ASUS X570-F ile RAM nasıl 3600 MHz'de çalıştırılır?

  • Konuyu başlatan Faeron
  • Başlangıç Tarihi
  • Mesaj 12
  • Görüntüleme 840

Faeron

Hectopat
Katılım
29 Mart 2020
Mesajlar
65
Anakart
X570-f asus rog
İşlemci
Ryzen 7 5800x
Arkadaşlar önceden 8x2 3000MHz RAM kullanıyordum 5800X ile.
Bugün RAM'lerimi yükseltmek istedim. Corsair'in CMW32GX4M2D3600C18 modelini aldım. Standart 2133 ile açıldı. BIOS'dan D.O.C.P. (sanırım böyleydi ismi) ile 3600 frekansa otomatik OC yapıyor.
Ankart modelim ise X570-F ASUS ROG fakat açılmadı PC. Açıldı kapandı, sonrasında girdim 3200'e çektim. Açıldı fakat mavi ekran hatası veriyor. Bunu 3600'de nasıl açabilirim?
 
Son düzenleyen: Moderatör:
Son çıkan sürüme geçip tekrar D.O.C.P. açmayı deneyin.


Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffe38b1c2a5e40, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffe38b1c2a5d98, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4771

    Key  : Analysis.IO.Other.Mb
    Value: 2

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 10

    Key  : Analysis.Init.CPU.mSec
    Value: 218

    Key  : Analysis.Init.Elapsed.mSec
    Value: 6803

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x139

    Key  : Bugcheck.Code.Register
    Value: 0x139

    Key  : FailFast.Name
    Value: INCORRECT_STACK

    Key  : FailFast.Type
    Value: 4

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  010622-7250-01.dmp

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffe38b1c2a5e40

BUGCHECK_P3: ffffe38b1c2a5d98

BUGCHECK_P4: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

EXCEPTION_RECORD:  ffffe38b1c2a5d98 -- (.exr 0xffffe38b1c2a5d98)
ExceptionAddress: fffff8005fc5a1e5 (nt!RtlpGetStackLimitsEx+0x00000000001736b5)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  wermgr.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffe38b`1c2a5b18 fffff800`5fc09069     : 00000000`00000139 00000000`00000004 ffffe38b`1c2a5e40 ffffe38b`1c2a5d98 : nt!KeBugCheckEx
ffffe38b`1c2a5b20 fffff800`5fc09490     : 00000000`00000001 ffffc907`2fb020c0 00000000`00000200 ffffc907`2fb02090 : nt!KiBugCheckDispatch+0x69
ffffe38b`1c2a5c60 fffff800`5fc07823     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe38b`1c2a5e40 fffff800`5fc5a1e5     : ffffe38b`1c2a6250 ffffe38b`1c2a6a18 ffffe38b`1c2a6040 ffffc907`23ff6910 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe38b`1c2a5fd0 fffff800`5fae6d01     : ffffe38b`1c2a6250 00000000`00000000 00000000`00000000 00000000`00000003 : nt!RtlpGetStackLimitsEx+0x1736b5
ffffe38b`1c2a6000 fffff800`5fae5ab6     : ffffe38b`1c2a6a18 ffffe38b`1c2a6750 ffffe38b`1c2a6a18 ffffe38b`1c287040 : nt!RtlDispatchException+0xe1
ffffe38b`1c2a6220 fffff800`5fc091ac     : 00000000`00001000 ffffe38b`1c2a6ac0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffe38b`1c2a68e0 fffff800`5fc05343     : ffffe38b`1c2a6b68 00000000`00000000 ffffc907`2493ddd0 fffff800`5caeaf6f : nt!KiExceptionDispatch+0x12c
ffffe38b`1c2a6ac0 00000000`00000000     : 00000000`c0000016 ffffe38b`1c2a6cd9 ffffc907`3499ea20 fffff800`5cae5359 : nt!KiPageFault+0x443


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1415

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup:     MachineOwner
---------

4: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.3, DMIVersion 0, Size=3074]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends Inc.
BiosVersion = 4021
BiosReleaseDate = 08/09/2021
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = ROG STRIX X570-F GAMING
BaseBoardVersion = Rev X.0x
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000001651f0, entry in list being removed
Arg3: 000000000082f37f, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3093

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 34440

    Key  : Analysis.IO.Other.Mb
    Value: 3

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 12

    Key  : Analysis.Init.CPU.mSec
    Value: 468

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8055

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x4e

    Key  : Bugcheck.Code.Register
    Value: 0x4e

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  010622-8437-01.dmp

BUGCHECK_CODE:  4e

BUGCHECK_P1: 2

BUGCHECK_P2: 1651f0

BUGCHECK_P3: 82f37f

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

STACK_TEXT: 
ffff830a`955ff028 fffff803`530aa9d9     : 00000000`0000004e 00000000`00000002 00000000`001651f0 00000000`0082f37f : nt!KeBugCheckEx
ffff830a`955ff030 fffff803`53030d69     : 00000000`00000000 ffffea00`00000000 00000000`00000001 ffffea00`042f5d00 : nt!MiUnlinkPageFromList+0xc89
ffff830a`955ff0c0 fffff803`5302ef5f     : 00000000`00000380 00000000`00380000 00000000`00040000 ffffa005`d417e300 : nt!MmCheckCachedPageStates+0x1339
ffff830a`955ff290 fffff803`533fcbf0     : 00000000`00380000 00000000`00000000 00000000`00000001 ffff830a`955ff3a0 : nt!CcFetchDataForRead+0x8f
ffff830a`955ff2f0 fffff803`5302ecf9     : ffffa005`d1c5c498 00000000`00380000 00000000`00040000 00000000`00000001 : nt!CcMapAndCopyFromCache+0xe0
ffff830a`955ff390 fffff803`58c0d288     : ffffa005`d4e6e8f0 fffff803`00000000 ffffa005`00080000 00000000`00000000 : nt!CcCopyReadEx+0x139
ffff830a`955ff440 fffff803`58c0ff58     : 00000000`00080000 ffff830a`955ff6e0 00000000`00000001 ffffb484`37c877c0 : Ntfs!NtfsCachedRead+0x17c
ffff830a`955ff4b0 fffff803`58c0dc9c     : ffffa005`d4dbbd78 ffffa005`d4e6e8f0 ffffb484`37c87850 ffffb484`37c87828 : Ntfs!NtfsCommonRead+0x2088
ffff830a`955ff6b0 fffff803`5308f7d5     : ffffa005`d3e6f9b0 ffffa005`d4e6e8f0 ffffa005`d4e6e8f0 ffffa005`ca406920 : Ntfs!NtfsFsdRead+0x1fc
ffff830a`955ff780 fffff803`528d6c5f     : ffffa005`c5bd6a20 ffffa005`c5a30060 ffffa005`ca3a3270 ffffa005`d4c25140 : nt!IofCallDriver+0x55
ffff830a`955ff7c0 fffff803`528d4673     : ffff830a`955ff850 00000000`00000000 ffff830a`955ff800 ffff830a`955ff800 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff830a`955ff830 fffff803`5308f7d5     : ffffa005`d4e6e8f0 ffff830a`955ff9f8 ffff830a`955ff9d0 ffffa005`d4c25140 : FLTMGR!FltpDispatch+0xa3
ffff830a`955ff890 fffff803`53475a08     : 00000000`00000000 ffffa005`d4c25140 00000000`00000001 fffff803`5290b901 : nt!IofCallDriver+0x55
ffff830a`955ff8d0 fffff803`5348c7c9     : ffffa005`00000000 ffff830a`955ffb40 00000000`00000000 ffff830a`955ffb40 : nt!IopSynchronousServiceTail+0x1a8
ffff830a`955ff970 fffff803`53208ab8     : 00000000`000013e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
ffff830a`955ffa50 00007ffc`dde4ce34     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008f`f03f9918 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dde4ce34


SYMBOL_NAME:  nt!MiUnlinkPageFromList+c89

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1415

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  c89

FAILURE_BUCKET_ID:  0x4E_2_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b084f841-86a9-e353-1d26-a04cfe7406b4}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000009d, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12367

    Key  : Analysis.IO.Other.Mb
    Value: 3

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 10

    Key  : Analysis.Init.CPU.mSec
    Value: 280

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5421

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  010622-8953-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: 9d

BUGCHECK_P4: 0

PROCESS_NAME:  System

ADDITIONAL_DEBUG_TEXT:  The trap occurred when interrupts are disabled on the target.

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  ffff81871698f750 -- (.trap 0xffff81871698f750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb68e3c9d0a90
rdx=ffffc886d8d8db10 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffff81871698f8e8 rbp=ffff81871698f929
 r8=ffffc886d8d8db10  r9=000000000000003e r10=fffff805099e79e0
r11=ffffb68e3c9d0a90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

STACK_TEXT: 
ffff8187`1698f608 fffff805`05c09069     : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000009d : nt!KeBugCheckEx
ffff8187`1698f610 fffff805`05c05369     : fffff805`09ad5528 fffff805`05a02f16 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8187`1698f750 00000000`00000000     : ffffb68e`32ea0120 00000000`00000000 00000000`00000350 00000000`00000000 : nt!KiPageFault+0x469


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1415

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  DISABLED_INTERRUPT_FAULT_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4e9c41db-c8e3-cbef-73a7-1b373e8262de}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8060ee141e6, Address of the instruction which caused the BugCheck
Arg3: ffffc5013fb7f920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1718

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 5462

    Key  : Analysis.IO.Other.Mb
    Value: 2

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 10

    Key  : Analysis.Init.CPU.mSec
    Value: 327

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5214

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  010722-8390-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8060ee141e6

BUGCHECK_P3: ffffc5013fb7f920

BUGCHECK_P4: 0

CONTEXT:  ffffc5013fb7f920 -- (.cxr 0xffffc5013fb7f920)
rax=0000000000050000 rbx=ffffa38b6182d082 rcx=404a7e062ffbdd00
rdx=ffffa38b6182d082 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060ee141e6 rsp=fffff683f461f378 rbp=0000000000000001
 r8=0000000000000001  r9=0000000000000000 r10=0000fffff8060ef2
r11=ffffb4fb32200000 r12=fffff683f461f438 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!KiUpdateSharedReadyQueueAffinityThread+0x16:
fffff806`0ee141e6 4c8b8140840000  mov     r8,qword ptr [rcx+8440h] ds:002b:404a7e06`2ffc6140=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffff683`f461f378 fffff806`0ee13747     : ffffa38b`6182d082 00000000`00000001 00000000`00000000 fffff806`0eefd085 : nt!KiUpdateSharedReadyQueueAffinityThread+0x16
fffff683`f461f380 fffff806`0eef06f0     : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiSetPriorityThread+0xc7
fffff683`f461f3e0 fffff806`0eef18e2     : ffffa38b`00000001 ffffa38b`61831001 ffffa38b`617c0006 ffffa38b`61831080 : nt!KeSetPriorityAndQuantumProcess+0x254
fffff683`f461f4b0 fffff806`0f2f771c     : ffffffff`ffffff06 00000000`00000000 00000069`00000000 ffffa38b`00000000 : nt!PspSetProcessPriorityByClass+0x4a
fffff683`f461f4f0 fffff806`0f2f7687     : 00000000`00000100 fffff683`f461fb40 00000000`00000000 ffffb40c`296ea040 : nt!PspSetProcessForegroundBackgroundRequest+0x7c
fffff683`f461f540 fffff806`0f2a08fd     : 00000000`00000100 fffff683`f461fb40 00000000`00002008 ffffa38b`61831080 : nt!PsSetProcessPriorityByClass+0x17
fffff683`f461f570 fffff806`0f008ab8     : ffffa38b`5f485080 ffffa38b`5f338360 fffff683`f461fb40 fffff683`f461fb40 : nt!NtSetInformationProcess+0x61d
fffff683`f461fac0 00007ffa`a464d0f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000069`e97ff558 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a464d0f4


SYMBOL_NAME:  nt!KiUpdateSharedReadyQueueAffinityThread+16

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1415

STACK_COMMAND:  .cxr 0xffffc5013fb7f920 ; kb

BUCKET_ID_FUNC_OFFSET:  16

FAILURE_BUCKET_ID:  AV_nt!KiUpdateSharedReadyQueueAffinityThread

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f7cf9eb0-d54b-a7fb-21e1-cec3f1fce477}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff80383afc668, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803810d6743, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2874

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 10177

    Key  : Analysis.IO.Other.Mb
    Value: 6

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 20

    Key  : Analysis.Init.CPU.mSec
    Value: 296

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7880

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 100

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  010622-7250-02.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: fffff80383afc668

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803810d6743

READ_ADDRESS: fffff80381afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff80383afc668

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  2

PROCESS_NAME:  iCUE.exe

TRAP_FRAME:  ffff8b8a3cc27380 -- (.trap 0xffff8b8a3cc27380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd1015ef60180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803810d6743 rsp=ffff8b8a3cc27510 rbp=ffff8b8a3cc27610
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=ffff8b8a3cc27708 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!IoBoostThreadIoPriority+0xb7:
fffff803`810d6743 8b051f5fa200    mov     eax,dword ptr [nt!KiIrqlFlags (fffff803`81afc668)] ds:fffff803`81afc668=????????
Resetting default scope

STACK_TEXT: 
ffff8b8a`3cc27238 fffff803`81209069     : 00000000`0000000a fffff803`83afc668 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8b8a`3cc27240 fffff803`81205369     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8b8a`3cc27380 fffff803`810d6743     : ffffe307`470de608 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8b8a`3cc27510 fffff803`810836e2     : ffffe307`449b8d90 ffffe307`449b8d90 00000000`00000000 ffffe307`470de080 : nt!IoBoostThreadIoPriority+0xb7
ffff8b8a`3cc27680 fffff803`8100a097     : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000004 : nt!ExpApplyPriorityBoost+0x622
ffff8b8a`3cc27710 fffff803`8100902c     : fffff803`81163250 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ExpAcquireResourceExclusiveLite+0x597
ffff8b8a`3cc277e0 fffff755`aaa5e73a     : 00000000`00000000 00000000`00989680 00000000`00000001 ffffe307`4b156240 : nt!ExEnterCriticalRegionAndAcquireResourceExclusive+0x3c
ffff8b8a`3cc27820 fffff755`ab0741f3     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8b8a`3cc27a68 : win32kbase!EnterCrit+0x8a
ffff8b8a`3cc27940 fffff755`aa8071ad     : ffffe307`4a9cf080 00000056`bda5c9c8 ffff8b8a`3cc27a68 00000000`00000000 : win32kfull!NtUserPeekMessage+0x113
ffff8b8a`3cc27a00 fffff803`81208ab8     : 00000000`00000000 00000000`00000001 000001b3`ec0ca590 ffff8b8a`3cc27b40 : win32k!NtUserPeekMessage+0x29
ffff8b8a`3cc27a50 00007fff`d5d31064     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000056`bda5c9a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`d5d31064


SYMBOL_NAME:  win32kbase!EnterCrit+8a

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1173

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  8a

FAILURE_BUCKET_ID:  AV_win32kbase!EnterCrit

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d56d29ce-2532-972b-bc6d-31106c6c0955}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı