dejavujojo
Hectopat
- Katılım
- 2 Ekim 2018
- Mesajlar
- 31
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8020aa14cc5, The address that the exception occurred at
Arg3: fffffe013dbbf198, Exception Record Address
Arg4: fffffe013dbbe9e0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2006
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8020aa14cc5
BUGCHECK_P3: fffffe013dbbf198
BUGCHECK_P4: fffffe013dbbe9e0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!IovpValidateDeviceObject+5
fffff802`0aa14cc5 66833903 cmp word ptr [rcx],3
EXCEPTION_RECORD: fffffe013dbbf198 -- (.exr 0xfffffe013dbbf198)
ExceptionAddress: fffff8020aa14cc5 (nt!IovpValidateDeviceObject+0x0000000000000005)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000046dc232
Attempt to read from address 00000000046dc232
CONTEXT: fffffe013dbbe9e0 -- (.cxr 0xfffffe013dbbe9e0)
rax=ffffa28fa3bc0e10 rbx=ffffa28fa3bc0e10 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffa28fa0a70b90
rip=fffff8020aa14cc5 rsp=fffffe013dbbf3d8 rbp=fffff8020a22e76a
r8=0000000000000000 r9=0000000000000000 r10=fffff8020aa7a840
r11=ffffce7d2dc00000 r12=ffffa28fa474d000 r13=fffff807aa5c4000
r14=0000000000000000 r15=0000000000400000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!IovpValidateDeviceObject+0x5:
fffff802`0aa14cc5 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
HIDCLASS!HidpCallDriver+b9
fffff807`aa5a3939 90 nop
BUGCHECK_STR: AV
READ_ADDRESS: fffff8020a6223b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000046dc232
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000046dc232
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-21-2020 17:37:26.0715
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LOCK_ADDRESS: fffff8020a5119a0 -- (!locks fffff8020a5119a0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff8020a5119a0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8020a5119a0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff8020aa13f9e to fffff8020aa14cc5
STACK_TEXT:
fffffe01`3dbbf3d8 fffff802`0aa13f9e : ffffa28f`a3bc0e10 fffffe01`3dbbf3f8 ffffa28f`a3bc0f70 ffffa28f`9d3796a0 : nt!IovpValidateDeviceObject+0x5
fffffe01`3dbbf3e0 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000000 ffffa28f`a4a376a0 ffffa28f`a0a70b90 : nt!IovCallDriver+0x16a
fffffe01`3dbbf420 fffff802`0a22e76a : 00000000`00000000 fffff802`0aa1fa5c ffffa28f`00000000 ffffa28f`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf450 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a4a376a0 fffffe01`3dbbf510 fffff802`0a170768 : nt!IopfCallDriver+0x56
fffffe01`3dbbf490 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000017 ffffa28f`a46f5410 ffffa28f`99bf7100 : nt!IovCallDriver+0x275
fffffe01`3dbbf4d0 fffff807`aa5a3939 : 00000000`00000004 fffff802`0a0b8422 fffffe01`3dbba000 00000000`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf500 fffff807`aa5b3d81 : 00000000`00000000 ffffa28f`a46f5580 ffffa28f`a3bc0e10 fffff802`0aa26387 : HIDCLASS!HidpCallDriver+0xb9
fffffe01`3dbbf570 fffff807`aa5d0f1d : ffffa28f`a46f5560 ffffa28f`a2d85540 ffffa28f`9d379718 fffff802`0aa1ea0a : HIDCLASS!HidpIrpMajorDefault+0x129
fffffe01`3dbbf5d0 fffff807`aa5a269b : ffffa28f`00000002 ffffa28f`a46f5560 ffffa28f`9d379718 00000000`00000017 : HIDCLASS!HidpIrpMajorSystemControl+0x5e5
fffffe01`3dbbf600 fffff802`0a22e76a : 00000000`00000000 ffffa28f`a3bc0e10 ffffa28f`a46f5410 ffffa28f`00000001 : HIDCLASS!HidpMajorHandler+0x26b
fffffe01`3dbbf690 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 fffff802`0aa1ff69 : nt!IopfCallDriver+0x56
fffffe01`3dbbf6d0 fffff802`0a30e8c3 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 ffffa28f`a2d85540 : nt!IovCallDriver+0x275
fffffe01`3dbbf710 fffff802`0aa1fec5 : ffffa28f`a4a376a0 00000000`00000000 fffffe01`00000002 00000000`000000c0 : nt!IofCallDriver+0x154ff3
fffffe01`3dbbf750 fffff802`0aa3187a : ffffa28f`a4a376a0 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfIrpSendSynchronousIrp+0x115
fffffe01`3dbbf7c0 fffff802`0aa26234 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfWmiTestStartedPdoStack+0x5a
fffffe01`3dbbf860 fffff802`0a20a67b : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`95284010 : nt!VfMajorTestStartedPdoStack+0x58
fffffe01`3dbbf890 fffff802`0a7b70b7 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 fffffe01`3dbbf939 : nt!PpvUtilTestStartedPdoStack+0x17
fffffe01`3dbbf8c0 fffff802`0a7b0d1d : ffffa28f`95e30a80 fffffe01`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xbf
fffffe01`3dbbf9a0 fffff802`0a7ce17c : ffffa28f`a40f2d00 fffff802`0a1c1501 fffffe01`3dbbfab0 fffff802`00000002 : nt!PipProcessDevNodeTree+0x375
fffffe01`3dbbfa60 fffff802`0a20b6d7 : 00000001`00000003 ffffa28f`95284010 ffffa28f`a40f2db0 ffffa28f`a40f2db0 : nt!PiProcessReenumeration+0x88
fffffe01`3dbbfab0 fffff802`0a1a33b5 : ffffa28f`99bbb080 ffffa28f`95283a20 fffff802`0a510240 ffffa28f`95283a20 : nt!PnpDeviceActionWorker+0x207
fffffe01`3dbbfb70 fffff802`0a11acd5 : ffffa28f`99bbb080 00000000`00000080 ffffa28f`95282040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe01`3dbbfc10 fffff802`0a278998 : ffffde81`14ed2180 ffffa28f`99bbb080 fffff802`0a11ac80 ffffe184`e488a1e3 : nt!PspSystemThreadStartup+0x55
fffffe01`3dbbfc60 00000000`00000000 : fffffe01`3dbc0000 fffffe01`3dbba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
THREAD_SHA1_HASH_MOD_FUNC: fec41cbe2df6dc4585248640cf4fde66365deaa9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d765ea7fdd134b070e20337900d03742d37cc229
THREAD_SHA1_HASH_MOD: d85734949ecfb4643d983d4a36d81494e778c50c
FAULT_INSTR_CODE: 187f8090
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: HIDCLASS!HidpCallDriver+b9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HIDCLASS
IMAGE_NAME: HIDCLASS.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.175
STACK_COMMAND: .cxr 0xfffffe013dbbe9e0 ; kb
BUCKET_ID_FUNC_OFFSET: b9
FAILURE_BUCKET_ID: AV_VRF_HIDCLASS!HidpCallDriver
BUCKET_ID: AV_VRF_HIDCLASS!HidpCallDriver
PRIMARY_PROBLEM_CLASS: AV_VRF_HIDCLASS!HidpCallDriver
TARGET_TIME: 2020-04-21T13:46:07.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 24a4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_vrf_hidclass!hidpcalldriver
FAILURE_ID_HASH: {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}
Followup: MachineOwner
---------
drive.google.com
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8065cd73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2006
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8065cd73358
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CPU_COUNT: 10
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x133
PROCESS_NAME: svchost.exe
CURRENT_IRQL: d
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-19-2020 21:24:22.0521
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8065ca3d8b1 to fffff8065c9c2390
STACK_TEXT:
ffff8c81`92371b08 fffff806`5ca3d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`5cd73358 : nt!KeBugCheckEx
ffff8c81`92371b10 fffff806`5c8b90a7 : 00000081`c64ae210 ffff8c81`92352180 00000000`00000286 ffff8784`2e3f04d0 : nt!KeAccumulateTicks+0x181641
ffff8c81`92371b70 fffff806`5c75f291 : ffffe28c`a76bd000 ffffe28c`99cb2a00 ffff8784`2e3f0550 ffffe28c`99cb2ab0 : nt!KeClockInterruptNotify+0xc07
ffff8c81`92371f30 fffff806`5c82cc75 : ffffe28c`99cb2a00 00000000`00000000 00000000`00000000 ffff0e10`2ef0b7f8 : hal!HalpTimerClockIpiRoutine+0x21
ffff8c81`92371f60 fffff806`5c9c3e1a : ffff8784`2e3f0550 ffffe28c`99cb2a00 ffffe28c`a49c6080 ffffe28c`99cb2a00 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8c81`92371fb0 fffff806`5c9c4387 : ffff8784`2e3f06c0 ffff8784`2e3f0550 ffffe28c`99cb2a00 ffffa000`01a2c230 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8784`2e3f04d0 fffff806`5c8b522d : ffffffff`ffffffd2 fffff806`5c9088c6 00000000`00000010 00000000`00040286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8784`2e3f0660 fffff806`5c9088cb : ffffe28c`a76bd0c0 fffff806`00000000 00000000`00000000 ffff8784`2e3f0788 : nt!KeYieldProcessorEx+0xd
ffff8784`2e3f0690 fffff806`5cead39a : 00000000`1de8caf7 ffffe28c`a76be638 ffff8784`2e3f0788 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x8b
ffff8784`2e3f06c0 fffff806`5ceacd99 : 00000000`00000001 ffffd184`1cd6e8f0 ffff8784`2e3f08e0 ffffe28c`a76bd000 : nt!PfpPfnPrioRequest+0xda
ffff8784`2e3f0740 fffff806`5ceaae1c : 000000f1`188f9f68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x329
ffff8784`2e3f08b0 fffff806`5ceaab8b : fffff806`5c775b30 fffff806`5c75f37a 00000000`00000008 00000000`00000000 : nt!ExpQuerySystemInformation+0x16c
ffff8784`2e3f0ac0 fffff806`5c9d3c18 : 00000000`00000000 ffff8784`2e3f0b80 ffffe28c`99cb2a00 00000000`00000c0d : nt!NtQuerySystemInformation+0x2b
ffff8784`2e3f0b00 00007ffa`6d67c734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f1`188f9e58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`6d67c734
THREAD_SHA1_HASH_MOD_FUNC: 493026044bcb57bcd29de46d15dfb43c032f58d8
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e29aaa1f455afb1cde6ec560aba3efe8668909fd
THREAD_SHA1_HASH_MOD: a46c1b556d92394c8d3f63eb407b2ed053afd34a
FOLLOWUP_IP:
nt!KeAccumulateTicks+181641
fffff806`5ca3d8b1 cc int 3
FAULT_INSTR_CODE: ab3944cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!KeAccumulateTicks+181641
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5629d63a
IMAGE_VERSION: 10.0.18362.778
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 181641
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
PRIMARY_PROBLEM_CLASS: 0x133_ISR_nt!KeAccumulateTicks
TARGET_TIME: 2020-04-19T18:18:00.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 3747
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x133_isr_nt!keaccumulateticks
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------
drive.google.com
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8020aa14cc5, The address that the exception occurred at
Arg3: fffffe013dbbf198, Exception Record Address
Arg4: fffffe013dbbe9e0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2006
BIOS_DATE: 11/13/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME B450M-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8020aa14cc5
BUGCHECK_P3: fffffe013dbbf198
BUGCHECK_P4: fffffe013dbbe9e0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!IovpValidateDeviceObject+5
fffff802`0aa14cc5 66833903 cmp word ptr [rcx],3
EXCEPTION_RECORD: fffffe013dbbf198 -- (.exr 0xfffffe013dbbf198)
ExceptionAddress: fffff8020aa14cc5 (nt!IovpValidateDeviceObject+0x0000000000000005)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000046dc232
Attempt to read from address 00000000046dc232
CONTEXT: fffffe013dbbe9e0 -- (.cxr 0xfffffe013dbbe9e0)
rax=ffffa28fa3bc0e10 rbx=ffffa28fa3bc0e10 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffa28fa0a70b90
rip=fffff8020aa14cc5 rsp=fffffe013dbbf3d8 rbp=fffff8020a22e76a
r8=0000000000000000 r9=0000000000000000 r10=fffff8020aa7a840
r11=ffffce7d2dc00000 r12=ffffa28fa474d000 r13=fffff807aa5c4000
r14=0000000000000000 r15=0000000000400000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!IovpValidateDeviceObject+0x5:
fffff802`0aa14cc5 66833903 cmp word ptr [rcx],3 ds:002b:00000000`046dc232=????
Resetting default scope
CPU_COUNT: 10
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
HIDCLASS!HidpCallDriver+b9
fffff807`aa5a3939 90 nop
BUGCHECK_STR: AV
READ_ADDRESS: fffff8020a6223b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000046dc232
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000046dc232
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-21-2020 17:37:26.0715
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LOCK_ADDRESS: fffff8020a5119a0 -- (!locks fffff8020a5119a0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff8020a5119a0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8020a5119a0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff8020aa13f9e to fffff8020aa14cc5
STACK_TEXT:
fffffe01`3dbbf3d8 fffff802`0aa13f9e : ffffa28f`a3bc0e10 fffffe01`3dbbf3f8 ffffa28f`a3bc0f70 ffffa28f`9d3796a0 : nt!IovpValidateDeviceObject+0x5
fffffe01`3dbbf3e0 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000000 ffffa28f`a4a376a0 ffffa28f`a0a70b90 : nt!IovCallDriver+0x16a
fffffe01`3dbbf420 fffff802`0a22e76a : 00000000`00000000 fffff802`0aa1fa5c ffffa28f`00000000 ffffa28f`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf450 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a4a376a0 fffffe01`3dbbf510 fffff802`0a170768 : nt!IopfCallDriver+0x56
fffffe01`3dbbf490 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000017 ffffa28f`a46f5410 ffffa28f`99bf7100 : nt!IovCallDriver+0x275
fffffe01`3dbbf4d0 fffff807`aa5a3939 : 00000000`00000004 fffff802`0a0b8422 fffffe01`3dbba000 00000000`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf500 fffff807`aa5b3d81 : 00000000`00000000 ffffa28f`a46f5580 ffffa28f`a3bc0e10 fffff802`0aa26387 : HIDCLASS!HidpCallDriver+0xb9
fffffe01`3dbbf570 fffff807`aa5d0f1d : ffffa28f`a46f5560 ffffa28f`a2d85540 ffffa28f`9d379718 fffff802`0aa1ea0a : HIDCLASS!HidpIrpMajorDefault+0x129
fffffe01`3dbbf5d0 fffff807`aa5a269b : ffffa28f`00000002 ffffa28f`a46f5560 ffffa28f`9d379718 00000000`00000017 : HIDCLASS!HidpIrpMajorSystemControl+0x5e5
fffffe01`3dbbf600 fffff802`0a22e76a : 00000000`00000000 ffffa28f`a3bc0e10 ffffa28f`a46f5410 ffffa28f`00000001 : HIDCLASS!HidpMajorHandler+0x26b
fffffe01`3dbbf690 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 fffff802`0aa1ff69 : nt!IopfCallDriver+0x56
fffffe01`3dbbf6d0 fffff802`0a30e8c3 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 ffffa28f`a2d85540 : nt!IovCallDriver+0x275
fffffe01`3dbbf710 fffff802`0aa1fec5 : ffffa28f`a4a376a0 00000000`00000000 fffffe01`00000002 00000000`000000c0 : nt!IofCallDriver+0x154ff3
fffffe01`3dbbf750 fffff802`0aa3187a : ffffa28f`a4a376a0 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfIrpSendSynchronousIrp+0x115
fffffe01`3dbbf7c0 fffff802`0aa26234 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfWmiTestStartedPdoStack+0x5a
fffffe01`3dbbf860 fffff802`0a20a67b : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`95284010 : nt!VfMajorTestStartedPdoStack+0x58
fffffe01`3dbbf890 fffff802`0a7b70b7 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 fffffe01`3dbbf939 : nt!PpvUtilTestStartedPdoStack+0x17
fffffe01`3dbbf8c0 fffff802`0a7b0d1d : ffffa28f`95e30a80 fffffe01`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xbf
fffffe01`3dbbf9a0 fffff802`0a7ce17c : ffffa28f`a40f2d00 fffff802`0a1c1501 fffffe01`3dbbfab0 fffff802`00000002 : nt!PipProcessDevNodeTree+0x375
fffffe01`3dbbfa60 fffff802`0a20b6d7 : 00000001`00000003 ffffa28f`95284010 ffffa28f`a40f2db0 ffffa28f`a40f2db0 : nt!PiProcessReenumeration+0x88
fffffe01`3dbbfab0 fffff802`0a1a33b5 : ffffa28f`99bbb080 ffffa28f`95283a20 fffff802`0a510240 ffffa28f`95283a20 : nt!PnpDeviceActionWorker+0x207
fffffe01`3dbbfb70 fffff802`0a11acd5 : ffffa28f`99bbb080 00000000`00000080 ffffa28f`95282040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe01`3dbbfc10 fffff802`0a278998 : ffffde81`14ed2180 ffffa28f`99bbb080 fffff802`0a11ac80 ffffe184`e488a1e3 : nt!PspSystemThreadStartup+0x55
fffffe01`3dbbfc60 00000000`00000000 : fffffe01`3dbc0000 fffffe01`3dbba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
THREAD_SHA1_HASH_MOD_FUNC: fec41cbe2df6dc4585248640cf4fde66365deaa9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d765ea7fdd134b070e20337900d03742d37cc229
THREAD_SHA1_HASH_MOD: d85734949ecfb4643d983d4a36d81494e778c50c
FAULT_INSTR_CODE: 187f8090
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: HIDCLASS!HidpCallDriver+b9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: HIDCLASS
IMAGE_NAME: HIDCLASS.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.175
STACK_COMMAND: .cxr 0xfffffe013dbbe9e0 ; kb
BUCKET_ID_FUNC_OFFSET: b9
FAILURE_BUCKET_ID: AV_VRF_HIDCLASS!HidpCallDriver
BUCKET_ID: AV_VRF_HIDCLASS!HidpCallDriver
PRIMARY_PROBLEM_CLASS: AV_VRF_HIDCLASS!HidpCallDriver
TARGET_TIME: 2020-04-21T13:46:07.000Z
OSBUILD: 18362
OSSERVICEPACK: 778
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-10-23 09:39:54
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 24a4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_vrf_hidclass!hidpcalldriver
FAILURE_ID_HASH: {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.