[Çözüldü] IRQL_NOT_LESS_OR_EQUAL Mavi ekran hatası

miranerdogan

Zeptopat
Katılım
22 Ekim 2020
Mesajlar
8
Beğeniler
4
Bilgisayarımda 1 aydır süregelen bir mavi ekran sorunu var ya mavi ekran veriyor ya da sbepsiz yere restart atyıo.

IRQL_NOT_LESS_OR_EQUAL.
Karnel Security check failure.
Page fault in nonpaged area.

Bu 2 mavi ekran 1 haftadır karşıma çıkıyor.
Ve daha önce olmayan veya fark etmediğim BIOS'tan sonra ASUS TUF Gaming yazan açılışın altında bir yükleme işareti çıkıyor bir de geçen hafta o yüklemenin yaında disk C: Gibi bir şey yazıyordu.
  • GTX1660 Ti.
  • Ryzen 5 2600X.
  • 8 GB 3200MHz RAM.
  • B450M g+ ASUS anakart.
Şimdiden çok teşekkür ederim.
 
Son düzenleyen: Moderatör:
Çözüm
Konu açanlar gerekli bilgileri vermeye vermeye Recep Abi'yi kahin yaptılar sanırım, daha dosyalara bakmadan BIOS'un güncel olmadığını görmüş😅 Önce çipset sürücüsünün güncel olduğuna emin olun, değilse güncelleyin. Sonra BIOS güncelleyin.


Üsttekilere ek olarak bellek testi yapın (bunu da bilmiş) :D

Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin. Windows'unuz da eski, son sürüme güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000007f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064fb098ca, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9964

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 7f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8064fb098ca

READ_ADDRESS: fffff8064ff733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064fe2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8064fe2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000007f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80656037730 -- (.trap 0xfffff80656037730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000080
rdx=ffff870fbfa0f000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064fb098ca rsp=fffff806560378c0 rbp=0000000020000080
r8=0000000000000001  r9=0000000000000008 r10=0000fffff8064f95
r11=fffff80656037938 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!EtwTraceTimedEvent+0x86:
fffff806`4fb098ca f7c1ffffff1f    test    ecx,1FFFFFFFh
Resetting default scope

STACK_TEXT:
fffff806`560375e8 fffff806`4fbd41e9     : 00000000`0000000a 00000000`0000007f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`560375f0 fffff806`4fbd0529     : 00000000`00000002 00000000`00000000 fffff806`4d48c180 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff806`56037730 fffff806`4fb098ca     : ffff870f`cffd2bc8 ffff870f`ccc8e4e0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff806`560378c0 fffff806`4fa5145b     : ffff870f`cffd2b60 00000000`00000002 00000000`00000080 ffff870f`00000002 : nt!EtwTraceTimedEvent+0x86
fffff806`56037940 fffff806`4fa50039     : 00000000`00000002 00000000`00989680 00000000`000fc50a 00000000`00000022 : nt!KiProcessExpiredTimerList+0x2eb
fffff806`56037a30 fffff806`4fbc5ece     : 00000000`00000000 fffff806`4d48c180 fffff806`4ff91400 ffff870f`cc058080 : nt!KiRetireDpcList+0x4e9
fffff806`56037c60 00000000`00000000     : fffff806`56038000 fffff806`56032000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME:  nt!EtwTraceTimedEvent+86

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.900

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  86

FAILURE_BUCKET_ID:  AV_nt!EtwTraceTimedEvent

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {43915c3d-a7ac-a59b-08ea-4718e5897e29}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff801480373a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff801480372f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 64625

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff801480373a0

BUGCHECK_P3: fffff801480372f8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff801480373a0 -- (.trap 0xfffff801480373a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc095d28eac0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015223a5be rsp=fffff80148037530 rbp=ffffcc095d2426e0
r8=ffffcc09578e3240  r9=0000000000000000 r10=fffff80140ea6d10
r11=fffff801480371f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VidSchDdiNotifyDpc+0x1604e:
fffff801`5223a5be cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff801480372f8 -- (.exr 0xfffff801480372f8)
ExceptionAddress: fffff8015223a5be (dxgmms2!VidSchDdiNotifyDpc+0x000000000001604e)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff801`48037078 fffff801`40fd41e9     : 00000000`00000139 00000000`00000003 fffff801`480373a0 fffff801`480372f8 : nt!KeBugCheckEx
fffff801`48037080 fffff801`40fd4610     : fffff801`48037320 00000000`00000001 00000000`00000002 ffffcc09`5d243690 : nt!KiBugCheckDispatch+0x69
fffff801`480371c0 fffff801`40fd29a3     : ffffcc09`5d243618 00000000`00000000 ffffcc09`5d243648 ffffcc09`5d28eb90 : nt!KiFastFailDispatch+0xd0
fffff801`480373a0 fffff801`5223a5be     : 00000000`00000000 fffff801`53d7ef01 fffff801`48037629 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
fffff801`48037530 fffff801`50cf3181     : fffff801`48037629 ffffcc09`5d243000 ffffcc09`5a6226e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x1604e
fffff801`480375e0 fffff801`53d0a02b     : ffffcc09`5a622030 00000000`00000000 ffffcc09`5a622030 ffffcc09`5a866000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff801`48037690 ffffcc09`5a622030     : 00000000`00000000 ffffcc09`5a622030 ffffcc09`5a866000 fffff801`53d09fbe : nvlddmkm+0x9a02b
fffff801`48037698 00000000`00000000     : ffffcc09`5a622030 ffffcc09`5a866000 fffff801`53d09fbe ffffcc09`5a866000 : 0xffffcc09`5a622030


SYMBOL_NAME:  dxgmms2!VidSchDdiNotifyDpc+1604e

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.997

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1604e

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2680cc95-c3eb-4ecf-e7af-fb371282c295}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000fffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802662435cb, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7324

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffffffff

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802662435cb

READ_ADDRESS: fffff802667733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026662a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026662a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000fffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dlpc.exe

TRAP_FRAME:  fffff309a0f244f0 -- (.trap 0xfffff309a0f244f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8c00000000017670 rbx=0000000000000000 rcx=ffff8f0020eb9180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802662435cb rsp=fffff309a0f24680 rbp=0000000fffffffff
r8=fffffff000000000  r9=0000000000000001 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiUnlinkFreeOrZeroedPage+0x3cb:
fffff802`662435cb c9              leave
Resetting default scope

STACK_TEXT:
fffff309`a0f243a8 fffff802`663d41e9     : 00000000`0000000a 0000000f`ffffffff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff309`a0f243b0 fffff802`663d0529     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff309`a0f244f0 fffff802`662435cb     : ffff8f00`20eb9180 fffff802`662b0985 fffff309`9d54db70 00000000`00000000 : nt!KiPageFault+0x469
fffff309`a0f24680 fffff802`66242eb9     : 00000000`0020d370 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiUnlinkFreeOrZeroedPage+0x3cb
fffff309`a0f24700 fffff802`66242501     : 00000000`00000000 00000000`00000001 00000000`00000000 fffff802`00000002 : nt!MiCoalesceFreePages+0x379
fffff309`a0f24780 fffff802`6623e5ff     : 00000000`0020d37f 02000000`00000000 00000000`00000001 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x231
fffff309`a0f24860 fffff802`66282860     : fffff309`a0f24af0 ffff9f8f`0d6ca080 00000000`00000001 fffff309`a0f25520 : nt!MiDeletePteList+0x28f
fffff309`a0f24940 fffff802`667e93fd     : fffff802`668c9dd0 fffff802`668ca89e ffff9f8f`01cbcca0 fffff309`a0f25960 : nt!MiDecommitPages+0x1510
fffff309`a0f254e0 fffff802`667e994b     : 00000000`00100000 00000000`00000000 fffff309`a0f257c0 ffffffff`ffffffff : nt!MiDecommitRegion+0xbd
fffff309`a0f256c0 fffff802`667e963b     : ffff8f00`20eca340 ffff9f8f`0bae4040 ffff8f00`20eb9180 fffff802`663c956f : nt!MmFreeVirtualMemory+0x2db
fffff309`a0f25800 fffff802`663d3c18     : ffff9f8f`0bae4040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
fffff309`a0f25860 fffff802`663c61c0     : fffff802`73b84c4f 00000000`00000000 ffff8f00`20d63180 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffff309`a0f259f8 fffff802`73b84c4f     : 00000000`00000000 ffff8f00`20d63180 00000000`00000000 ffff9f8f`0bae4180 : nt!KiServiceLinkage
fffff309`a0f25a00 fffff802`73b88f52     : 00000000`00100000 ffffdc0a`eca75908 ffffdc0a`e0f694a0 ffff9f8f`0e6c6010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x15f
fffff309`a0f25a50 fffff802`73b86f44     : fffff802`73b86eb0 ffff9f8f`0e6c6010 ffff9f8f`00000000 fffff802`6678f240 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
fffff309`a0f25ac0 fffff802`73b86ec1     : 00000000`00000100 ffff9f8f`0dcb8740 ffff9f8f`01490020 fffff802`66afc2b0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x78
fffff309`a0f25b40 fffff802`66283945     : ffff9f8f`01490020 fffff802`66afc200 ffff9f8f`01490000 ffff9f8f`01490020 : dxgmms2!VidMmRangeCurationThread+0x11
fffff309`a0f25b70 fffff802`6631e135     : ffff9f8f`0bae4040 00000000`00000080 ffff9f8f`01495080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffff309`a0f25c10 fffff802`663c99a8     : ffff8f00`20f55180 ffff9f8f`0bae4040 fffff802`6631e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff309`a0f25c60 00000000`00000000     : fffff309`a0f26000 fffff309`a0f20000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff802662435cb - nt!MiUnlinkFreeOrZeroedPage+3cb
    [ 49:c9 ]
1 error : !nt (fffff802662435cb)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000b1546000, memory referenced
Arg2: 000000000000000e, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800558b1562, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76638

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: b1546000

BUGCHECK_P2: e

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800558b1562

READ_ADDRESS: fffff80043d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80043c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80043c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000b1546000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  fffff80049c45460 -- (.trap 0xfffff80049c45460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80056118a98 rbx=0000000000000000 rcx=00000000b1546000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800558b1562 rsp=fffff80049c455f0 rbp=fffff80049c45728
r8=0000000000000004  r9=0000000000000800 r10=fffff80056118a98
r11=ffff787e5ac00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0x11562:
fffff800`558b1562 488b01          mov     rax,qword ptr [rcx] ds:00000000`b1546000=????????????????
Resetting default scope

STACK_TEXT:
fffff800`49c45318 fffff800`439d41e9     : 00000000`0000000a 00000000`b1546000 00000000`0000000e 00000000`00000000 : nt!KeBugCheckEx
fffff800`49c45320 fffff800`439d0529     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`49c45460 fffff800`558b1562     : fffff800`43760f20 fffff800`4375d8f8 00000000`00000000 ffffe702`b1546000 : nt!KiPageFault+0x469
fffff800`49c455f0 fffff800`43760f20     : fffff800`4375d8f8 00000000`00000000 ffffe702`b1546000 00000000`00000800 : nvlddmkm+0x11562
fffff800`49c455f8 fffff800`4375d8f8     : 00000000`00000000 ffffe702`b1546000 00000000`00000800 fffff800`560796ca : hal!HalpTscQueryCounterOrdered
fffff800`49c45600 fffff800`49c45728     : 00000000`00000000 00000000`000007c0 00000000`00000000 fffff800`56078d20 : hal!KeQueryPerformanceCounter+0x88
fffff800`49c45630 00000000`00000000     : 00000000`000007c0 00000000`00000000 fffff800`56078d20 ffffe702`afe4e000 : 0xfffff800`49c45728


SYMBOL_NAME:  nvlddmkm+11562

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11562

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8804d5c4755, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff806708f3ac9, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8777

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8804d5c4755

BUGCHECK_P2: 3

BUGCHECK_P3: fffff806708f3ac9

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff80670d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80670c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80670c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8804d5c4755

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8b8df91c6520 -- (.trap 0xffff8b8df91c6520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88000000002 rbx=0000000000000000 rcx=fffff88005516b50
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806708f3ac9 rsp=ffff8b8df91c66b0 rbp=7fffffffffffffff
r8=000000010000003f  r9=fffff80670800000 r10=ffffd500b1963180
r11=ffff8b8df91c6518 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiLockPageInline+0x19:
fffff806`708f3ac9 c08b05dc0a4800  ror     byte ptr [rbx+480ADC05h],0 ds:00000000`480adc05=??
Resetting default scope

MISALIGNED_IP:
nt!MiLockPageInline+19
fffff806`708f3ac9 c08b05dc0a4800  ror     byte ptr [rbx+480ADC05h],0

STACK_TEXT:
ffff8b8d`f91c6278 fffff806`709ecf22     : 00000000`00000050 fffff880`4d5c4755 00000000`00000003 ffff8b8d`f91c6520 : nt!KeBugCheckEx
ffff8b8d`f91c6280 fffff806`7085873f     : ffffd500`b1974340 00000000`00000003 00000000`00000000 fffff880`4d5c4755 : nt!MiSystemFault+0x1c5ae2
ffff8b8d`f91c6380 fffff806`709d041e     : fffff806`6c6d6180 00000000`00000000 00000000`00000001 ffffa18e`20fbf1c0 : nt!MmAccessFault+0x34f
ffff8b8d`f91c6520 fffff806`708f3ac9     : ffffa18e`28b706f0 00000000`00000001 00000000`00000004 00000000`00000001 : nt!KiPageFault+0x35e
ffff8b8d`f91c66b0 fffff806`7086c82e     : 00000000`00000000 00000000`00000000 fffff806`70b78360 00000000`00000002 : nt!MiLockPageInline+0x19
ffff8b8d`f91c66e0 fffff806`7098ba6d     : fffff806`70c6a440 ffffa18e`20fbf0c0 fffff806`70c6a440 00000000`00000014 : nt!MiGatherMappedPages+0xda
ffff8b8d`f91c67b0 fffff806`7091e135     : ffffa18e`20fbf0c0 ffffa18e`20fbf0c0 00000000`00000080 00000067`b4bbbdff : nt!MiMappedPageWriter+0x17d
ffff8b8d`f91c6c10 fffff806`709c99a8     : ffffd500`b1ca1180 ffffa18e`20fbf0c0 fffff806`7091e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8b8d`f91c6c60 00000000`00000000     : ffff8b8d`f91c7000 ffff8b8d`f91c1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiLockPageInline+19

IMAGE_VERSION:  10.0.18362.900

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  hardware

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------

bahadrop-top

Hectopat
Katılım
8 Aralık 2017
Mesajlar
2.256
Çözümler
2
Beğeniler
1.150
 

YiğitYVZ

Kilopat
Katılım
19 Ekim 2018
Mesajlar
3.178
Çözümler
11
Beğeniler
4.437
Yer
hadwiger ve WoLeRm ile kahvehanede oturuyor.
Bunu yavaşça bırakıp kaçıyorum. Teknik resim ödevim olmasaydı bakardım.



 

Recep Baltaş

Technopat
Yönetici
Katılım
14 Ağustos 2010
Mesajlar
69.262
Çözümler
865
Beğeniler
98.674
Yer
İstanbul

Bora Dere

Zettapat
Katılım
10 Ağustos 2016
Mesajlar
10.594
Çözümler
317
Beğeniler
13.745
Konu açanlar gerekli bilgileri vermeye vermeye Recep Abi'yi kahin yaptılar sanırım, daha dosyalara bakmadan BIOS'un güncel olmadığını görmüş😅 Önce çipset sürücüsünün güncel olduğuna emin olun, değilse güncelleyin. Sonra BIOS güncelleyin.


Üsttekilere ek olarak bellek testi yapın (bunu da bilmiş) :D

Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin. Windows'unuz da eski, son sürüme güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000007f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064fb098ca, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9964

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 7f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8064fb098ca

READ_ADDRESS: fffff8064ff733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064fe2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8064fe2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000007f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80656037730 -- (.trap 0xfffff80656037730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000080
rdx=ffff870fbfa0f000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064fb098ca rsp=fffff806560378c0 rbp=0000000020000080
r8=0000000000000001  r9=0000000000000008 r10=0000fffff8064f95
r11=fffff80656037938 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!EtwTraceTimedEvent+0x86:
fffff806`4fb098ca f7c1ffffff1f    test    ecx,1FFFFFFFh
Resetting default scope

STACK_TEXT:
fffff806`560375e8 fffff806`4fbd41e9     : 00000000`0000000a 00000000`0000007f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`560375f0 fffff806`4fbd0529     : 00000000`00000002 00000000`00000000 fffff806`4d48c180 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff806`56037730 fffff806`4fb098ca     : ffff870f`cffd2bc8 ffff870f`ccc8e4e0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff806`560378c0 fffff806`4fa5145b     : ffff870f`cffd2b60 00000000`00000002 00000000`00000080 ffff870f`00000002 : nt!EtwTraceTimedEvent+0x86
fffff806`56037940 fffff806`4fa50039     : 00000000`00000002 00000000`00989680 00000000`000fc50a 00000000`00000022 : nt!KiProcessExpiredTimerList+0x2eb
fffff806`56037a30 fffff806`4fbc5ece     : 00000000`00000000 fffff806`4d48c180 fffff806`4ff91400 ffff870f`cc058080 : nt!KiRetireDpcList+0x4e9
fffff806`56037c60 00000000`00000000     : fffff806`56038000 fffff806`56032000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME:  nt!EtwTraceTimedEvent+86

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.900

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  86

FAILURE_BUCKET_ID:  AV_nt!EtwTraceTimedEvent

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {43915c3d-a7ac-a59b-08ea-4718e5897e29}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff801480373a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff801480372f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 64625

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff801480373a0

BUGCHECK_P3: fffff801480372f8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff801480373a0 -- (.trap 0xfffff801480373a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc095d28eac0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015223a5be rsp=fffff80148037530 rbp=ffffcc095d2426e0
r8=ffffcc09578e3240  r9=0000000000000000 r10=fffff80140ea6d10
r11=fffff801480371f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VidSchDdiNotifyDpc+0x1604e:
fffff801`5223a5be cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff801480372f8 -- (.exr 0xfffff801480372f8)
ExceptionAddress: fffff8015223a5be (dxgmms2!VidSchDdiNotifyDpc+0x000000000001604e)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff801`48037078 fffff801`40fd41e9     : 00000000`00000139 00000000`00000003 fffff801`480373a0 fffff801`480372f8 : nt!KeBugCheckEx
fffff801`48037080 fffff801`40fd4610     : fffff801`48037320 00000000`00000001 00000000`00000002 ffffcc09`5d243690 : nt!KiBugCheckDispatch+0x69
fffff801`480371c0 fffff801`40fd29a3     : ffffcc09`5d243618 00000000`00000000 ffffcc09`5d243648 ffffcc09`5d28eb90 : nt!KiFastFailDispatch+0xd0
fffff801`480373a0 fffff801`5223a5be     : 00000000`00000000 fffff801`53d7ef01 fffff801`48037629 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
fffff801`48037530 fffff801`50cf3181     : fffff801`48037629 ffffcc09`5d243000 ffffcc09`5a6226e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x1604e
fffff801`480375e0 fffff801`53d0a02b     : ffffcc09`5a622030 00000000`00000000 ffffcc09`5a622030 ffffcc09`5a866000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff801`48037690 ffffcc09`5a622030     : 00000000`00000000 ffffcc09`5a622030 ffffcc09`5a866000 fffff801`53d09fbe : nvlddmkm+0x9a02b
fffff801`48037698 00000000`00000000     : ffffcc09`5a622030 ffffcc09`5a866000 fffff801`53d09fbe ffffcc09`5a866000 : 0xffffcc09`5a622030


SYMBOL_NAME:  dxgmms2!VidSchDdiNotifyDpc+1604e

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.997

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1604e

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2680cc95-c3eb-4ecf-e7af-fb371282c295}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000fffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802662435cb, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7324

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffffffff

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802662435cb

READ_ADDRESS: fffff802667733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026662a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026662a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000fffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dlpc.exe

TRAP_FRAME:  fffff309a0f244f0 -- (.trap 0xfffff309a0f244f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8c00000000017670 rbx=0000000000000000 rcx=ffff8f0020eb9180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802662435cb rsp=fffff309a0f24680 rbp=0000000fffffffff
r8=fffffff000000000  r9=0000000000000001 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiUnlinkFreeOrZeroedPage+0x3cb:
fffff802`662435cb c9              leave
Resetting default scope

STACK_TEXT:
fffff309`a0f243a8 fffff802`663d41e9     : 00000000`0000000a 0000000f`ffffffff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff309`a0f243b0 fffff802`663d0529     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff309`a0f244f0 fffff802`662435cb     : ffff8f00`20eb9180 fffff802`662b0985 fffff309`9d54db70 00000000`00000000 : nt!KiPageFault+0x469
fffff309`a0f24680 fffff802`66242eb9     : 00000000`0020d370 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiUnlinkFreeOrZeroedPage+0x3cb
fffff309`a0f24700 fffff802`66242501     : 00000000`00000000 00000000`00000001 00000000`00000000 fffff802`00000002 : nt!MiCoalesceFreePages+0x379
fffff309`a0f24780 fffff802`6623e5ff     : 00000000`0020d37f 02000000`00000000 00000000`00000001 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x231
fffff309`a0f24860 fffff802`66282860     : fffff309`a0f24af0 ffff9f8f`0d6ca080 00000000`00000001 fffff309`a0f25520 : nt!MiDeletePteList+0x28f
fffff309`a0f24940 fffff802`667e93fd     : fffff802`668c9dd0 fffff802`668ca89e ffff9f8f`01cbcca0 fffff309`a0f25960 : nt!MiDecommitPages+0x1510
fffff309`a0f254e0 fffff802`667e994b     : 00000000`00100000 00000000`00000000 fffff309`a0f257c0 ffffffff`ffffffff : nt!MiDecommitRegion+0xbd
fffff309`a0f256c0 fffff802`667e963b     : ffff8f00`20eca340 ffff9f8f`0bae4040 ffff8f00`20eb9180 fffff802`663c956f : nt!MmFreeVirtualMemory+0x2db
fffff309`a0f25800 fffff802`663d3c18     : ffff9f8f`0bae4040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
fffff309`a0f25860 fffff802`663c61c0     : fffff802`73b84c4f 00000000`00000000 ffff8f00`20d63180 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffff309`a0f259f8 fffff802`73b84c4f     : 00000000`00000000 ffff8f00`20d63180 00000000`00000000 ffff9f8f`0bae4180 : nt!KiServiceLinkage
fffff309`a0f25a00 fffff802`73b88f52     : 00000000`00100000 ffffdc0a`eca75908 ffffdc0a`e0f694a0 ffff9f8f`0e6c6010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x15f
fffff309`a0f25a50 fffff802`73b86f44     : fffff802`73b86eb0 ffff9f8f`0e6c6010 ffff9f8f`00000000 fffff802`6678f240 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
fffff309`a0f25ac0 fffff802`73b86ec1     : 00000000`00000100 ffff9f8f`0dcb8740 ffff9f8f`01490020 fffff802`66afc2b0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x78
fffff309`a0f25b40 fffff802`66283945     : ffff9f8f`01490020 fffff802`66afc200 ffff9f8f`01490000 ffff9f8f`01490020 : dxgmms2!VidMmRangeCurationThread+0x11
fffff309`a0f25b70 fffff802`6631e135     : ffff9f8f`0bae4040 00000000`00000080 ffff9f8f`01495080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffff309`a0f25c10 fffff802`663c99a8     : ffff8f00`20f55180 ffff9f8f`0bae4040 fffff802`6631e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff309`a0f25c60 00000000`00000000     : fffff309`a0f26000 fffff309`a0f20000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff802662435cb - nt!MiUnlinkFreeOrZeroedPage+3cb
    [ 49:c9 ]
1 error : !nt (fffff802662435cb)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000b1546000, memory referenced
Arg2: 000000000000000e, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800558b1562, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76638

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: b1546000

BUGCHECK_P2: e

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800558b1562

READ_ADDRESS: fffff80043d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80043c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80043c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000b1546000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  fffff80049c45460 -- (.trap 0xfffff80049c45460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80056118a98 rbx=0000000000000000 rcx=00000000b1546000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800558b1562 rsp=fffff80049c455f0 rbp=fffff80049c45728
r8=0000000000000004  r9=0000000000000800 r10=fffff80056118a98
r11=ffff787e5ac00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0x11562:
fffff800`558b1562 488b01          mov     rax,qword ptr [rcx] ds:00000000`b1546000=????????????????
Resetting default scope

STACK_TEXT:
fffff800`49c45318 fffff800`439d41e9     : 00000000`0000000a 00000000`b1546000 00000000`0000000e 00000000`00000000 : nt!KeBugCheckEx
fffff800`49c45320 fffff800`439d0529     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`49c45460 fffff800`558b1562     : fffff800`43760f20 fffff800`4375d8f8 00000000`00000000 ffffe702`b1546000 : nt!KiPageFault+0x469
fffff800`49c455f0 fffff800`43760f20     : fffff800`4375d8f8 00000000`00000000 ffffe702`b1546000 00000000`00000800 : nvlddmkm+0x11562
fffff800`49c455f8 fffff800`4375d8f8     : 00000000`00000000 ffffe702`b1546000 00000000`00000800 fffff800`560796ca : hal!HalpTscQueryCounterOrdered
fffff800`49c45600 fffff800`49c45728     : 00000000`00000000 00000000`000007c0 00000000`00000000 fffff800`56078d20 : hal!KeQueryPerformanceCounter+0x88
fffff800`49c45630 00000000`00000000     : 00000000`000007c0 00000000`00000000 fffff800`56078d20 ffffe702`afe4e000 : 0xfffff800`49c45728


SYMBOL_NAME:  nvlddmkm+11562

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11562

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8804d5c4755, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff806708f3ac9, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8777

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8804d5c4755

BUGCHECK_P2: 3

BUGCHECK_P3: fffff806708f3ac9

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff80670d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80670c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80670c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8804d5c4755

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8b8df91c6520 -- (.trap 0xffff8b8df91c6520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88000000002 rbx=0000000000000000 rcx=fffff88005516b50
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806708f3ac9 rsp=ffff8b8df91c66b0 rbp=7fffffffffffffff
r8=000000010000003f  r9=fffff80670800000 r10=ffffd500b1963180
r11=ffff8b8df91c6518 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiLockPageInline+0x19:
fffff806`708f3ac9 c08b05dc0a4800  ror     byte ptr [rbx+480ADC05h],0 ds:00000000`480adc05=??
Resetting default scope

MISALIGNED_IP:
nt!MiLockPageInline+19
fffff806`708f3ac9 c08b05dc0a4800  ror     byte ptr [rbx+480ADC05h],0

STACK_TEXT:
ffff8b8d`f91c6278 fffff806`709ecf22     : 00000000`00000050 fffff880`4d5c4755 00000000`00000003 ffff8b8d`f91c6520 : nt!KeBugCheckEx
ffff8b8d`f91c6280 fffff806`7085873f     : ffffd500`b1974340 00000000`00000003 00000000`00000000 fffff880`4d5c4755 : nt!MiSystemFault+0x1c5ae2
ffff8b8d`f91c6380 fffff806`709d041e     : fffff806`6c6d6180 00000000`00000000 00000000`00000001 ffffa18e`20fbf1c0 : nt!MmAccessFault+0x34f
ffff8b8d`f91c6520 fffff806`708f3ac9     : ffffa18e`28b706f0 00000000`00000001 00000000`00000004 00000000`00000001 : nt!KiPageFault+0x35e
ffff8b8d`f91c66b0 fffff806`7086c82e     : 00000000`00000000 00000000`00000000 fffff806`70b78360 00000000`00000002 : nt!MiLockPageInline+0x19
ffff8b8d`f91c66e0 fffff806`7098ba6d     : fffff806`70c6a440 ffffa18e`20fbf0c0 fffff806`70c6a440 00000000`00000014 : nt!MiGatherMappedPages+0xda
ffff8b8d`f91c67b0 fffff806`7091e135     : ffffa18e`20fbf0c0 ffffa18e`20fbf0c0 00000000`00000080 00000067`b4bbbdff : nt!MiMappedPageWriter+0x17d
ffff8b8d`f91c6c10 fffff806`709c99a8     : ffffd500`b1ca1180 ffffa18e`20fbf0c0 fffff806`7091e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8b8d`f91c6c60 00000000`00000000     : ffff8b8d`f91c7000 ffff8b8d`f91c1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiLockPageInline+19

IMAGE_VERSION:  10.0.18362.900

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  hardware

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------
 
Çözüm
KS
miranerdogan

miranerdogan

Zeptopat
Katılım
22 Ekim 2020
Mesajlar
8
Beğeniler
4
Konu açanlar gerekli bilgileri vermeye vermeye Recep Abi'yi kahin yaptılar sanırım, daha dosyalara bakmadan BIOS'un güncel olmadığını görmüş😅 Önce çipset sürücüsünün güncel olduğuna emin olun, değilse güncelleyin. Sonra BIOS güncelleyin.


Üsttekilere ek olarak bellek testi yapın (bunu da bilmiş) :D

Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin. Windows'unuz da eski, son sürüme güncelleyin.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000007f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064fb098ca, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9964

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 7f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8064fb098ca

READ_ADDRESS: fffff8064ff733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064fe2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8064fe2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000007f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80656037730 -- (.trap 0xfffff80656037730)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000080
rdx=ffff870fbfa0f000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064fb098ca rsp=fffff806560378c0 rbp=0000000020000080
r8=0000000000000001  r9=0000000000000008 r10=0000fffff8064f95
r11=fffff80656037938 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!EtwTraceTimedEvent+0x86:
fffff806`4fb098ca f7c1ffffff1f    test    ecx,1FFFFFFFh
Resetting default scope

STACK_TEXT:
fffff806`560375e8 fffff806`4fbd41e9     : 00000000`0000000a 00000000`0000007f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`560375f0 fffff806`4fbd0529     : 00000000`00000002 00000000`00000000 fffff806`4d48c180 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff806`56037730 fffff806`4fb098ca     : ffff870f`cffd2bc8 ffff870f`ccc8e4e0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff806`560378c0 fffff806`4fa5145b     : ffff870f`cffd2b60 00000000`00000002 00000000`00000080 ffff870f`00000002 : nt!EtwTraceTimedEvent+0x86
fffff806`56037940 fffff806`4fa50039     : 00000000`00000002 00000000`00989680 00000000`000fc50a 00000000`00000022 : nt!KiProcessExpiredTimerList+0x2eb
fffff806`56037a30 fffff806`4fbc5ece     : 00000000`00000000 fffff806`4d48c180 fffff806`4ff91400 ffff870f`cc058080 : nt!KiRetireDpcList+0x4e9
fffff806`56037c60 00000000`00000000     : fffff806`56038000 fffff806`56032000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7e


SYMBOL_NAME:  nt!EtwTraceTimedEvent+86

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.900

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  86

FAILURE_BUCKET_ID:  AV_nt!EtwTraceTimedEvent

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {43915c3d-a7ac-a59b-08ea-4718e5897e29}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff801480373a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff801480372f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 64625

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff801480373a0

BUGCHECK_P3: fffff801480372f8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff801480373a0 -- (.trap 0xfffff801480373a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc095d28eac0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015223a5be rsp=fffff80148037530 rbp=ffffcc095d2426e0
r8=ffffcc09578e3240  r9=0000000000000000 r10=fffff80140ea6d10
r11=fffff801480371f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VidSchDdiNotifyDpc+0x1604e:
fffff801`5223a5be cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff801480372f8 -- (.exr 0xfffff801480372f8)
ExceptionAddress: fffff8015223a5be (dxgmms2!VidSchDdiNotifyDpc+0x000000000001604e)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
fffff801`48037078 fffff801`40fd41e9     : 00000000`00000139 00000000`00000003 fffff801`480373a0 fffff801`480372f8 : nt!KeBugCheckEx
fffff801`48037080 fffff801`40fd4610     : fffff801`48037320 00000000`00000001 00000000`00000002 ffffcc09`5d243690 : nt!KiBugCheckDispatch+0x69
fffff801`480371c0 fffff801`40fd29a3     : ffffcc09`5d243618 00000000`00000000 ffffcc09`5d243648 ffffcc09`5d28eb90 : nt!KiFastFailDispatch+0xd0
fffff801`480373a0 fffff801`5223a5be     : 00000000`00000000 fffff801`53d7ef01 fffff801`48037629 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
fffff801`48037530 fffff801`50cf3181     : fffff801`48037629 ffffcc09`5d243000 ffffcc09`5a6226e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x1604e
fffff801`480375e0 fffff801`53d0a02b     : ffffcc09`5a622030 00000000`00000000 ffffcc09`5a622030 ffffcc09`5a866000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff801`48037690 ffffcc09`5a622030     : 00000000`00000000 ffffcc09`5a622030 ffffcc09`5a866000 fffff801`53d09fbe : nvlddmkm+0x9a02b
fffff801`48037698 00000000`00000000     : ffffcc09`5a622030 ffffcc09`5a866000 fffff801`53d09fbe ffffcc09`5a866000 : 0xffffcc09`5a622030


SYMBOL_NAME:  dxgmms2!VidSchDdiNotifyDpc+1604e

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.997

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1604e

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchDdiNotifyDpc

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {2680cc95-c3eb-4ecf-e7af-fb371282c295}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000fffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802662435cb, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7324

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: fffffffff

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff802662435cb

READ_ADDRESS: fffff802667733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8026662a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8026662a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000fffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dlpc.exe

TRAP_FRAME:  fffff309a0f244f0 -- (.trap 0xfffff309a0f244f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=8c00000000017670 rbx=0000000000000000 rcx=ffff8f0020eb9180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802662435cb rsp=fffff309a0f24680 rbp=0000000fffffffff
r8=fffffff000000000  r9=0000000000000001 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiUnlinkFreeOrZeroedPage+0x3cb:
fffff802`662435cb c9              leave
Resetting default scope

STACK_TEXT:
fffff309`a0f243a8 fffff802`663d41e9     : 00000000`0000000a 0000000f`ffffffff 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff309`a0f243b0 fffff802`663d0529     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff309`a0f244f0 fffff802`662435cb     : ffff8f00`20eb9180 fffff802`662b0985 fffff309`9d54db70 00000000`00000000 : nt!KiPageFault+0x469
fffff309`a0f24680 fffff802`66242eb9     : 00000000`0020d370 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiUnlinkFreeOrZeroedPage+0x3cb
fffff309`a0f24700 fffff802`66242501     : 00000000`00000000 00000000`00000001 00000000`00000000 fffff802`00000002 : nt!MiCoalesceFreePages+0x379
fffff309`a0f24780 fffff802`6623e5ff     : 00000000`0020d37f 02000000`00000000 00000000`00000001 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x231
fffff309`a0f24860 fffff802`66282860     : fffff309`a0f24af0 ffff9f8f`0d6ca080 00000000`00000001 fffff309`a0f25520 : nt!MiDeletePteList+0x28f
fffff309`a0f24940 fffff802`667e93fd     : fffff802`668c9dd0 fffff802`668ca89e ffff9f8f`01cbcca0 fffff309`a0f25960 : nt!MiDecommitPages+0x1510
fffff309`a0f254e0 fffff802`667e994b     : 00000000`00100000 00000000`00000000 fffff309`a0f257c0 ffffffff`ffffffff : nt!MiDecommitRegion+0xbd
fffff309`a0f256c0 fffff802`667e963b     : ffff8f00`20eca340 ffff9f8f`0bae4040 ffff8f00`20eb9180 fffff802`663c956f : nt!MmFreeVirtualMemory+0x2db
fffff309`a0f25800 fffff802`663d3c18     : ffff9f8f`0bae4040 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
fffff309`a0f25860 fffff802`663c61c0     : fffff802`73b84c4f 00000000`00000000 ffff8f00`20d63180 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
fffff309`a0f259f8 fffff802`73b84c4f     : 00000000`00000000 ffff8f00`20d63180 00000000`00000000 ffff9f8f`0bae4180 : nt!KiServiceLinkage
fffff309`a0f25a00 fffff802`73b88f52     : 00000000`00100000 ffffdc0a`eca75908 ffffdc0a`e0f694a0 ffff9f8f`0e6c6010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x15f
fffff309`a0f25a50 fffff802`73b86f44     : fffff802`73b86eb0 ffff9f8f`0e6c6010 ffff9f8f`00000000 fffff802`6678f240 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
fffff309`a0f25ac0 fffff802`73b86ec1     : 00000000`00000100 ffff9f8f`0dcb8740 ffff9f8f`01490020 fffff802`66afc2b0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x78
fffff309`a0f25b40 fffff802`66283945     : ffff9f8f`01490020 fffff802`66afc200 ffff9f8f`01490000 ffff9f8f`01490020 : dxgmms2!VidMmRangeCurationThread+0x11
fffff309`a0f25b70 fffff802`6631e135     : ffff9f8f`0bae4040 00000000`00000080 ffff9f8f`01495080 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffff309`a0f25c10 fffff802`663c99a8     : ffff8f00`20f55180 ffff9f8f`0bae4040 fffff802`6631e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff309`a0f25c60 00000000`00000000     : fffff309`a0f26000 fffff309`a0f20000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff802662435cb - nt!MiUnlinkFreeOrZeroedPage+3cb
    [ 49:c9 ]
1 error : !nt (fffff802662435cb)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------



DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000b1546000, memory referenced
Arg2: 000000000000000e, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff800558b1562, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6890

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76638

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: b1546000

BUGCHECK_P2: e

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800558b1562

READ_ADDRESS: fffff80043d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80043c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80043c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000000b1546000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  fffff80049c45460 -- (.trap 0xfffff80049c45460)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80056118a98 rbx=0000000000000000 rcx=00000000b1546000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800558b1562 rsp=fffff80049c455f0 rbp=fffff80049c45728
r8=0000000000000004  r9=0000000000000800 r10=fffff80056118a98
r11=ffff787e5ac00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nvlddmkm+0x11562:
fffff800`558b1562 488b01          mov     rax,qword ptr [rcx] ds:00000000`b1546000=????????????????
Resetting default scope

STACK_TEXT:
fffff800`49c45318 fffff800`439d41e9     : 00000000`0000000a 00000000`b1546000 00000000`0000000e 00000000`00000000 : nt!KeBugCheckEx
fffff800`49c45320 fffff800`439d0529     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`49c45460 fffff800`558b1562     : fffff800`43760f20 fffff800`4375d8f8 00000000`00000000 ffffe702`b1546000 : nt!KiPageFault+0x469
fffff800`49c455f0 fffff800`43760f20     : fffff800`4375d8f8 00000000`00000000 ffffe702`b1546000 00000000`00000800 : nvlddmkm+0x11562
fffff800`49c455f8 fffff800`4375d8f8     : 00000000`00000000 ffffe702`b1546000 00000000`00000800 fffff800`560796ca : hal!HalpTscQueryCounterOrdered
fffff800`49c45600 fffff800`49c45728     : 00000000`00000000 00000000`000007c0 00000000`00000000 fffff800`56078d20 : hal!KeQueryPerformanceCounter+0x88
fffff800`49c45630 00000000`00000000     : 00000000`000007c0 00000000`00000000 fffff800`56078d20 ffffe702`afe4e000 : 0xfffff800`49c45728


SYMBOL_NAME:  nvlddmkm+11562

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11562

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------



PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff8804d5c4755, memory referenced.
Arg2: 0000000000000003, value 0 = read operation, 1 = write operation.
Arg3: fffff806708f3ac9, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4499

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8777

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff8804d5c4755

BUGCHECK_P2: 3

BUGCHECK_P3: fffff806708f3ac9

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff80670d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80670c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80670c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8804d5c4755

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8b8df91c6520 -- (.trap 0xffff8b8df91c6520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88000000002 rbx=0000000000000000 rcx=fffff88005516b50
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806708f3ac9 rsp=ffff8b8df91c66b0 rbp=7fffffffffffffff
r8=000000010000003f  r9=fffff80670800000 r10=ffffd500b1963180
r11=ffff8b8df91c6518 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiLockPageInline+0x19:
fffff806`708f3ac9 c08b05dc0a4800  ror     byte ptr [rbx+480ADC05h],0 ds:00000000`480adc05=??
Resetting default scope

MISALIGNED_IP:
nt!MiLockPageInline+19
fffff806`708f3ac9 c08b05dc0a4800  ror     byte ptr [rbx+480ADC05h],0

STACK_TEXT:
ffff8b8d`f91c6278 fffff806`709ecf22     : 00000000`00000050 fffff880`4d5c4755 00000000`00000003 ffff8b8d`f91c6520 : nt!KeBugCheckEx
ffff8b8d`f91c6280 fffff806`7085873f     : ffffd500`b1974340 00000000`00000003 00000000`00000000 fffff880`4d5c4755 : nt!MiSystemFault+0x1c5ae2
ffff8b8d`f91c6380 fffff806`709d041e     : fffff806`6c6d6180 00000000`00000000 00000000`00000001 ffffa18e`20fbf1c0 : nt!MmAccessFault+0x34f
ffff8b8d`f91c6520 fffff806`708f3ac9     : ffffa18e`28b706f0 00000000`00000001 00000000`00000004 00000000`00000001 : nt!KiPageFault+0x35e
ffff8b8d`f91c66b0 fffff806`7086c82e     : 00000000`00000000 00000000`00000000 fffff806`70b78360 00000000`00000002 : nt!MiLockPageInline+0x19
ffff8b8d`f91c66e0 fffff806`7098ba6d     : fffff806`70c6a440 ffffa18e`20fbf0c0 fffff806`70c6a440 00000000`00000014 : nt!MiGatherMappedPages+0xda
ffff8b8d`f91c67b0 fffff806`7091e135     : ffffa18e`20fbf0c0 ffffa18e`20fbf0c0 00000000`00000080 00000067`b4bbbdff : nt!MiMappedPageWriter+0x17d
ffff8b8d`f91c6c10 fffff806`709c99a8     : ffffd500`b1ca1180 ffffa18e`20fbf0c0 fffff806`7091e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8b8d`f91c6c60 00000000`00000000     : ffff8b8d`f91c7000 ffff8b8d`f91c1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiLockPageInline+19

IMAGE_VERSION:  10.0.18362.900

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  hardware

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

Followup:     MachineOwner
---------
chipset sürücüsünü güncelledim
biosu güncelledim.
ramlerde bi sıkıntyı yok memtestte sorun çıkmadı
ekran kartı sürücüsünü DDU ile kaldırdım tekrar güncelledim
windows updateten windowsu da güncelledim
Fakat bilgisayarım hala kendi kendine kapanıyor
 

Bora Dere

Zettapat
Katılım
10 Ağustos 2016
Mesajlar
10.594
Çözümler
317
Beğeniler
13.745
Kendi kendine kapanmayı biraz daha açıklar mısınız? Yük altındayken mi kapanıyor yoksa durduk yerde mi? OCCT ile Power testi yapın.

Ayrıca yine mavi ekran alırsanız yeni oluşan dosyaları atmayı unutmayın.
 
KS
miranerdogan

miranerdogan

Zeptopat
Katılım
22 Ekim 2020
Mesajlar
8
Beğeniler
4
Kendi kendine kapanmayı biraz daha açıklar mısınız? Yük altındayken mi kapanıyor yoksa durduk yerde mi? OCCT ile Power testi yapın.

Ayrıca yine mavi ekran alırsanız yeni oluşan dosyaları atmayı unutmayın.
mesela chromeda geziyorum bi anda ekran kararıyo ekranda no signal yazıyo sonra bilgisayar yeniden başlıyo oyun oynarken de oluyo hiçbir şey yapmazken de
Kendi kendine kapanmayı biraz daha açıklar mısınız? Yük altındayken mi kapanıyor yoksa durduk yerde mi? OCCT ile Power testi yapın.

Ayrıca yine mavi ekran alırsanız yeni oluşan dosyaları atmayı unutmayın.
bide testte tam olarak neye bakıcam
 
Son düzenleme:

Yukarı