 1:22:28.078
Loading Kernel Symbols
...............................................................
.....Page 13dc4e not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
...............................................................
Loading User Symbols

Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`233ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8804`44c29350=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff803232cd92e, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80333c2bd22, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2687

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6184

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: fffff803232cd92e

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80333c2bd22

READ_ADDRESS: fffff803232cd92e

ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

PROCESS_NAME: System

TRAP_FRAME: ffff880444c29490 -- (.trap 0xffff880444c29490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000085ded25366 rbx=0000000000000000 rcx=0000008511100e78
rdx=0000008c0b11ad1b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80333c2bd22 rsp=ffff880444c29620 rbp=ffff880444c29650
r8=0000000000000000 r9=00000000000000e8 r10=ffffa88253598578
r11=ffffa88253598578 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac po nc
amdppm+0xbd22:
fffff803`33c2bd22 488906 mov qword ptr [rsi],rax ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffff8804`44c29348 fffff803`233efa29 : 00000000`0000000a fffff803`232cd92e 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff8804`44c29350 fffff803`233ebd29 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8804`44c29490 fffff803`33c2bd22 : ffffbb00`617ea100 fffff803`232cd92e ffff8804`44c29680 00000000`00000000 : nt!KiPageFault+0x469
ffff8804`44c29620 fffff803`232cd26c : 0000008c`0b11ad1b ffffbb00`617ea1c8 00000085`11100e78 ffffbb00`617ea210 : amdppm+0xbd22
ffff8804`44c29670 fffff803`232cc6fd : 0000007c`676442c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmUpdatePerformanceFeedback+0x16c
ffff8804`44c29720 fffff803`232cc034 : 00000000`00000000 00001fa0`0045006b 00000000`00000000 00000000`00000002 : nt!PpmIdleExecuteTransition+0x54d
ffff8804`44c29af0 fffff803`233e1684 : ffffffff`00000000 ffffbb00`617ed340 ffffa882`576990c0 00000000`00000654 : nt!PoIdle+0x374
ffff8804`44c29c60 00000000`00000000 : ffff8804`44c2a000 ffff8804`44c24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME: amdppm+bd22

MODULE_NAME: amdppm

IMAGE_NAME: amdppm.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: bd22

FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_amdppm!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5e1247f1-ee9a-c0ed-5172-4a788588c200}

Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\072520-9578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`29800000 PsLoadedModuleList = 0xfffff805`2a42a310
Debug session time: Sat Jul 25 16:34:44.317 2020 (UTC + 3:00)
System Uptime: 0 days 0:08:17.968
Loading Kernel Symbols
...............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`29bddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd484`7d140770=0000000000000139
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: ffffd4847d140a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd4847d1409e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2843

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 9308

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 1e

BUGCHECK_P2: ffffd4847d140a90

BUGCHECK_P3: ffffd4847d1409e8

BUGCHECK_P4: 0

IMAGE_NAME: ntkrnlmp.exe

MODULE_NAME: ntkrnlmp

FAULTING_MODULE: fffff80529800000 nt

TRAP_FRAME: ffffd4847d140a90 -- (.trap 0xffffd4847d140a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=000000000000001e
rdx=fffff8052a4fcc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80529c629d3 rsp=ffffd4847d140c20 rbp=ffffd680912d5180
r8=0000000000000000 r9=ffffd4847d140fb0 r10=0000000000000000
r11=000000000000001a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x17e703:
fffff805`29c629d3 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffd4847d1409e8 -- (.exr 0xffffd4847d1409e8)
ExceptionAddress: fffff80529c629d3 (nt!KeQueryValuesThread+0x000000000017e703)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 000000000000001e
Subcode: 0x1e FAST_FAIL_INVALID_NEXT_THREAD

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: PMRunner32.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 000000000000001e

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffd484`7d140768 fffff805`29befa29 : 00000000`00000139 00000000`0000001e ffffd484`7d140a90 ffffd484`7d1409e8 : nt!KeBugCheckEx
ffffd484`7d140770 fffff805`29befe50 : fffff805`29b17530 fffff805`29b121f0 ffffd484`7d140a80 ffffa806`74091040 : nt!KiBugCheckDispatch+0x69
ffffd484`7d1408b0 fffff805`29bee1e3 : ffffffff`ffffffff 00000000`00000001 ffffd484`7d140bc0 00000000`00000100 : nt!KiFastFailDispatch+0xd0
ffffd484`7d140a90 fffff805`29c629d3 : ffffa806`73014c40 010000f0`000000f0 00000000`00000000 00001f80`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd484`7d140c20 fffff805`29e95a31 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeQueryValuesThread+0x17e703
ffffd484`7d140ca0 fffff805`29e956c2 : ffffa806`804b1660 ffffa806`804b18e0 ffffa806`83397080 00000000`00000001 : nt!PsQueryStatisticsProcess+0x111
ffffd484`7d140d20 fffff805`29df8071 : 00000000`00000001 ffffa806`804b1080 00000000`ffffffff 00000000`00000000 : nt!ExpCopyProcessInfo+0x42
ffffd484`7d140da0 fffff805`29dfbfc3 : 00000000`00000000 fffff805`00058400 00000000`00000000 00000000`00000000 : nt!ExpGetProcessInformation+0x9f1
ffffd484`7d141400 fffff805`29dfb6a7 : ffffa806`83397001 fffff805`00000000 00000000`00f36000 00000000`00010000 : nt!ExpQuerySystemInformation+0x7d3
ffffd484`7d141ac0 fffff805`29bef478 : ffffa806`83390000 00000000`00000000 ffffffff`fe363c80 ffffa806`00000000 : nt!NtQuerySystemInformation+0x37
ffffd484`7d141b00 00007ff9`8492b454 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0373e5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8492b454


IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x139_1e_INVALID_NEXT_THREAD-
IMAGE_ntkrnlmp.exe

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {64929928-a824-2134-285e-71128496d311}

Followup: MachineOwner
---------
Yinede Memtest86 Testi Yapayım Sonuçları Paylaşacağım
memtest86 test sonucu hiçbir error yok
---
TestInfo:
Type: 6
StartTime: 20200725180141
NumCPU: 12
CPUType: ! 'AMD Ryzen 5 3600 6-Core '
CPUSpeed: ! '3600 MHz [Turbo: 4075.7 MHz]'
Version:
Major: 8
Minor: 4
Build: 1001
Architecture: 64
MemTestHeader:
TotalPhys: 17141170176
TestMode: 0
AveSpeed: 6328374
ModuleManuf: Corsair
ModulePartNo: ! 'CMK16GX4M2E3200C16 '
RAMType: PC4-25600 DDR4 XMP 3200MHz
RAMTiming: 16-20-20-38
IsRead: true
ArraySize: 536870912
MinBlock: 0
MaxBlock: 0
AccessDataSize: 0
Results:
- [15534459, 1]
- [15420235, 2]
- [14979656, 4]
- [13443281, 8]
- [9475084, 16]
- [5748771, 32]
- [2387951, 64]
- [1735376, 128]
- [1814334, 256]
- [1685061, 512]
- [1651196, 1024]
- [1609584, 2048]
- [1582252, 4096]
- [1530005, 8192]
Checksum: 91f094b25b6460d0117d91ed1d966131abcef0245ccc37232306070f8c30c6da
...
WhatsApp Image 2020-07-25 at 21.31.59.jpeg

Xmp yi açacağım sırada fark ettim ram 2 kere hata vermiş normaldede böyle problemler olabilir mi?
WhatsApp Image 2020-07-25 at 21.35.26.jpeg

Bunlar bugün yaşadığım mavi ekran hataları minidumps

hepsine preview baktım
bide xmp yi açmamın üstüne mavi ekran hataları kat kat hızlandı normalde 2 saatlik bir videoda 2 kere veriyorken bu yazıyı yazmamın daha 2 cümlesinde hata verdi hep kernel ile ilgili hatalar veriyor yardımlarınızı bekliyorum yoksa aldığım günden beri kafayı yiyeceğim :)
minidumpson
buda üsteki yazıyı yazarken aldığım hata belki bir ipucu kaynağı olur diğe
linkleri bulamayanlara kapalı parantezle belirteyim
(minidumps)
( minidumpson )
Xmp yi açtıktan sonra ciddi bir şekilde mavi ekran hataları arttı normalde pc direk hata verirken şimdi donuyor ve uzun bir süre bekletiyor bende mecburen düğmeden kapatıyorum
 
Son düzenleme:
Adam minidump atmış, daha ne atsın? Açıp oradan öğrenebilirsin kodları. Konusunu okdunuz mu bu cevabı yazmadan önce?
Bellek sorunu gibi.
  • Anakart nedir?
  • XMP açık mı?
  • BIOS güncel mi?
Memtest testi yapıp sonucu paylaşın:


Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe80963ad4460, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 000000000000009e, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031a6cbd9c, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3608.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 7171.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: ffffe80963ad4460.

BUGCHECK_P2: ff.

BUGCHECK_P3: 9e.

BUGCHECK_P4: fffff8031a6cbd9c.

READ_ADDRESS: fffff8031b0fa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock.
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffe80963ad4460.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: ffff8a8241629960 -- (.trap 0xffff8a8241629960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000.
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0.
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010.
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di ng nz na pe nc.
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
Resetting default scope.

STACK_TEXT:
ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx.
ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69.
ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469.
ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc.
ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.

SYMBOL_NAME: nt!PoIdle+fc.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.329.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: fc.

FAILURE_BUCKET_ID: AV_CODE_AV_nt!PoIdle.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e4da1044-dba7-2394-a0c7-af0e27cae716}

Followup: MachineOwner.
---------

1: kd> .bugcheck.
Bugcheck code 0000000A.
Arguments ffffe809`63ad4460 00000000`000000ff 00000000`0000009e fffff803`1a6cbd9c.
1: kd> kb.
# RetAddr : Args to Child : Call Site.
00 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx.
01 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69.
02 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469.
03 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc.
04 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
1: kd> kv.
# Child-SP RetAddr : Args to Child : Call Site.
00 ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx.
01 ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69.
02 ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469 (TrapFrame @ ffff8a82`41629960)
03 ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc.
04 ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
1: kd> .trap ffff8a82`41629960.
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000.
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0.
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010.
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di ng nz na pe nc.
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff80330accb61, The address that the exception occurred at.
Arg3: 0000000000000001, Parameter 0 of the exception.
Arg4: 000000000000031c, Parameter 1 of the exception.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6202.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 9514.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 1e.

BUGCHECK_P1: ffffffffc0000005.

BUGCHECK_P2: fffff80330accb61.

BUGCHECK_P3: 1.

BUGCHECK_P4: 31c.

WRITE_ADDRESS: fffff803314fa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock.
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
000000000000031c.

EXCEPTION_PARAMETER1: 0000000000000001.

EXCEPTION_PARAMETER2: 000000000000031c.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8033666b590 -- (.trap 0xfffff8033666b590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330b84ee0 rbx=0000000000000000 rcx=0000000000000001.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80330accb61 rsp=fffff8033666b720 rbp=0000000000000000.
r8=0000000000000000 r9=0000000000000001 r10=00000000ffffffff.
r11=ffff917e69c00000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!PpmIdleExecuteTransition+0x9d1:
fffff803`30accb61 899e1c030000 mov dword ptr [rsi+31Ch],ebx ds:00000000`0000031c=????????
Resetting default scope.

STACK_TEXT:
fffff803`3666a558 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx.
fffff803`3666a560 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22.
fffff803`3666a5a0 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12.
fffff803`3666a5d0 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297.
fffff803`3666acf0 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186.
fffff803`3666b3b0 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c.
fffff803`3666b590 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443.
fffff803`3666b720 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1.
fffff803`3666baf0 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374.
fffff803`3666bc60 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.

SYMBOL_NAME: nt!PpmIdleExecuteTransition+9d1.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.329.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 9d1.

FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!PpmIdleExecuteTransition.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {33165129-5eba-df70-5004-10486d097d7a}

Followup: MachineOwner.
---------

0: kd> kb.
# RetAddr : Args to Child : Call Site.
00 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx.
01 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22.
02 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12.
03 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297.
04 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186.
05 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c.
06 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443.
07 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1.
08 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374.
09 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or.
above.
Arguments:
Arg1: ffff9f8625e57080, The address of the thread.
Arg2: ffffce8e811b3b80, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3234.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 4717.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 192.

BUGCHECK_P1: ffff9f8625e57080.

BUGCHECK_P2: ffffce8e811b3b80.

BUGCHECK_P3: 0.

BUGCHECK_P4: 0.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: nvcontainer.exe.

STACK_TEXT:
ffffc68b`b986f558 fffff807`1f425a7b : 00000000`00000192 ffff9f86`25e57080 ffffce8e`811b3b80 00000000`00000000 : nt!KeBugCheckEx.
ffffc68b`b986f560 fffff807`1f7f35e2 : 00000000`00000000 ffff9f86`25b24230 ffffce8e`00000000 ffff9f86`25b24230 : nt!ExAcquirePushLockExclusiveEx+0x14b.
ffffc68b`b986f5a0 fffff807`1f81350d : ffff9f86`1b010340 ffff9f86`1b012900 ffff9f86`1b015d80 00000000`00000080 : nt!ObpCreateHandle+0x3f2.
ffffc68b`b986f790 fffff807`1f812741 : 00000000`00000001 ffffc68b`b986fb80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x13d.
ffffc68b`b986fa20 fffff807`1f5ef478 : ffff9f86`25e57080 000000b6`c2dff978 ffffc68b`b986faa8 00000000`00000000 : nt!NtCreateEvent+0xe1.
ffffc68b`b986fa90 00007ffb`b5eeb694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000b6`c2dff958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b5eeb694.

SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+14b.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.388.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 14b.

FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80676436c74, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3624.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 6228.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 1.

BUGCHECK_P2: 2.

BUGCHECK_P3: 0.

BUGCHECK_P4: fffff80676436c74.

READ_ADDRESS: fffff80676efa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock.
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000001.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff80679c6b6a0 -- (.trap 0xfffff80679c6b6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80676436c74 rsp=fffff80679c6b830 rbp=0000000000000001.
r8=0000000000000102 r9=0000000000000000 r10=fffff80671b27ac0.
r11=0000000f8dcdabea r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!KiTimerWaitTest+0x1c4:
fffff806`76436c74 4d8b36 mov r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope.

STACK_TEXT:
fffff806`79c6b558 fffff806`765ef929 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff806`79c6b560 fffff806`765ebc29 : fffff806`79c6b6b8 00000000`00000018 fffff806`76551a00 fffff806`84d41101 : nt!KiBugCheckDispatch+0x69.
fffff806`79c6b6a0 fffff806`76436c74 : ffffc80a`b2b0c408 00000000`00000000 ffffc80a`b2b0c4d0 00000000`00000000 : nt!KiPageFault+0x469.
fffff806`79c6b830 fffff806`7643683c : ffffc80a`b2b0c400 00000000`00000000 fffff806`79c6bb18 00000000`00000000 : nt!KiTimerWaitTest+0x1c4.
fffff806`79c6b8e0 fffff806`7643a169 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003e38b : nt!KiProcessExpiredTimerList+0xdc.
fffff806`79c6b9d0 fffff806`765e158e : 00000000`00000000 fffff806`71b24180 fffff806`76f26600 ffffc80a`b6a22080 : nt!KiRetireDpcList+0x9d9.
fffff806`79c6bc60 00000000`00000000 : fffff806`79c6c000 fffff806`79c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiTimerWaitTest+1c4.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.329.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1c4.

FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup: MachineOwner.
---------

Özür dilerim minidump dosyasını görmemişim. Ben de yakın zamanda aynı sorunu yaşadığım için direk cevap yazdım. Kusura bakmayın.
 
KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE hatası aldım
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`36200000 PsLoadedModuleList = 0xfffff802`36e2a310
Debug session time: Mon Jul 27 16:10:38.123 2020 (UTC + 3:00)
System Uptime: 0 days 0:38:27.757
Loading Kernel Symbols
...............................................................
................................................................
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000070`b32d8018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`365ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff40d`c54985e0=0000000000000162
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE (162)
A lock tracked by AutoBoost was released by a thread that did not own the lock.
This is typically caused when some thread releases a lock on behalf of another
thread (which is not legal with AutoBoost tracking enabled) or when some thread
tries to release a lock it no longer owns.
Arguments:
Arg1: ffffb4086f2240c0, The address of the thread
Arg2: ffffa3807a87c100, The lock address
Arg3: 00000000ffffffff, The session ID of the thread
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2640

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2659

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 162

BUGCHECK_P1: ffffb4086f2240c0

BUGCHECK_P2: ffffa3807a87c100

BUGCHECK_P3: ffffffff

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: nvcontainer.exe

STACK_TEXT:
fffff40d`c54985d8 fffff802`365fad21 : 00000000`00000162 ffffb408`6f2240c0 ffffa380`7a87c100 00000000`ffffffff : nt!KeBugCheckEx
fffff40d`c54985e0 fffff802`367f4abc : ffffa380`0000003f fffff802`00000000 ffffffff`ffffffff ffffa380`8a7f9310 : nt!KeAbPostRelease+0x1d4b01
fffff40d`c5498640 fffff802`367fb11c : 00000000`000054c4 00000000`000007ff ffffa380`ffffffff 00000000`00000000 : nt!ObCloseHandleTableEntry+0x19c
fffff40d`c5498780 fffff802`365ef478 : 00000000`00000000 fffff802`00000000 fffff40d`c5498870 ffffa380`7a000ac0 : nt!NtClose+0xec
fffff40d`c54987f0 fffff802`365e19c0 : fffff802`3689f4b1 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffff40d`c5498988 fffff802`3689f4b1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff40d`c5498990 fffff802`38f192a2 : ffffffff`800054c4 00000000`00000000 ffffb408`64bf18c0 00000000`00000000 : nt!IoGetDeviceObjectPointer+0xe1
fffff40d`c5498a20 fffff802`38f190c3 : ffffb408`64bf18c0 ffffb408`6f947bc0 ffffb408`7845c0d0 00000000`00000000 : mountmgr!MountMgrQueryDosVolumePath+0xd2
fffff40d`c5498b50 fffff802`36446d45 : fffff40d`c5498cf0 ffffa380`d6bd4540 ffffa380`81dcb5b0 fffff40d`c5498c48 : mountmgr!MountMgrDeviceControl+0xb3
fffff40d`c5498bb0 fffff802`3689f332 : 00000000`00000010 fffff40d`c5498cf0 ffffa380`d6bd4540 00000000`00000000 : nt!IofCallDriver+0x55
fffff40d`c5498bf0 fffff802`3689eb57 : b4087601`0050fffe 00000000`000000c0 ffffa380`d6bd4540 ffffa380`d6bd4540 : nt!IoVolumeDeviceToDosName+0x232
fffff40d`c5498ec0 fffff802`3689ea6e : ffffb408`7845d200 ffffb408`00000000 fffff40d`c5499001 ffffa380`d6bd4540 : nt!IopQueryNameInternal+0xa3
fffff40d`c5498f70 fffff802`3686ecb8 : ffffb408`7845d200 fffff40d`c5499b80 ffffa380`000000d0 0000017e`5f6c9800 : nt!IoQueryFileDosDeviceName+0x5e
fffff40d`c5498fc0 fffff802`365ef478 : 00000000`00000002 00000000`00000001 00000000`00000000 0000017e`5f5411e4 : nt!NtQueryInformationProcess+0x968
fffff40d`c5499a90 00007ffd`dddeb0b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000070`b44ff018 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`dddeb0b4


SYMBOL_NAME: mountmgr!MountMgrQueryDosVolumePath+d2

MODULE_NAME: mountmgr

IMAGE_NAME: mountmgr.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d2

FAILURE_BUCKET_ID: 0x162_mountmgr!MountMgrQueryDosVolumePath

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {9924ce1c-a12e-8671-635f-acc1e09bf450}

Followup: MachineOwner
---------
dumpdosyaları
@Recep Baltaş ATTEMPTED_WRITE_TO_READONLY_MEMORY en son bu hata ile karşılaştım ve
(nvlddmkm.sys , nvlddmkm.sys+12d550) hatası , amdppm.sys hatası ve ntoskrnl.exe hata ayrıntılarını görmüş olmaktayım ben sorunun ekran kartımdan kaynaklandığını düşünüyorum sizin kadar anlamadığım için yinede size sormak istiyorum sizce hata belleklerden mi ekran kartından mı kaynaklanıyor
ATTEMPTED_WRITE_TO_READONLY_MEMORY bu hatadan öncede DRIVER_IRQL_NOT_LESS_OR_EQUAL hatası aldım zaten dump dosyalarını paylaştım inceleyebilirsiniz bende windbg preview dosyaları okumuyor önceden okuyor idi ama şimdi afk bir şekilde bekliyor.
ramler memtest 86 ile test edildi bellek tanılamayla test edildi sorun çıkmadı zaten son test etmemden sonra resimleri paylaşmıştım
 

Technopat Haberler

Yeni konular

Geri
Yukarı