IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

Starlegend

Decapat
Katılım
24 Ağustos 2020
Mesajlar
35
Çözümler
1
İlk hatayı aldığımda forumda araştırma yaptım ama çözümü bulamadım. Ardından bu hata son bir ay içerisinde iki günde bir bazen de günde iki defa mavi ekran vermeye başladı. Rainbow, Valorant, FiveM gibi oyunları oynarken oyunlarda ya oyun crash veriyor ya da bilgisayar donuyor kapatmam gerekiyor. Bazen ise mavi ekran veriyor ve hata kısmında IRQL_NOT_LESS_OR_EQUAL yazıyor. AMD Radeon'un önerilen sürümünü yükledim. Aygıt yöneticisinden tüm sürücüleri güncelliğini kontrol ettim ama sorun devam ediyor.

Minidump dosyam

@claus @Trieetz @Enes3078 @Murat5038
BlueScreenView'de böyle gözüküyor ben anlamadığım için hem minidump dosyasını paylaştım hem de bunu ekleyeyim dedim.

Screenshot_5.png
 
Son düzenleyen: Moderatör:
Muhtemel bellek sorunu. Başka bellek ile dene mümkünse. Ya da XMP kapat öyle dene.

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8020941702d, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff8020941702d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3780

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9432

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff8020941702d

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff8020941702d

READ_ADDRESS: fffff8020a6fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020a60f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8020a60f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff8020941702d

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RainbowSix.exe

TRAP_FRAME:  ffff8f85b668fad0 -- (.trap 0xffff8f85b668fad0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe07fffffffff rbx=0000000000000000 rcx=fffff8020496c180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8020941702d rsp=ffff8f85b668fc60 rbp=ffff8f85b668fce9
r8=0000000000000001  r9=0000000000000006 r10=0000000000000000
r11=ffffe07fffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
fffff802`0941702d ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS:
+0
fffff802`0941702d ??              ???

STACK_TEXT:
ffff8f85`b668f988 fffff802`09defe29     : 00000000`0000000a fffff802`0941702d 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffff8f85`b668f990 fffff802`09dec129     : fffff802`09a00000 00000000`00000000 00000000`00000002 fffff802`09def878 : nt!KiBugCheckDispatch+0x69
ffff8f85`b668fad0 fffff802`0941702d     : ffff8f85`b668fc80 00000000`00000000 ffff8f85`00000001 00000000`00000002 : nt!KiPageFault+0x469
ffff8f85`b668fc60 ffff8f85`b668fc80     : 00000000`00000000 ffff8f85`00000001 00000000`00000002 00000000`00000000 : 0xfffff802`0941702d
ffff8f85`b668fc68 00000000`00000000     : ffff8f85`00000001 00000000`00000002 00000000`00000000 ffffa984`e7fdaa80 : 0xffff8f85`b668fc80


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000027dae7650b, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803786cc7fe, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3999

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10142

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 27dae7650b

BUGCHECK_P2: d

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803786cc7fe

READ_ADDRESS: fffff803790fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037900f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8037900f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
00000027dae7650b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff97001b71aa70 -- (.trap 0xffff97001b71aa70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000027dae78c1b rbx=0000000000000000 rcx=00000027dae9bd0e
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803786cc7fe rsp=ffff97001b71ac00 rbp=fffff8037545fac0
r8=0000000000000000  r9=0000000000000002 r10=00000027dae88eaa
r11=000000000009f6b9 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!PpmUpdatePerformanceFeedback+0x14e:
fffff803`786cc7fe 8b07            mov     eax,dword ptr [rdi] ds:00000000`00000000=????????
Resetting default scope

MISALIGNED_IP:
nt!PpmUpdatePerformanceFeedback+14e
fffff803`786cc7fe 8b07            mov     eax,dword ptr [rdi]

STACK_TEXT:
ffff9700`1b71a928 fffff803`787efe29     : 00000000`0000000a 00000027`dae7650b 00000000`0000000d 00000000`00000000 : nt!KeBugCheckEx
ffff9700`1b71a930 fffff803`787ec129     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9700`1b71aa70 fffff803`786cc7fe     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff9700`1b71ac00 ffff9700`1b701180     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0010b768 : nt!PpmUpdatePerformanceFeedback+0x14e
ffff9700`1b71acb0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`0010b768 ffff9700`1b701180 : 0xffff9700`1b701180


SYMBOL_NAME:  nt!PpmUpdatePerformanceFeedback+14e

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {201b0e5d-db2a-63d2-77be-8ce8ff234750}

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff803419bcb34, memory referenced.
Arg2: 0000000000000011, value 0 = read operation, 1 = write operation.
Arg3: fffff803419bcb34, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4531

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 8308

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: fffff803419bcb34

BUGCHECK_P2: 11

BUGCHECK_P3: fffff803419bcb34

BUGCHECK_P4: 2

WRITE_ADDRESS: fffff803424fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8034240f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8034240f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff803419bcb34

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: avp.exe

TRAP_FRAME:  ffffea0aafb09300 -- (.trap 0xffffea0aafb09300)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb00a3af58000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb00a355de080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803419bcb34 rsp=ffffea0aafb09490 rbp=ffffea0aafb09519
r8=0000000000000001 r9=fffff80341a3d700 r10=fffff80341a3c6a0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!_guard_fids_table <PERF> (nt+0x1bcb34):
fffff803`419bcb34 0100 add dword ptr [rax],eax ds:ffffb00a`3af58000=02d00000
Resetting default scope

STACK_TEXT:
ffffea0a`afb09058 fffff803`41c35de9 : 00000000`00000050 fffff803`419bcb34 00000000`00000011 ffffea0a`afb09300 : nt!KeBugCheckEx
ffffea0a`afb09060 fffff803`41a12d00 : 00000000`00000000 00000000`00000011 ffffea0a`afb09380 00000000`00000000 : nt!MiSystemFault+0x1ae0e9
ffffea0a`afb09160 fffff803`41bec01e : ffffea0a`afb09500 ffffb00a`355de080 ffffea0a`afb09350 00000000`00000000 : nt!MmAccessFault+0x400
ffffea0a`afb09300 fffff803`419bcb34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffea0a`afb09490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_guard_fids_table <PERF> (nt+0x1bcb34)


SYMBOL_NAME: nt!_guard_fids_table <PERF> (nt+0x1bcb34)+0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 0

FAILURE_BUCKET_ID: AV_INVALID_nt!_guard_fids_table__PERF__(nt+0x1bcb34)

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ceea394d-2b75-8b0a-7e2b-a74eee885a16}

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffffeb768237e73, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000100008, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4906

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 19483

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffffeb768237e73

BUGCHECK_P3: 1

BUGCHECK_P4: 100008

WRITE_ADDRESS: fffff8041befa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8041be0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8041be0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000100008

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: 0000000000100008

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: AMDRSSrcExt.exe

TRAP_FRAME:  ffff8c89a1d1e0d0 -- (.trap 0xffff8c89a1d1e0d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffe68734e9dfc0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffffeb768237e73 rsp=ffff8c89a1d1e260 rbp=ffffd3082be1b418
r8=0000000000000000 r9=0000000000000101 r10=000000000000000c
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32kbase!ThreadUnlock1+0x73:
fffffeb7`68237e73 f00fc14308 lock xadd dword ptr [rbx+8],eax ds:00000000`00000008=????????
Resetting default scope

STACK_TEXT:
ffff8c89`a1d1d828 fffff804`1b62efc5 : 00000000`0000001e ffffffff`c0000005 fffffeb7`68237e73 00000000`00000001 : nt!KeBugCheckEx
ffff8c89`a1d1d830 fffff804`1b5eff6c : ffff8c89`a1d1e150 00000000`00001000 ffff8c89`a1d1e0d0 ffff8000`00000000 : nt!KiDispatchException+0x1b4955
ffff8c89`a1d1def0 fffff804`1b5ec103 : 00000000`00000000 ffffe687`3b736080 00000000`00000000 fffffeb7`68245d07 : nt!KiExceptionDispatch+0x12c
ffff8c89`a1d1e0d0 fffffeb7`68237e73 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
ffff8c89`a1d1e260 00000000`00000000 : fffffe87`00606b00 fffffe87`06fa2cd0 ffffe687`40340290 fffff804`1b424678 : win32kbase!ThreadUnlock1+0x73


SYMBOL_NAME: win32kbase!ThreadUnlock1+73

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 73

FAILURE_BUCKET_ID: 0x1E_c0000005_W_win32kbase!ThreadUnlock1

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {926c3e21-3097-d8ef-adb1-098fca243107}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016baa7e6e, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4780

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 12438

Key : Analysis.Memory.CommitPeak.Mb
Value: 78

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8016baa7e6e

WRITE_ADDRESS: fffff8016c4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016c40f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8016c40f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  ffffe180ec2927c0 -- (.trap 0xffffe180ec2927c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe180ec2929d0
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016baa7e6e rsp=ffffe180ec292950 rbp=ffffe180ec292b00
r8=ffff9103e0abe000 r9=7fff9103e0ac7c20 r10=0000000000000000
r11=ffffe180ec2929d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0xe:
fffff801`6baa7e6e 48890a mov qword ptr [rdx],rcx ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffffe180`ec292678 fffff801`6bbefe29 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe180`ec292680 fffff801`6bbec129 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`e0eff2d0 : nt!KiBugCheckDispatch+0x69
ffffe180`ec2927c0 fffff801`6baa7e6e : ffff9103`e0ac7c50 0000017d`024784c2 00000000`00000000 ffff9103`e0ac8050 : nt!KiPageFault+0x469
ffffe180`ec292950 fffff801`6baa7e4f : ffff9103`e0abe000 ffffffff`00000001 00000000`00000000 ffff9103`e0ac7c50 : nt!KxWaitForLockOwnerShip+0xe
ffffe180`ec292980 fffff801`80e328e8 : ffff9103`e0abe000 fffff801`6ba26197 ffff9103`00000001 ffff9103`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7f
ffffe180`ec2929b0 fffff801`80eb94bb : ffff9103`e0abe000 ffff9103`e0ac7c10 ffff9103`e0abe000 ffff9103`e0ac7c10 : dxgmms2!VIDMM_GLOBAL::GetNextPendingTermination+0x28
ffffe180`ec292a00 fffff801`80ec36c9 : ffffb88d`78c1f540 ffff9103`e34a1500 00000000`00000000 00000000`09b8d000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xb0b
ffffe180`ec292be0 fffff801`6bb46745 : ffff9103`e34a1540 fffff801`80ec36c0 ffffb88d`78c1f540 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffe180`ec292c10 fffff801`6bbe5598 : ffffe780`433a3180 ffff9103`e34a1540 fffff801`6bb466f0 006f0062`fffffff0 : nt!PspSystemThreadStartup+0x55
ffffe180`ec292c60 00000000`00000000 : ffffe180`ec293000 ffffe180`ec28d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::GetNextPendingTermination+28

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 28

FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_GLOBAL::GetNextPendingTermination

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ff872a24-3803-9729-2ecd-398732d6d380}

Followup: MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffffff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: ffffffffffffffff, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4499

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 8451

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffffffffffffff

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8032a6fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8032a60f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8032a60f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: FiveM_GTAProcess.exe

TRAP_FRAME:  fffff90d81d99090 -- (.trap 0xfffff90d81d99090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffb7079a391ca0
rdx=ffffb70799dff040 rsi=0000000000000000 rdi=0000000000000000
rip=ffffffffffffffff rsp=fffff90d81d99220 rbp=ffffffffffffffff
r8=ffffb707963aa988 r9=ffffb7079f72ca20 r10=fffff8032e1f8a30
r11=fffff90d81d991f0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffffff`ffffffff ?? ???
Resetting default scope

BAD_STACK_POINTER: fffff90d81d98f48

FAILED_INSTRUCTION_ADDRESS:
+0
ffffffff`ffffffff ?? ???

SYMBOL_NAME: nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 469

FAILURE_BUCKET_ID: AV_CODE_AV_STACKPTR_ERROR_BAD_IP_nt!KiPageFault

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {34f9cbc0-1550-7c88-9b48-00dd756e07ce}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000600, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000c3, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80758c28233, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3546

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 9008

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 600

BUGCHECK_P2: ff

BUGCHECK_P3: c3

BUGCHECK_P4: fffff80758c28233

WRITE_ADDRESS: fffff807596fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075960f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8075960f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000600

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: FiveM_GTAProcess.exe

TRAP_FRAME:  ffff950f54d0f790 -- (.trap 0xffff950f54d0f790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=000000000000000e
rdx=ffff810ebf29be88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80758c28233 rsp=ffff950f54d0f920 rbp=0000000000000001
r8=0000000000000020 r9=ffff810ebf29bdd8 r10=0000000000018e2c
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!KiSwapThread+0x993:
fffff807`58c28233 488b80f8050000 mov rax,qword ptr [rax+5F8h] ds:00000000`00000600=????????????????
Resetting default scope

STACK_TEXT:
ffff950f`54d0f648 fffff807`58defe29 : 00000000`0000000a 00000000`00000600 00000000`000000ff 00000000`000000c3 : nt!KeBugCheckEx
ffff950f`54d0f650 fffff807`58dec129 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff950f`54d0f790 fffff807`58c28233 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff950f`54d0f920 fffff807`58c272cf : ffff950f`54d0fb80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x993
ffff950f`54d0f9d0 fffff807`58c30ce8 : ffff810e`00000000 ffff810e`00000000 ffff950f`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff950f`54d0fa70 fffff807`5900b060 : ffff810e`bf29b540 ffff950f`54d0fb80 00000000`00000000 00000000`00000000 : nt!KeWaitForAlertByThreadId+0xc4
ffff950f`54d0fad0 fffff807`58def878 : ffff810e`bf29b540 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForAlertByThreadId+0x30
ffff950f`54d0fb00 00007ffb`73f8f7b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`7a6bfad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`73f8f7b4


SYMBOL_NAME: nt!KiSwapThread+993

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 993

FAILURE_BUCKET_ID: AV_CODE_AV_nt!KiSwapThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {cf7b014d-29aa-1ade-7b31-a611d67b642f}

Followup: MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8067f81b5bf, Address of the instruction which caused the bugcheck
Arg3: fffffc81a292b990, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4656

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 11882

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8067f81b5bf

BUGCHECK_P3: fffffc81a292b990

BUGCHECK_P4: 0

CONTEXT:  fffffc81a292b990 -- (.cxr 0xfffffc81a292b990)
rax=00000000ffffffff rbx=0000000000000008 rcx=0000000000000008
rdx=0000000000000008 rsi=ffffba024f9f4510 rdi=0000000000000045
rip=fffff8067f81b5bf rsp=fffffc81a292c390 rbp=ffffba0241cbac40
r8=ffffba024e246080 r9=0000000000000000 r10=0000000000000000
r11=000000000000032c r12=0000000000000000 r13=0000000000000070
r14=ffffba024f9f4510 r15=0000000000000008
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
nt!PspDereferenceQuotaBlock+0x1b:
fffff806`7f81b5bf f00fc18100020000 lock xadd dword ptr [rcx+200h],eax ds:002b:00000000`00000208=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: FiveM_GTAProcess.exe

STACK_TEXT:
fffffc81`a292c390 fffff806`7f80cb3f : ffffba02`4f9f4530 ffffba02`4f9f4510 00000000`00000045 ffffba02`4a580d40 : nt!PspDereferenceQuotaBlock+0x1b
fffffc81`a292c3c0 fffff806`7f80c898 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x24f
fffffc81`a292c420 fffff806`7f424eb7 : 00000000`00000000 00000000`00000000 fffffc81`a292c5a9 ffffba02`4f9f4560 : nt!ObpRemoveObjectRoutine+0x88
fffffc81`a292c480 fffff806`7f7f4f5e : ffffba02`41cbac40 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc7
fffffc81`a292c4c0 fffff806`7f8e1c25 : 00000000`00000103 00000000`00000000 00000000`c4ce0091 00000000`00000000 : nt!ObCloseHandleTableEntry+0x29e
fffffc81`a292c600 fffff806`7f8c84d9 : 00000000`00000000 ffffba02`4d0b4580 ffffffff`ffffff01 ffffba02`4e2464d8 : nt!ExSweepHandleTable+0xd5
fffffc81`a292c6b0 fffff806`7f8bb4bf : ffffffff`ffffffff ffffba02`4e246080 fffffc81`a292c700 ffffba02`00000000 : nt!ObKillProcess+0x35
fffffc81`a292c6e0 fffff806`7f7e91d2 : ffffba02`4e246080 ffffcf0f`55ee5060 fffffc81`a292c920 00000000`00000000 : nt!PspRundownSingleProcess+0x133
fffffc81`a292c760 fffff806`7f8f6518 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`002e2000 : nt!PspExitThread+0x5f6
fffffc81`a292c860 fffff806`7f42a507 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffc81`a292c8a0 fffff806`7f5e24e0 : 00000000`00000000 fffffc81`a292c950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffc81`a292c950 fffff806`7f5ef91f : ffffba02`4ea8c600 fffffc81`a292cb80 ffffba02`4d0b4580 ffffba02`4f3babc0 : nt!KiInitiateUserApc+0x70
fffffc81`a292ca90 00007fff`e760c914 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`62cfd638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e760c914


SYMBOL_NAME: nt!PspDereferenceQuotaBlock+1b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .cxr 0xfffffc81a292b990 ; kb

BUCKET_ID_FUNC_OFFSET: 1b

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PspDereferenceQuotaBlock

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7a45ee28-7cce-d9df-0178-12f4a9caa1f3}

Followup: MachineOwner
---------

3: kd> !sysino machineid
No export sysino found
3: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.8, DMIVersion 0, Size=2220]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = 3.50
BiosReleaseDate = 04/20/2020
SystemManufacturer = Micro-Star International Co., Ltd.
SystemProductName = MS-7C52
SystemFamily = To be filled by O.E.M.
SystemVersion = 1.0
SystemSKU = To be filled by O.E.M.
BaseBoardManufacturer = Micro-Star International Co., Ltd.
BaseBoardProduct = B450M-A PRO MAX (MS-7C52)
BaseBoardVersion = 1.0
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000600, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8037f028233, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3702

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 6479

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 600

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8037f028233

READ_ADDRESS: fffff8037fafa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8037fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8037fa0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000600

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: FiveM_GTAProcess.exe

TRAP_FRAME:  ffff98045778e790 -- (.trap 0xffff98045778e790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=000000000000000e
rdx=ffff9b8ef7ea79c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037f028233 rsp=ffff98045778e920 rbp=0000000000000001
r8=0000000000000020 r9=ffff9b8ef7ea7918 r10=0000000000048466
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!KiSwapThread+0x993:
fffff803`7f028233 488b80f8050000 mov rax,qword ptr [rax+5F8h] ds:00000000`00000600=????????????????
Resetting default scope

STACK_TEXT:
ffff9804`5778e648 fffff803`7f1efa29 : 00000000`0000000a 00000000`00000600 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff9804`5778e650 fffff803`7f1ebd29 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9804`5778e790 fffff803`7f028233 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff9804`5778e920 fffff803`7f0272cf : ffff9804`5778eb80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x993
ffff9804`5778e9d0 fffff803`7f030ce8 : ffff9b8e`00000000 ffff9b8e`00000000 ffff9804`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff9804`5778ea70 fffff803`7f40acc0 : ffff9b8e`f7ea7080 ffff9804`5778eb80 00000000`00000000 00000000`00000000 : nt!KeWaitForAlertByThreadId+0xc4
ffff9804`5778ead0 fffff803`7f1ef478 : ffff9b8e`f7ea7080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForAlertByThreadId+0x30
ffff9804`5778eb00 00007ffb`87fce784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`6ee0fad8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`87fce784


SYMBOL_NAME: nt!KiSwapThread+993

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 993

FAILURE_BUCKET_ID: AV_nt!KiSwapThread

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3a5eca23-a992-0c0e-a0ce-d48add0d8eda}

Followup: MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000600, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80416628233, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3827

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 13484

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: 600

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80416628233

READ_ADDRESS: fffff804170fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8041700f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff8041700f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000600

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  ffffc001d20ae720 -- (.trap 0xffffc001d20ae720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=000000000000000e
rdx=ffffd98a59e22988 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80416628233 rsp=ffffc001d20ae8b0 rbp=0000000000000001
r8=0000000000000020 r9=ffffd98a59e228d8 r10=0000000000004d6e
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
nt!KiSwapThread+0x993:
fffff804`16628233 488b80f8050000 mov rax,qword ptr [rax+5F8h] ds:00000000`00000600=????????????????
Resetting default scope

STACK_TEXT:
ffffc001`d20ae5d8 fffff804`167efe29 : 00000000`0000000a 00000000`00000600 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffc001`d20ae5e0 fffff804`167ec129 : ffffac01`75d00180 fffff804`167e5152 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffc001`d20ae720 fffff804`16628233 : ffffac01`7605d180 00000000`00000000 000000ad`00000000 ffffd98a`5dcd6198 : nt!KiPageFault+0x469
ffffc001`d20ae8b0 fffff804`166272cf : ffffffff`00000009 ffffac01`00000005 ffffc001`d20aea70 fffff804`00000000 : nt!KiSwapThread+0x993
ffffc001`d20ae960 fffff804`16626b73 : ffffffff`00000000 00000000`00000000 000000ad`bb6bdc00 ffffd98a`59e22180 : nt!KiCommitThreadWait+0x14f
ffffc001`d20aea00 fffff804`12d62471 : ffffd98a`59bffce0 ffffd98a`00000000 00000000`00000000 ffffd98a`5bd69401 : nt!KeWaitForSingleObject+0x233
ffffc001`d20aeaf0 fffff804`12d62f29 : 00000000`00000010 00000000`0000001a 00000000`00000009 fffff804`12d67150 : mmcss!CiSchedulerWait+0x2d1
ffffc001`d20aebc0 fffff804`16746745 : ffffd98a`00000010 ffffd98a`59e22040 00000000`00000080 fffff804`12d62d50 : mmcss!CiSchedulerThreadFunction+0x1d9
ffffc001`d20aec10 fffff804`167e5598 : ffffac01`75b80180 ffffd98a`59e22040 fffff804`167466f0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc001`d20aec60 00000000`00000000 : ffffc001`d20af000 ffffc001`d20a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: mmcss!CiSchedulerWait+2d1

MODULE_NAME: mmcss

IMAGE_NAME:  mmcss.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2d1

FAILURE_BUCKET_ID: AV_mmcss!CiSchedulerWait

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8dcd8784-767d-3e09-7c6b-1dde77ecb666}

Followup: MachineOwner
---------

4: kd> lmvm mmcss
Browse full module list
start             end                 module name
fffff804`12d60000 fffff804`12d74000   mmcss    # (pdb symbols)          C:\ProgramData\Dbg\sym\mmcss.pdb\6E397F6CB167ECCEC215C127973E000A1\mmcss.pdb
    Loaded symbol image file: mmcss.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\mmcss.sys\A1F3B59014000\mmcss.sys
Image path: \SystemRoot\system32\drivers\mmcss.sys
Image name: mmcss.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        A1F3B590 (This is a reproducible build file hash, not a timestamp)
CheckSum: 000108D9
ImageSize: 00014000
File version: 10.0.19041.1030
Product version: 10.0.19041.1030
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: mmcss.sys
OriginalFilename: mmcss.sys
ProductVersion: 10.0.19041.1030
FileVersion: 10.0.19041.1030 (WinBuild.160101.0800)
FileDescription: MMCSS Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
 

Yeni konular

Geri
Yukarı