Çözüldü IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.
Çözüm
Olabilir. Bir süre böyle test et. Sorun olmaz ise sebebi buymuş diyebiliriz sanırım.

Yaklaşık 3 saattir oynuyorum tam ekran modunda ve ayar kapalı. Bilgisayarı kapatacağım zaman açacağım tekrardan mavi ekran verecek mi diye denemek için. Verirse sebebinin o olduğu kesinleşmiş olur :)

Olabilir. Bir süre böyle test et. Sorun olmaz ise sebebi buymuş diyebiliriz sanırım.

"Görüntü tekrarı" ayarını açıp denedim ve mavi ekran yedim :) Sanırım sorunun sebebi bulundu. Aklımın ucundan bile geçmiyordu açıkcası bu yüzden olabileceği :D Yardım eden herkese çok teşekkür ederim :kalp:.
Monitor.sys bir Windows sürücüsüdür. Sürücü, bilgisayarınızın donanım veya bağlı aygıtlarla iletişim kurmasını sağlayan küçük bir yazılımdır. Yani monitör sürücüsü değildir.

Belleklerin kit mi?

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800166e9a1e, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4936.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 74586.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff800166e9a1e.

WRITE_ADDRESS: fffff800170fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8001700f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8001700f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8001ba6b6d0 -- (.trap 0xfffff8001ba6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000004559e231800 rbx=0000000000000000 rcx=ffffe68f02b46000.
rdx=0000045500000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff800166e9a1e rsp=fffff8001ba6b860 rbp=fffff8001ba6b960.
r8=0000000000000000 r9=0000000000000000 r10=ffffe68f0b3afc88.
r11=fffff8001ba6bb10 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff800`166e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope.

STACK_TEXT:
fffff800`1ba6b588 fffff800`16805e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff800`1ba6b590 fffff800`16802169 : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69.
fffff800`1ba6b6d0 fffff800`166e9a1e : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469.
fffff800`1ba6b860 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
fffff800`1ba6b9d0 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4.
fffff800`1ba6bc60 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------

0: kd> kb.
# RetAddr : Args to Child : Call Site.
00 fffff800`16805e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
01 fffff800`16802169 : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69.
02 fffff800`166e9a1e : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469.
03 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
04 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4.
05 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.
0: kd> kv.
# Child-SP RetAddr : Args to Child : Call Site.
00 fffff800`1ba6b588 fffff800`16805e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
01 fffff800`1ba6b590 fffff800`16802169 : ffffab00`ae17b6f0 ffffe68f`08fcc6e8 ffffe68f`0b523000 fffff800`290bb717 : nt!KiBugCheckDispatch+0x69.
02 fffff800`1ba6b6d0 fffff800`166e9a1e : fffff800`13857240 ffffe68f`02ce5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469 (TrapFrame @ fffff800`1ba6b6d0)
03 fffff800`1ba6b860 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
04 fffff800`1ba6b9d0 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4.
05 fffff800`1ba6bc60 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.
0: kd> .trap fffff800`1ba6b6d0.
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000004559e231800 rbx=0000000000000000 rcx=ffffe68f02b46000.
rdx=0000045500000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff800166e9a1e rsp=fffff8001ba6b860 rbp=fffff8001ba6b960.
r8=0000000000000000 r9=0000000000000000 r10=ffffe68f0b3afc88.
r11=fffff8001ba6bb10 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff800`166e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
0: kd> kb.
*** Stack trace for last set context - .thread/.cxr resets it.
# RetAddr : Args to Child : Call Site.
00 fffff800`166e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
01 fffff800`167f7a0e : 00000000`00000000 fffff800`13854180 fffff800`17126600 ffffe68f`0dc16080 : nt!KiRetireDpcList+0x1f4.
02 00000000`00000000 : fffff800`1ba6c000 fffff800`1ba66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80459ce9a1e, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4593.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 66280.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff80459ce9a1e.

WRITE_ADDRESS: fffff8045a6fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8045a60f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8045dc6b6d0 -- (.trap 0xfffff8045dc6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00001e35bc85306d rbx=0000000000000000 rcx=ffffa58d69735000.
rdx=00001e3500000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80459ce9a1e rsp=fffff8045dc6b860 rbp=fffff8045dc6b960.
r8=0000000000000000 r9=0000000000000000 r10=ffffa58d7219fc88.
r11=fffff8045dc6bb10 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff804`59ce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope.

STACK_TEXT:
fffff804`5dc6b588 fffff804`59e05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff804`5dc6b590 fffff804`59e02169 : ffff8080`845c06f0 ffffa58d`707756e8 ffffa58d`77fc5000 fffff804`6a8ab717 : nt!KiBugCheckDispatch+0x69.
fffff804`5dc6b6d0 fffff804`59ce9a1e : fffff804`559a2240 ffffa58d`698f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469.
fffff804`5dc6b860 fffff804`59ce8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
fffff804`5dc6b9d0 fffff804`59df7a0e : 00000000`00000000 fffff804`5599f180 fffff804`5a726600 ffffa58d`700ad080 : nt!KiRetireDpcList+0x1f4.
fffff804`5dc6bc60 00000000`00000000 : fffff804`5dc6c000 fffff804`5dc66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802834e9a1e, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4359.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 49402.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff802834e9a1e.

WRITE_ADDRESS: fffff80283efa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80283e0f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff80283e0f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8028706b6d0 -- (.trap 0xfffff8028706b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00017b9d122a9cb4 rbx=0000000000000000 rcx=ffff968dfa135000.
rdx=00017b9d00000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff802834e9a1e rsp=fffff8028706b860 rbp=fffff8028706b960.
r8=0000000000000000 r9=0000000000000000 r10=ffff968e01a59f88.
r11=fffff8028706bb10 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff802`834e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope.

STACK_TEXT:
fffff802`8706b588 fffff802`83605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff802`8706b590 fffff802`83602169 : 00000000`00000000 ffff968e`042176e8 00000000`00000000 fffff802`9390b978 : nt!KiBugCheckDispatch+0x69.
fffff802`8706b6d0 fffff802`834e9a1e : fffff802`7ed7b240 ffff968d`fa2f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469.
fffff802`8706b860 fffff802`834e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
fffff802`8706b9d0 fffff802`835f7a0e : 00000000`00000000 fffff802`7ed78180 fffff802`83f26600 ffff968e`068a1080 : nt!KiRetireDpcList+0x1f4.
fffff802`8706bc60 00000000`00000000 : fffff802`8706c000 fffff802`87066000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016a4e9a1e, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4812.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 80069.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff8016a4e9a1e.

WRITE_ADDRESS: fffff8016aefa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8016ae0f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8016ae0f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8016fe6b6d0 -- (.trap 0xfffff8016fe6b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000d01fe6c4b44 rbx=0000000000000000 rcx=ffffb186a8735000.
rdx=00000d0100000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8016a4e9a1e rsp=fffff8016fe6b860 rbp=fffff8016fe6b960.
r8=0000000000000000 r9=0000000000000000 r10=ffffb186b0fd9f48.
r11=fffff8016fe6bb10 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff801`6a4e9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope.

STACK_TEXT:
fffff801`6fe6b588 fffff801`6a605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff801`6fe6b590 fffff801`6a602169 : ffff9681`dd4a46f0 ffffb186`af7986e8 ffffb186`b0f54000 fffff801`7c76b717 : nt!KiBugCheckDispatch+0x69.
fffff801`6fe6b6d0 fffff801`6a4e9a1e : fffff801`67ca9240 ffffb186`a88f5000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469.
fffff801`6fe6b860 fffff801`6a4e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
fffff801`6fe6b9d0 fffff801`6a5f7a0e : 00000000`00000000 fffff801`67ca6180 fffff801`6af26600 ffffb186`b1c48080 : nt!KiRetireDpcList+0x1f4.
fffff801`6fe6bc60 00000000`00000000 : fffff801`6fe6c000 fffff801`6fe66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------

0: kd> lm.
start end module name.
ffffa68d`dee00000 ffffa68d`df0e2000 win32kbase (deferred)
ffffa68d`df0f0000 ffffa68d`df4a6000 win32kfull (deferred)
ffffa68d`df4c0000 ffffa68d`df55a000 win32k C (pdb symbols) C:\ProgramData\Dbg\sym\win32k.pdb\ED706A38659240A066E6FB19B994BAAA1\win32k.pdb.
ffffa68d`df560000 ffffa68d`df5a8000 cdd (deferred)
fffff801`68b50000 fffff801`68b78000 mcupdate_AuthenticAMD (deferred)
fffff801`68b80000 fffff801`68b86000 hal (deferred)
fffff801`68b90000 fffff801`68b9b000 kd (deferred)
fffff801`68ba0000 fffff801`68bc7000 tm (deferred)
fffff801`68bd0000 fffff801`68c39000 CLFS (deferred)
fffff801`68c40000 fffff801`68c5a000 PSHED (deferred)
fffff801`68c60000 fffff801`68c6b000 BOOTVID (deferred)
fffff801`68c70000 fffff801`68d83000 clipsp (deferred)
fffff801`68d90000 fffff801`68dff000 FLTMGR (deferred)
fffff801`68e00000 fffff801`68e29000 ksecdd (deferred)
fffff801`68e30000 fffff801`68e92000 msrpc (deferred)
fffff801`68ea0000 fffff801`68eae000 cmimcext (deferred)
fffff801`68eb0000 fffff801`68ec1000 werkernel (deferred)
fffff801`68ed0000 fffff801`68edc000 ntosext (deferred)
fffff801`68ee0000 fffff801`68ef3000 WDFLDR (deferred)
fffff801`68f00000 fffff801`68f0f000 SleepStudyHelper (deferred)
fffff801`68f10000 fffff801`68f21000 WppRecorder (deferred)
fffff801`68f30000 fffff801`68f4a000 SgrmAgent (deferred)
fffff801`6a200000 fffff801`6b246000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\641F55C592201DCC4F59FACC72EA54DA1\ntkrnlmp.pdb.
fffff801`6e400000 fffff801`6e4e3000 CI (deferred)
fffff801`6e4f0000 fffff801`6e5a7000 cng (deferred)
fffff801`6e5b0000 fffff801`6e681000 Wdf01000 (deferred)
fffff801`6e690000 fffff801`6e6b6000 acpiex (deferred)
fffff801`6e6c0000 fffff801`6e70b000 mssecflt (deferred)
fffff801`6e710000 fffff801`6e7dc000 ACPI (deferred)
fffff801`6e7e0000 fffff801`6e7ec000 WMILIB (deferred)
fffff801`6e810000 fffff801`6e87b000 intelpep (deferred)
fffff801`6e880000 fffff801`6e897000 WindowsTrustedRT (deferred)
fffff801`6e8a0000 fffff801`6e8ab000 IntelTA (deferred)
fffff801`6e8b0000 fffff801`6e8bb000 WindowsTrustedRTProxy (deferred)
fffff801`6e8c0000 fffff801`6e8d4000 pcw (deferred)
fffff801`6e8e0000 fffff801`6e8eb000 msisadrv (deferred)
fffff801`6e8f0000 fffff801`6e968000 pci (deferred)
fffff801`6e970000 fffff801`6e985000 vdrvroot (deferred)
fffff801`6e990000 fffff801`6e9a6000 amdkmpfd (deferred)
fffff801`6e9b0000 fffff801`6e9df000 pdc (deferred)
fffff801`6e9e0000 fffff801`6e9f9000 CEA (deferred)
fffff801`6ea00000 fffff801`6ea31000 partmgr (deferred)
fffff801`6ea40000 fffff801`6eaea000 spaceport (deferred)
fffff801`6eaf0000 fffff801`6eb09000 volmgr (deferred)
fffff801`6eb10000 fffff801`6eb73000 volmgrx (deferred)
fffff801`6eb80000 fffff801`6eb9e000 mountmgr (deferred)
fffff801`6eba0000 fffff801`6ebd2000 storahci (deferred)
fffff801`6ebe0000 fffff801`6ebfc000 EhStorClass (deferred)
fffff801`6ec00000 fffff801`6ecb0000 storport (deferred)
fffff801`6ecc0000 fffff801`6ecda000 fileinfo (deferred)
fffff801`6ece0000 fffff801`6ed20000 Wof (deferred)
fffff801`6ed30000 fffff801`6ed9c000 WdFilter (deferred)
fffff801`6eda0000 fffff801`6edad000 Fs_Rec (deferred)
fffff801`6edb0000 fffff801`6ef1f000 ndis (deferred)
fffff801`6ef20000 fffff801`6efb8000 NETIO (deferred)
fffff801`6efc0000 fffff801`6eff2000 ksecpkg (deferred)
fffff801`6f000000 fffff801`6f2d9000 Ntfs (deferred)
fffff801`6f2e0000 fffff801`6f301000 amdpsp (deferred)
fffff801`6f310000 fffff801`6f5fc000 tcpip (deferred)
fffff801`6f600000 fffff801`6f67f000 fwpkclnt (deferred)
fffff801`6f680000 fffff801`6f6b0000 wfplwfs (deferred)
fffff801`6f6c0000 fffff801`6f789000 fvevol (deferred)
fffff801`6f790000 fffff801`6f79b000 volume (deferred)
fffff801`6f7a0000 fffff801`6f80d000 volsnap (deferred)
fffff801`6f810000 fffff801`6f860000 rdyboost (deferred)
fffff801`6f870000 fffff801`6f896000 mup (deferred)
fffff801`6f8a0000 fffff801`6f8b2000 iorate (deferred)
fffff801`6f8e0000 fffff801`6f8fc000 disk (deferred)
fffff801`6f900000 fffff801`6f96c000 CLASSPNP (deferred)
fffff801`760a0000 fffff801`760be000 crashdmp (deferred)
fffff801`76800000 fffff801`76830000 cdrom (deferred)
fffff801`76840000 fffff801`76855000 filecrypt (deferred)
fffff801`76860000 fffff801`7686e000 tbs (deferred)
fffff801`76870000 fffff801`7687a000 Null (deferred)
fffff801`76880000 fffff801`7688a000 Beep (deferred)
fffff801`76890000 fffff801`76dc7000 vgk (deferred)
fffff801`76e00000 fffff801`76e10000 TDI (deferred)
fffff801`76e20000 fffff801`76e7c000 netbt (deferred)
fffff801`76e80000 fffff801`76e93000 afunix (deferred)
fffff801`76ea0000 fffff801`76f43000 afd (deferred)
fffff801`76f50000 fffff801`76f6a000 vwififlt (deferred)
fffff801`76f70000 fffff801`76f9b000 pacer (deferred)
fffff801`76fa0000 fffff801`76fb4000 ndiscap (deferred)
fffff801`76fc0000 fffff801`76fd4000 netbios (deferred)
fffff801`76fe0000 fffff801`77081000 Vid (deferred)
fffff801`77090000 fffff801`770b1000 winhvr (deferred)
fffff801`770c0000 fffff801`7713b000 rdbss (deferred)
fffff801`77140000 fffff801`771d4000 csc (deferred)
fffff801`771e0000 fffff801`771f2000 nsiproxy (deferred)
fffff801`77200000 fffff801`7720e000 npsvctrig (deferred)
fffff801`77210000 fffff801`77220000 mssmbios (deferred)
fffff801`77230000 fffff801`7723a000 gpuenergydrv (deferred)
fffff801`77240000 fffff801`77248000 GLCKIO2 (deferred)
fffff801`77250000 fffff801`77257000 ene (deferred)
fffff801`77260000 fffff801`7728c000 dfsc (deferred)
fffff801`772b0000 fffff801`7731c000 fastfat (deferred)
fffff801`77320000 fffff801`77337000 bam (deferred)
fffff801`77340000 fffff801`77349000 AsIO2 (deferred)
fffff801`77350000 fffff801`77359000 AsUpIO (deferred)
fffff801`77360000 fffff801`77366000 AsIO (deferred)
fffff801`77370000 fffff801`773be000 ahcache (deferred)
fffff801`773c0000 fffff801`773d2000 CompositeBus (deferred)
fffff801`773e0000 fffff801`773ed000 kdnic (deferred)
fffff801`773f0000 fffff801`77405000 umbus (deferred)
fffff801`77410000 fffff801`77411f80 AiCharger (deferred)
fffff801`77420000 fffff801`774b8000 USBXHCI (deferred)
fffff801`774c0000 fffff801`77504000 ucx01000 (deferred)
fffff801`77510000 fffff801`77626000 rt640x64 (deferred)
fffff801`77630000 fffff801`776c2000 atikmpag (deferred)
fffff801`776d0000 fffff801`777a6000 peauth (deferred)
fffff801`777b0000 fffff801`77877000 srv2 (deferred)
fffff801`77880000 fffff801`778a1000 raspptp (deferred)
fffff801`778b0000 fffff801`778cc000 raspppoe (deferred)
fffff801`778d0000 fffff801`7790a000 ndiswan (deferred)
fffff801`77910000 fffff801`77926000 WdNisDrv (deferred)
fffff801`77930000 fffff801`77943000 condrv (deferred)
fffff801`77d50000 fffff801`780f4000 dxgkrnl (deferred)
fffff801`78100000 fffff801`78118000 watchdog (deferred)
fffff801`78120000 fffff801`78136000 BasicDisplay (deferred)
fffff801`78140000 fffff801`78151000 BasicRender (deferred)
fffff801`78160000 fffff801`7817c000 Npfs (deferred)
fffff801`78180000 fffff801`78191000 Msfs (deferred)
fffff801`781a0000 fffff801`781bb000 CimFS (deferred)
fffff801`781c0000 fffff801`781e2000 tdx (deferred)
fffff801`78a00000 fffff801`78a11000 kbdhid (deferred)
fffff801`78a20000 fffff801`78a34000 kbdclass (deferred)
fffff801`78a40000 fffff801`78a50000 mouhid (deferred)
fffff801`78a60000 fffff801`78a73000 mouclass (deferred)
fffff801`78a90000 fffff801`78a9e000 dump_diskdump (deferred)
fffff801`78ae0000 fffff801`78b12000 dump_storahci (deferred)
fffff801`78b40000 fffff801`78b5d000 dump_dumpfve (deferred)
fffff801`78b60000 fffff801`78c41000 dxgmms2 (deferred)
fffff801`78c50000 fffff801`78c6b000 monitor (deferred)
fffff801`78c70000 fffff801`78c84000 qwavedrv (deferred)
fffff801`78d10000 fffff801`78d39000 luafv (deferred)
fffff801`78d40000 fffff801`78d76000 wcifs (deferred)
fffff801`78d80000 fffff801`78e00000 cldflt (deferred)
fffff801`78e10000 fffff801`78e2a000 storqosflt (deferred)
fffff801`78e30000 fffff801`78e57000 bindflt (deferred)
fffff801`78e60000 fffff801`78e78000 mslldp (deferred)
fffff801`78e80000 fffff801`78e98000 lltdio (deferred)
fffff801`78ea0000 fffff801`78ebb000 rspndr (deferred)
fffff801`78ec0000 fffff801`78edd000 wanarp (deferred)
fffff801`78ee0000 fffff801`78f36000 msquic (deferred)
fffff801`78f40000 fffff801`790c6000 HTTP (deferred)
fffff801`790d0000 fffff801`790f5000 bowser (deferred)
fffff801`79100000 fffff801`7911a000 mpsdrv (deferred)
fffff801`79120000 fffff801`79165000 mrxsmb20 (deferred)
fffff801`79170000 fffff801`791a4000 AMDRyzenMasterDriver (deferred)
fffff801`791b0000 fffff801`7983c000 RTKVHD64 (deferred)
fffff801`79850000 fffff801`79883000 usbccgp (deferred)
fffff801`79890000 fffff801`798e2000 srvnet (deferred)
fffff801`798f0000 fffff801`79904000 mmcss (deferred)
fffff801`79910000 fffff801`7991f000 ndistapi (deferred)
fffff801`79920000 fffff801`79931000 UAExt (deferred)
fffff801`79940000 fffff801`79977000 usbaudio (deferred)
fffff801`79980000 fffff801`79992000 hidusb (deferred)
fffff801`799a0000 fffff801`799df000 HIDCLASS (deferred)
fffff801`799e0000 fffff801`799f3000 HIDPARSE (deferred)
fffff801`7c200000 fffff801`7c221000 drmk (deferred)
fffff801`7c230000 fffff801`7c2a6000 ks (deferred)
fffff801`7c2b0000 fffff801`7c2ba000 AMDPCIDev (deferred)
fffff801`7c2c0000 fffff801`7c2dc000 serial (deferred)
fffff801`7c2e0000 fffff801`7c2ef000 serenum (deferred)
fffff801`7c2f0000 fffff801`7c2fd000 amdgpio2 (deferred)
fffff801`7c300000 fffff801`7c332000 msgpioclx (deferred)
fffff801`7c340000 fffff801`7c34c000 wmiacpi (deferred)
fffff801`7c350000 fffff801`7c38b000 amdppm (deferred)
fffff801`7c390000 fffff801`7c39a000 amdgpio3 (deferred)
fffff801`7c3a0000 fffff801`7c3ae000 UEFI (deferred)
fffff801`7c3b0000 fffff801`7c3bd000 NdisVirtualBus (deferred)
fffff801`7c3c0000 fffff801`7c3cc000 swenum (deferred)
fffff801`7c3d0000 fffff801`7c3de000 rdpbus (deferred)
fffff801`7c3e0000 fffff801`7c483000 UsbHub3 (deferred)
fffff801`7c490000 fffff801`7c49e000 USBD (deferred)
fffff801`7c4a0000 fffff801`7c4bd000 AtihdWT6 (deferred)
fffff801`7c4c0000 fffff801`7c4cf000 ksthunk (deferred)
fffff801`7c4d0000 fffff801`7c563000 mrxsmb (deferred)
fffff801`7c570000 fffff801`7c597000 Ndu (deferred)
fffff801`7c5a0000 fffff801`7c5b5000 tcpipreg (deferred)
fffff801`7c5c0000 fffff801`7c5dc000 rassstp (deferred)
fffff801`7c5e0000 fffff801`7c5fd000 NDProxy (deferred)
fffff801`7c600000 fffff801`7c627000 AgileVpn (deferred)
fffff801`7c630000 fffff801`7c651000 rasl2tp (deferred)
fffff801`7c660000 fffff801`7c669000 IOMap64 (deferred)
fffff801`7c670000 fffff801`80556000 atikmdag (deferred)
fffff801`80560000 fffff801`80585000 HDAudBus (deferred)
fffff801`80590000 fffff801`805f6000 portcls (deferred)

Unloaded modules:
fffff801`768b0000 fffff801`76df5000 vgk.sys.
fffff801`79840000 fffff801`7984e000 AppleLowerFi.
fffff801`78d00000 fffff801`78d0f000 WpdUpFltr.sy.
fffff801`78ca0000 fffff801`78cf5000 WUDFRd.sys.
fffff801`78c70000 fffff801`78c91000 WinUSB.SYS.
fffff801`760d0000 fffff801`760df000 dump_storpor.
fffff801`76120000 fffff801`76153000 dump_storahc.
fffff801`76180000 fffff801`7619e000 dump_dumpfve.
fffff801`79890000 fffff801`798b1000 WinUSB.SYS.
fffff801`798c0000 fffff801`79915000 WUDFRd.sys.
fffff801`77290000 fffff801`772ac000 dam.sys.
fffff801`6e7f0000 fffff801`6e801000 WdBoot.sys.
fffff801`6f8c0000 fffff801`6f8d1000 hwpolicy.sys.
0: kd> lmDvmmonitor.
Browse full module list.
start end module name.
fffff801`78c50000 fffff801`78c6b000 monitor (deferred)
Mapped memory image file: C:\ProgramData\Dbg\sym\monitor.sys\1CD682D71b000\monitor.sys.
Image path: \SystemRoot\System32\drivers\monitor.sys.
Image name: monitor.sys.
Browse all global symbols functions data.
Image was built with /Brepro flag.
Timestamp: 1CD682D7 (This is a reproducible build file hash, not a timestamp)
CheckSum: 0001751B.
ImageSize: 0001B000.
File version: 10.0.19041.508.
Product version: 10.0.19041.508.
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32.
File type: 3.7 Driver.
File date: 00000000.00000000.
Translations: 0409.04b0.
Information from resource tables:
CompanyName: Microsoft Corporation.
ProductName: Microsoft® Windows® Operating System.
InternalName: monitor.sys.
OriginalFilename: monitor.sys.
ProductVersion: 10.0.19041.508.
FileVersion: 10.0.19041.508 (WinBuild.160101.0800)
FileDescription: Monitor Driver.
LegalCopyright: © Microsoft Corporation. All rights reserved.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80203ae9a1e, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5218.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 77906.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 85.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff80203ae9a1e.

WRITE_ADDRESS: fffff802044fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8020440f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8020440f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

TRAP_FRAME: fffff8020946b6d0 -- (.trap 0xfffff8020946b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000096746f53086 rbx=0000000000000000 rcx=ffffd78eccf46000.
rdx=0000096700000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80203ae9a1e rsp=fffff8020946b860 rbp=fffff8020946b960.
r8=0000000000000000 r9=0000000000000000 r10=ffffd78ecffbbe38.
r11=fffff8020946bb10 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff802`03ae9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope.

STACK_TEXT:
fffff802`0946b588 fffff802`03c05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff802`0946b590 fffff802`03c02169 : ffff9480`3c2fe1f0 ffffd78e`cffec6e8 ffffd78e`d68a6000 fffff802`1929bd87 : nt!KiBugCheckDispatch+0x69.
fffff802`0946b6d0 fffff802`03ae9a1e : fffff802`00fdf240 ffffd78e`ce0f1000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x469.
fffff802`0946b860 fffff802`03ae8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x2ee.
fffff802`0946b9d0 fffff802`03bf7a0e : 00000000`00000000 fffff802`00fdc180 fffff802`04526600 ffffd78e`d83b7080 : nt!KiRetireDpcList+0x1f4.
fffff802`0946bc60 00000000`00000000 : fffff802`0946c000 fffff802`09466000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8001f4e9a1e, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 6296.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 71698.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 93.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff8001f4e9a1e.

WRITE_ADDRESS: fffff8001fefa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8001fe0f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8001fe0f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: AMDRSServ.exe.

DPC_STACK_BASE: FFFFF80022C72FB0.

TRAP_FRAME: ffff9cad82e97010 -- (.trap 0xffff9cad82e97010)
Unable to read trap frame at ffff9cad`82e97010.

STACK_TEXT:
fffff800`22c728d8 fffff800`1f605e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff800`22c728e0 fffff800`1f602169 : 000022f5`cb0d972c 00000000`00000002 ffffb08d`6d902000 fffff800`2fc59f37 : nt!KiBugCheckDispatch+0x69.
fffff800`22c72a20 fffff800`1f4e9a1e : fffff800`1a7b9240 ffffb08d`650f8000 fffff800`22c72e70 fffff800`00000002 : nt!KiPageFault+0x469.
fffff800`22c72bb0 fffff800`1f4e8d24 : fffff800`1a7b6180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee.
fffff800`22c72d20 fffff800`1f5faee5 : 00000000`00000000 fffff800`1a7b6180 ffff9f80`60cfe140 00000000`00000000 : nt!KiRetireDpcList+0x1f4.
fffff800`22c72fb0 fffff800`1f5facd0 : fffff800`1f5eff90 fffff800`1f43f03a ffffb08d`6f192000 00000000`ffffffff : nt!KxRetireDpcList+0x5.
ffffc109`a2253850 fffff800`1f5fa585 : 00000000`00000000 fffff800`1f5f5a11 00000000`00300d68 00000000`00000000 : nt!KiDispatchInterruptContinue.
ffffc109`a2253880 fffff800`1f5f5a11 : 00000000`00300d68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25.
ffffc109`a2253890 ffff9c86`ab6656d4 : 00000000`00300d68 ffffef8b`09542b92 ffff9cad`82e97010 ffffc109`a2253a30 : nt!KiInterruptDispatch+0xb1.
ffffc109`a2253a20 ffff9c86`acb6473f : 000001c0`7236dc90 00000000`00300d68 ffffc109`a2253b80 ffff9c86`acafb28a : win32kbase!ValidateHwnd+0x4.
ffffc109`a2253a50 ffff9c86`abb75bf1 : ffffb08d`6d7e8300 00000000`00000001 00000000`00000000 000001c0`4f023e70 : win32kfull!NtUserGetClassName+0x4f.
ffffc109`a2253ad0 fffff800`1f6058b8 : ffffb08d`6d7e8300 00000000`00000000 00000000`00000000 00000000`00000001 : win32k!NtUserGetClassName+0x15.
ffffc109`a2253b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80142ce9a1e, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5218.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 74598.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 75.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: a.

BUGCHECK_P1: 20.

BUGCHECK_P2: 2.

BUGCHECK_P3: 1.

BUGCHECK_P4: fffff80142ce9a1e.

WRITE_ADDRESS: fffff801436fa390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8014360f2e0: Unable to get Flags value from nt!KdVersionBlock.
fffff8014360f2e0: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000020.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: League of Legends.exe.

DPC_STACK_BASE: FFFFF80145872FB0.

TRAP_FRAME: fffff80145872a20 -- (.trap 0xfffff80145872a20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00004a83da5af6e4 rbx=0000000000000000 rcx=ffff978fb7935000.
rdx=00004a8300000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80142ce9a1e rsp=fffff80145872bb0 rbp=fffff80145872cb0.
r8=0000000000000000 r9=0000000000000000 r10=ffff978fc11ecf88.
r11=fffff80145872e60 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz ac po cy.
nt!KiExecuteAllDpcs+0x2ee:
fffff801`42ce9a1e 49894720 mov qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope.

STACK_TEXT:
fffff801`458728d8 fffff801`42e05e69 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx.
fffff801`458728e0 fffff801`42e02169 : 00004a83`da570c24 00000000`00000000 ffff978f`c1002000 fffff801`526e9c37 : nt!KiBugCheckDispatch+0x69.
fffff801`45872a20 fffff801`42ce9a1e : fffff801`3d759240 ffff978f`b7af7000 fffff801`45872e70 fffff801`00000002 : nt!KiPageFault+0x469.
fffff801`45872bb0 fffff801`42ce8d24 : fffff801`3d756180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2ee.
fffff801`45872d20 fffff801`42dfaee5 : 00000000`00000000 fffff801`3d756180 ffff8081`42834640 00000000`7ffea000 : nt!KiRetireDpcList+0x1f4.
fffff801`45872fb0 fffff801`42dfacd0 : fffff801`42deff90 fffff801`42c3f03a ffff978f`c8ba9080 00000000`76359560 : nt!KxRetireDpcList+0x5.
ffffe80b`8b4d8ac0 fffff801`42dfa585 : 00000000`7ffea000 fffff801`42df5a11 00000000`0000e383 ffff978f`c80cd080 : nt!KiDispatchInterruptContinue.
ffffe80b`8b4d8af0 fffff801`42df5a11 : 00000000`0000e383 ffff978f`c80cd080 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25.
ffffe80b`8b4d8b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1.

SYMBOL_NAME: nt!KiExecuteAllDpcs+2ee.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.508.

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 2ee.

FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup: MachineOwner.
---------

Yok, 1 ay arayla aldım fakat aynı yerden aldım ve Thaiphoon Burner ile baktığımda ikisinde de Samsung B-Die çipler olduğunu gördüm. Ripjaws V 3200MHz kullanıyorum, kırmızı olanlarlardan. Bu arada monitörüm LG22MK400H.
 
Modüllere ait CPU-Z SPD ve TB ekran görüntüsü paylaşın.

Örnekteki gibi:

h50.PNG
h51.PNG
slot1.PNG
slot2.PNG
1602496775594.png

1602496879124.png
 
Şu an 1.36V 3200MHz'de çalışıyor. Hemen stok ayarlarına çekip deniyorum.
Bunu baştan söyleseydin keşke. Sen RAM'lere OC yapmışsın ve bu hata da muhtemelen ondan kaynaklı. Standart XMP'de de sorun olmaması lazım. 3200 MHz biraz fazla kaçmış onlara. Durumdan haberdar et de bunu da çözüldü yapalım. Amatörlerle farkımızı anlaşılsın 😎

Monitör yüzünden mavi ekran alıyorsun demişler 🤭
 
Son düzenleme:
Bunu baştan söyleseydin keşke. Sen RAM'lere OC yapmışsın ve bu hata da muhtemelen ondan kaynaklı. Standart XMP'de de sorun olmaması lazım. 3200 MHz biraz fazla kaçmış onlara. Durumdan haberdar et de bunu da çözüldü yapalım. Amatörlerle farkımızı anlaşılsın 😎

Şu an antrenman moduna giriş yapıyorum, inşallah sıkıntı çıkmaz :D Sadece LoL’de olması çok garibime gitmişti, bakalım düzeldi mi :)
Bunu baştan söyleseydin keşke. Sen RAM'lere OC yapmışsın ve bu hata da muhtemelen ondan kaynaklı. Standart XMP'de de sorun olmaması lazım. 3200 MHz biraz fazla kaçmış onlara. Durumdan haberdar et de bunu da çözüldü yapalım. Amatörlerle farkımızı anlaşılsın 😎

Monitör yüzünden mavi ekran alıyorsun demişler 🤭
Abi kötü bir haberim var yine mavi ekran yedim 😂😂 Bilgisayar açılsın minidump’ı yolluyorum.
Bunu baştan söyleseydin keşke. Sen RAM'lere OC yapmışsın ve bu hata da muhtemelen ondan kaynaklı. Standart XMP'de de sorun olmaması lazım. 3200 MHz biraz fazla kaçmış onlara. Durumdan haberdar et de bunu da çözüldü yapalım. Amatörlerle farkımızı anlaşılsın 😎

Monitör yüzünden mavi ekran alıyorsun demişler 🤭
 
Son düzenleme:
Ekran kartını OCCT ile test eder misin?

Sorun ilk çıktığı zamanlarda test etmiştim zaten OCCT ve bir sürü yazılım ile ama istersen tekrar test edebilirim. Seçmem gereken bir şey var mı ben direk 3D'ye tıklayarak test etmiştim.
 
Durum
Mesaj gönderimine kapalı.

Technopat Haberler

Yeni konular

Yeni mesajlar

Geri
Yukarı