Çözüldü KERNEL_SECURITY_CHECK_FAILURE ve benzeri hatalar

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

dejavujojo

Hectopat
Katılım
2 Ekim 2018
Mesajlar
31
Merhaba, bugün 4 kez PC mavi ekran verdi. Minidump dosyalarını ekledim. Sorunun neden kaynaklandığını söyleyebilecek ve yardım edebilecek var mı?

 
Son düzenleyen: Moderatör:
Çözüm
Astrill VPN kaldırmanızı söylemiştim.

Bir sürü çöp yazılım var MSI, ASUS, Ryzen Master, Logitech araçlarını kaldırın.

Hangi cihazı taktığın zaman sorun oluşuyor?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8020aa14cc5, The address that the exception occurred at
Arg3: fffffe013dbbf198, Exception Record Address
Arg4: fffffe013dbbe9e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2006

BIOS_DATE:  11/13/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8020aa14cc5

BUGCHECK_P3: fffffe013dbbf198

BUGCHECK_P4: fffffe013dbbe9e0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!IovpValidateDeviceObject+5
fffff802`0aa14cc5 66833903        cmp     word ptr [rcx],3

EXCEPTION_RECORD:  fffffe013dbbf198 -- (.exr 0xfffffe013dbbf198)
ExceptionAddress: fffff8020aa14cc5 (nt!IovpValidateDeviceObject+0x0000000000000005)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000046dc232
Attempt to read from address 00000000046dc232

CONTEXT:  fffffe013dbbe9e0 -- (.cxr 0xfffffe013dbbe9e0)
rax=ffffa28fa3bc0e10 rbx=ffffa28fa3bc0e10 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffa28fa0a70b90
rip=fffff8020aa14cc5 rsp=fffffe013dbbf3d8 rbp=fffff8020a22e76a
r8=0000000000000000  r9=0000000000000000 r10=fffff8020aa7a840
r11=ffffce7d2dc00000 r12=ffffa28fa474d000 r13=fffff807aa5c4000
r14=0000000000000000 r15=0000000000400000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!IovpValidateDeviceObject+0x5:
fffff802`0aa14cc5 66833903        cmp     word ptr [rcx],3 ds:002b:00000000`046dc232=????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
HIDCLASS!HidpCallDriver+b9
fffff807`aa5a3939 90              nop

BUGCHECK_STR:  AV

READ_ADDRESS: fffff8020a6223b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000046dc232

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000046dc232

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-21-2020 17:37:26.0715

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LOCK_ADDRESS:  fffff8020a5119a0 -- (!locks fffff8020a5119a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8020a5119a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8020a5119a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff8020aa13f9e to fffff8020aa14cc5

STACK_TEXT:
fffffe01`3dbbf3d8 fffff802`0aa13f9e : ffffa28f`a3bc0e10 fffffe01`3dbbf3f8 ffffa28f`a3bc0f70 ffffa28f`9d3796a0 : nt!IovpValidateDeviceObject+0x5
fffffe01`3dbbf3e0 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000000 ffffa28f`a4a376a0 ffffa28f`a0a70b90 : nt!IovCallDriver+0x16a
fffffe01`3dbbf420 fffff802`0a22e76a : 00000000`00000000 fffff802`0aa1fa5c ffffa28f`00000000 ffffa28f`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf450 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a4a376a0 fffffe01`3dbbf510 fffff802`0a170768 : nt!IopfCallDriver+0x56
fffffe01`3dbbf490 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000017 ffffa28f`a46f5410 ffffa28f`99bf7100 : nt!IovCallDriver+0x275
fffffe01`3dbbf4d0 fffff807`aa5a3939 : 00000000`00000004 fffff802`0a0b8422 fffffe01`3dbba000 00000000`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf500 fffff807`aa5b3d81 : 00000000`00000000 ffffa28f`a46f5580 ffffa28f`a3bc0e10 fffff802`0aa26387 : HIDCLASS!HidpCallDriver+0xb9
fffffe01`3dbbf570 fffff807`aa5d0f1d : ffffa28f`a46f5560 ffffa28f`a2d85540 ffffa28f`9d379718 fffff802`0aa1ea0a : HIDCLASS!HidpIrpMajorDefault+0x129
fffffe01`3dbbf5d0 fffff807`aa5a269b : ffffa28f`00000002 ffffa28f`a46f5560 ffffa28f`9d379718 00000000`00000017 : HIDCLASS!HidpIrpMajorSystemControl+0x5e5
fffffe01`3dbbf600 fffff802`0a22e76a : 00000000`00000000 ffffa28f`a3bc0e10 ffffa28f`a46f5410 ffffa28f`00000001 : HIDCLASS!HidpMajorHandler+0x26b
fffffe01`3dbbf690 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 fffff802`0aa1ff69 : nt!IopfCallDriver+0x56
fffffe01`3dbbf6d0 fffff802`0a30e8c3 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 ffffa28f`a2d85540 : nt!IovCallDriver+0x275
fffffe01`3dbbf710 fffff802`0aa1fec5 : ffffa28f`a4a376a0 00000000`00000000 fffffe01`00000002 00000000`000000c0 : nt!IofCallDriver+0x154ff3
fffffe01`3dbbf750 fffff802`0aa3187a : ffffa28f`a4a376a0 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfIrpSendSynchronousIrp+0x115
fffffe01`3dbbf7c0 fffff802`0aa26234 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfWmiTestStartedPdoStack+0x5a
fffffe01`3dbbf860 fffff802`0a20a67b : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`95284010 : nt!VfMajorTestStartedPdoStack+0x58
fffffe01`3dbbf890 fffff802`0a7b70b7 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 fffffe01`3dbbf939 : nt!PpvUtilTestStartedPdoStack+0x17
fffffe01`3dbbf8c0 fffff802`0a7b0d1d : ffffa28f`95e30a80 fffffe01`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xbf
fffffe01`3dbbf9a0 fffff802`0a7ce17c : ffffa28f`a40f2d00 fffff802`0a1c1501 fffffe01`3dbbfab0 fffff802`00000002 : nt!PipProcessDevNodeTree+0x375
fffffe01`3dbbfa60 fffff802`0a20b6d7 : 00000001`00000003 ffffa28f`95284010 ffffa28f`a40f2db0 ffffa28f`a40f2db0 : nt!PiProcessReenumeration+0x88
fffffe01`3dbbfab0 fffff802`0a1a33b5 : ffffa28f`99bbb080 ffffa28f`95283a20 fffff802`0a510240 ffffa28f`95283a20 : nt!PnpDeviceActionWorker+0x207
fffffe01`3dbbfb70 fffff802`0a11acd5 : ffffa28f`99bbb080 00000000`00000080 ffffa28f`95282040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe01`3dbbfc10 fffff802`0a278998 : ffffde81`14ed2180 ffffa28f`99bbb080 fffff802`0a11ac80 ffffe184`e488a1e3 : nt!PspSystemThreadStartup+0x55
fffffe01`3dbbfc60 00000000`00000000 : fffffe01`3dbc0000 fffffe01`3dbba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


THREAD_SHA1_HASH_MOD_FUNC:  fec41cbe2df6dc4585248640cf4fde66365deaa9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d765ea7fdd134b070e20337900d03742d37cc229

THREAD_SHA1_HASH_MOD:  d85734949ecfb4643d983d4a36d81494e778c50c

FAULT_INSTR_CODE:  187f8090

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  HIDCLASS!HidpCallDriver+b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: HIDCLASS

IMAGE_NAME:  HIDCLASS.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.175

STACK_COMMAND:  .cxr 0xfffffe013dbbe9e0 ; kb

BUCKET_ID_FUNC_OFFSET:  b9

FAILURE_BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver

BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver

PRIMARY_PROBLEM_CLASS:  AV_VRF_HIDCLASS!HidpCallDriver

TARGET_TIME:  2020-04-21T13:46:07.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  24a4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_vrf_hidclass!hidpcalldriver

FAILURE_ID_HASH:  {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}

Followup:     MachineOwner
---------
Astrill VPN kaldır.

Chipset sürücüsünü kaldır tekrar yükle.

Hatalar devam ederse işlemci kaynaklı hatalar olabilir.
Kod:
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8065cd73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2006

BIOS_DATE:  11/13/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8065cd73358

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x133

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  d

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-19-2020 21:24:22.0521

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8065ca3d8b1 to fffff8065c9c2390

STACK_TEXT: 
ffff8c81`92371b08 fffff806`5ca3d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`5cd73358 : nt!KeBugCheckEx
ffff8c81`92371b10 fffff806`5c8b90a7 : 00000081`c64ae210 ffff8c81`92352180 00000000`00000286 ffff8784`2e3f04d0 : nt!KeAccumulateTicks+0x181641
ffff8c81`92371b70 fffff806`5c75f291 : ffffe28c`a76bd000 ffffe28c`99cb2a00 ffff8784`2e3f0550 ffffe28c`99cb2ab0 : nt!KeClockInterruptNotify+0xc07
ffff8c81`92371f30 fffff806`5c82cc75 : ffffe28c`99cb2a00 00000000`00000000 00000000`00000000 ffff0e10`2ef0b7f8 : hal!HalpTimerClockIpiRoutine+0x21
ffff8c81`92371f60 fffff806`5c9c3e1a : ffff8784`2e3f0550 ffffe28c`99cb2a00 ffffe28c`a49c6080 ffffe28c`99cb2a00 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8c81`92371fb0 fffff806`5c9c4387 : ffff8784`2e3f06c0 ffff8784`2e3f0550 ffffe28c`99cb2a00 ffffa000`01a2c230 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8784`2e3f04d0 fffff806`5c8b522d : ffffffff`ffffffd2 fffff806`5c9088c6 00000000`00000010 00000000`00040286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8784`2e3f0660 fffff806`5c9088cb : ffffe28c`a76bd0c0 fffff806`00000000 00000000`00000000 ffff8784`2e3f0788 : nt!KeYieldProcessorEx+0xd
ffff8784`2e3f0690 fffff806`5cead39a : 00000000`1de8caf7 ffffe28c`a76be638 ffff8784`2e3f0788 00000000`00000000 : nt!MiIdentifyPfnWrapper+0x8b
ffff8784`2e3f06c0 fffff806`5ceacd99 : 00000000`00000001 ffffd184`1cd6e8f0 ffff8784`2e3f08e0 ffffe28c`a76bd000 : nt!PfpPfnPrioRequest+0xda
ffff8784`2e3f0740 fffff806`5ceaae1c : 000000f1`188f9f68 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x329
ffff8784`2e3f08b0 fffff806`5ceaab8b : fffff806`5c775b30 fffff806`5c75f37a 00000000`00000008 00000000`00000000 : nt!ExpQuerySystemInformation+0x16c
ffff8784`2e3f0ac0 fffff806`5c9d3c18 : 00000000`00000000 ffff8784`2e3f0b80 ffffe28c`99cb2a00 00000000`00000c0d : nt!NtQuerySystemInformation+0x2b
ffff8784`2e3f0b00 00007ffa`6d67c734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f1`188f9e58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`6d67c734


THREAD_SHA1_HASH_MOD_FUNC:  493026044bcb57bcd29de46d15dfb43c032f58d8

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e29aaa1f455afb1cde6ec560aba3efe8668909fd

THREAD_SHA1_HASH_MOD:  a46c1b556d92394c8d3f63eb407b2ed053afd34a

FOLLOWUP_IP:
nt!KeAccumulateTicks+181641
fffff806`5ca3d8b1 cc              int     3

FAULT_INSTR_CODE:  ab3944cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KeAccumulateTicks+181641

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5629d63a

IMAGE_VERSION:  10.0.18362.778

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  181641

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

PRIMARY_PROBLEM_CLASS:  0x133_ISR_nt!KeAccumulateTicks

TARGET_TIME:  2020-04-19T18:18:00.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  3747

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x133_isr_nt!keaccumulateticks

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------
 
Tekrardan selamlar, saatlerdir Driver verifier ile test yapıyorum. Yüzde yüz kesin olmamakla birlikte Logitech sürücülerinde sorun var gibi görünüyor. Diğerlerinde sürücü testlerinde olmazken, sadece Logitech sürücülerini seçip Driver Verifier'ı kullanınca Windows açıldığı anda PC donmaya başlıyor. Ya donuk kalıyor ya mavi ekran veriyor. Webcam, mouse, klavye ve headset Logitech. Nasıl çıkabilirim bu işin içinden?
Yine de Minidump'ı atayım belki işe yarar bir şey görebilirsiniz. Teşekkürler şimdiden.

 
Astrill VPN kaldırmanızı söylemiştim.

Bir sürü çöp yazılım var MSI, ASUS, Ryzen Master, Logitech araçlarını kaldırın.

Hangi cihazı taktığın zaman sorun oluşuyor?

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8020aa14cc5, The address that the exception occurred at
Arg3: fffffe013dbbf198, Exception Record Address
Arg4: fffffe013dbbe9e0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2006

BIOS_DATE:  11/13/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  PRIME B450M-K

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8020aa14cc5

BUGCHECK_P3: fffffe013dbbf198

BUGCHECK_P4: fffffe013dbbe9e0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!IovpValidateDeviceObject+5
fffff802`0aa14cc5 66833903        cmp     word ptr [rcx],3

EXCEPTION_RECORD:  fffffe013dbbf198 -- (.exr 0xfffffe013dbbf198)
ExceptionAddress: fffff8020aa14cc5 (nt!IovpValidateDeviceObject+0x0000000000000005)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 00000000046dc232
Attempt to read from address 00000000046dc232

CONTEXT:  fffffe013dbbe9e0 -- (.cxr 0xfffffe013dbbe9e0)
rax=ffffa28fa3bc0e10 rbx=ffffa28fa3bc0e10 rcx=00000000046dc232
rdx=0000000000000000 rsi=00000000046dc232 rdi=ffffa28fa0a70b90
rip=fffff8020aa14cc5 rsp=fffffe013dbbf3d8 rbp=fffff8020a22e76a
r8=0000000000000000  r9=0000000000000000 r10=fffff8020aa7a840
r11=ffffce7d2dc00000 r12=ffffa28fa474d000 r13=fffff807aa5c4000
r14=0000000000000000 r15=0000000000400000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!IovpValidateDeviceObject+0x5:
fffff802`0aa14cc5 66833903        cmp     word ptr [rcx],3 ds:002b:00000000`046dc232=????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  0

FOLLOWUP_IP:
HIDCLASS!HidpCallDriver+b9
fffff807`aa5a3939 90              nop

BUGCHECK_STR:  AV

READ_ADDRESS: fffff8020a6223b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000046dc232

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  00000000046dc232

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-21-2020 17:37:26.0715

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LOCK_ADDRESS:  fffff8020a5119a0 -- (!locks fffff8020a5119a0)
Cannot get _ERESOURCE type

Resource @ nt!PiEngineLock (0xfffff8020a5119a0)    Available
1 total locks

PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8020a5119a0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0

LAST_CONTROL_TRANSFER:  from fffff8020aa13f9e to fffff8020aa14cc5

STACK_TEXT:
fffffe01`3dbbf3d8 fffff802`0aa13f9e : ffffa28f`a3bc0e10 fffffe01`3dbbf3f8 ffffa28f`a3bc0f70 ffffa28f`9d3796a0 : nt!IovpValidateDeviceObject+0x5
fffffe01`3dbbf3e0 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000000 ffffa28f`a4a376a0 ffffa28f`a0a70b90 : nt!IovCallDriver+0x16a
fffffe01`3dbbf420 fffff802`0a22e76a : 00000000`00000000 fffff802`0aa1fa5c ffffa28f`00000000 ffffa28f`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf450 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a4a376a0 fffffe01`3dbbf510 fffff802`0a170768 : nt!IopfCallDriver+0x56
fffffe01`3dbbf490 fffff802`0aa21af8 : ffffa28f`a3bc0e10 00000000`00000017 ffffa28f`a46f5410 ffffa28f`99bf7100 : nt!IovCallDriver+0x275
fffffe01`3dbbf4d0 fffff807`aa5a3939 : 00000000`00000004 fffff802`0a0b8422 fffffe01`3dbba000 00000000`00000000 : nt!VerifierIofCallDriver+0x18
fffffe01`3dbbf500 fffff807`aa5b3d81 : 00000000`00000000 ffffa28f`a46f5580 ffffa28f`a3bc0e10 fffff802`0aa26387 : HIDCLASS!HidpCallDriver+0xb9
fffffe01`3dbbf570 fffff807`aa5d0f1d : ffffa28f`a46f5560 ffffa28f`a2d85540 ffffa28f`9d379718 fffff802`0aa1ea0a : HIDCLASS!HidpIrpMajorDefault+0x129
fffffe01`3dbbf5d0 fffff807`aa5a269b : ffffa28f`00000002 ffffa28f`a46f5560 ffffa28f`9d379718 00000000`00000017 : HIDCLASS!HidpIrpMajorSystemControl+0x5e5
fffffe01`3dbbf600 fffff802`0a22e76a : 00000000`00000000 ffffa28f`a3bc0e10 ffffa28f`a46f5410 ffffa28f`00000001 : HIDCLASS!HidpMajorHandler+0x26b
fffffe01`3dbbf690 fffff802`0aa140a9 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 fffff802`0aa1ff69 : nt!IopfCallDriver+0x56
fffffe01`3dbbf6d0 fffff802`0a30e8c3 : ffffa28f`a3bc0e10 ffffa28f`a46f5410 00000000`00000000 ffffa28f`a2d85540 : nt!IovCallDriver+0x275
fffffe01`3dbbf710 fffff802`0aa1fec5 : ffffa28f`a4a376a0 00000000`00000000 fffffe01`00000002 00000000`000000c0 : nt!IofCallDriver+0x154ff3
fffffe01`3dbbf750 fffff802`0aa3187a : ffffa28f`a4a376a0 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfIrpSendSynchronousIrp+0x115
fffffe01`3dbbf7c0 fffff802`0aa26234 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`a4a376a0 : nt!VfWmiTestStartedPdoStack+0x5a
fffffe01`3dbbf860 fffff802`0a20a67b : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 ffffa28f`95284010 : nt!VfMajorTestStartedPdoStack+0x58
fffffe01`3dbbf890 fffff802`0a7b70b7 : 00000000`00000000 fffffe01`3dbbf939 00000000`00000001 fffffe01`3dbbf939 : nt!PpvUtilTestStartedPdoStack+0x17
fffffe01`3dbbf8c0 fffff802`0a7b0d1d : ffffa28f`95e30a80 fffffe01`00000001 00000000`00000000 00000000`00000000 : nt!PipProcessStartPhase3+0xbf
fffffe01`3dbbf9a0 fffff802`0a7ce17c : ffffa28f`a40f2d00 fffff802`0a1c1501 fffffe01`3dbbfab0 fffff802`00000002 : nt!PipProcessDevNodeTree+0x375
fffffe01`3dbbfa60 fffff802`0a20b6d7 : 00000001`00000003 ffffa28f`95284010 ffffa28f`a40f2db0 ffffa28f`a40f2db0 : nt!PiProcessReenumeration+0x88
fffffe01`3dbbfab0 fffff802`0a1a33b5 : ffffa28f`99bbb080 ffffa28f`95283a20 fffff802`0a510240 ffffa28f`95283a20 : nt!PnpDeviceActionWorker+0x207
fffffe01`3dbbfb70 fffff802`0a11acd5 : ffffa28f`99bbb080 00000000`00000080 ffffa28f`95282040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
fffffe01`3dbbfc10 fffff802`0a278998 : ffffde81`14ed2180 ffffa28f`99bbb080 fffff802`0a11ac80 ffffe184`e488a1e3 : nt!PspSystemThreadStartup+0x55
fffffe01`3dbbfc60 00000000`00000000 : fffffe01`3dbc0000 fffffe01`3dbba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


THREAD_SHA1_HASH_MOD_FUNC:  fec41cbe2df6dc4585248640cf4fde66365deaa9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d765ea7fdd134b070e20337900d03742d37cc229

THREAD_SHA1_HASH_MOD:  d85734949ecfb4643d983d4a36d81494e778c50c

FAULT_INSTR_CODE:  187f8090

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  HIDCLASS!HidpCallDriver+b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: HIDCLASS

IMAGE_NAME:  HIDCLASS.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.175

STACK_COMMAND:  .cxr 0xfffffe013dbbe9e0 ; kb

BUCKET_ID_FUNC_OFFSET:  b9

FAILURE_BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver

BUCKET_ID:  AV_VRF_HIDCLASS!HidpCallDriver

PRIMARY_PROBLEM_CLASS:  AV_VRF_HIDCLASS!HidpCallDriver

TARGET_TIME:  2020-04-21T13:46:07.000Z

OSBUILD:  18362

OSSERVICEPACK:  778

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-10-23 09:39:54

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  24a4

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_vrf_hidclass!hidpcalldriver

FAILURE_ID_HASH:  {25e71b60-36c1-fafe-99dd-4c12cfb82b8a}

Followup:     MachineOwner
---------
 
Çözüm
Çin'de yaşıyorum ben. VPN olmadan Youtube/facebook/google biliyorsunuz hiçbir şey çalışmıyor. O yüzden PC'den tek silemeyeceğim app o diyebilirim şu an. Astrill'in sürücüsünü tek olarak test ettim hata vermedi Driver verifier ile.

Bütün cihazlar sürekli takılı. Klavye ve mouse gün boyu işlemde. Kamera ve Kulaklığı YT için video çekerken kullanıyorum ama kullanım anında genelde sorun yaşatmıyorlar. Rastgele bir ana denk geliyor mavi ekran sorunu.
 
Bütün dediğiniz programları kaldırdım ryzenmaster harici. Çünkü onu daha önce kaldırmıştım. Acaba PC'de bir parçası silinmedi de kaldı mı bilmiyorum. Son bir test yaptım Driver verifier ile Logitech ve Windows sürücüleri dışında hepsini test ettim 5 dk boyunca donma vs olmadı. 1-2 gün test edeyim böyle sorun yaşanmazsa bilgilendirme yapmaya gelirim.

Fakat bilgi sahibi olmak için sormak isterim. İşlemcimde sorun olup olmadığı anlamak için bir şey yapma şansım var mı? Memtest'in işlemci versiyonu var mı?
 
Son düzenleyen: Moderatör:
Hafta bitmek üzere güncellemek istedim durumumu. 5 gündür PC hiç kapanmadı. Muhtemelen sorun Logitech'in Gaming uygulaması ve yüklediği sürücüden dolayıydı. Yabancı forumlarda da Logitech sürücüleri yüzünden mavi ekran alan çok kişi olduğunu öğrendim bu süreçte.


Uygulamayı silince, sürücü de silindi ve sorun ortadan kalktı. Aynı sorunu yaşayan arkadaşlar olursa belki benzer şekilde çözüme ulaşabilirler.

Yardımınız için çok teşekkür ederim. Konuyu çözüldü olarak kapatabilirsiniz. Kolay gelsin. ^^
 
Durum
Mesaj gönderimine kapalı.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı