DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) mavi ekran hatası

 
  1. MemTest86 ile belleklerinizi test edin. XMP gibi profiller kullanıyorsanız mutlaka kapatın, daha sonra gerçekleştirin testi.
    Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
    Daha detaylı bilgi için, çerezler sayfamıza bakınız.

  2. AMD'ye ait ekran kartı sürücünüzü DDU ile kaldırıp WHQL sürüm yükleyin.

  3. Symantec'e ait yazılımı crackli ise kaldırın, değilse güncelleyin. *: Kontrol amaçlı bir süre kaldırmanızı öneririm.

  4. Anakartınızın sitesinden Chipset sürücüsünü kurun.

  5. SFC /scannow komutu nedir? Ne işe yarar? Attığım rehber'i uygulayın.



    [*]
    Kod:
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1356.39499\110320-6609-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff805`6fe00000 PsLoadedModuleList = 0xfffff805`70a2a310
    Debug session time: Tue Nov 3 22:54:57.836 2020 (UTC + 3:00)
    System Uptime: 0 days 0:04:49.475
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................................................
    Loading User Symbols
    Loading unloaded module list
    ......
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff805`701f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8008`ee6f4530=000000000000000a
    5: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 000000000000003f, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
    Arg4: 000000000000003f, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 5640
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 14773
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 74
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: d1
    
    BUGCHECK_P1: 3f
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: 8
    
    BUGCHECK_P4: 3f
    
    READ_ADDRESS: fffff80570afb390: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
    fffff80570a0f340: Unable to get Flags value from nt!KdVersionBlock
    fffff80570a0f340: Unable to get Flags value from nt!KdVersionBlock
    unable to get nt!MmSpecialPagesInUse
    000000000000003f
    
    PROCESS_NAME: chrome.exe
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    TRAP_FRAME: ffff8008ee6f4670 -- (.trap 0xffff8008ee6f4670)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffff8008ee6f47c8 rbx=0000000000000000 rcx=ffff8008ee6f4830
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=000000000000003f rsp=ffff8008ee6f4800 rbp=ffffa6856a788080
    r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
    r11=ffff717fc1a00000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0 nv up ei ng nz na po nc
    00000000`0000003f ?? ???
    Resetting default scope
    
    FAILED_INSTRUCTION_ADDRESS:
    +0
    00000000`0000003f ?? ???
    
    STACK_TEXT:
    ffff8008`ee6f4528 fffff805`70206569 : 00000000`0000000a 00000000`0000003f 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
    ffff8008`ee6f4530 fffff805`70202869 : 00000000`00000000 fffff805`700e016c 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    ffff8008`ee6f4670 00000000`0000003f : ffffa685`6a5a1430 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
    ffff8008`ee6f4800 ffffa685`6a5a1430 : 00000000`00000000 00000000`00000000 00000000`00000000 00000001`ffffffff : 0x3f
    ffff8008`ee6f4808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000001`ffffffff fffffff6`00000007 : 0xffffa685`6a5a1430
    
    
    SYMBOL_NAME: nt!KiPageFault+469
    
    MODULE_NAME: nt
    
    IMAGE_NAME: ntkrnlmp.exe
    
    IMAGE_VERSION: 10.0.19041.572
    
    STACK_COMMAND: .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET: 469
    
    FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
    
    Followup: MachineOwner
    
    ---------
    
    
    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1356.10841\110320-6531-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    
    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 19041 MP (6 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff802`13800000 PsLoadedModuleList = 0xfffff802`1442a310
    Debug session time: Tue Nov 3 22:57:38.787 2020 (UTC + 3:00)
    System Uptime: 0 days 0:02:18.427
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................................................
    Loading User Symbols
    Loading unloaded module list
    ......
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff802`13bf45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9a83`d20c3b70=0000000000000001
    5: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************
    
    APC_INDEX_MISMATCH (1)
    This is a kernel internal error. The most common reason to see this
    bugcheck is when a filesystem or a driver has a mismatched number of
    calls to disable and re-enable APCs. The key data item is the
    Thread->CombinedApcDisable field. This consists of two separate 16-bit
    fields, the SpecialApcDisable and the KernelApcDisable. A negative value
    of either indicates that a driver has disabled special or normal APCs
    (respectively) without re-enabling them; a positive value indicates that
    a driver has enabled special or normal APCs (respectively) too many times.
    Arguments:
    Arg1: fffff80213f07540, Address of system call function or worker routine
    Arg2: 0000000000000000, Thread->ApcStateIndex
    Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
    Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)
    
    Debugging Details:
    ------------------
    
    *** WARNING: Unable to verify timestamp for win32k.sys
    
    KEY_VALUES_STRING: 1
    
    Key : Analysis.CPU.mSec
    Value: 4186
    
    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25
    
    Key : Analysis.DebugData
    Value: CreateObject
    
    Key : Analysis.DebugModel
    Value: CreateObject
    
    Key : Analysis.Elapsed.mSec
    Value: 9951
    
    Key : Analysis.Memory.CommitPeak.Mb
    Value: 76
    
    Key : Analysis.System
    Value: CreateObject
    
    Key : WER.OS.Branch
    Value: vb_release
    
    Key : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z
    
    Key : WER.OS.Version
    Value: 10.0.19041.1
    
    
    ADDITIONAL_XML: 1
    
    OS_BUILD_LAYERS: 1
    
    BUGCHECK_CODE: 1
    
    BUGCHECK_P1: fffff80213f07540
    
    BUGCHECK_P2: 0
    
    BUGCHECK_P3: 1
    
    BUGCHECK_P4: 1
    
    BLACKBOXBSD: 1 (!blackboxbsd)
    
    
    BLACKBOXNTFS: 1 (!blackboxntfs)
    
    
    BLACKBOXWINLOGON: 1
    
    CUSTOMER_CRASH_COUNT: 1
    
    PROCESS_NAME: System
    
    STACK_TEXT:
    ffff9a83`d20c3b68 fffff802`13c77765 : 00000000`00000001 fffff802`13f07540 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
    ffff9a83`d20c3b70 fffff802`13aa2ae5 : ffff8589`bd39a080 00000000`00000080 ffff8589`b2c76040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x174275
    ffff9a83`d20c3c10 fffff802`13bfbbf8 : ffffa180`e4b89180 ffff8589`bd39a080 fffff802`13aa2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
    ffff9a83`d20c3c60 00000000`00000000 : ffff9a83`d20c4000 ffff9a83`d20be000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
    
    
    SYMBOL_NAME: nt!PfSnSectionInfoCleanupWorkItem+0
    
    MODULE_NAME: nt
    
    IMAGE_NAME: ntkrnlmp.exe
    
    IMAGE_VERSION: 10.0.19041.572
    
    STACK_COMMAND: .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET: 0
    
    FAILURE_BUCKET_ID: 0x1_SysCallNum_0_nt!PfSnSectionInfoCleanupWorkItem
    
    OS_VERSION: 10.0.19041.1
    
    BUILDLAB_STR: vb_release
    
    OSPLATFORM_TYPE: x64
    
    OSNAME: Windows 10
    
    FAILURE_ID_HASH: {4a6bfb4c-ad90-5f76-7b42-dca41f7ffa82}
    
    Followup: MachineOwner
    ---------
    [*]
 
Son düzenleme:
Bir forumda mavi ekran hatası için DMP dosyası atmıstım. Easy Anti-Cheat ile Riot Vanguard sil demişti, yaptım. 1 gun boyunca mavi ekran yemedim fakat bugun saat sabah 5 gibi 2 kez yedim. DMP dosyası bu:

Desktop
 
Son düzenleyen: Moderatör:
Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin. USB ile bağlı hangi aygıtlar var?
Önceki konunuzda Vanguard kaldır denmiş fakat hala durmakta, kaldırın.

Kod:
BAD_OBJECT_HEADER (189)
The OBJECT_HEADER has been corrupted
Arguments:
Arg1: ffffde03371e4a90, Pointer to bad OBJECT_HEADER
Arg2: 0000000000000000, Pointer to the resulting OBJECT_TYPE based on the TypeIndex in the OBJECT_HEADER
Arg3: 0000000000000000, The type index is corrupt.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5593

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5696

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  189

BUGCHECK_P1: ffffde03371e4a90

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffff88f`c243e888 fffff802`5e63a08c     : 00000000`00000189 ffffde03`371e4a90 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff88f`c243e890 fffff802`5e4efbce     : ffffde03`3549d080 00000000`00000001 ffffde03`2b2f7560 00000000`00000001 : nt!ObpReferenceObjectByHandleWithTag+0x14a4ac
fffff88f`c243e920 fffff802`5e0de4fa     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObReferenceObjectByHandle+0x2e
fffff88f`c243e970 fffff802`5e4b94a4     : ffffde03`33ca4080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopReferenceFileObject+0x3a
fffff88f`c243e9b0 fffff802`5e206bb8     : 00000000`00000000 00000000`000003c0 00000000`00000000 00000011`f23feae0 : nt!NtReadFile+0x64
fffff88f`c243ea90 00007ffd`d704be64     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000011`f23fea08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d704be64


SYMBOL_NAME:  nt!ObpReferenceObjectByHandleWithTag+14a4ac

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14a4ac

FAILURE_BUCKET_ID:  0x189_nt!ObpReferenceObjectByHandleWithTag

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8bf3796f-7602-d49d-dd11-eaa45fa2179c}

Followup:     MachineOwner
---------



DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8060e8fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding this single DPC timeout

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5765

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 12319

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 98

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8060e8fb320

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff8061206bbf0 -- (.trap 0xfffff8061206bbf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000003a3ab4da rbx=0000000000000000 rcx=fffff8061206bdf8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060debecd7 rsp=fffff8061206bd80 rbp=fffff80609d84180
 r8=0000000000000100  r9=0000000000000000 r10=fffff8060dec2e00
r11=fffff80609d84180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff806`0debecd7 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff806`1207ae18 fffff806`0e087372     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
fffff806`1207ae20 fffff806`0df26853     : 00000839`66c17980 fffff806`09d84180 00000000`00000000 fffff806`09d84180 : nt!KeAccumulateTicks+0x15e2c2
fffff806`1207ae80 fffff806`0df2633a     : fffff806`0e8f38c0 fffff806`1206bc70 fffff806`18b33c00 00000000`0000b301 : nt!KeClockInterruptNotify+0x453
fffff806`1207af30 fffff806`0de2ecd5     : fffff806`0e8f38c0 fffff806`1207af40 00000000`00000010 ffff4089`906461f1 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`1207af60 fffff806`0dff6cba     : fffff806`1206bc70 fffff806`0e8f38c0 00000000`00000002 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`1207afb0 fffff806`0dff7227     : ffffcf0b`601f2a50 ffffcf0b`61c6e4f8 ffffcf0b`614fb080 fffff806`0dff7234 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`1206bbf0 fffff806`0debecd7     : 00000000`00000010 00000000`00000286 fffff806`1206bda8 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`1206bd80 fffff806`0dec0fe8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
fffff806`1206bdb0 fffff806`0de1016d     : fffff806`09d84180 fffff806`3a3ab4da ffffcf0b`614fb080 fffff806`1206bea9 : nt!KiSignalThread+0x1a8
fffff806`1206bdf0 fffff806`0dec33bc     : ffffcf0b`614fb080 fffff806`1206bea9 ffffcf0b`614fb080 fffff806`1e0680e7 : nt!KiSignalThreadForApc+0xb5
fffff806`1206be20 fffff806`0dec2e97     : 00000000`00000000 fffff806`1206bf06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x50c
fffff806`1206bf10 fffff806`19b65056     : 00000000`00000018 fffff806`1206bfb0 ffffcf0b`614f7270 ffffcf0b`5ef72e10 : nt!IofCompleteRequest+0x17
fffff806`1206bf40 fffff806`19b43aa7     : 00000000`00000002 ffffcf0b`5e141450 ffffcf0b`5cbb1970 fffff806`1206c024 : mouclass!MouseClassServiceCallback+0x476
fffff806`1206bfe0 fffff806`0dec2fce     : 00000000`00000000 fffff806`1206c100 00000000`00000001 fffff806`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff806`1206c080 fffff806`0dec2e97     : 00000000`00000008 00000000`00000006 ffffcf0b`5ef791d0 ffffcf0b`5e18e400 : nt!IopfCompleteRequest+0x11e
fffff806`1206c170 fffff806`19acaef5     : ffffcf0b`5e18e400 00000000`00000007 ffffcf0b`5e18e3f0 00000000`00000007 : nt!IofCompleteRequest+0x17
fffff806`1206c1a0 fffff806`19aca7ed     : ffffcf0b`5ef791d0 ffffcf0b`5ef79102 ffffcf0b`5ef791d0 00000000`00000007 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff806`1206c2a0 fffff806`0dec2fce     : ffffcf0b`5ecc6050 ffffcf0b`5ecc6050 fffff806`1206c301 ffffcf0b`5ecc643b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff806`1206c340 fffff806`0dec2e97     : 00000000`00000001 00000000`00000000 ffffcf0b`5ef80020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff806`1206c430 fffff806`109b811a     : 00000000`00000000 ffffcf0b`5e0d4c90 ffffcf0b`5ecc6050 fffff806`0e08973b : nt!IofCompleteRequest+0x17
fffff806`1206c460 fffff806`109b5bbf     : ffffcf0b`62f18102 ffffcf0b`5ef805e0 ffffcf0b`5ecc6050 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff806`1206c4f0 fffff806`194bb91c     : 00000000`ffffff02 ffffcf0b`62f18020 ffffcf0b`5ef80400 ffffcf0b`5ef80400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff806`1206c550 fffff806`194bb7e1     : ffffcf0b`62f181c0 00000000`00000006 ffffcf0b`62f18250 fffff806`1206c768 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff806`1206c5b0 fffff806`194bb5d0     : 00000000`00000004 fffff806`1206c720 00000000`00000000 ffffcf0b`5ef7f5e0 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff806`1206c660 fffff806`194b6570     : 00000000`00000004 fffff806`1206c738 00000000`00000008 fffff806`1206c740 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff806`1206c690 fffff806`194b60a5     : 00000000`00000780 000030f4`a3155700 ffffcf0b`5cc34f10 ffffcf0b`5ece2cf0 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff806`1206c6f0 fffff806`194b5d7c     : ffffcf0b`5ec5a398 fffff806`09d84180 000030f4`a652b308 fffff806`1206c810 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff806`1206c7f0 fffff806`109b38f5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`1206c820 fffff806`0dee535e     : fffff806`09d87240 fffff806`1206c960 fffff806`1206cb20 fffff806`09d84180 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff806`1206c860 fffff806`0dee4644     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`1206c9d0 fffff806`0dff8d7e     : 00000000`00000000 fffff806`09d84180 fffff806`0e927600 ffffcf0b`5ef39100 : nt!KiRetireDpcList+0x1f4
fffff806`1206cc60 00000000`00000000     : fffff806`1206d000 fffff806`12067000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  mouclass!MouseClassServiceCallback+476

MODULE_NAME: mouclass

IMAGE_NAME:  mouclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  476

FAILURE_BUCKET_ID:  0x133_DPC_mouclass!MouseClassServiceCallback

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3fa01bd8-d2f7-df82-2794-89aa20021973}

Followup:     MachineOwner
---------



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff878e2ba6d420, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff878e2ba6d378, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4905

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 43172

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff878e2ba6d420

BUGCHECK_P3: ffff878e2ba6d378

BUGCHECK_P4: 0

TRAP_FRAME:  ffff878e2ba6d420 -- (.trap 0xffff878e2ba6d420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8017aa248a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017a0c506d rsp=ffff878e2ba6d5b0 rbp=ffffa70259346080
 r8=0000000000000001  r9=0000000000000000 r10=0000000000000000
r11=ffffa702611460b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiExitDispatcher+0x1ad:
fffff801`7a0c506d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff878e2ba6d378 -- (.exr 0xffff878e2ba6d378)
ExceptionAddress: fffff8017a0c506d (nt!KiExitDispatcher+0x00000000000001ad)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff878e`2ba6d0f8 fffff801`7a207169     : 00000000`00000139 00000000`00000003 ffff878e`2ba6d420 ffff878e`2ba6d378 : nt!KeBugCheckEx
ffff878e`2ba6d100 fffff801`7a207590     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff878e`2ba6d240 fffff801`7a205923     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff878e`2ba6d420 fffff801`7a0c506d     : 00000000`00000000 fffff801`8acd96c0 00000048`063000e4 00000000`00000004 : nt!KiRaiseSecurityCheckFailure+0x323
ffff878e`2ba6d5b0 fffff801`7a057c50     : fffff801`7aa248c0 fffff801`00000000 fffff801`7aa248c0 00000000`00000000 : nt!KiExitDispatcher+0x1ad
ffff878e`2ba6d620 fffff801`7a09d821     : 00000000`00000048 00000000`00000000 00000000`00000000 fffff801`79e01328 : nt!KeReleaseSemaphoreEx+0x120
ffff878e`2ba6d6a0 fffff801`7a02a0e0     : 00000000`00000001 ffffa702`61146000 00000000`00000000 00000000`00000002 : nt!PopFxRequestWorker+0x31
ffff878e`2ba6d6e0 fffff801`7a029fa1     : ffffa702`61146000 00000000`00000002 00000000`00000006 ffffa702`611460b8 : nt!PopPepRequestWork+0x18
ffff878e`2ba6d710 fffff801`7a0bb48c     : 00000000`00000000 00000000`00000000 ffffa702`5fbbb902 fffff801`7a0e002c : nt!PopPepProcessEvent+0xf1
ffff878e`2ba6d770 fffff801`7a0ba73a     : 00000000`00000001 00000000`00000000 ffffa702`5fbbb9a0 00000000`8aab499c : nt!PopPluginComponentActive+0x7c
ffff878e`2ba6d7b0 fffff801`7a0ba57c     : 00000000`00000002 00000000`00000000 00000000`00000000 ffffa702`5ff31000 : nt!PopFxActivateComponentWorker+0x5a
ffff878e`2ba6d800 fffff801`85ef6ba2     : ffffa702`5ff31000 00000000`00000000 ffffa702`61141000 00000000`00000003 : nt!PoFxActivateComponent+0x13c
ffff878e`2ba6d890 fffff801`85ef6725     : 00000000`00000002 ffffa702`5ff31000 00000000`00000000 fffff801`00000002 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+0x45e
ffff878e`2ba6d980 fffff801`85effd53     : ffffa702`5d512030 ffffa702`5ff71000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBInternal+0x6d
ffff878e`2ba6d9b0 fffff801`86fbd37e     : ffffa702`5ff3e000 ffffa702`5ff71000 ffffffff`ffffffff 00000000`00000000 : dxgkrnl!DxgSetPowerComponentActiveNoWaitForceAsyncCB+0x43
ffff878e`2ba6da20 fffff801`86fab81d     : ffffa702`5ff3e000 00000000`00000000 ffffffff`ffffffff 00000000`00989680 : dxgmms2!VidSchiSwitchContextWithCheck+0x1096e
ffff878e`2ba6dac0 fffff801`8702ad45     : ffffa702`5f25a600 ffffa702`5ff3e000 ffffa702`5f25a620 ffffa702`61d87610 : dxgmms2!VidSchiScheduleCommandToRun+0x11d
ffff878e`2ba6db80 fffff801`8702acfa     : ffffa702`5ff3e400 fffff801`8702ac30 ffffa702`5ff3e000 ffff9201`8bd89100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff878e`2ba6dbd0 fffff801`7a0a29a5     : ffffa702`5fdc6580 fffff801`00000001 ffffa702`5ff3e000 000f8067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff878e`2ba6dc10 fffff801`7a1fc868     : ffff9201`8bd89180 ffffa702`5fdc6580 fffff801`7a0a2950 32336469`736c4362 : nt!PspSystemThreadStartup+0x55
ffff878e`2ba6dc60 00000000`00000000     : ffff878e`2ba6e000 ffff878e`2ba68000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker+45e

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.626

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  45e

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!DXGADAPTER::SetPowerComponentActiveCBWorker

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5106890b-1385-57f9-9b8f-28678a37d713}

Followup:     MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000e097100022f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80537918ccf, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on BORA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10634

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: e097100022f

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80537918ccf

READ_ADDRESS: fffff805380fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8053800f340: Unable to get Flags value from nt!KdVersionBlock
fffff8053800f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 00000e097100022f

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffbd8b804066d0 -- (.trap 0xffffbd8b804066d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=00000e0971000117
rdx=000000000000003f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80537918ccf rsp=ffffbd8b80406868 rbp=ffffbd8b804068b0
 r8=000000000000000c  r9=ffffbd8b804068f8 r10=0000000000000037
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiGenerateHeteroSets+0x7:
fffff805`37918ccf 4e8b9cc1b8000000 mov     r11,qword ptr [rcx+r8*8+0B8h] ds:00000e09`7100022f=????????????????
Resetting default scope

STACK_TEXT: 
ffffbd8b`80406588 fffff805`37807169     : 00000000`0000000a 00000e09`7100022f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbd8b`80406590 fffff805`37803469     : ffffe501`93d671c0 ffffc384`e59a7040 ffffe501`93d5c180 fffff805`377fc422 : nt!KiBugCheckDispatch+0x69
ffffbd8b`804066d0 fffff805`37918ccf     : fffff805`3765902e ffffe501`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffffbd8b`80406868 fffff805`3765902e     : ffffe501`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGenerateHeteroSets+0x7
ffffbd8b`80406870 fffff805`37919b56     : ffffc384`e59a7101 ffffc384`db127080 00000000`00000000 00000000`00000000 : nt!KiCheckPreferredHeteroProcessor+0x7e
ffffbd8b`804068e0 fffff805`379199b4     : 00000000`00000004 ffffbd8b`804069a8 ffffbd8b`804069a0 ffffe501`93d5c180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x156
ffffbd8b`80406970 fffff805`3786fb1c     : ffffe501`ffffffff 00000000`00000000 00000000`00000000 fffff805`376be528 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffbd8b`804069a0 fffff805`376df38f     : 00000000`00000002 fffff805`00000005 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x1901bc
ffffbd8b`80406a50 fffff805`377038a7     : ffffc384`00000000 00000000`00000000 ffffbd8b`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffffbd8b`80406af0 fffff805`37703450     : ffffc384`e59a7040 fffff805`37a12360 ffffc384`db088590 ffffc384`00000000 : nt!KeRemovePriQueue+0x1a7
ffffbd8b`80406b70 fffff805`376a29a5     : ffffc384`e59a7040 00000000`00000080 ffffc384`db09f040 000f8067`b4bbbdff : nt!ExpWorkerThread+0xa0
ffffbd8b`80406c10 fffff805`377fc868     : fffff805`35a7d180 ffffc384`e59a7040 fffff805`376a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffbd8b`80406c60 00000000`00000000     : ffffbd8b`80407000 ffffbd8b`80401000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!KiGenerateHeteroSets+7

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  7

FAILURE_BUCKET_ID:  AV_nt!KiGenerateHeteroSets

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e12c4c11-0ff5-f5ca-55be-f1d53353b217}

Followup:     MachineOwner
---------
 
Son düzenleme:
Ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.
Baktınız mı .dmp dosyasına?
 
Son düzenleyen: Moderatör:
Evet, dosyaya bakarak cevap veriyorum zaten. Siz şimdilik yazdıklarımı uygulayın, mesaja eklemeler yapacağım.
 
Evet, dosyaya bakarak cevap veriyorum zaten. Siz şimdilik yazdıklarımı uygulayın, mesaja eklemeler yapacağım.

Peki bir şey daha soracağım:
Ben bu DDU'yu güvenli moda alamıyorum. Nasıl yapacağım? Bir de bu DDU ile sadece ekran kartı driveri mi kaldırılıyor yoksa ses suruculerı falan kalkıyor mu?
 
Son düzenleyen: Moderatör:

Geri
Yukarı