Çözüldü IRQL_NOT_LESS_OR_EQUAL Mavi Ekran Hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

Alp810

Centipat
Katılım
12 Kasım 2019
Mesajlar
20
Çözümler
1
Merhaba!
Bilgisayarımın anakart ve işlemcisini değiştirdim. Format atıp "Windows 10 64 Bit" yükledim. Rastgele mavi ekran hatası almaya başladım. Genelde hata kodu olarak "MEMORY_MANAGEMENT" yazıyordu, bende D.O.C.P. (XMP) profilini devre dışı bırakıp yeniden format attım. Yeni kurulumdan sonra mavi ekran hataları devam etmekte, fakat kodlar değişti. Aldığım kodlar;

System SERVICE EXCEPTION
KERNEL_SECURITY_CHECK_FAILURE
IRQL_NOT_LESS_OR_EQUAL

Bu hataları "Chrome" açıkken veya "World of Warcraft" oynarken alıyorum (gerçi benim makinede sürekli açıktır Chrome, WoW oynarken dahi geride YouTube için müzik açıyorum genelde).İnternet ve forumlarda yaptığım arama sonucunda net bir çözüm bulamadım. Benim tahminim LAN sürüsü ile ilgili bir hata. Technopat Sosyal'de bazı arkadaşlara "minidump" klasörünü gönderdiğinde yardımcı olmuşsunuz. Benim minidump Bende size danışayım dedim.
Bilgisayar parçaları;

  • Anakart: ASUS Crosshair 7 Hero X470
  • İşlemci: AMD R5 3600
  • Ekran Kartı: ASUS ROG STRIX RTX 2060 / MSI GTX 1080 Ti Gaming X Trio
  • 1080 Ti ısınma sorunu sebebiyle serviste, 2060 geçiçi olarak kullanıyorum
  • Bellek: 3x4GB Corsair Dominator Platinum 3000MHz
  • Şu an 2133 MHz XMP/DOCP kapalı
  • SSD: Corsair'le 240 GB (Boot Drive)
  • Samsung 860 Evo 500 GB M.2 SATA
  • Samsung 860 QVO 1TB SATA
  • HDD: WD Blue 1TB

Yüklü ve sürekli açık programlar: AIDA64, MSI Afterburner ve RTSS, ASUS GPU Tweak, Discord, Steam, Battle.net

Minidump Klasörüm: minidump Mark 7.rar

Yardımcı olacak herkese şimdiden teşekkürler.
 
Son düzenleyen: Moderatör:
Çözüm
İşletim sitemi problem olamaz, zira zaten 2 defa format attım. Benim aklıma da ilk gelen bu oldu ve format attım ama çözülmedi. Ve önceki "Windows 10" anakart ve işlemciyi değiştirdiğim için zaten 3 haftalık bir kurulumdu. Yani yeniydi.

Arkadaşlar, durum güncellemesi;
2 Hafta geçti ve hiç mavi ekran hatası almadım. Görünüşe göre problem kitteki belleklerden birinin bozuk olmasıymış. Yani çözüldü gibi gözüküyor.

Şu anda "Memtest86" ile yapılan test sonucunda bellek kitindeki belleklerden birinin bozuk olması ve benim bu belleği çıkartmam sonucu problem çözüldü.

Şu an bilgisayarımda 3 adet 4 GB bellek modülü takılı, ve işin güzel yani DOCP/XMP açık ve çalışıyor.😊 Demek ki o bozuk bellek modülünden dolayı DOCP/XMP çalışmıyormuş. 12 GB bellek bana yeterli yeni bellek almayacağım.

Ben mavi ekran hatasını çözmek için yazmıştım, DOCP/XMP problemim de çözüldü.
Herkese yardımları için tekrar teşekkür ederim.
Tekrar mavi ekran hatası alırsam konuya yazarım.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000821, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8027b6c1870, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5155

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 35218

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 821

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8027b6c1870

READ_ADDRESS: fffff8027bb733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8027ba2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8027ba2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000821

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffab0d838776b0 -- (.trap 0xffffab0d838776b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8506147638a0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8027f0327d4 rsp=ffffab0d83877840 rbp=ffffab0d838779a1
 r8=ffffab0d838778d8  r9=ffffab0d838778d0 r10=0000000000000000
r11=ffff8506147638a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
WppRecorder!WppAutoLogGetBugCheckDataForLog+0x28:
fffff802`7f0327d4 0000            add     byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope

MISALIGNED_IP:
WppRecorder!WppAutoLogGetBugCheckDataForLog+28
fffff802`7f0327d4 0000            add     byte ptr [rax],al

STACK_TEXT: 
ffffab0d`83877008 fffff802`7b7d30e9     : 00000000`0000000a 00000000`00000821 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffab0d`83877010 fffff802`7b7cf42b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffab0d`83877150 fffff802`7b6c1870     : ffffab0d`83877420 00000000`00013980 00000000`000000bc 00000000`00000000 : nt!KiPageFault+0x46b
ffffab0d`838772e0 fffff802`7b6c138c     : 00000000`00000000 fffff802`7b636a3a ffff967c`0143ec48 ffff964b`3e00a1f0 : nt!MiCheckVirtualAddress+0xf0
ffffab0d`83877310 fffff802`7b6739ac     : ffff967f`ffffffff ffff9600`00000000 ffff9600`00000000 ffff964b`00000000 : nt!MiInPagePageTable+0xcc
ffffab0d`83877460 fffff802`7b672cde     : 00000000`00000040 fffff802`87d88c84 00000000`00000002 00000000`00000000 : nt!MiUserFault+0x7dc
ffffab0d`83877510 fffff802`7b7cf320     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x14e
ffffab0d`838776b0 fffff802`7f0327d4     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`7f032578 : nt!KiPageFault+0x360
ffffab0d`83877840 fffff802`7f032578     : 00000000`00000000 fffff802`87d88e62 00000000`00000000 00000000`00000000 : WppRecorder!WppAutoLogGetBugCheckDataForLog+0x28
ffffab0d`83877860 fffff802`87da29e4     : ffff8506`1464d960 ffffab0d`838779a1 ffff8506`1e4ebad0 ffff8506`1c06d010 : WppRecorder!imp_WppRecorderLogDumpLiveData+0x18
ffffab0d`838778a0 fffff802`87d50c5b     : ffff8506`1c06d010 ffffab0d`838779a1 ffff8506`1c06d010 ffff8506`1464d960 : USBXHCI!Controller_TelemetryAddControllerData+0x74
ffffab0d`83877910 fffff802`87d51080     : ffff8506`1425e360 ffffab0d`83877a40 00000000`00000000 00000000`00000000 : USBXHCI!Controller_TelemetryReport+0x1ff
ffffab0d`83877a00 fffff802`7ef33fd9     : ffff8506`1425e260 00000000`00000008 00000000`00000008 00000000`00000000 : USBXHCI!Controller_TelemetryReportWorker+0x290
ffffab0d`83877a80 fffff802`7ef33e69     : ffff9b00`0a940100 ffff8506`1425e260 ffff8506`10c80040 fffff802`7b6bd91c : Wdf01000!FxWorkItem::WorkItemHandler+0x7d [minkernel\wdf\framework\shared\core\fxworkitem.cpp @ 371]
ffffab0d`83877ac0 fffff802`7b667bff     : ffff8506`1424db50 00000000`00000000 ffff8506`00000000 fffff802`87825020 : Wdf01000!FxWorkItem::WorkItemThunk+0x29 [minkernel\wdf\framework\shared\core\fxworkitem.cpp @ 439]
ffffab0d`83877b00 fffff802`7b6bd465     : ffff8506`10c7ea20 ffff8506`10c80040 fffff802`7b667b00 00000000`0000000c : nt!IopProcessWorkItem+0xff
ffffab0d`83877b70 fffff802`7b72a725     : ffff8506`10c80040 00000000`00000080 ffff8506`10c96040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffab0d`83877c10 fffff802`7b7c886a     : ffff9b00`0a747180 ffff8506`10c80040 fffff802`7b72a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffab0d`83877c60 00000000`00000000     : ffffab0d`83878000 ffffab0d`83872000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  WppRecorder!WppAutoLogGetBugCheckDataForLog+28

MODULE_NAME: hardware

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.18362.1049

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  IP_MISALIGNED_WppRecorder.sys

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a9f7fe95-c676-0dcf-dbdf-709e0c33a748}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff60cabde17a0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff60cabde16f8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 27435

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff60cabde17a0

BUGCHECK_P3: fffff60cabde16f8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000

EXCEPTION_RECORD:  fffff60cabde16f8 -- (.exr 0xfffff60cabde16f8)
ExceptionAddress: fffff800163dc388 (nt!KiWakeQueueWaiter+0x00000000001d8268)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  netsh.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff60c`abde1478 fffff800`163d30e9     : 00000000`00000139 00000000`00000003 fffff60c`abde17a0 fffff60c`abde16f8 : nt!KeBugCheckEx
fffff60c`abde1480 fffff800`163d3510     : 00000048`06320076 00000000`00000004 ffff840d`65720180 ffff840d`65720080 : nt!KiBugCheckDispatch+0x69
fffff60c`abde15c0 fffff800`163d18a5     : ffff840d`6eb51a58 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff60c`abde17a0 fffff800`163dc388     : 00000000`00000000 00000000`00000001 ffffdd04`c8ac1e18 fffff800`1626528b : nt!KiRaiseSecurityCheckFailure+0x325
fffff60c`abde1930 fffff800`1624870d     : 00000000`00000000 ffffdd04`c8ac1e18 ffff840d`631329e0 ffff840d`6226b420 : nt!KiWakeQueueWaiter+0x1d8268
fffff60c`abde1980 fffff800`1680e423     : ffff840d`620ff400 00000000`00000000 ffffdd04`c8cb0cf0 ffff840d`620ff408 : nt!KeSetEvent+0x25d
fffff60c`abde1a10 fffff800`1680c6d9     : ffffdd04`c8dbe170 00000000`00000000 fffff60c`00000001 00000000`00000000 : nt!ExpWnfNotifyNameSubscribers+0x153
fffff60c`abde1a80 fffff800`163d2b18     : ffff840d`6ac73080 00000000`00000001 00000000`00000000 fffff60c`abde1dd0 : nt!NtUpdateWnfStateData+0x299
fffff60c`abde1b80 fffff800`163c5060     : fffff800`16a4c3fa ffff840d`6b94e4c0 fffff60c`abde2b01 fffff60c`abde1fb0 : nt!KiSystemServiceCopyEnd+0x28
fffff60c`abde1d88 fffff800`16a4c3fa     : ffff840d`6b94e4c0 fffff60c`abde2b01 fffff60c`abde1fb0 fffff800`1689688c : nt!KiServiceLinkage
fffff60c`abde1d90 fffff800`16a4bf95     : 00000000`00000000 fffff60c`abde1f10 00000000`00000000 00000000`00000000 : nt!DbgkpStartSystemErrorHandler+0x6e
fffff60c`abde1e10 fffff800`169f9587     : ffff840d`6335aa20 ffff840d`6335aa20 ffff840d`6335aa20 ffff840d`6b94e4c0 : nt!DbgkpSendErrorMessage+0xed
fffff60c`abde1f80 fffff800`1642fda3     : fffff60c`abde2a58 fffff60c`abde2a58 fffff60c`abde2130 00000000`00000000 : nt!DbgkForwardException+0x10681f
fffff60c`abde2100 fffff800`163d321d     : ffff80c0`60301000 fffff60c`abde2b00 ffff8000`00000000 00000000`3ceebdf4 : nt!KiDispatchException+0x168603
fffff60c`abde2920 fffff800`163cf405     : 00000000`00ebef90 fffff60c`abde2b80 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
fffff60c`abde2b00 00007fff`3cd9ccee     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x445
00000000`00e91560 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`3cd9ccee


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000200000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8030d405e0e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4515

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21123

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 200000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8030d405e0e

WRITE_ADDRESS: fffff8030d9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8030d82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8030d82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000200000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffff8e8cac043700 -- (.trap 0xffff8e8cac043700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8e8cac043958
rdx=0000000000200000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8030d405e0e rsp=ffff8e8cac043890 rbp=ffff8e8cac043b80
 r8=ffffb3081bec8930  r9=ffffc90030ca1180 r10=ffffb3080fac9d50
r11=ffffb3081d2a48d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0xe:
fffff803`0d405e0e 48890a          mov     qword ptr [rdx],rcx ds:00000000`00200000=????????????????
Resetting default scope

STACK_TEXT: 
ffff8e8c`ac0435b8 fffff803`0d5d30e9     : 00000000`0000000a 00000000`00200000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8e8c`ac0435c0 fffff803`0d5cf42b     : 00000000`00000000 ffffb308`1dd83630 ffffb308`19998040 fffff803`0d43f4be : nt!KiBugCheckDispatch+0x69
ffff8e8c`ac043700 fffff803`0d405e0e     : 00000000`00000000 00000000`00000000 ffff6850`07f72b79 fffff803`00000002 : nt!KiPageFault+0x46b
ffff8e8c`ac043890 fffff803`0d43ee7d     : 00000000`00000000 ffff8e8c`ac0439c0 ffffb308`195aaca0 00000000`00000001 : nt!KxWaitForLockOwnerShip+0xe
ffff8e8c`ac0438c0 fffff803`0d43ecac     : 00000000`00000000 fffff803`0d9e9200 00000000`00000000 fffff803`0d43a969 : nt!KeAcquireInStackQueuedSpinLock+0x7d
ffff8e8c`ac0438f0 fffff803`0d5d2b18     : 00000000`00000308 000000b4`84cff900 00000000`00000000 ffff8e8c`ac043a00 : nt!NtWaitForWorkViaWorkerFactory+0x27c
ffff8e8c`ac043a90 00007ffa`944dfa54     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b4`84cffae8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`944dfa54


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff9204fbef4720, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9204fbef4678, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 32867

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff9204fbef4720

BUGCHECK_P3: ffff9204fbef4678

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9204fbef4720 -- (.trap 0xffff9204fbef4720)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffab08ce0a31a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffab08cd15b198 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006fbdd8db rsp=ffff9204fbef48b8 rbp=0000000000000000
 r8=ffffab08cd15b118  r9=fffff8006fb75160 r10=fffff80070281860
r11=ffff9204fbef4980 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac pe cy
nt!KiInsertQueueApc+0x137af3:
fffff800`6fbdd8db cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9204fbef4678 -- (.exr 0xffff9204fbef4678)
ExceptionAddress: fffff8006fbdd8db (nt!KiInsertQueueApc+0x0000000000137af3)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff9204`fbef43f8 fffff800`6fbd30e9     : 00000000`00000139 00000000`00000003 ffff9204`fbef4720 ffff9204`fbef4678 : nt!KeBugCheckEx
ffff9204`fbef4400 fffff800`6fbd3510     : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000003 : nt!KiBugCheckDispatch+0x69
ffff9204`fbef4540 fffff800`6fbd18a5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9204`fbef4720 fffff800`6fbdd8db     : fffff800`6faa548d ffffab08`d5bce540 00000000`00000000 ffffab08`d5bce7c8 : nt!KiRaiseSecurityCheckFailure+0x325
ffff9204`fbef48b8 fffff800`6faa548d     : ffffab08`d5bce540 00000000`00000000 ffffab08`d5bce7c8 ffffc180`97a00180 : nt!KiInsertQueueApc+0x137af3
ffff9204`fbef48c0 fffff800`70051c30     : ffffab08`ce3207a0 ffffab08`cd15b080 ffffab08`cd15b000 ffffab08`d02e2080 : nt!KeRequestTerminationThread+0xc1
ffff9204`fbef49a0 fffff800`7005133f     : 00000000`00000008 ffffab08`cd15b080 00000000`00000000 00000000`00000000 : nt!PspTerminateThreadByPointer+0x80
ffff9204`fbef49e0 fffff800`70039400     : ffffab08`d0f50080 00000000`00000000 ffffab08`ce3204c0 ffffab08`ce3204c0 : nt!PspTerminateAllThreads+0xcb
ffff9204`fbef4a50 fffff800`700391e9     : ffffffff`ffffffff ffff9204`fbef4b80 ffffab08`d0c0e4c0 00000000`00000001 : nt!PspTerminateProcess+0xe0
ffff9204`fbef4a90 fffff800`6fbd2b18     : ffffab08`000017ac ffffab08`d02e2080 ffffab08`ce3204c0 0000023c`77660bf0 : nt!NtTerminateProcess+0xa9
ffff9204`fbef4b00 00007ffb`27efc644     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007b`c847f848 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`27efc644


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000821, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803370c1870, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4577

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 27858

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 821

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803370c1870

READ_ADDRESS: fffff803375733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033742a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8033742a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000821

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Wow.exe

TRAP_FRAME:  ffff990891e4c5a0 -- (.trap 0xffff990891e4c5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000066e47eb1 rbx=0000000000000000 rcx=0000000066e47eb1
rdx=00000007ff9c6e7b rsi=0000000000000000 rdi=0000000000000000
rip=fffff803370c1870 rsp=ffff990891e4c730 rbp=ffff990891e4c860
 r8=0000000000000800  r9=ffff808575d3d080 r10=ffff990891e4c798
r11=00007ff9c6e7bea1 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!MiCheckVirtualAddress+0xf0:
fffff803`370c1870 410fb64821      movzx   ecx,byte ptr [r8+21h] ds:00000000`00000821=??
Resetting default scope

STACK_TEXT: 
ffff9908`91e4c458 fffff803`371d30e9     : 00000000`0000000a 00000000`00000821 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9908`91e4c460 fffff803`371cf42b     : c1000002`478c0867 ffff984c`1ffd8920 ffff8085`7694b0a0 00000000`00000004 : nt!KiBugCheckDispatch+0x69
ffff9908`91e4c5a0 fffff803`370c1870     : ffff9908`91e4c740 ffffcf8e`a03bcc98 00000001`ffffffff fffffff6`0000000d : nt!KiPageFault+0x46b
ffff9908`91e4c730 fffff803`370c138c     : 00000000`00000000 00000000`00000004 fffff803`3c05c000 ffff8085`66a90040 : nt!MiCheckVirtualAddress+0xf0
ffff9908`91e4c760 fffff803`370739ac     : ffff987f`ffffffff ffff9800`00000000 ffff9800`00000000 ffff984c`1ffe71b8 : nt!MiInPagePageTable+0xcc
ffff9908`91e4c8b0 fffff803`37072cde     : 00000000`00000000 fffff803`3758f240 00000000`00000001 00000000`00000000 : nt!MiUserFault+0x7dc
ffff9908`91e4c960 fffff803`371cf320     : ffff8085`704ba080 ffff8085`72357080 00000000`00000206 00000000`00000000 : nt!MmAccessFault+0x14e
ffff9908`91e4cb00 00007ff9`c6e7bea1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000001`000fd6f0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`c6e7bea1


SYMBOL_NAME:  nt!MiCheckVirtualAddress+f0

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  f0

FAILURE_BUCKET_ID:  AV_nt!MiCheckVirtualAddress

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d1671d7f-3fe0-534a-163c-71c126713b3c}

Followup:     MachineOwner
---------
 
Durum
Mesaj gönderimine kapalı.

Geri
Yukarı