Bazen masaütsüne atıyor oyun kapanıyor. Bazen de ekran tamamen gidiyor kasa çalışmaya devam ediyor ve kapatıp açmadan düzelmiyor. Garantiye göndersem mi iade için?
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffa1f9, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80218042cb6, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffffa1f9
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80218042cb6
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
00000000ffffa1f9
CURRENT_IRQL: 0
FAULTING_IP:
+0
fffff802`18042cb6 ?? ???
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV
BUGCHECK_STR: AV
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-28-2019 18:29:42.0185
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff802181d1ae9 to fffff802181bfcc0
STACK_TEXT:
ffff8583`a51e6ab8 fffff802`181d1ae9 : 00000000`0000000a 00000000`ffffa1f9 00000000`00000002 00000000`00000000 : 0xfffff802`181bfcc0
ffff8583`a51e6ac0 00000000`0000000a : 00000000`ffffa1f9 00000000`00000002 00000000`00000000 fffff802`18042cb6 : 0xfffff802`181d1ae9
ffff8583`a51e6ac8 00000000`ffffa1f9 : 00000000`00000002 00000000`00000000 fffff802`18042cb6 00000028`00000000 : 0xa
ffff8583`a51e6ad0 00000000`00000002 : 00000000`00000000 fffff802`18042cb6 00000028`00000000 e160e525`169b235d : 0xffffa1f9
ffff8583`a51e6ad8 00000000`00000000 : fffff802`18042cb6 00000028`00000000 e160e525`169b235d 634ad035`042103c7 : 0x2
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_AV
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
TARGET_TIME: 2019-09-06T18:28:40.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000ffffb882, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8076d242400, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1005
BIOS_DATE: 08/02/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X570-P
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffb882
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8076d242400
READ_ADDRESS: fffff8076d7723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000ffffb882
CURRENT_IRQL: 2
FAULTING_IP:
nt!RtlpHpVsFreeChunkInsert+170
fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8]
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-28-2019 18:29:44.0839
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff80772866d70 -- (.trap 0xfffff80772866d70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffb88a rbx=0000000000000000 rcx=0000000000830000
rdx=00000000ffffb88a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8076d242400 rsp=fffff80772866f00 rbp=ffffb88a07010280
r8=00000000008b0001 r9=3dea7b975c0a4ae2 r10=0000000000000000
r11=ffffb88a07010290 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!RtlpHpVsFreeChunkInsert+0x170:
fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8] ds:00000000`ffffb882=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8076d3d2ee9 to fffff8076d3c10a0
STACK_TEXT:
fffff807`72866c28 fffff807`6d3d2ee9 : 00000000`0000000a 00000000`ffffb882 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff807`72866c30 fffff807`6d3cf22b : 00000000`00000000 fffff807`6dcb6c53 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`72866d70 fffff807`6d242400 : 00000000`00000000 ffffb88a`0d6a6410 00000000`00002bed ffffb88a`19fe3fe0 : nt!KiPageFault+0x46b
fffff807`72866f00 fffff807`6d243fb2 : ffffb88a`19fd5000 ffffb88a`07010280 ffffb88a`19fe3e70 ffffb88a`19fd5000 : nt!RtlpHpVsFreeChunkInsert+0x170
fffff807`72866f30 fffff807`6d2460ad : ffffb88a`000000a2 fffff807`00000000 ffffb88a`1539e8b0 fffff807`00000000 : nt!RtlpHpVsContextFree+0x302
fffff807`72866fd0 fffff807`6d56e0a9 : 00000000`00000000 00000000`00000450 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d
fffff807`728670f0 fffff807`6d23171b : ffffb88a`17d69b58 00000000`00000001 ffffb88a`17d69b58 00000000`00000002 : nt!ExFreePool+0x9
fffff807`72867120 fffff807`6d247d01 : 00000000`00000002 ffffb88a`10111010 ffffb88a`10111010 ffffb88a`10111010 : nt!IopFreeIrp+0x1ab
fffff807`72867160 fffff807`6d247667 : ffffb88a`00000001 ffffb88a`0d36e101 ffffb88a`00000000 ffffb88a`101111b8 : nt!IopfCompleteRequest+0x681
fffff807`72867270 fffff807`72216e45 : 000002b1`477e1b66 ffffb88a`1977f9e0 fffff807`728673a0 ffffb88a`1977f9e0 : nt!IofCompleteRequest+0x17
fffff807`728672a0 fffff807`6d247799 : ffffb88a`12b2866b 000002c8`00000000 fffff807`728675b8 ffffb88a`00000000 : CLASSPNP!TransferPktComplete+0x645
fffff807`728674a0 fffff807`6d247667 : 00000000`01008000 ffffb88a`00000201 ffffb88a`09a091a0 01000000`00100000 : nt!IopfCompleteRequest+0x119
fffff807`728675b0 fffff807`715799a2 : fffff807`6dcc0920 ffffb88a`099c5040 fffff807`728677b0 00000000`00000000 : nt!IofCompleteRequest+0x17
fffff807`728675e0 fffff807`7157928a : 00000000`00000000 00000000`00989680 fffff807`728677b0 ffffa500`9d0b2ef0 : storport!RaidCompleteRequestEx+0x92
fffff807`728676b0 fffff807`7158d60b : ffffb88a`0dfef178 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da
fffff807`72867850 fffff807`6d26b065 : ffffb88a`099da000 00000000`00000001 fffff807`728678a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8b
fffff807`728678f0 fffff807`6d26a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff807`72867a30 fffff807`6d3c4be4 : 00000000`00000000 fffff807`6ac3b180 fffff807`6d790400 ffffb88a`159b4680 : nt!KiRetireDpcList+0x1ef
fffff807`72867c60 00000000`00000000 : fffff807`72868000 fffff807`72862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84
THREAD_SHA1_HASH_MOD_FUNC: a94082232eca6b95de04de3544667deb7f9674ed
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 55edd50d5671c740a0984858021c3d53a86023fe
THREAD_SHA1_HASH_MOD: be8ee3bab5ac6018a7cc89b0d69661e74bafaaf3
FOLLOWUP_IP:
nt!ExFreePool+9
fffff807`6d56e0a9 4883c428 add rsp,28h
FAULT_INSTR_CODE: 28c48348
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nt!ExFreePool+9
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.356
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_nt!ExFreePool
BUCKET_ID: AV_nt!ExFreePool
PRIMARY_PROBLEM_CLASS: AV_nt!ExFreePool
TARGET_TIME: 2019-09-24T19:05:50.000Z
OSBUILD: 18362
OSSERVICEPACK: 356
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 7a4d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!exfreepool
FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1}
Followup: Pool_corruption
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffbe0557b870c0, The address of the thread.
Arg2: ffffd53cc4c67078, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1404
BIOS_DATE: 11/08/2019
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME X570-P
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 2
BUGCHECK_P1: ffffbe0557b870c0
BUGCHECK_P2: ffffd53cc4c67078
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: e09
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x192
PROCESS_NAME: Steam.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-28-2019 18:29:48.0495
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8040ae39c75 to fffff8040afc14e0
STACK_TEXT:
ffffe68a`b7a4c3f8 fffff804`0ae39c75 : 00000000`00000192 ffffbe05`57b870c0 ffffd53c`c4c67078 00000000`00000000 : nt!KeBugCheckEx
ffffe68a`b7a4c400 ffffd503`32c56932 : ffffd53c`c4c67020 ffffd53c`00000000 00000000`00000000 00000000`400f0f2a : nt!ExAcquirePushLockExclusiveEx+0x145
ffffe68a`b7a4c440 ffffd503`32c4fb15 : 00000000`000008c0 ffffe68a`b7a47000 ffffe68a`b7a4d000 00000000`00000000 : win32kfull!GreUpdateSpriteInternal+0x252
ffffe68a`b7a4c690 ffffd503`32c4d59e : ffffe68a`b7a4cc10 ffffd53c`c66ac620 ffffe68a`b7a4cc10 ffffd503`331c4aa0 : win32kfull!GreUpdateSpriteDevLockEnd+0x1b5
ffffe68a`b7a4c980 ffffd503`32c58403 : ffffd53c`c4b32000 ffffd53c`c3e27900 00000000`00000000 00000000`00000000 : win32kfull!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x14e
ffffe68a`b7a4ca30 ffffd503`32d004fb : 00000000`00e660b8 ffffe68a`b7a4cd00 fffff804`0ae36960 ffffd503`32ffde41 : win32kfull!NtGdiBitBltInternal+0xad3
ffffe68a`b7a4cd60 fffff804`0afd2d18 : 00000000`00000020 ffffd503`32c4709e ffffbe05`57b870c0 ffffd53c`c0911000 : win32kfull!NtGdiBitBlt+0x5b
ffffe68a`b7a4cdd0 00007ffb`749efdb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0063c8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`749efdb4
THREAD_SHA1_HASH_MOD_FUNC: 7536c886c443a0fbfd0ddc0e449662b05a8d9030
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 80c526b398100591ecee148642f92bc53619c753
THREAD_SHA1_HASH_MOD: 4fde9e56ff1f90cca0839847b6728a9769306bd5
FOLLOWUP_IP:
win32kfull!GreUpdateSpriteInternal+252
ffffd503`32c56932 488b8ba8000000 mov rcx,qword ptr [rbx+0A8h]
FAULT_INSTR_CODE: a88b8b48
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32kfull!GreUpdateSpriteInternal+252
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 252
FAILURE_BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal
BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal
PRIMARY_PROBLEM_CLASS: 0x192_win32kfull!GreUpdateSpriteInternal
TARGET_TIME: 2019-12-02T13:49:29.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5613
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x192_win32kfull!greupdatespriteinternal
FAILURE_ID_HASH: {6d016e5d-db8f-06f7-61b8-ec8816b15658}
Followup: MachineOwner
---------
Kartı garantiye gönderdiğim için yapamadım testi hatalar RAM kaynaklı mı?Memtest86 testi yapar mısın?
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000ffffa1f9, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80218042cb6, address which referenced memory Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 DUMP_TYPE: 2 BUGCHECK_P1: ffffa1f9 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80218042cb6 READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols 00000000ffffa1f9 CURRENT_IRQL: 0 FAULTING_IP: +0 fffff802`18042cb6 ?? ??? CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV BUGCHECK_STR: AV ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-28-2019 18:29:42.0185 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff802181d1ae9 to fffff802181bfcc0 STACK_TEXT: ffff8583`a51e6ab8 fffff802`181d1ae9 : 00000000`0000000a 00000000`ffffa1f9 00000000`00000002 00000000`00000000 : 0xfffff802`181bfcc0 ffff8583`a51e6ac0 00000000`0000000a : 00000000`ffffa1f9 00000000`00000002 00000000`00000000 fffff802`18042cb6 : 0xfffff802`181d1ae9 ffff8583`a51e6ac8 00000000`ffffa1f9 : 00000000`00000002 00000000`00000000 fffff802`18042cb6 00000028`00000000 : 0xa ffff8583`a51e6ad0 00000000`00000002 : 00000000`00000000 fffff802`18042cb6 00000028`00000000 e160e525`169b235d : 0xffffa1f9 ffff8583`a51e6ad8 00000000`00000000 : fffff802`18042cb6 00000028`00000000 e160e525`169b235d 634ad035`042103c7 : 0x2 SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID: CORRUPT_MODULELIST_AV PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV TARGET_TIME: 2019-09-06T18:28:40.000Z OSBUILD: 18362 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date ANALYSIS_SESSION_ELAPSED_TIME: f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7} Followup: MachineOwner --------- IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000ffffb882, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8076d242400, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1005 BIOS_DATE: 08/02/2019 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME X570-P BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 2 BUGCHECK_P1: ffffb882 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8076d242400 READ_ADDRESS: fffff8076d7723b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 00000000ffffb882 CURRENT_IRQL: 2 FAULTING_IP: nt!RtlpHpVsFreeChunkInsert+170 fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8] CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-28-2019 18:29:44.0839 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: fffff80772866d70 -- (.trap 0xfffff80772866d70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000ffffb88a rbx=0000000000000000 rcx=0000000000830000 rdx=00000000ffffb88a rsi=0000000000000000 rdi=0000000000000000 rip=fffff8076d242400 rsp=fffff80772866f00 rbp=ffffb88a07010280 r8=00000000008b0001 r9=3dea7b975c0a4ae2 r10=0000000000000000 r11=ffffb88a07010290 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!RtlpHpVsFreeChunkInsert+0x170: fffff807`6d242400 8b4af8 mov ecx,dword ptr [rdx-8] ds:00000000`ffffb882=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8076d3d2ee9 to fffff8076d3c10a0 STACK_TEXT: fffff807`72866c28 fffff807`6d3d2ee9 : 00000000`0000000a 00000000`ffffb882 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff807`72866c30 fffff807`6d3cf22b : 00000000`00000000 fffff807`6dcb6c53 00000000`00000001 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff807`72866d70 fffff807`6d242400 : 00000000`00000000 ffffb88a`0d6a6410 00000000`00002bed ffffb88a`19fe3fe0 : nt!KiPageFault+0x46b fffff807`72866f00 fffff807`6d243fb2 : ffffb88a`19fd5000 ffffb88a`07010280 ffffb88a`19fe3e70 ffffb88a`19fd5000 : nt!RtlpHpVsFreeChunkInsert+0x170 fffff807`72866f30 fffff807`6d2460ad : ffffb88a`000000a2 fffff807`00000000 ffffb88a`1539e8b0 fffff807`00000000 : nt!RtlpHpVsContextFree+0x302 fffff807`72866fd0 fffff807`6d56e0a9 : 00000000`00000000 00000000`00000450 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x56d fffff807`728670f0 fffff807`6d23171b : ffffb88a`17d69b58 00000000`00000001 ffffb88a`17d69b58 00000000`00000002 : nt!ExFreePool+0x9 fffff807`72867120 fffff807`6d247d01 : 00000000`00000002 ffffb88a`10111010 ffffb88a`10111010 ffffb88a`10111010 : nt!IopFreeIrp+0x1ab fffff807`72867160 fffff807`6d247667 : ffffb88a`00000001 ffffb88a`0d36e101 ffffb88a`00000000 ffffb88a`101111b8 : nt!IopfCompleteRequest+0x681 fffff807`72867270 fffff807`72216e45 : 000002b1`477e1b66 ffffb88a`1977f9e0 fffff807`728673a0 ffffb88a`1977f9e0 : nt!IofCompleteRequest+0x17 fffff807`728672a0 fffff807`6d247799 : ffffb88a`12b2866b 000002c8`00000000 fffff807`728675b8 ffffb88a`00000000 : CLASSPNP!TransferPktComplete+0x645 fffff807`728674a0 fffff807`6d247667 : 00000000`01008000 ffffb88a`00000201 ffffb88a`09a091a0 01000000`00100000 : nt!IopfCompleteRequest+0x119 fffff807`728675b0 fffff807`715799a2 : fffff807`6dcc0920 ffffb88a`099c5040 fffff807`728677b0 00000000`00000000 : nt!IofCompleteRequest+0x17 fffff807`728675e0 fffff807`7157928a : 00000000`00000000 00000000`00989680 fffff807`728677b0 ffffa500`9d0b2ef0 : storport!RaidCompleteRequestEx+0x92 fffff807`728676b0 fffff807`7158d60b : ffffb88a`0dfef178 00000000`00000000 00000000`00000000 00000000`00000000 : storport!RaidUnitCompleteRequest+0x5da fffff807`72867850 fffff807`6d26b065 : ffffb88a`099da000 00000000`00000001 fffff807`728678a8 00000000`00000000 : storport!RaidpAdapterRedirectDpcRoutine+0x8b fffff807`728678f0 fffff807`6d26a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305 fffff807`72867a30 fffff807`6d3c4be4 : 00000000`00000000 fffff807`6ac3b180 fffff807`6d790400 ffffb88a`159b4680 : nt!KiRetireDpcList+0x1ef fffff807`72867c60 00000000`00000000 : fffff807`72868000 fffff807`72862000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84 THREAD_SHA1_HASH_MOD_FUNC: a94082232eca6b95de04de3544667deb7f9674ed THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 55edd50d5671c740a0984858021c3d53a86023fe THREAD_SHA1_HASH_MOD: be8ee3bab5ac6018a7cc89b0d69661e74bafaaf3 FOLLOWUP_IP: nt!ExFreePool+9 fffff807`6d56e0a9 4883c428 add rsp,28h FAULT_INSTR_CODE: 28c48348 SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nt!ExFreePool+9 FOLLOWUP_NAME: Pool_corruption IMAGE_NAME: Pool_Corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.356 MODULE_NAME: Pool_Corruption STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: AV_nt!ExFreePool BUCKET_ID: AV_nt!ExFreePool PRIMARY_PROBLEM_CLASS: AV_nt!ExFreePool TARGET_TIME: 2019-09-24T19:05:50.000Z OSBUILD: 18362 OSSERVICEPACK: 356 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: unknown_date BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 7a4d ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!exfreepool FAILURE_ID_HASH: {2ae0a97e-dcd7-47ef-dbfb-430f2cbf58a1} Followup: Pool_corruption --------- KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192) A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or above. Arguments: Arg1: ffffbe0557b870c0, The address of the thread. Arg2: ffffd53cc4c67078, The lock address. Arg3: 0000000000000000, The IRQL at which the lock was acquired. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 SYSTEM_MANUFACTURER: System manufacturer SYSTEM_PRODUCT_NAME: System Product Name SYSTEM_SKU: SKU SYSTEM_VERSION: System Version BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: 1404 BIOS_DATE: 11/08/2019 BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC. BASEBOARD_PRODUCT: PRIME X570-P BASEBOARD_VERSION: Rev X.0x DUMP_TYPE: 2 BUGCHECK_P1: ffffbe0557b870c0 BUGCHECK_P2: ffffd53cc4c67078 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: e09 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x192 PROCESS_NAME: Steam.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 12-28-2019 18:29:48.0495 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8040ae39c75 to fffff8040afc14e0 STACK_TEXT: ffffe68a`b7a4c3f8 fffff804`0ae39c75 : 00000000`00000192 ffffbe05`57b870c0 ffffd53c`c4c67078 00000000`00000000 : nt!KeBugCheckEx ffffe68a`b7a4c400 ffffd503`32c56932 : ffffd53c`c4c67020 ffffd53c`00000000 00000000`00000000 00000000`400f0f2a : nt!ExAcquirePushLockExclusiveEx+0x145 ffffe68a`b7a4c440 ffffd503`32c4fb15 : 00000000`000008c0 ffffe68a`b7a47000 ffffe68a`b7a4d000 00000000`00000000 : win32kfull!GreUpdateSpriteInternal+0x252 ffffe68a`b7a4c690 ffffd503`32c4d59e : ffffe68a`b7a4cc10 ffffd53c`c66ac620 ffffe68a`b7a4cc10 ffffd503`331c4aa0 : win32kfull!GreUpdateSpriteDevLockEnd+0x1b5 ffffe68a`b7a4c980 ffffd503`32c58403 : ffffd53c`c4b32000 ffffd53c`c3e27900 00000000`00000000 00000000`00000000 : win32kfull!DEVLOCKBLTOBJ::~DEVLOCKBLTOBJ+0x14e ffffe68a`b7a4ca30 ffffd503`32d004fb : 00000000`00e660b8 ffffe68a`b7a4cd00 fffff804`0ae36960 ffffd503`32ffde41 : win32kfull!NtGdiBitBltInternal+0xad3 ffffe68a`b7a4cd60 fffff804`0afd2d18 : 00000000`00000020 ffffd503`32c4709e ffffbe05`57b870c0 ffffd53c`c0911000 : win32kfull!NtGdiBitBlt+0x5b ffffe68a`b7a4cdd0 00007ffb`749efdb4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`0063c8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`749efdb4 THREAD_SHA1_HASH_MOD_FUNC: 7536c886c443a0fbfd0ddc0e449662b05a8d9030 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 80c526b398100591ecee148642f92bc53619c753 THREAD_SHA1_HASH_MOD: 4fde9e56ff1f90cca0839847b6728a9769306bd5 FOLLOWUP_IP: win32kfull!GreUpdateSpriteInternal+252 ffffd503`32c56932 488b8ba8000000 mov rcx,qword ptr [rbx+0A8h] FAULT_INSTR_CODE: a88b8b48 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: win32kfull!GreUpdateSpriteInternal+252 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32kfull IMAGE_NAME: win32kfull.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.476 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 252 FAILURE_BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal BUCKET_ID: 0x192_win32kfull!GreUpdateSpriteInternal PRIMARY_PROBLEM_CLASS: 0x192_win32kfull!GreUpdateSpriteInternal TARGET_TIME: 2019-12-02T13:49:29.000Z OSBUILD: 18362 OSSERVICEPACK: 476 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2011-12-30 02:28:41 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 5613 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x192_win32kfull!greupdatespriteinternal FAILURE_ID_HASH: {6d016e5d-db8f-06f7-61b8-ec8816b15658} Followup: MachineOwner ---------
Garantiden dönmesini beklemekten başka yol yok o zaman.İhtimal dahilinde fakat kesin odur diyemem.