IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8066ca0c842, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2249
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2265
Key : Analysis.Init.CPU.mSec
Value: 781
Key : Analysis.Init.Elapsed.mSec
Value: 6773
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
FILE_IN_CAB: 013022-12984-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8066ca0c842
WORKER_ROUTINE:
+0
00000000`00000001 ?? ???
WORK_ITEM: fffff8066ca0c842
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicWebHelper.
TRAP_FRAME: ffff8087a1c7d530 -- (.trap 0xffff8087a1c7d530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=000000000000007b rsi=0000000000000000 rdi=0000000000000000
rip=fffff8066ca0c842 rsp=ffff8087a1c7d6c0 rbp=0000000000000000
r8=0000000000000000 r9=ffffd101ae54a180 r10=ffffaa0f9ca0e080
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KiSwapThread+0x542:
fffff806`6ca0c842 488901 mov qword ptr [rcx],rax ds:00000000`00000001=????????????????
Resetting default scope
STACK_TEXT:
ffff8087`a1c7d3e8 fffff806`6cc09269 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8087`a1c7d3f0 fffff806`6cc05569 : ffffd101`ae54a180 fffff806`6cbfe4f2 000f8067`b4bbbdff ffffaa0f`00000001 : nt!KiBugCheckDispatch+0x69
ffff8087`a1c7d530 fffff806`6ca0c842 : ffffd101`00000000 00000000`00000000 00000000`00000000 fffff806`00000000 : nt!KiPageFault+0x469
ffff8087`a1c7d6c0 fffff806`6ca0bd2f : ffffe50b`00000003 fffff806`00000001 00000000`00000001 ffffaa0f`00000000 : nt!KiSwapThread+0x542
ffff8087`a1c7d770 fffff806`6ca0f663 : ffffaa0f`00000000 ffffaa0f`00000000 00000000`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
ffff8087`a1c7d810 fffff806`6ca0f098 : ffffaa0f`9a979cc0 00000000`00000001 ffffaa0f`991b2720 fffff806`00000000 : nt!KeRemoveQueueEx+0x263
ffff8087`a1c7d8b0 fffff806`6ced76ed : 00000000`00000000 00000000`00000000 ffffd101`ae3d5180 fffff806`6ca86c0a : nt!IoRemoveIoCompletion+0x98
ffff8087`a1c7d9e0 fffff806`6cc08cb8 : ffffaa0f`9ae15080 0000007b`b161f378 ffff8087`a1c7daa8 0000020f`0e177880 : nt!NtRemoveIoCompletion+0x13d
ffff8087`a1c7da90 00007ffc`2112ce94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007b`b161f358 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2112ce94
SYMBOL_NAME: nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 469
FAILURE_BUCKET_ID: AV_nt!KiPageFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup: MachineOwner
---------
KERNEL_THREAD_PRIORITY_FLOOR_VIOLATION (157)
An illegal operation was attempted on the priority floor of a particular
thread.
Arguments:
Arg1: ffff9e83795df280, The address of the thread
Arg2: 0000000000000001, The target priority value
Arg3: 0000000000000002, The priority counter for the target priority underflowed
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3812
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8046
Key : Analysis.Init.CPU.mSec
Value: 843
Key : Analysis.Init.Elapsed.mSec
Value: 6993
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
FILE_IN_CAB: 013122-11812-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 157
BUGCHECK_P1: ffff9e83795df280
BUGCHECK_P2: 1
BUGCHECK_P3: 2
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffff9688`7e0d67c8 fffff800`6187adec : 00000000`00000157 ffff9e83`795df280 00000000`00000001 00000000`00000002 : nt!KeBugCheckEx
ffff9688`7e0d67d0 fffff800`61607e8d : ffff9688`7e0d68e0 00000000`00000000 ffff9688`00000000 00000000`00000000 : nt!KiAbThreadUnboostCpuPriority+0x139fc8
ffff9688`7e0d6840 fffff800`616079f3 : ffff9e83`795df280 fffff800`709554a8 ffff9688`7e0d67e1 00000000`00000001 : nt!KiAbThreadRemoveBoosts+0x5d
ffff9688`7e0d6870 fffff800`7095951a : 00000000`00000000 fffff800`00000001 ffff8504`0000c965 ffff8504`cd878d84 : nt!ExReleasePushLockExclusiveEx+0x1a3
ffff9688`7e0d68d0 fffff800`70958f8f : 00000000`00000000 ffff8504`cd878c30 fffff800`709554b8 00000000`00000000 : bam!BampCommitThrottledProcessStateChange+0x43a
ffff9688`7e0d6bd0 fffff800`61755995 : ffff9e83`795df280 ffffffff`fd408b56 00000000`00000080 fffff800`70958df0 : bam!BampThrottlingWorker+0x19f
ffff9688`7e0d6c10 fffff800`617fe938 : ffffdc81`1d5d5180 ffff9e83`795df280 fffff800`61755940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9688`7e0d6c60 00000000`00000000 : ffff9688`7e0d7000 ffff9688`7e0d1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: bam!BampCommitThrottledProcessStateChange+43a
MODULE_NAME: bam
IMAGE_NAME: bam.sys
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 43a
FAILURE_BUCKET_ID: 0x157_bam!BampCommitThrottledProcessStateChange
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {795c6bb5-d704-935d-08b6-df419e6de781}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffb07ccec85d0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffb07ccec8528, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3077
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23749
Key : Analysis.Init.CPU.mSec
Value: 874
Key : Analysis.Init.Elapsed.mSec
Value: 6782
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
FILE_IN_CAB: 013022-12812-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffffb07ccec85d0
BUGCHECK_P3: fffffb07ccec8528
BUGCHECK_P4: 0
TRAP_FRAME: fffffb07ccec85d0 -- (.trap 0xfffffb07ccec85d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffb07ce748960 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80751e871ed rsp=fffffb07ccec8760 rbp=ffffe3870d5b4080
r8=0000000000000001 r9=0000000000000000 r10=00000000fffffffe
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiExitDispatcher+0x1ad:
fffff807`51e871ed cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffffb07ccec8528 -- (.exr 0xfffffb07ccec8528)
ExceptionAddress: fffff80751e871ed (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvsphelper64.e
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffffb07`ccec82a8 fffff807`52009269 : 00000000`00000139 00000000`00000003 fffffb07`ccec85d0 fffffb07`ccec8528 : nt!KeBugCheckEx
fffffb07`ccec82b0 fffff807`52009690 : ffffcaad`c2859010 00000000`00000000 ffffcaad`c2859010 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffb07`ccec83f0 fffff807`52007a23 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffb07`ccec85d0 fffff807`51e871ed : 00000000`00000000 00000000`ffffffff 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffb07`ccec8760 fffff807`51e0a6d3 : ffffe387`0b119f10 ffffcaad`00000000 ffffe387`0b119f10 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffffb07`ccec87d0 fffff807`51e0a248 : ffffe387`00000000 fffffb07`ccec8b80 00000000`000061a8 00000000`00000000 : nt!ExpReleaseResourceExclusiveForThreadLite+0x3c3
fffffb07`ccec88b0 ffffcae5`fca44914 : 00000000`00000000 00000000`00000000 000000d4`9c7ff338 00000000`00000000 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x88
fffffb07`ccec8910 ffffcae5`fcd8224a : fffffb07`ccec89d8 00000000`00000000 00000000`00000000 fffffb07`ccec8aa8 : win32kbase!UserSessionSwitchLeaveCrit+0x74
fffffb07`ccec8980 ffffcae5`fd6771ad : ffffe387`0ebcd080 000000d4`9c7ff228 fffffb07`ccec8aa8 00000000`000202fe : win32kfull!NtUserPeekMessage+0x1aa
fffffb07`ccec8a40 fffff807`52008cb8 : fffffb07`ccec8b18 00000000`00000000 ffffe387`00000000 ffffe387`0eab98d0 : win32k!NtUserPeekMessage+0x29
fffffb07`ccec8a90 00007ffe`a48e1064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d4`9c7ff208 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a48e1064
SYMBOL_NAME: win32kbase!UserSessionSwitchLeaveCrit+74
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
IMAGE_VERSION: 10.0.19041.1469
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 74
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_win32kbase!UserSessionSwitchLeaveCrit
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0a5d7812-de29-e317-2ea0-92b5d30889e6}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the BugCheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2390
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2423
Key : Analysis.Init.CPU.mSec
Value: 734
Key : Analysis.Init.Elapsed.mSec
Value: 5650
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
FILE_IN_CAB: 020122-12531-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 139
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffa50c`3f0458a8 fffff803`4e7ffdeb : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffa50c`3f0458b0 fffff803`4e6816f2 : ffffc90c`99fca420 ffffa881`eefd5180 ffffa881`eefd5180 00000000`00000002 : nt!guard_icall_bugcheck+0x1b
ffffa50c`3f0458e0 fffff803`4e699a5d : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`001096c1 : nt!KiProcessExpiredTimerList+0x172
ffffa50c`3f0459d0 fffff803`4e7fae4e : ffffffff`00000000 ffffa881`eefd5180 ffffa881`eefe01c0 ffffc90c`99155080 : nt!KiRetireDpcList+0x5dd
ffffa50c`3f045c60 00000000`00000000 : ffffa50c`3f046000 ffffa50c`3f040000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!guard_icall_bugcheck+1b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}
Followup: MachineOwner
---------
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffbd04be193298, Virtual address for the attempted execute.
Arg2: 810000009d508963, PTE contents.
Arg3: ffffb60aa34fb5e0, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3311
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 5470
Key : Analysis.Init.CPU.mSec
Value: 828
Key : Analysis.Init.Elapsed.mSec
Value: 5840
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
FILE_IN_CAB: 020122-12562-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: fc
BUGCHECK_P1: ffffbd04be193298
BUGCHECK_P2: 810000009d508963
BUGCHECK_P3: ffffb60aa34fb5e0
BUGCHECK_P4: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicWebHelper.
TRAP_FRAME: ffffb60aa34fb5e0 -- (.trap 0xffffb60aa34fb5e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa583fb90bac8 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000ca rsi=0000000000000000 rdi=0000000000000000
rip=ffffbd04be193298 rsp=ffffb60aa34fb770 rbp=ffff8400fafd5180
r8=0000000000000000 r9=ffff8400fafd5180 r10=ffffa58408768340
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffbd04`be193298 0020 add byte ptr [rax],ah ds:ffffa583`fb90bac8=??
Resetting default scope
STACK_TEXT:
ffffb60a`a34fb2f8 fffff803`16484028 : 00000000`000000fc ffffbd04`be193298 81000000`9d508963 ffffb60a`a34fb5e0 : nt!KeBugCheckEx
ffffb60a`a34fb300 fffff803`162bdbb6 : ffffbd04`be193298 ffffb60a`a34fb500 1a000001`00000000 ffff8000`00000000 : nt!MiCheckSystemNxFault+0x12dec0
ffffb60a`a34fb340 fffff803`1629f4d0 : 00000000`00082e45 00000000`00000011 ffffb60a`a34fb660 00000000`00000000 : nt!MiSystemFault+0x6c6
ffffb60a`a34fb440 fffff803`1640545e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffb60a`a34fb5e0 ffffbd04`be193298 : ffffbd04`00000003 fffff803`00000001 00000000`00000000 ffffa584`00000000 : nt!KiPageFault+0x35e
ffffb60a`a34fb770 ffffbd04`00000003 : fffff803`00000001 00000000`00000000 ffffa584`00000000 ffffbd04`00000000 : 0xffffbd04`be193298
ffffb60a`a34fb778 fffff803`00000001 : 00000000`00000000 ffffa584`00000000 ffffbd04`00000000 ffffa584`00ac6240 : 0xffffbd04`00000003
ffffb60a`a34fb780 00000000`00000000 : ffffa584`00000000 ffffbd04`00000000 ffffa584`00ac6240 ffff8400`00000000 : 0xfffff803`00000001
SYMBOL_NAME: nt!MiCheckSystemNxFault+12dec0
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 12dec0
FAILURE_BUCKET_ID: 0xFC_nt!MiCheckSystemNxFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {a6ae5288-6b71-974a-9b09-23f14d998164}
Followup: MachineOwner
---------
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=2318]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = F1
BiosReleaseDate = 12/10/2019
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = B450M H
SystemFamily = Default string
SystemVersion = Default string
SystemSKU = Default string
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = B450M H
BaseBoardVersion = x.x