Crash/Mavi Ekran Hataları

cany98

Hectopat
Katılım
15 Mayıs 2019
Mesajlar
138
Merhaba, geçen aydan beri çok defa mavi ekran hatası almaktayım. Bir ara sistemi geri yüklemekle sorunu çözdüğümü zannetmiştim ama tekrar nüksetmeye başladı. Chipset güncellemesi yaptığımda çok fazla hata almaya başlamıştım, BIOS güncellemesi sonrası çok fazla almamıştım, ekran kartı güncellemesi sonrası da çok hata ile karşılaştım. Aralık ayında aldığım hataların minidump dosyaları hakkında link aşağıdadır.


Sistem özellikleri:
  • AMD Ryzen 5 3600
  • Gigabyte B450M S2H
  • Gigabyte NVIDIA GeForce RTX 2060
  • Adata XPG Gammix D30 2x8GB Ram
  • Toshiba OCZ TR200 240GB SDD
  • Seagate Barracuda 1TB HDD
 
Minidump dosyasını incelemedim, şu anda sadece bir tahminde bulunuyorum yani sorun kesin bundadır demiyorum, belirtmeyince yanlış bilgilendirme alıyoruz mâlum. Tamamen benim tahminime göre sorun SSD'de olabilir.
 
  • Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince yeniden başlatın
  • Ethernet sürücünü güvenli mod ile kaldır ve tekrar yükle
  • Memtest86 testi yap (sonuçların fotoğrafını paylaşmayı unutma!)

Ekran kartı sürücüsünü güvenli mod da DDU ile eski sürücüyü silip yeni ve en güncel olanını yükleyin, dikkat edin internetiniz kapalı olsun siz yeni sürücüyü kurar iken Windows arka da eski
tarihten kalma bir sürücüyü yükler ve sizde sürücüyü yükleyince üst üste sürücü kurmuş olursunuz.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8057420af47, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8057420af47

READ_ADDRESS: fffff8056fb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000001

CURRENT_IRQL:  2

FAULTING_IP:
ndis!ndisMTopReceiveNetBufferLists+147
fffff805`7420af47 49837d0000      cmp     qword ptr [r13],0

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:24.0337

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff80574e67220 -- (.trap 0xfffff80574e67220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=ffff8b087d4ef510
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057420af47 rsp=fffff80574e673b0 rbp=fffff80574e67451
r8=ffff8b0879b641a0  r9=0000000000000000 r10=0000000000000001
r11=ffffb2790f000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ndis!ndisMTopReceiveNetBufferLists+0x147:
fffff805`7420af47 49837d0000      cmp     qword ptr [r13],0 ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8056f7d32e9 to fffff8056f7c14e0

STACK_TEXT:
fffff805`74e670d8 fffff805`6f7d32e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`74e670e0 fffff805`6f7cf62b : 00000008`00000004 fffff805`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`74e67220 fffff805`7420af47 : 00000007`00000001 ffff8b08`00000008 00000000`00000800 ffff8b08`00000000 : nt!KiPageFault+0x46b
fffff805`74e673b0 fffff805`74210eb0 : ffff8b08`79b641a0 fffff805`00000000 ffff8b08`79b641a0 fffff805`735b208d : ndis!ndisMTopReceiveNetBufferLists+0x147
fffff805`74e674b0 fffff805`74241756 : ffff8b08`7d4ea9f0 fffff805`74e67581 00000000`00000000 00000000`00000008 : ndis!ndisCallReceiveHandler+0x60
fffff805`74e67500 fffff805`7420e874 : 00000000`0010fe76 00000000`00000001 ffff8b08`79b641a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x207a6
fffff805`74e675d0 fffff805`7e5c5bb9 : ffff8b08`7d4aa000 ffff8b08`7d4aa000 00000000`00000000 ffff8b08`7d4aa5f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff805`74e67660 fffff805`7e5b2351 : 00000000`00000000 fffff170`9e1ad501 00000028`00000400 fffff805`74e677d8 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb41
fffff805`74e67750 fffff805`7420f2cc : 00000000`00000000 ffff8b08`7d7e7280 fffff805`80382be0 fffff805`00000000 : rt640x64!MPHandleMessageInterrupt+0x341
fffff805`74e677c0 fffff805`6f66ae95 : 00000000`00000000 00000000`00000001 fffff805`74e678a8 00000000`00000000 : ndis!ndisInterruptDpc+0x19c
fffff805`74e678f0 fffff805`6f66a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff805`74e67a30 fffff805`6f7c5024 : 00000000`00000000 fffff805`6d608180 00000000`00000000 fffff805`6fb91400 : nt!KiRetireDpcList+0x1ef
fffff805`74e67c60 00000000`00000000 : fffff805`74e68000 fffff805`74e62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  e878c61b72aec1e87d18f42d5763235ada7c73e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c1fdaa211506f9d97e7f6967ec912cf66439fb5d

THREAD_SHA1_HASH_MOD:  151fffff2e1d2e818079bf439acd32f0d5d2316b

FOLLOWUP_IP:
rt640x64!MpHandleRecvIntPriVLanJumbo+b41
fffff805`7e5c5bb9 4c8b6c2460      mov     r13,qword ptr [rsp+60h]

FAULT_INSTR_CODE:  246c8b4c

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  rt640x64!MpHandleRecvIntPriVLanJumbo+b41

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5bcde005

IMAGE_VERSION:  9.1.409.2015

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b41

FAILURE_BUCKET_ID:  AV_rt640x64!MpHandleRecvIntPriVLanJumbo

BUCKET_ID:  AV_rt640x64!MpHandleRecvIntPriVLanJumbo

PRIMARY_PROBLEM_CLASS:  AV_rt640x64!MpHandleRecvIntPriVLanJumbo

TARGET_TIME:  2019-12-11T21:43:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7569

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_rt640x64!mphandlerecvintprivlanjumbo

FAILURE_ID_HASH:  {e85833a8-915f-a98a-61ce-bd85f0b49fd7}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff868b74576253, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8004523ac31, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff868b74576253

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8004523ac31

READ_ADDRESS: fffff800457733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff868b74576253

CURRENT_IRQL:  2

FAULTING_IP:
nt!KeWaitForSingleObject+a1
fffff800`4523ac31 83790400        cmp     dword ptr [rcx+4],0

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  opera.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:28.0038

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff868b90b3a810 -- (.trap 0xffff868b90b3a810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff868b7457624f
rdx=fffff78000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004523ac31 rsp=ffff868b90b3a9a0 rbp=ffff868b90b3aa21
r8=0000000000000001  r9=0000000000000000 r10=0000000000000001
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KeWaitForSingleObject+0xa1:
fffff800`4523ac31 83790400        cmp     dword ptr [rcx+4],0 ds:ffff868b`74576253=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800453d32e9 to fffff800453c14e0

STACK_TEXT: 
ffff868b`90b3a6c8 fffff800`453d32e9 : 00000000`0000000a ffff868b`74576253 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff868b`90b3a6d0 fffff800`453cf62b : 00000000`00000000 fffff800`45200000 ffffbc01`18700180 ffff84a9`8db3b2bc : nt!KiBugCheckDispatch+0x69
ffff868b`90b3a810 fffff800`4523ac31 : ffff8f0a`000000c0 ffff868b`00000000 ffff868b`90b3ab01 00000000`00000000 : nt!KiPageFault+0x46b
ffff868b`90b3a9a0 fffff800`457f3c5b : ffff8f0a`5fa0c0e0 00000000`00000006 00000000`00000001 00000237`1c4b7e00 : nt!KeWaitForSingleObject+0xa1
ffff868b`90b3aa80 fffff800`453d2d18 : ffff8f0a`581e0080 0000008b`d97afb58 ffff868b`90b3ab18 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x10b
ffff868b`90b3ab00 00007ffc`87b3c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008b`d97afb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`87b3c144


THREAD_SHA1_HASH_MOD_FUNC:  ce952d657f7eb7f8c759a1a1e40ec24a2db5ec7d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d6a9f5239c1326f9f1af0d932c71bd507aa2f284

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!KeWaitForSingleObject+a1
fffff800`4523ac31 83790400        cmp     dword ptr [rcx+4],0

FAULT_INSTR_CODE:  47983

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KeWaitForSingleObject+a1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a1

FAILURE_BUCKET_ID:  AV_nt!KeWaitForSingleObject

BUCKET_ID:  AV_nt!KeWaitForSingleObject

PRIMARY_PROBLEM_CLASS:  AV_nt!KeWaitForSingleObject

TARGET_TIME:  2019-12-12T21:01:44.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  af9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kewaitforsingleobject

FAILURE_ID_HASH:  {505415ce-6277-25db-2465-e86127b1616c}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000054a3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040e838cf2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 54a3

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8040e838cf2

WRITE_ADDRESS: fffff8040ed733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000054a3

CURRENT_IRQL:  2

FAULTING_IP:
nt!KxReleaseQueuedSpinLock+32
fffff804`0e838cf2 f0480fb139      lock cmpxchg qword ptr [rcx],rdi

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:32.0412

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff80413267060 -- (.trap 0xfffff80413267060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80413267368 rbx=0000000000000000 rcx=00000000000054a3
rdx=fffff80413267270 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040e838cf2 rsp=fffff804132671f0 rbp=fffff80413267320
r8=ffff9a09c48ff340  r9=0000000000000000 r10=fffff8040e838cc0
r11=fffff804132671f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KxReleaseQueuedSpinLock+0x32:
fffff804`0e838cf2 f0480fb139      lock cmpxchg qword ptr [rcx],rdi ds:00000000`000054a3=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8040e9d32e9 to fffff8040e9c14e0

STACK_TEXT: 
fffff804`13266f18 fffff804`0e9d32e9 : 00000000`0000000a 00000000`000054a3 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`13266f20 fffff804`0e9cf62b : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff804`13267060 fffff804`0e838cf2 : ffff9a09`d04d04b0 ffff9a09`d055f4e0 ffff9a09`c831b628 fffff804`13267320 : nt!KiPageFault+0x46b
fffff804`132671f0 fffff804`1dc47bb8 : 00000000`00000000 ffff9a09`c831b000 fffff804`13267320 ffff9a09`c838b000 : nt!KxReleaseQueuedSpinLock+0x32
fffff804`13267220 fffff804`1dc470fe : ffff9a09`c838e002 ffff9a09`00000000 ffff9a09`00000000 ffff9a09`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x6f8
fffff804`132673d0 fffff804`1dc4479b : ffff9a09`c838e002 00000000`00000001 fffff804`13267629 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee
fffff804`13267530 fffff804`1bf44711 : fffff804`13267629 ffff9a09`c831b000 ffff9a09`c4c746e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff804`132675e0 fffff804`1f097cb4 : ffff9a09`c4c74030 00000000`00000000 ffff9a09`c4c74030 ffff9a09`c49b4000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff804`13267690 ffff9a09`c4c74030 : 00000000`00000000 ffff9a09`c4c74030 ffff9a09`c49b4000 fffff804`1f097c47 : nvlddmkm+0xa7cb4
fffff804`13267698 00000000`00000000 : ffff9a09`c4c74030 ffff9a09`c49b4000 fffff804`1f097c47 ffff9a09`c49b4000 : 0xffff9a09`c4c74030


THREAD_SHA1_HASH_MOD_FUNC:  5d91316b45855d6276047261974539e1fdab1da2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  19928186f760a71720824155545844098bc6be18

THREAD_SHA1_HASH_MOD:  f9ab640266b35824718fb479bce6b94b41a7a7c6

FOLLOWUP_IP:
dxgmms2!VidSchiProcessCompletedQueuePacketInternal+6f8
fffff804`1dc47bb8 0fb68db0000000  movzx   ecx,byte ptr [rbp+0B0h]

FAULT_INSTR_CODE:  b08db60f

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VidSchiProcessCompletedQueuePacketInternal+6f8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6f8

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal

BUCKET_ID:  AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal

PRIMARY_PROBLEM_CLASS:  AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal

TARGET_TIME:  2019-12-13T20:02:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  11e47

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_dxgmms2!vidschiprocesscompletedqueuepacketinternal

FAILURE_ID_HASH:  {b2c3b332-059a-e5f3-ac1f-2810d43d4dff}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000000000001a, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 000000000000001a, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 1a

BUGCHECK_P3: 8

BUGCHECK_P4: 1a

WRITE_ADDRESS: fffff800691733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000001a

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
00000000`0000001a ??              ???

EXCEPTION_PARAMETER1:  0000000000000008

EXCEPTION_PARAMETER2:  000000000000001a

BUGCHECK_STR:  0x1E_c0000005_X

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:35.0999

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  ffff98cc66331000 -- (.exr 0xffff98cc66331000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00511867
  ExceptionFlags: 8a000004
NumberParameters: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff80068e2fda7 to fffff80068dc14e0

STACK_TEXT: 
ffffe88c`2a5c6f98 fffff800`68e2fda7 : 00000000`0000001e ffffffff`c0000005 00000000`0000001a 00000000`00000008 : nt!KeBugCheckEx
ffffe88c`2a5c6fa0 fffff800`68dd341d : ffff98cc`66331000 ffffe88c`2a5c7830 ffff8000`00000000 00000000`0000001a : nt!KiDispatchException+0x1689d7
ffffe88c`2a5c7650 fffff800`68dcf605 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffe88c`2a5c7830 00000000`0000001a : ffffd48b`23162080 fffff800`00000000 00000000`00000000 fffff800`00000000 : nt!KiPageFault+0x445
ffffe88c`2a5c79c0 ffffd48b`23162080 : fffff800`00000000 00000000`00000000 fffff800`00000000 00000000`0000000e : 0x1a
ffffe88c`2a5c79c8 fffff800`00000000 : 00000000`00000000 fffff800`00000000 00000000`0000000e ffffe88c`2a5c7a48 : 0xffffd48b`23162080
ffffe88c`2a5c79d0 00000000`00000000 : fffff800`00000000 00000000`0000000e ffffe88c`2a5c7a48 00000000`0000001a : 0xfffff800`00000000


THREAD_SHA1_HASH_MOD_FUNC:  2e9ab7e93b3f60731b8608f9c5cc37cdb42d594f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ad4e40938d7ce4649a69b0de8cb803599f411381

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDispatchException+1689d7
fffff800`68e2fda7 cc              int     3

FAULT_INSTR_CODE:  86f741cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1689d7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1689d7

FAILURE_BUCKET_ID:  0x1E_c0000005_X_nt!KiDispatchException

BUCKET_ID:  0x1E_c0000005_X_nt!KiDispatchException

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_X_nt!KiDispatchException

TARGET_TIME:  2019-12-16T20:03:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2ace

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_x_nt!kidispatchexception

FAILURE_ID_HASH:  {72b01280-60ea-6404-b5e3-077cb4799617}

Followup:     MachineOwner
---------
 
Minidump dosyasını incelemedim, şu anda sadece bir tahminde bulunuyorum yani sorun kesin bundadır demiyorum, belirtmeyince yanlış bilgilendirme alıyoruz mâlum. Tamamen benim tahminime göre sorun SSD'de olabilir.

Umarım donanımsal problem yoktur. Servise göndermek istemiyorum.

Hocam merhaba şu anki güncel sürüm 1909 mu?

Evet 1909 güncellemiştim.
 
  • Komut satırını(CMD) yönetici olarak başlatın "sfc /scannow" yazın işlemi başlatın, işlem bitince yeniden başlatın
  • Ethernet sürücünü güvenli mod ile kaldır ve tekrar yükle
  • Memtest86 testi yap (sonuçların fotoğrafını paylaşmayı unutma!)

Ekran kartı sürücüsünü güvenli mod da DDU ile eski sürücüyü silip yeni ve en güncel olanını yükleyin, dikkat edin internetiniz kapalı olsun siz yeni sürücüyü kurar iken Windows arka da eski
tarihten kalma bir sürücüyü yükler ve sizde sürücüyü yükleyince üst üste sürücü kurmuş olursunuz.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8057420af47, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8057420af47

READ_ADDRESS: fffff8056fb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000001

CURRENT_IRQL:  2

FAULTING_IP:
ndis!ndisMTopReceiveNetBufferLists+147
fffff805`7420af47 49837d0000      cmp     qword ptr [r13],0

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:24.0337

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff80574e67220 -- (.trap 0xfffff80574e67220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=ffff8b087d4ef510
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057420af47 rsp=fffff80574e673b0 rbp=fffff80574e67451
r8=ffff8b0879b641a0  r9=0000000000000000 r10=0000000000000001
r11=ffffb2790f000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
ndis!ndisMTopReceiveNetBufferLists+0x147:
fffff805`7420af47 49837d0000      cmp     qword ptr [r13],0 ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8056f7d32e9 to fffff8056f7c14e0

STACK_TEXT:
fffff805`74e670d8 fffff805`6f7d32e9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff805`74e670e0 fffff805`6f7cf62b : 00000008`00000004 fffff805`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`74e67220 fffff805`7420af47 : 00000007`00000001 ffff8b08`00000008 00000000`00000800 ffff8b08`00000000 : nt!KiPageFault+0x46b
fffff805`74e673b0 fffff805`74210eb0 : ffff8b08`79b641a0 fffff805`00000000 ffff8b08`79b641a0 fffff805`735b208d : ndis!ndisMTopReceiveNetBufferLists+0x147
fffff805`74e674b0 fffff805`74241756 : ffff8b08`7d4ea9f0 fffff805`74e67581 00000000`00000000 00000000`00000008 : ndis!ndisCallReceiveHandler+0x60
fffff805`74e67500 fffff805`7420e874 : 00000000`0010fe76 00000000`00000001 ffff8b08`79b641a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x207a6
fffff805`74e675d0 fffff805`7e5c5bb9 : ffff8b08`7d4aa000 ffff8b08`7d4aa000 00000000`00000000 ffff8b08`7d4aa5f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff805`74e67660 fffff805`7e5b2351 : 00000000`00000000 fffff170`9e1ad501 00000028`00000400 fffff805`74e677d8 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb41
fffff805`74e67750 fffff805`7420f2cc : 00000000`00000000 ffff8b08`7d7e7280 fffff805`80382be0 fffff805`00000000 : rt640x64!MPHandleMessageInterrupt+0x341
fffff805`74e677c0 fffff805`6f66ae95 : 00000000`00000000 00000000`00000001 fffff805`74e678a8 00000000`00000000 : ndis!ndisInterruptDpc+0x19c
fffff805`74e678f0 fffff805`6f66a4ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff805`74e67a30 fffff805`6f7c5024 : 00000000`00000000 fffff805`6d608180 00000000`00000000 fffff805`6fb91400 : nt!KiRetireDpcList+0x1ef
fffff805`74e67c60 00000000`00000000 : fffff805`74e68000 fffff805`74e62000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


THREAD_SHA1_HASH_MOD_FUNC:  e878c61b72aec1e87d18f42d5763235ada7c73e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  c1fdaa211506f9d97e7f6967ec912cf66439fb5d

THREAD_SHA1_HASH_MOD:  151fffff2e1d2e818079bf439acd32f0d5d2316b

FOLLOWUP_IP:
rt640x64!MpHandleRecvIntPriVLanJumbo+b41
fffff805`7e5c5bb9 4c8b6c2460      mov     r13,qword ptr [rsp+60h]

FAULT_INSTR_CODE:  246c8b4c

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  rt640x64!MpHandleRecvIntPriVLanJumbo+b41

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5bcde005

IMAGE_VERSION:  9.1.409.2015

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b41

FAILURE_BUCKET_ID:  AV_rt640x64!MpHandleRecvIntPriVLanJumbo

BUCKET_ID:  AV_rt640x64!MpHandleRecvIntPriVLanJumbo

PRIMARY_PROBLEM_CLASS:  AV_rt640x64!MpHandleRecvIntPriVLanJumbo

TARGET_TIME:  2019-12-11T21:43:56.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  7569

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_rt640x64!mphandlerecvintprivlanjumbo

FAILURE_ID_HASH:  {e85833a8-915f-a98a-61ce-bd85f0b49fd7}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff868b74576253, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8004523ac31, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffff868b74576253

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8004523ac31

READ_ADDRESS: fffff800457733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff868b74576253

CURRENT_IRQL:  2

FAULTING_IP:
nt!KeWaitForSingleObject+a1
fffff800`4523ac31 83790400        cmp     dword ptr [rcx+4],0

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  opera.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:28.0038

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff868b90b3a810 -- (.trap 0xffff868b90b3a810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff868b7457624f
rdx=fffff78000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004523ac31 rsp=ffff868b90b3a9a0 rbp=ffff868b90b3aa21
r8=0000000000000001  r9=0000000000000000 r10=0000000000000001
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KeWaitForSingleObject+0xa1:
fffff800`4523ac31 83790400        cmp     dword ptr [rcx+4],0 ds:ffff868b`74576253=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800453d32e9 to fffff800453c14e0

STACK_TEXT:
ffff868b`90b3a6c8 fffff800`453d32e9 : 00000000`0000000a ffff868b`74576253 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff868b`90b3a6d0 fffff800`453cf62b : 00000000`00000000 fffff800`45200000 ffffbc01`18700180 ffff84a9`8db3b2bc : nt!KiBugCheckDispatch+0x69
ffff868b`90b3a810 fffff800`4523ac31 : ffff8f0a`000000c0 ffff868b`00000000 ffff868b`90b3ab01 00000000`00000000 : nt!KiPageFault+0x46b
ffff868b`90b3a9a0 fffff800`457f3c5b : ffff8f0a`5fa0c0e0 00000000`00000006 00000000`00000001 00000237`1c4b7e00 : nt!KeWaitForSingleObject+0xa1
ffff868b`90b3aa80 fffff800`453d2d18 : ffff8f0a`581e0080 0000008b`d97afb58 ffff868b`90b3ab18 ffffffff`ffffd8f0 : nt!NtWaitForSingleObject+0x10b
ffff868b`90b3ab00 00007ffc`87b3c144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008b`d97afb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`87b3c144


THREAD_SHA1_HASH_MOD_FUNC:  ce952d657f7eb7f8c759a1a1e40ec24a2db5ec7d

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d6a9f5239c1326f9f1af0d932c71bd507aa2f284

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!KeWaitForSingleObject+a1
fffff800`4523ac31 83790400        cmp     dword ptr [rcx+4],0

FAULT_INSTR_CODE:  47983

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KeWaitForSingleObject+a1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a1

FAILURE_BUCKET_ID:  AV_nt!KeWaitForSingleObject

BUCKET_ID:  AV_nt!KeWaitForSingleObject

PRIMARY_PROBLEM_CLASS:  AV_nt!KeWaitForSingleObject

TARGET_TIME:  2019-12-12T21:01:44.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  af9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kewaitforsingleobject

FAILURE_ID_HASH:  {505415ce-6277-25db-2465-e86127b1616c}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000054a3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040e838cf2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 54a3

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8040e838cf2

WRITE_ADDRESS: fffff8040ed733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000054a3

CURRENT_IRQL:  2

FAULTING_IP:
nt!KxReleaseQueuedSpinLock+32
fffff804`0e838cf2 f0480fb139      lock cmpxchg qword ptr [rcx],rdi

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:32.0412

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff80413267060 -- (.trap 0xfffff80413267060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80413267368 rbx=0000000000000000 rcx=00000000000054a3
rdx=fffff80413267270 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040e838cf2 rsp=fffff804132671f0 rbp=fffff80413267320
r8=ffff9a09c48ff340  r9=0000000000000000 r10=fffff8040e838cc0
r11=fffff804132671f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KxReleaseQueuedSpinLock+0x32:
fffff804`0e838cf2 f0480fb139      lock cmpxchg qword ptr [rcx],rdi ds:00000000`000054a3=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8040e9d32e9 to fffff8040e9c14e0

STACK_TEXT:
fffff804`13266f18 fffff804`0e9d32e9 : 00000000`0000000a 00000000`000054a3 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`13266f20 fffff804`0e9cf62b : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff804`13267060 fffff804`0e838cf2 : ffff9a09`d04d04b0 ffff9a09`d055f4e0 ffff9a09`c831b628 fffff804`13267320 : nt!KiPageFault+0x46b
fffff804`132671f0 fffff804`1dc47bb8 : 00000000`00000000 ffff9a09`c831b000 fffff804`13267320 ffff9a09`c838b000 : nt!KxReleaseQueuedSpinLock+0x32
fffff804`13267220 fffff804`1dc470fe : ffff9a09`c838e002 ffff9a09`00000000 ffff9a09`00000000 ffff9a09`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x6f8
fffff804`132673d0 fffff804`1dc4479b : ffff9a09`c838e002 00000000`00000001 fffff804`13267629 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x6ee
fffff804`13267530 fffff804`1bf44711 : fffff804`13267629 ffff9a09`c831b000 ffff9a09`c4c746e8 00000000`00000000 : dxgmms2!VidSchDdiNotifyDpc+0x22b
fffff804`132675e0 fffff804`1f097cb4 : ffff9a09`c4c74030 00000000`00000000 ffff9a09`c4c74030 ffff9a09`c49b4000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff804`13267690 ffff9a09`c4c74030 : 00000000`00000000 ffff9a09`c4c74030 ffff9a09`c49b4000 fffff804`1f097c47 : nvlddmkm+0xa7cb4
fffff804`13267698 00000000`00000000 : ffff9a09`c4c74030 ffff9a09`c49b4000 fffff804`1f097c47 ffff9a09`c49b4000 : 0xffff9a09`c4c74030


THREAD_SHA1_HASH_MOD_FUNC:  5d91316b45855d6276047261974539e1fdab1da2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  19928186f760a71720824155545844098bc6be18

THREAD_SHA1_HASH_MOD:  f9ab640266b35824718fb479bce6b94b41a7a7c6

FOLLOWUP_IP:
dxgmms2!VidSchiProcessCompletedQueuePacketInternal+6f8
fffff804`1dc47bb8 0fb68db0000000  movzx   ecx,byte ptr [rbp+0B0h]

FAULT_INSTR_CODE:  b08db60f

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VidSchiProcessCompletedQueuePacketInternal+6f8

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6f8

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal

BUCKET_ID:  AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal

PRIMARY_PROBLEM_CLASS:  AV_dxgmms2!VidSchiProcessCompletedQueuePacketInternal

TARGET_TIME:  2019-12-13T20:02:25.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  11e47

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_dxgmms2!vidschiprocesscompletedqueuepacketinternal

FAILURE_ID_HASH:  {b2c3b332-059a-e5f3-ac1f-2810d43d4dff}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 000000000000001a, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 000000000000001a, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: 1a

BUGCHECK_P3: 8

BUGCHECK_P4: 1a

WRITE_ADDRESS: fffff800691733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000001a

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
00000000`0000001a ??              ???

EXCEPTION_PARAMETER1:  0000000000000008

EXCEPTION_PARAMETER2:  000000000000001a

BUGCHECK_STR:  0x1E_c0000005_X

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-16-2019 23:31:35.0999

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  ffff98cc66331000 -- (.exr 0xffff98cc66331000)
ExceptionAddress: 0000000000000000
   ExceptionCode: 00511867
  ExceptionFlags: 8a000004
NumberParameters: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

LAST_CONTROL_TRANSFER:  from fffff80068e2fda7 to fffff80068dc14e0

STACK_TEXT:
ffffe88c`2a5c6f98 fffff800`68e2fda7 : 00000000`0000001e ffffffff`c0000005 00000000`0000001a 00000000`00000008 : nt!KeBugCheckEx
ffffe88c`2a5c6fa0 fffff800`68dd341d : ffff98cc`66331000 ffffe88c`2a5c7830 ffff8000`00000000 00000000`0000001a : nt!KiDispatchException+0x1689d7
ffffe88c`2a5c7650 fffff800`68dcf605 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffe88c`2a5c7830 00000000`0000001a : ffffd48b`23162080 fffff800`00000000 00000000`00000000 fffff800`00000000 : nt!KiPageFault+0x445
ffffe88c`2a5c79c0 ffffd48b`23162080 : fffff800`00000000 00000000`00000000 fffff800`00000000 00000000`0000000e : 0x1a
ffffe88c`2a5c79c8 fffff800`00000000 : 00000000`00000000 fffff800`00000000 00000000`0000000e ffffe88c`2a5c7a48 : 0xffffd48b`23162080
ffffe88c`2a5c79d0 00000000`00000000 : fffff800`00000000 00000000`0000000e ffffe88c`2a5c7a48 00000000`0000001a : 0xfffff800`00000000


THREAD_SHA1_HASH_MOD_FUNC:  2e9ab7e93b3f60731b8608f9c5cc37cdb42d594f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  ad4e40938d7ce4649a69b0de8cb803599f411381

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiDispatchException+1689d7
fffff800`68e2fda7 cc              int     3

FAULT_INSTR_CODE:  86f741cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1689d7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1689d7

FAILURE_BUCKET_ID:  0x1E_c0000005_X_nt!KiDispatchException

BUCKET_ID:  0x1E_c0000005_X_nt!KiDispatchException

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_X_nt!KiDispatchException

TARGET_TIME:  2019-12-16T20:03:48.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2ace

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_x_nt!kidispatchexception

FAILURE_ID_HASH:  {72b01280-60ea-6404-b5e3-077cb4799617}

Followup:     MachineOwner
---------
Nasıl ışık hızında mavi ekran hatasını buluyorsun helal olsun. Katkıda Bulunan'ı cidden hakediyorsun.
 
Umarım donanımsal problem yoktur. Servise göndermek istemiyorum.

Evet 1909 güncellemiştim.

Hocam aynı sorunu bende yasıyorum gerek oyunlardakı sıcaklıklar gerek FPS düşüşlerı her turlu bır sorun var. Bugun Microsoft yetkıllerı uzaktan baglanmasına her şeyı tam yuklemesıne ragmen durum hala aynı. Bu sürümden dolayı ayrıca bu sorunu bırcok arkadaşım yasıyor.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı