IRQL_NOT_LESS_OR_EQUAL Mavi Ekran Hatası

2. Mehmed

Centipat
Katılım
5 Şubat 2020
Mesajlar
35
Yer
İzmir/Bornova
Daha fazla  
Cinsiyet
Erkek
Meslek
Öğrenci
Sistemim şu şekilde:
  • Intel Celeron J3060 1.6 GHz (2 çekirdekli işlemci)
  • 4 GB 1600 MHz RAM.
  • Ekran kartı yok. (İşlemcinin grafik işlemcisini kullanıyor.)
  • Windows 8.1 Pro.
Şimdi olaya gelelim. Chrome’da izlerken, Point Blank oynarken (özellikle Point Blank oynarken çok hata alıyorum.) IRQL_NOT_LESS_OR_EQUAL, KERNEL_SECURITY_CHECK_FAILURE gibi hatalar alıyorum. Minidump dosyaları burada. (4 tane var.)
Not: Çözüm önerisi olarak Windows 10 yükle demeyin.
 
Son düzenleyen: Moderatör:
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffd5000846878, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803edcbcaa6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffffd5000846878

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803edcbcaa6

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803edf70298
GetUlongPtrFromAddress: unable to read from fffff803edf70520
 fffffd5000846878

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiResolveDemandZeroFault+956
fffff803`edcbcaa6 498b4008        mov     rax,qword ptr [r8+8]

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  PointBlank.exe

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:47.0238

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffd0005af280f0 -- (.trap 0xffffd0005af280f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=800000006ce5e86b rbx=0000000000000000 rcx=fffff6c000000000
rdx=00007ffffffeffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803edcbcaa6 rsp=ffffd0005af28280 rbp=ffffd0005af282c0
 r8=fffffd5000846870  r9=0000000000000001 r10=0000000000000003
r11=0000000fffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiResolveDemandZeroFault+0x956:
fffff803`edcbcaa6 498b4008        mov     rax,qword ptr [r8+8] ds:fffffd50`00846878=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803edd694e9 to fffff803edd5d9a0

STACK_TEXT: 
ffffd000`5af27fa8 fffff803`edd694e9 : 00000000`0000000a fffffd50`00846878 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`5af27fb0 fffff803`edd67d3a : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`5af280f0 fffff803`edcbcaa6 : 00000000`00000003 00000000`00000002 00000000`00000000 fffff803`edc7012a : nt!KiPageFault+0x23a
ffffd000`5af28280 fffff803`edc6bec2 : 00000000`00000000 00000000`38186000 ffffd000`5af287b1 ffffc001`50794180 : nt!MiResolveDemandZeroFault+0x956
ffffd000`5af283a0 fffff803`edc69d8b : 00000000`00000380 00000000`38000000 fffff680`001c0000 ffffe001`bd6c17d8 : nt!MiResolveProtoPteFault+0x592
ffffd000`5af28440 fffff803`edc6509f : ffffe001`bd6c17d8 00000000`00000000 00000000`00000000 ffffd000`5af28630 : nt!MiDispatchFault+0x2bb
ffffd000`5af28580 fffff803`edcac5a1 : 00000000`00000000 ffffffff`ffffffff 00000000`ffffff00 ffffffff`ffffffff : nt!MmAccessFault+0x54f
ffffd000`5af28740 fffff803`edcabc31 : 00000000`00000001 fffff803`00000002 ffffd000`00000001 00000000`00000002 : nt!MiProbeLeafFrame+0x3d1
ffffd000`5af28870 fffff801`2a89a59f : 00000000`00000400 ffffd000`5af28f00 ffffc001`00000002 ffffc001`4f556001 : nt!MmProbeAndLockPages+0x241
ffffd000`5af28950 fffff801`2a8996e7 : ffffc001`5088ca00 ffffc001`5088ca00 ffffe001`be6ca930 ffffd000`5af28f00 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x12f
ffffd000`5af289b0 fffff801`2a86fa31 : 00000000`00000000 fffff801`2a892cbe 00000000`00000002 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x767
ffffd000`5af28d80 fffff801`2a73a049 : 00000000`00000200 ffffd000`5af29a90 ffffc001`4f95dec0 ffffd000`5af28f00 : dxgmms1!VidMmReferenceDmaBuffer+0x55
ffffd000`5af28de0 fffff801`2a732c35 : ffffc001`51a8a000 00000000`00000000 00000000`00000000 00000000`fec63000 : dxgkrnl!DXGCONTEXT::Render+0x229
ffffd000`5af29930 fffff803`edd691b3 : ffffe001`be0c6080 ffffe001`be0c6080 00000000`031e0000 00000000`fec65000 : dxgkrnl!DxgkRender+0x325
ffffd000`5af29c40 00000000`776777fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`030ee3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776777fa


THREAD_SHA1_HASH_MOD_FUNC:  3359f03a46be49f4f4f981fec7f2b74c023b2721

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1a769494e732f23ab2bcf5a29cda656a0ecbcc98

THREAD_SHA1_HASH_MOD:  25d39b01828eedce19ed04589a8dd1a5fb863a65

FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+12f
fffff801`2a89a59f e985000000      jmp     dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x1b9 (fffff801`2a89a629)

FAULT_INSTR_CODE:  85e9

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+12f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54505506

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12f

FAILURE_BUCKET_ID:  AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages

BUCKET_ID:  AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages

PRIMARY_PROBLEM_CLASS:  AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages

TARGET_TIME:  2020-04-18T08:35:12.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  1a80

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_dxgmms1!vidmm_segment::safeprobeandlockpages

FAILURE_ID_HASH:  {ef2979ff-e4ab-9457-2244-340982265f57}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000066710010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802efedb192, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 66710010

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802efedb192

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802f01ed298
GetUlongPtrFromAddress: unable to read from fffff802f01ed520
 0000000066710010

CURRENT_IRQL:  2

FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff802`efedb192 48890a          mov     qword ptr [rdx],rcx

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  PointBlank.exe

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:49.0819

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffd00022b593c0 -- (.trap 0xffffd00022b593c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004800000 rbx=0000000000000000 rcx=ffffd00022b59628
rdx=0000000066710010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802efedb192 rsp=ffffd00022b59550 rbp=ffffd00022b59600
 r8=0000000000000000  r9=0000000000000000 r10=0020006000000000
r11=fffffa8004801460 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0x12:
fffff802`efedb192 48890a          mov     qword ptr [rdx],rcx ds:00000000`66710010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802effe64e9 to fffff802effda9a0

STACK_TEXT: 
ffffd000`22b59278 fffff802`effe64e9 : 00000000`0000000a 00000000`66710010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`22b59280 fffff802`effe4d3a : 00000000`00000001 fffffa80`004fe120 00000000`00000000 00000000`00000003 : nt!KiBugCheckDispatch+0x69
ffffd000`22b593c0 fffff802`efedb192 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`22b59550 fffff802`efeee16f : fffffa80`004fe120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0x12
ffffd000`22b59580 fffff802`efeec01b : 00000000`0001aa06 fffffa80`004fe130 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x7ef
ffffd000`22b596c0 fffff802`eff3a897 : 00000000`00000002 ffffd000`22b59740 00000000`00000242 00000000`00000002 : nt!MiInsertLargePageInFreeOrZeroList+0xdb
ffffd000`22b59710 fffff802`eff3a33f : 00000000`00000008 00000000`00000000 00000000`00000242 00000000`00000001 : nt!MiGetFreeOrZeroPage+0x3e7
ffffd000`22b597b0 fffff802`eff392e3 : 00000000`00000000 00000000`00000002 00000000`00000001 fffff802`eff3ab49 : nt!MiGetPage+0x6f
ffffd000`22b59820 fffff802`efee6e5e : 00000000`00000001 00000000`30954000 ffffd000`22b59c40 fffff680`00184aa0 : nt!MiResolveDemandZeroFault+0x193
ffffd000`22b59940 fffff802`efee209f : ffffe001`044b7558 00000000`30954000 ffffd000`22b59bd0 00000000`00000000 : nt!MiDispatchFault+0x38e
ffffd000`22b59a80 fffff802`effe4c2f : 00000000`00000001 00000000`2e9f8e40 ffffc001`907ef001 ffffc001`907ef000 : nt!MmAccessFault+0x54f
ffffd000`22b59c40 00000000`6c97494a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
00000000`061cfd94 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6c97494a


THREAD_SHA1_HASH_MOD_FUNC:  d6636dbb959ce8b41ab0f437250fc3072f1e80da

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  441af99844d266e1076fa5f6e98394b7e5510b33

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+12
fffff802`efedb192 48890a          mov     qword ptr [rdx],rcx

FAULT_INSTR_CODE:  330a8948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+12

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12

FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

PRIMARY_PROBLEM_CLASS:  AV_nt!KxWaitForLockOwnerShip

TARGET_TIME:  2020-04-18T07:34:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  46e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kxwaitforlockownership

FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00000000365f3000
Arg3: 000000000001f4db
Arg4: fffff58010804000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 41284

BUGCHECK_P2: 365f3000

BUGCHECK_P3: 1f4db

BUGCHECK_P4: fffff58010804000

BUGCHECK_STR:  0x1a_41284

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  PointBlank.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:43.0076

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff803129ec43d to fffff803129c59a0

STACK_TEXT: 
ffffd001`e1ff7798 fffff803`129ec43d : 00000000`0000001a 00000000`00041284 00000000`365f3000 00000000`0001f4db : nt!KeBugCheckEx
ffffd001`e1ff77a0 fffff803`128d4728 : cdb00001`5a03086f ffffd001`e1ff78f0 fffff680`001b2f98 fffff580`10804000 : nt! ?? ::FNODOBFM::`string'+0x1658d
ffffd001`e1ff77f0 fffff803`12937dc3 : ffffe001`9f7c0568 ffffe001`9d16f4e0 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x558
ffffd001`e1ff7a80 fffff803`12cad389 : ffffe001`a01c6620 00000000`36540000 ffffe001`00000000 7fffffff`00000000 : nt!MiDeleteVad+0x233
ffffd001`e1ff7b80 fffff800`f4ad6074 : 00000000`00000000 fffff803`12b27200 ffffe001`a01d7a50 fffff803`12b27300 : nt!MiUnmapViewOfSection+0xfd
ffffd001`e1ff7c50 fffff803`1291138c : fffff803`128ff674 ffffe001`9d16f180 ffffe001`9d16f040 fffff803`12b27300 : dxgmms1!VidMmProcessAsyncOperation+0x4c
ffffd001`e1ff7c90 fffff803`12976c70 : afafafaf`afafafaf ffffe001`9d16f040 00000000`00000080 ffffe001`9d16f040 : nt!ExpWorkerThread+0x28c
ffffd001`e1ff7d40 fffff803`129cbfc6 : fffff803`12b78180 ffffe001`9d16f040 ffffe001`9d13f880 afafafaf`afafafaf : nt!PspSystemThreadStartup+0x58
ffffd001`e1ff7da0 00000000`00000000 : ffffd001`e1ff8000 ffffd001`e1ff2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  0bdf1083aeea2455c25eec9609c1ac92b8a72afe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  48178d863dd522b5a3e1918099a584615114fbda

THREAD_SHA1_HASH_MOD:  39228cfe83a24322e7aa8ed3ae32e8bbb19cc5a8

FOLLOWUP_IP:
dxgmms1!VidMmProcessAsyncOperation+4c
fffff800`f4ad6074 488b4b28        mov     rcx,qword ptr [rbx+28h]

FAULT_INSTR_CODE:  284b8b48

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  dxgmms1!VidMmProcessAsyncOperation+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54505506

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4c

FAILURE_BUCKET_ID:  0x1a_41284_dxgmms1!VidMmProcessAsyncOperation

BUCKET_ID:  0x1a_41284_dxgmms1!VidMmProcessAsyncOperation

PRIMARY_PROBLEM_CLASS:  0x1a_41284_dxgmms1!VidMmProcessAsyncOperation

TARGET_TIME:  2020-04-17T17:18:26.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  476

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41284_dxgmms1!vidmmprocessasyncoperation

FAILURE_ID_HASH:  {96cdb27a-c9ec-e3f0-3733-5b92dbafc0c2}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8005a086103, The address that the exception occurred at
Arg3: ffffd001bc26c778, Exception Record Address
Arg4: ffffd001bc26bf80, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullPtr

    Key  : AV.Fault
    Value: Write


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8005a086103

BUGCHECK_P3: ffffd001bc26c778

BUGCHECK_P4: ffffd001bc26bf80

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgmms1!VidSchiCheckFlipQueueTimeout+13
fffff800`5a086103 80792e00        cmp     byte ptr [rcx+2Eh],0

EXCEPTION_RECORD:  ffffd001bc26c778 -- (.exr 0xffffd001bc26c778)
ExceptionAddress: fffff8005a086103 (dxgmms1!VidSchiCheckFlipQueueTimeout+0x0000000000000013)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000

CONTEXT:  ffffd001bc26bf80 -- (.cxr 0xffffd001bc26bf80)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000bc7b4000
rdx=ffffd001bc26ca60 rsi=0000000000000000 rdi=ffffe000bc7b4000
rip=fffff8005a086103 rsp=ffffd001bc26c9b0 rbp=0000000000000009
 r8=ffffd001bc26ca68  r9=00000000000000b3 r10=00000000000000b3
r11=ffffd001bc26cab0 r12=fffff78000000320 r13=0000000000000000
r14=ffffe000bc7b4000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
dxgmms1!VidSchiCheckFlipQueueTimeout+0x13:
fffff800`5a086103 80792e00        cmp     byte ptr [rcx+2Eh],0 ds:002b:ffffe000`bc7b402e=01
Resetting default scope

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
dxgmms1!VidSchiCheckFlipQueueTimeout+13
fffff800`5a086103 80792e00        cmp     byte ptr [rcx+2Eh],0

BUGCHECK_STR:  AV

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8015c9e2298
GetUlongPtrFromAddress: unable to read from fffff8015c9e2520
 0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000000

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:41.0710

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8005a0a7b0a to fffff8005a086103

STACK_TEXT: 
ffffd001`bc26c9b0 fffff800`5a0a7b0a : ffffe000`bc7b4000 ffffd001`bc26ca60 ffffd001`bc26ca68 00000000`00000000 : dxgmms1!VidSchiCheckFlipQueueTimeout+0x13
ffffd001`bc26ca40 fffff800`5a085a5a : ffffffff`ff676980 00000000`00000000 ffffd001`bc26cbd0 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0xfa
ffffd001`bc26cad0 fffff800`5a0bbfb8 : ffffe000`bc7b4000 ffffe000`bc7b4000 ffffe000`bc7b4000 ffffe000`00000000 : dxgmms1!VidSchiScheduleCommandToRun+0x44a
ffffd001`bc26cc90 fffff800`5a0bbf7d : ffffe000`bc7b4000 ffffe000`00000000 00000000`00000080 ffffe000`ba33a500 : dxgmms1!VidSchiRun_PriorityTable+0x38
ffffd001`bc26cd00 fffff801`5c780c70 : fffff801`5c9dba00 ffffe000`ba33a500 ffffd001`bc26cdd0 fffff801`5c7d2d7d : dxgmms1!VidSchiWorkerThread+0x8d
ffffd001`bc26cd40 fffff801`5c7d5fc6 : fffff801`5c982180 ffffe000`ba33a500 fffff801`5c9dba00 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`bc26cda0 00000000`00000000 : ffffd001`bc26d000 ffffd001`bc267000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  4a81989f0cc8b6a31ae399e470c77fcfda82ad03

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  809981cb9407bbbbb6b8a3d9e87229cd73e85691

THREAD_SHA1_HASH_MOD:  715ea47f0e0475afca9183e1e7654934d827faef

FAULT_INSTR_CODE:  2e7980

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VidSchiCheckFlipQueueTimeout+13

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54505506

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd001bc26bf80 ; kb

BUCKET_ID_FUNC_OFFSET:  13

FAILURE_BUCKET_ID:  AV_dxgmms1!VidSchiCheckFlipQueueTimeout

BUCKET_ID:  AV_dxgmms1!VidSchiCheckFlipQueueTimeout

PRIMARY_PROBLEM_CLASS:  AV_dxgmms1!VidSchiCheckFlipQueueTimeout

TARGET_TIME:  2020-04-17T14:22:38.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  47c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_dxgmms1!vidschicheckflipqueuetimeout

FAILURE_ID_HASH:  {d4af77c3-ec14-7cc0-eed1-4df665e2fee5}

Followup:     MachineOwner
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffd5000846878, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803edcbcaa6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: fffffd5000846878

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803edcbcaa6

READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803edf70298
GetUlongPtrFromAddress: unable to read from fffff803edf70520
fffffd5000846878

CURRENT_IRQL:  2

FAULTING_IP:
nt!MiResolveDemandZeroFault+956
fffff803`edcbcaa6 498b4008        mov     rax,qword ptr [r8+8]

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  PointBlank.exe

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:47.0238

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffd0005af280f0 -- (.trap 0xffffd0005af280f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=800000006ce5e86b rbx=0000000000000000 rcx=fffff6c000000000
rdx=00007ffffffeffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803edcbcaa6 rsp=ffffd0005af28280 rbp=ffffd0005af282c0
r8=fffffd5000846870  r9=0000000000000001 r10=0000000000000003
r11=0000000fffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiResolveDemandZeroFault+0x956:
fffff803`edcbcaa6 498b4008        mov     rax,qword ptr [r8+8] ds:fffffd50`00846878=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803edd694e9 to fffff803edd5d9a0

STACK_TEXT:
ffffd000`5af27fa8 fffff803`edd694e9 : 00000000`0000000a fffffd50`00846878 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`5af27fb0 fffff803`edd67d3a : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`5af280f0 fffff803`edcbcaa6 : 00000000`00000003 00000000`00000002 00000000`00000000 fffff803`edc7012a : nt!KiPageFault+0x23a
ffffd000`5af28280 fffff803`edc6bec2 : 00000000`00000000 00000000`38186000 ffffd000`5af287b1 ffffc001`50794180 : nt!MiResolveDemandZeroFault+0x956
ffffd000`5af283a0 fffff803`edc69d8b : 00000000`00000380 00000000`38000000 fffff680`001c0000 ffffe001`bd6c17d8 : nt!MiResolveProtoPteFault+0x592
ffffd000`5af28440 fffff803`edc6509f : ffffe001`bd6c17d8 00000000`00000000 00000000`00000000 ffffd000`5af28630 : nt!MiDispatchFault+0x2bb
ffffd000`5af28580 fffff803`edcac5a1 : 00000000`00000000 ffffffff`ffffffff 00000000`ffffff00 ffffffff`ffffffff : nt!MmAccessFault+0x54f
ffffd000`5af28740 fffff803`edcabc31 : 00000000`00000001 fffff803`00000002 ffffd000`00000001 00000000`00000002 : nt!MiProbeLeafFrame+0x3d1
ffffd000`5af28870 fffff801`2a89a59f : 00000000`00000400 ffffd000`5af28f00 ffffc001`00000002 ffffc001`4f556001 : nt!MmProbeAndLockPages+0x241
ffffd000`5af28950 fffff801`2a8996e7 : ffffc001`5088ca00 ffffc001`5088ca00 ffffe001`be6ca930 ffffd000`5af28f00 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x12f
ffffd000`5af289b0 fffff801`2a86fa31 : 00000000`00000000 fffff801`2a892cbe 00000000`00000002 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x767
ffffd000`5af28d80 fffff801`2a73a049 : 00000000`00000200 ffffd000`5af29a90 ffffc001`4f95dec0 ffffd000`5af28f00 : dxgmms1!VidMmReferenceDmaBuffer+0x55
ffffd000`5af28de0 fffff801`2a732c35 : ffffc001`51a8a000 00000000`00000000 00000000`00000000 00000000`fec63000 : dxgkrnl!DXGCONTEXT::Render+0x229
ffffd000`5af29930 fffff803`edd691b3 : ffffe001`be0c6080 ffffe001`be0c6080 00000000`031e0000 00000000`fec65000 : dxgkrnl!DxgkRender+0x325
ffffd000`5af29c40 00000000`776777fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`030ee3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776777fa


THREAD_SHA1_HASH_MOD_FUNC:  3359f03a46be49f4f4f981fec7f2b74c023b2721

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1a769494e732f23ab2bcf5a29cda656a0ecbcc98

THREAD_SHA1_HASH_MOD:  25d39b01828eedce19ed04589a8dd1a5fb863a65

FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+12f
fffff801`2a89a59f e985000000      jmp     dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x1b9 (fffff801`2a89a629)

FAULT_INSTR_CODE:  85e9

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+12f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54505506

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12f

FAILURE_BUCKET_ID:  AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages

BUCKET_ID:  AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages

PRIMARY_PROBLEM_CLASS:  AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages

TARGET_TIME:  2020-04-18T08:35:12.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  1a80

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_dxgmms1!vidmm_segment::safeprobeandlockpages

FAILURE_ID_HASH:  {ef2979ff-e4ab-9457-2244-340982265f57}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000066710010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802efedb192, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 66710010

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff802efedb192

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802f01ed298
GetUlongPtrFromAddress: unable to read from fffff802f01ed520
0000000066710010

CURRENT_IRQL:  2

FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff802`efedb192 48890a          mov     qword ptr [rdx],rcx

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  PointBlank.exe

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:49.0819

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffd00022b593c0 -- (.trap 0xffffd00022b593c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004800000 rbx=0000000000000000 rcx=ffffd00022b59628
rdx=0000000066710010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802efedb192 rsp=ffffd00022b59550 rbp=ffffd00022b59600
r8=0000000000000000  r9=0000000000000000 r10=0020006000000000
r11=fffffa8004801460 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0x12:
fffff802`efedb192 48890a          mov     qword ptr [rdx],rcx ds:00000000`66710010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802effe64e9 to fffff802effda9a0

STACK_TEXT:
ffffd000`22b59278 fffff802`effe64e9 : 00000000`0000000a 00000000`66710010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`22b59280 fffff802`effe4d3a : 00000000`00000001 fffffa80`004fe120 00000000`00000000 00000000`00000003 : nt!KiBugCheckDispatch+0x69
ffffd000`22b593c0 fffff802`efedb192 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`22b59550 fffff802`efeee16f : fffffa80`004fe120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0x12
ffffd000`22b59580 fffff802`efeec01b : 00000000`0001aa06 fffffa80`004fe130 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x7ef
ffffd000`22b596c0 fffff802`eff3a897 : 00000000`00000002 ffffd000`22b59740 00000000`00000242 00000000`00000002 : nt!MiInsertLargePageInFreeOrZeroList+0xdb
ffffd000`22b59710 fffff802`eff3a33f : 00000000`00000008 00000000`00000000 00000000`00000242 00000000`00000001 : nt!MiGetFreeOrZeroPage+0x3e7
ffffd000`22b597b0 fffff802`eff392e3 : 00000000`00000000 00000000`00000002 00000000`00000001 fffff802`eff3ab49 : nt!MiGetPage+0x6f
ffffd000`22b59820 fffff802`efee6e5e : 00000000`00000001 00000000`30954000 ffffd000`22b59c40 fffff680`00184aa0 : nt!MiResolveDemandZeroFault+0x193
ffffd000`22b59940 fffff802`efee209f : ffffe001`044b7558 00000000`30954000 ffffd000`22b59bd0 00000000`00000000 : nt!MiDispatchFault+0x38e
ffffd000`22b59a80 fffff802`effe4c2f : 00000000`00000001 00000000`2e9f8e40 ffffc001`907ef001 ffffc001`907ef000 : nt!MmAccessFault+0x54f
ffffd000`22b59c40 00000000`6c97494a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
00000000`061cfd94 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6c97494a


THREAD_SHA1_HASH_MOD_FUNC:  d6636dbb959ce8b41ab0f437250fc3072f1e80da

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  441af99844d266e1076fa5f6e98394b7e5510b33

THREAD_SHA1_HASH_MOD:  dc844b1b94baa204d070855e43bbbd27eee98b94

FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+12
fffff802`efedb192 48890a          mov     qword ptr [rdx],rcx

FAULT_INSTR_CODE:  330a8948

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+12

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  12

FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

PRIMARY_PROBLEM_CLASS:  AV_nt!KxWaitForLockOwnerShip

TARGET_TIME:  2020-04-18T07:34:04.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  46e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kxwaitforlockownership

FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00000000365f3000
Arg3: 000000000001f4db
Arg4: fffff58010804000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 41284

BUGCHECK_P2: 365f3000

BUGCHECK_P3: 1f4db

BUGCHECK_P4: fffff58010804000

BUGCHECK_STR:  0x1a_41284

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  PointBlank.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:43.0076

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff803129ec43d to fffff803129c59a0

STACK_TEXT:
ffffd001`e1ff7798 fffff803`129ec43d : 00000000`0000001a 00000000`00041284 00000000`365f3000 00000000`0001f4db : nt!KeBugCheckEx
ffffd001`e1ff77a0 fffff803`128d4728 : cdb00001`5a03086f ffffd001`e1ff78f0 fffff680`001b2f98 fffff580`10804000 : nt! ?? ::FNODOBFM::`string'+0x1658d
ffffd001`e1ff77f0 fffff803`12937dc3 : ffffe001`9f7c0568 ffffe001`9d16f4e0 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x558
ffffd001`e1ff7a80 fffff803`12cad389 : ffffe001`a01c6620 00000000`36540000 ffffe001`00000000 7fffffff`00000000 : nt!MiDeleteVad+0x233
ffffd001`e1ff7b80 fffff800`f4ad6074 : 00000000`00000000 fffff803`12b27200 ffffe001`a01d7a50 fffff803`12b27300 : nt!MiUnmapViewOfSection+0xfd
ffffd001`e1ff7c50 fffff803`1291138c : fffff803`128ff674 ffffe001`9d16f180 ffffe001`9d16f040 fffff803`12b27300 : dxgmms1!VidMmProcessAsyncOperation+0x4c
ffffd001`e1ff7c90 fffff803`12976c70 : afafafaf`afafafaf ffffe001`9d16f040 00000000`00000080 ffffe001`9d16f040 : nt!ExpWorkerThread+0x28c
ffffd001`e1ff7d40 fffff803`129cbfc6 : fffff803`12b78180 ffffe001`9d16f040 ffffe001`9d13f880 afafafaf`afafafaf : nt!PspSystemThreadStartup+0x58
ffffd001`e1ff7da0 00000000`00000000 : ffffd001`e1ff8000 ffffd001`e1ff2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  0bdf1083aeea2455c25eec9609c1ac92b8a72afe

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  48178d863dd522b5a3e1918099a584615114fbda

THREAD_SHA1_HASH_MOD:  39228cfe83a24322e7aa8ed3ae32e8bbb19cc5a8

FOLLOWUP_IP:
dxgmms1!VidMmProcessAsyncOperation+4c
fffff800`f4ad6074 488b4b28        mov     rcx,qword ptr [rbx+28h]

FAULT_INSTR_CODE:  284b8b48

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  dxgmms1!VidMmProcessAsyncOperation+4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54505506

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4c

FAILURE_BUCKET_ID:  0x1a_41284_dxgmms1!VidMmProcessAsyncOperation

BUCKET_ID:  0x1a_41284_dxgmms1!VidMmProcessAsyncOperation

PRIMARY_PROBLEM_CLASS:  0x1a_41284_dxgmms1!VidMmProcessAsyncOperation

TARGET_TIME:  2020-04-17T17:18:26.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  476

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41284_dxgmms1!vidmmprocessasyncoperation

FAILURE_ID_HASH:  {96cdb27a-c9ec-e3f0-3733-5b92dbafc0c2}

Followup:     MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8005a086103, The address that the exception occurred at
Arg3: ffffd001bc26c778, Exception Record Address
Arg4: ffffd001bc26bf80, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullPtr

    Key  : AV.Fault
    Value: Write


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

SYSTEM_PRODUCT_NAME:  CASPER NIRVANA

SYSTEM_SKU:  CASPER BSWI-D2-J3060

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  CASPER BILGISAYAR SISTEMLERI A.S

BIOS_VERSION:  5.11

BIOS_DATE:  09/29/2016

BASEBOARD_MANUFACTURER:  CASPER BILGISAYAR SISTEMLERI A.S

BASEBOARD_PRODUCT:  CASPER NIRVANA DESKTOP

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8005a086103

BUGCHECK_P3: ffffd001bc26c778

BUGCHECK_P4: ffffd001bc26bf80

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgmms1!VidSchiCheckFlipQueueTimeout+13
fffff800`5a086103 80792e00        cmp     byte ptr [rcx+2Eh],0

EXCEPTION_RECORD:  ffffd001bc26c778 -- (.exr 0xffffd001bc26c778)
ExceptionAddress: fffff8005a086103 (dxgmms1!VidSchiCheckFlipQueueTimeout+0x0000000000000013)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000

CONTEXT:  ffffd001bc26bf80 -- (.cxr 0xffffd001bc26bf80)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000bc7b4000
rdx=ffffd001bc26ca60 rsi=0000000000000000 rdi=ffffe000bc7b4000
rip=fffff8005a086103 rsp=ffffd001bc26c9b0 rbp=0000000000000009
r8=ffffd001bc26ca68  r9=00000000000000b3 r10=00000000000000b3
r11=ffffd001bc26cab0 r12=fffff78000000320 r13=0000000000000000
r14=ffffe000bc7b4000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
dxgmms1!VidSchiCheckFlipQueueTimeout+0x13:
fffff800`5a086103 80792e00        cmp     byte ptr [rcx+2Eh],0 ds:002b:ffffe000`bc7b402e=01
Resetting default scope

CPU_COUNT: 2

CPU_MHZ: 640

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 4c

CPU_STEPPING: 4

CPU_MICROCODE: 6,4c,4,0 (F,M,S,R)  SIG: 408'00000000 (cache) 408'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  NULL_DEREFERENCE

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
dxgmms1!VidSchiCheckFlipQueueTimeout+13
fffff800`5a086103 80792e00        cmp     byte ptr [rcx+2Eh],0

BUGCHECK_STR:  AV

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8015c9e2298
GetUlongPtrFromAddress: unable to read from fffff8015c9e2520
0000000000000000

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000000

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-18-2020 14:29:41.0710

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8005a0a7b0a to fffff8005a086103

STACK_TEXT:
ffffd001`bc26c9b0 fffff800`5a0a7b0a : ffffe000`bc7b4000 ffffd001`bc26ca60 ffffd001`bc26ca68 00000000`00000000 : dxgmms1!VidSchiCheckFlipQueueTimeout+0x13
ffffd001`bc26ca40 fffff800`5a085a5a : ffffffff`ff676980 00000000`00000000 ffffd001`bc26cbd0 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0xfa
ffffd001`bc26cad0 fffff800`5a0bbfb8 : ffffe000`bc7b4000 ffffe000`bc7b4000 ffffe000`bc7b4000 ffffe000`00000000 : dxgmms1!VidSchiScheduleCommandToRun+0x44a
ffffd001`bc26cc90 fffff800`5a0bbf7d : ffffe000`bc7b4000 ffffe000`00000000 00000000`00000080 ffffe000`ba33a500 : dxgmms1!VidSchiRun_PriorityTable+0x38
ffffd001`bc26cd00 fffff801`5c780c70 : fffff801`5c9dba00 ffffe000`ba33a500 ffffd001`bc26cdd0 fffff801`5c7d2d7d : dxgmms1!VidSchiWorkerThread+0x8d
ffffd001`bc26cd40 fffff801`5c7d5fc6 : fffff801`5c982180 ffffe000`ba33a500 fffff801`5c9dba00 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`bc26cda0 00000000`00000000 : ffffd001`bc26d000 ffffd001`bc267000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  4a81989f0cc8b6a31ae399e470c77fcfda82ad03

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  809981cb9407bbbbb6b8a3d9e87229cd73e85691

THREAD_SHA1_HASH_MOD:  715ea47f0e0475afca9183e1e7654934d827faef

FAULT_INSTR_CODE:  2e7980

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VidSchiCheckFlipQueueTimeout+13

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  54505506

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .cxr 0xffffd001bc26bf80 ; kb

BUCKET_ID_FUNC_OFFSET:  13

FAILURE_BUCKET_ID:  AV_dxgmms1!VidSchiCheckFlipQueueTimeout

BUCKET_ID:  AV_dxgmms1!VidSchiCheckFlipQueueTimeout

PRIMARY_PROBLEM_CLASS:  AV_dxgmms1!VidSchiCheckFlipQueueTimeout

TARGET_TIME:  2020-04-17T14:22:38.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  47c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_dxgmms1!vidschicheckflipqueuetimeout

FAILURE_ID_HASH:  {d4af77c3-ec14-7cc0-eed1-4df665e2fee5}

Followup:     MachineOwner

50 dakikadır test ediyor, 200 tane hata buldu daha da bulmaya devam ediyor. Anladığım kadarıyla RAM’ler bozuk. Şimdi benim bu hataların tek sebebi RAM’ler mi yoksa başka sorunlar da mı var?
 

Dosya Ekleri

  • DED670E2-5CB8-44B6-B430-87B6BB585FB2.jpeg
    DED670E2-5CB8-44B6-B430-87B6BB585FB2.jpeg
    2,3 MB · Görüntüleme: 35
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı