Kadri Fidan
Kilopat
- Katılım
- 17 Aralık 2014
- Mesajlar
- 20
Daha fazla
- Cinsiyet
- Erkek
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000031c, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000047, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8060d822097, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: 31c
BUGCHECK_P2: ff
BUGCHECK_P3: 47
BUGCHECK_P4: fffff8060d822097
WRITE_ADDRESS: fffff8060dd733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000031c
CURRENT_IRQL: 0
FAULTING_IP:
nt!PpmIdleExecuteTransition+927
fffff806`0d822097 899d1c030000 mov dword ptr [rbp+31Ch],ebx
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-13-2020 19:12:29.0537
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffffe811a6b5650 -- (.trap 0xfffffe811a6b5650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8060d975280 rbx=0000000000000000 rcx=33c5ed4faa2e0001
rdx=00000000002cbf16 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060d822097 rsp=fffffe811a6b57e0 rbp=0000000000000000
r8=00000000004b1201 r9=0000000000000000 r10=00000000ffffffff
r11=ffffce7f6fc00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x927:
fffff806`0d822097 899d1c030000 mov dword ptr [rbp+31Ch],ebx ss:0018:00000000`0000031c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8060d9d33e9 to fffff8060d9c1510
STACK_TEXT:
fffffe81`1a6b5508 fffff806`0d9d33e9 : 00000000`0000000a 00000000`0000031c 00000000`000000ff 00000000`00000047 : nt!KeBugCheckEx
fffffe81`1a6b5510 fffff806`0d9cf72b : fffffe81`1a6b5620 00000000`00000002 ffffde81`d5e80251 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffffe81`1a6b5650 fffff806`0d822097 : 00006446`17e64a57 00006446`17e64a57 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
fffffe81`1a6b57e0 fffff806`0d8215ce : 00000000`00000003 00000000`00000002 ffffa60b`a7d35100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x927
fffffe81`1a6b5b00 fffff806`0d9c5018 : ffffffff`00000000 ffffde81`d5e80180 ffffa60b`ae6af080 00000000`00000360 : nt!PoIdle+0x36e
fffffe81`1a6b5c60 00000000`00000000 : fffffe81`1a6b6000 fffffe81`1a6b0000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: fbc86847fe4eb6c3c1fac4537ef130091fd9343a
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6efa8337f1f83fb6c761e7f449f6066ab3a91f1e
THREAD_SHA1_HASH_MOD: ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693
FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+927
fffff806`0d822097 899d1c030000 mov dword ptr [rbp+31Ch],ebx
FAULT_INSTR_CODE: 31c9d89
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmIdleExecuteTransition+927
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4269a790
IMAGE_VERSION: 10.0.18362.657
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 927
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdleExecuteTransition
BUCKET_ID: AV_CODE_AV_nt!PpmIdleExecuteTransition
PRIMARY_PROBLEM_CLASS: AV_CODE_AV_nt!PpmIdleExecuteTransition
TARGET_TIME: 2020-02-12T21:10:52.000Z
OSBUILD: 18362
OSSERVICEPACK: 657
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2005-04-23 04:40:32
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 8c65
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_code_av_nt!ppmidleexecutetransition
FAILURE_ID_HASH: {3d77750b-80a6-c195-659c-ebcffecd3d05}
Followup: MachineOwner
---------
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffc8012ed9c080, The address of the thread.
Arg2: fffff8074de65bb0, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: ffffc8012ed9c080
BUGCHECK_P2: fffff8074de65bb0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x192
PROCESS_NAME: LEDKeeper.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-10-2020 20:46:39.0416
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8074da39e37 to fffff8074dbc14e0
STACK_TEXT:
ffffd981`3022f738 fffff807`4da39e37 : 00000000`00000192 ffffc801`2ed9c080 fffff807`4de65bb0 00000000`00000000 : nt!KeBugCheckEx
ffffd981`3022f740 fffff807`4dfee780 : ffffd981`3022f930 fffff807`00000000 00000000`00001058 fffff807`4de65bc0 : nt!ExAcquirePushLockSharedEx+0x147
ffffd981`3022f780 fffff807`4dff65bc : 00000000`00000007 ffffd981`3022f930 00000000`00000000 ffffd981`3022fb01 : nt!CmpCallCallBacksEx+0xe0
ffffd981`3022f890 fffff807`4dbd2d18 : ffffc801`2ed9c080 00000000`08a3e1d8 ffffd981`3022faa8 00000000`00000000 : nt!NtQueryKey+0x3bc
ffffd981`3022fa90 00007ffb`b33bc384 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`08a3e3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b33bc384
THREAD_SHA1_HASH_MOD_FUNC: 5e69771f2fb64443fcd9f414d5ef970e5deb8ec6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4e672a2b177d1ada6ed4e5bbea4c534759a91d6e
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!ExAcquirePushLockSharedEx+147
fffff807`4da39e37 cc int 3
FAULT_INSTR_CODE: 8b8b48cc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExAcquirePushLockSharedEx+147
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3
IMAGE_VERSION: 10.0.18362.628
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 147
FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockSharedEx
BUCKET_ID: 0x192_nt!ExAcquirePushLockSharedEx
PRIMARY_PROBLEM_CLASS: 0x192_nt!ExAcquirePushLockSharedEx
TARGET_TIME: 2020-02-10T16:46:09.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 26f8
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x192_nt!exacquirepushlocksharedex
FAILURE_ID_HASH: {292e4563-5d10-0ceb-86fc-152da5e999ce}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: fffff8015c8d39f0, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff8015c8d39f0
BUGCHECK_P2: 0
BUGCHECK_P3: ffff0000
BUGCHECK_P4: 1
FAULTING_IP:
nt!ExpWnfWorkItemRoutine+0
fffff801`5c8d39f0 4883ec28 sub rsp,28h
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x1
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-10-2020 20:46:36.0432
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff8015c42b5ad to fffff8015c3c14e0
STACK_TEXT:
ffffd18f`67d72b68 fffff801`5c42b5ad : 00000000`00000001 fffff801`5c8d39f0 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx
ffffd18f`67d72b70 fffff801`5c32a7a5 : ffffe60e`1eda0040 00000000`00000080 ffffe60e`0d870280 00000000`00000000 : nt!ExpWorkerThread+0x16e61d
ffffd18f`67d72c10 fffff801`5c3c8b2a : ffffd601`b43c1180 ffffe60e`1eda0040 fffff801`5c32a750 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffd18f`67d72c60 00000000`00000000 : ffffd18f`67d73000 ffffd18f`67d6d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: abb52af8f664ebdb0a7322917295d92230a3de05
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e582783d64de53ea39b28692770c41b4dc51541f
THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791
FOLLOWUP_IP:
nt!ExpWnfWorkItemRoutine+0
fffff801`5c8d39f0 4883ec28 sub rsp,28h
FAULT_INSTR_CODE: 28ec8348
SYMBOL_NAME: nt!ExpWnfWorkItemRoutine+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3
IMAGE_VERSION: 10.0.18362.628
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 0
FAILURE_BUCKET_ID: 0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine
BUCKET_ID: 0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine
PRIMARY_PROBLEM_CLASS: 0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine
TARGET_TIME: 2020-02-09T19:37:06.000Z
OSBUILD: 18362
OSSERVICEPACK: 628
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1991-11-30 08:21:39
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 2920
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1_syscallnum_0_nt!expwnfworkitemroutine
FAILURE_ID_HASH: {10e36050-f896-7f32-c18d-23b6c4b2f487}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80430719a81, Address of the instruction which caused the bugcheck
Arg3: ffffa28ecf44b010, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for WdFilter.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80430719a81
BUGCHECK_P3: ffffa28ecf44b010
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
Ntfs!NtfsCleanupIrpContext+221
fffff804`30719a81 488b10 mov rdx,qword ptr [rax]
CONTEXT: ffffa28ecf44b010 -- (.cxr 0xffffa28ecf44b010)
rax=00010000000015fa rbx=ffffa28ecf44bd20 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa28ecf44bd58
rip=fffff80430719a81 rsp=ffffa28ecf44ba00 rbp=0000000000000000
r8=00000000ffffffff r9=7fffa50cbfafa408 r10=7ffffffffffffffc
r11=ffffa28ecf44b9f8 r12=ffffcc0cf8934528 r13=0000000000000000
r14=ffffcc0cf89341b0 r15=ffffa28ecf44bdc0
iopl=0 nv up ei pl nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207
Ntfs!NtfsCleanupIrpContext+0x221:
fffff804`30719a81 488b10 mov rdx,qword ptr [rax] ds:002b:00010000`000015fa=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-10-2020 20:46:33.0150
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff804307196cf to fffff80430719a81
STACK_TEXT:
ffffa28e`cf44ba00 fffff804`307196cf : ffffa50c`bf562900 fffff804`00000001 ffffa28e`cf44bd20 00000000`00000000 : Ntfs!NtfsCleanupIrpContext+0x221
ffffa28e`cf44ba60 fffff804`30819a00 : 00000000`00000000 ffffcc0d`06ecfde0 00000000`00000000 ffffcc0d`06ecfde0 : Ntfs!NtfsExtendedCompleteRequestInternal+0x13f
ffffa28e`cf44bad0 fffff804`308184a1 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`000000ba 00000000`00000002 : Ntfs!NtfsCommonQueryInformation+0xf80
ffffa28e`cf44bbd0 fffff804`30818a60 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`c7d739c0 ffffa50c`bf8f9718 : Ntfs!NtfsFsdDispatchSwitch+0x141
ffffa28e`cf44bd00 fffff804`2ba31f79 : 00000000`00000000 fffff804`2bb00740 00000000`0000000b ffff0da0`b642b304 : Ntfs!NtfsFsdDispatchWait+0x40
ffffa28e`cf44bfa0 fffff804`2fd1e99c : ffffa50c`c79b52f0 00000000`00000000 ffffa50c`cdaa0c10 ffffa50c`c9f5331c : nt!IofCallDriver+0x59
ffffa28e`cf44bfe0 fffff804`2fd1e6b9 : 00000000`00000000 ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpGetFileName+0x19c
ffffa28e`cf44c080 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`c79b52f0 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x39
ffffa28e`cf44c0e0 fffff804`2fd1df71 : ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30
ffffa28e`cf44c130 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1
ffffa28e`cf44c190 fffff804`2fce8325 : 00000000`00008000 ffffcc0c`ffff7fff ffffa50c`c32fc660 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffa28e`cf44c230 fffff804`3ea2e487 : ffffa28e`cf44c448 ffffa50c`cc079700 00000000`00000004 fffff804`2baa09a6 : FLTMGR!FltGetFileNameInformation+0x195
ffffa28e`cf44c2b0 fffff804`2fd1e6fe : 00000000`00003000 ffffa50c`c759f260 ffffa50c`cc079700 fffff804`2baa077e : luafv!LuafvGenerateFileName+0x57
ffffa28e`cf44c2e0 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`cc079700 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x7e
ffffa28e`cf44c340 fffff804`2fd1df71 : ffffa50c`cc079700 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30
ffffa28e`cf44c390 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1
ffffa28e`cf44c3f0 fffff804`2fce8325 : 00000000`00008000 ffffa50c`ffff7fff ffffa50c`c32fc660 ffffa50c`c60c2010 : FLTMGR!FltpGetFileNameInformation+0x4bf
ffffa28e`cf44c490 fffff804`306da09a : ffffa28e`cf44c618 ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 : FLTMGR!FltGetFileNameInformation+0x195
ffffa28e`cf44c510 ffffa28e`cf44c618 : ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 : WdFilter+0x3a09a
ffffa28e`cf44c518 ffffa50c`c65680f8 : ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 : 0xffffa28e`cf44c618
ffffa28e`cf44c520 ffffa50c`c32fc660 : ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 : 0xffffa50c`c65680f8
ffffa28e`cf44c528 ffffa50c`c65680f8 : ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a : 0xffffa50c`c32fc660
ffffa28e`cf44c530 ffffa28e`cf44c600 : 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 : 0xffffa50c`c65680f8
ffffa28e`cf44c538 00000000`00000000 : ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 00000000`00000000 : 0xffffa28e`cf44c600
THREAD_SHA1_HASH_MOD_FUNC: cfa66520a66b412456d5c69544130de72c5f7111
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0217f078f2a472046edead16c595337a005d9424
THREAD_SHA1_HASH_MOD: a6a06051b0876c1d7b117f1d0b30f134853e0c32
FOLLOWUP_IP:
luafv!LuafvGenerateFileName+57
fffff804`3ea2e487 8bd8 mov ebx,eax
FAULT_INSTR_CODE: c085d88b
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: luafv!LuafvGenerateFileName+57
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: luafv
IMAGE_NAME: luafv.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 8a8e82a
IMAGE_VERSION: 10.0.18362.53
STACK_COMMAND: .cxr 0xffffa28ecf44b010 ; kb
BUCKET_ID_FUNC_OFFSET: 57
FAILURE_BUCKET_ID: 0x3B_c0000005_luafv!LuafvGenerateFileName
BUCKET_ID: 0x3B_c0000005_luafv!LuafvGenerateFileName
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_luafv!LuafvGenerateFileName
TARGET_TIME: 2020-02-06T14:02:30.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 99f5
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_luafv!luafvgeneratefilename
FAILURE_ID_HASH: {528d35d3-ff80-5f65-e340-8b82fd9b5a30}
Followup: MachineOwner
---------
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff80540db0088, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000b7, value 0 = read operation, 1 = write operation
Arg4: fffff80540db0088, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 2
BUGCHECK_P1: fffff80540db0088
BUGCHECK_P2: ff
BUGCHECK_P3: b7
BUGCHECK_P4: fffff80540db0088
CURRENT_IRQL: 0
FAULTING_IP:
+0
fffff805`40db0088 ?? ???
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CPU_COUNT: c
CPU_MHZ: e10
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 02-10-2020 20:46:29.0383
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: fffff6889eaa7610 -- (.trap 0xfffff6889eaa7610)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80540db0088 rbx=0000000000000000 rcx=ffff840a468f9188
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80540db0088 rsp=fffff6889eaa77a8 rbp=ffff840a468de010
r8=0000000000000001 r9=ffff840a468f90d0 r10=0000fffff80540db
r11=ffffd37d42600000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na pe nc
fffff805`40db0088 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80563bd32e9 to fffff80563bc14e0
STACK_TEXT:
fffff688`9eaa74c8 fffff805`63bd32e9 : 00000000`0000000a fffff805`40db0088 00000000`000000ff 00000000`000000b7 : nt!KeBugCheckEx
fffff688`9eaa74d0 fffff805`63bcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff688`9eaa7610 fffff805`40db0088 : fffff805`6750a863 ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 : nt!KiPageFault+0x46b
fffff688`9eaa77a8 fffff805`6750a863 : ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 000032f9`05d26bb3 : 0xfffff805`40db0088
fffff688`9eaa77b0 fffff805`63a21e7c : 00000000`00000035 00000000`00000000 ffff840a`468de010 00000000`00000035 : amdppm!AcpiCStateIdleExecute+0x23
fffff688`9eaa77e0 fffff805`63a215ce : 00000000`00000003 00000000`00000002 ffff840a`468de100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
fffff688`9eaa7b00 fffff805`63bc4fe8 : ffffffff`00000000 ffffe381`907c5180 ffff840a`4be61080 00000000`00000d14 : nt!PoIdle+0x36e
fffff688`9eaa7c60 00000000`00000000 : fffff688`9eaa8000 fffff688`9eaa2000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: 202d15306e0cc33d1baba638b271a0a711a33f51
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5353dcac572e4947ce17e9703e4373879184aa42
THREAD_SHA1_HASH_MOD: 6f8028aef8dcafa1703c129d6f17905076f3b53a
FOLLOWUP_IP:
amdppm!AcpiCStateIdleExecute+23
fffff805`6750a863 90 nop
FAULT_INSTR_CODE: 48c03390
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: amdppm!AcpiCStateIdleExecute+23
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdppm
IMAGE_NAME: amdppm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.387
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 23
FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute
BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute
PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute
TARGET_TIME: 2020-02-05T02:12:26.000Z
OSBUILD: 18362
OSSERVICEPACK: 592
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1972-08-22 03:24:00
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 9a34
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_amdppm!acpicstateidleexecute
FAILURE_ID_HASH: {ecc2fd4d-3006-9cb6-c7fc-79e201867827}
Followup: MachineOwner
---------
Sürücüleri elle mi? Kurdunuz programla mı?
Anakart ve ekran kartı sürücülerini elle, Realtek vb. Live Update uygulaması ile.
Memtest86 yerine Windows'un bellek tanılama aracı olur mu?
- Ryzen Master, MSI yazılımlarını kaldır.
- Virüs taraması yap.
- Sanallaştırma açık ise kapat.
- DDU ile ekran kartı sürücüsünü kaldır tekrar yükle.
- Memtest86 testi yap.
Official Site | Malwarebytes: Antivirus, Anti-Malware & Privacy
Malwarebytes offers advanced antivirus, anti-malware, privacy and scam protection for all your devices. Protect your digital life today.www.malwarebytes.com Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net Kod:KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192) A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or above. Arguments: Arg1: ffffc8012ed9c080, The address of the thread. Arg2: fffff8074de65bb0, The lock address. Arg3: 0000000000000000, The IRQL at which the lock was acquired. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: ffffc8012ed9c080 BUGCHECK_P2: fffff8074de65bb0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 CPU_COUNT: c CPU_MHZ: e10 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x192 PROCESS_NAME: LEDKeeper.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-10-2020 20:46:39.0416 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8074da39e37 to fffff8074dbc14e0 STACK_TEXT: ffffd981`3022f738 fffff807`4da39e37 : 00000000`00000192 ffffc801`2ed9c080 fffff807`4de65bb0 00000000`00000000 : nt!KeBugCheckEx ffffd981`3022f740 fffff807`4dfee780 : ffffd981`3022f930 fffff807`00000000 00000000`00001058 fffff807`4de65bc0 : nt!ExAcquirePushLockSharedEx+0x147 ffffd981`3022f780 fffff807`4dff65bc : 00000000`00000007 ffffd981`3022f930 00000000`00000000 ffffd981`3022fb01 : nt!CmpCallCallBacksEx+0xe0 ffffd981`3022f890 fffff807`4dbd2d18 : ffffc801`2ed9c080 00000000`08a3e1d8 ffffd981`3022faa8 00000000`00000000 : nt!NtQueryKey+0x3bc ffffd981`3022fa90 00007ffb`b33bc384 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`08a3e3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b33bc384 THREAD_SHA1_HASH_MOD_FUNC: 5e69771f2fb64443fcd9f414d5ef970e5deb8ec6 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4e672a2b177d1ada6ed4e5bbea4c534759a91d6e THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84 FOLLOWUP_IP: nt!ExAcquirePushLockSharedEx+147 fffff807`4da39e37 cc int 3 FAULT_INSTR_CODE: 8b8b48cc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!ExAcquirePushLockSharedEx+147 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3 IMAGE_VERSION: 10.0.18362.628 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 147 FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockSharedEx BUCKET_ID: 0x192_nt!ExAcquirePushLockSharedEx PRIMARY_PROBLEM_CLASS: 0x192_nt!ExAcquirePushLockSharedEx TARGET_TIME: 2020-02-10T16:46:09.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 26f8 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x192_nt!exacquirepushlocksharedex FAILURE_ID_HASH: {292e4563-5d10-0ceb-86fc-152da5e999ce} Followup: MachineOwner --------- APC_INDEX_MISMATCH (1) This is a kernel internal error. The most common reason to see this bugcheck is when a filesystem or a driver has a mismatched number of calls to disable and re-enable APCs. The key data item is the Thread->CombinedApcDisable field. This consists of two separate 16-bit fields, the SpecialApcDisable and the KernelApcDisable. A negative value of either indicates that a driver has disabled special or normal APCs (respectively) without re-enabling them; a positive value indicates that a driver has enabled special or normal APCs (respectively) too many times. Arguments: Arg1: fffff8015c8d39f0, Address of system call function or worker routine Arg2: 0000000000000000, Thread->ApcStateIndex Arg3: 00000000ffff0000, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable Arg4: 0000000000000001, Call type (0 - system call, 1 - worker routine) Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: fffff8015c8d39f0 BUGCHECK_P2: 0 BUGCHECK_P3: ffff0000 BUGCHECK_P4: 1 FAULTING_IP: nt!ExpWnfWorkItemRoutine+0 fffff801`5c8d39f0 4883ec28 sub rsp,28h CPU_COUNT: c CPU_MHZ: e10 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x1 PROCESS_NAME: System CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-10-2020 20:46:36.0432 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff8015c42b5ad to fffff8015c3c14e0 STACK_TEXT: ffffd18f`67d72b68 fffff801`5c42b5ad : 00000000`00000001 fffff801`5c8d39f0 00000000`00000000 00000000`ffff0000 : nt!KeBugCheckEx ffffd18f`67d72b70 fffff801`5c32a7a5 : ffffe60e`1eda0040 00000000`00000080 ffffe60e`0d870280 00000000`00000000 : nt!ExpWorkerThread+0x16e61d ffffd18f`67d72c10 fffff801`5c3c8b2a : ffffd601`b43c1180 ffffe60e`1eda0040 fffff801`5c32a750 00000000`00000246 : nt!PspSystemThreadStartup+0x55 ffffd18f`67d72c60 00000000`00000000 : ffffd18f`67d73000 ffffd18f`67d6d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a THREAD_SHA1_HASH_MOD_FUNC: abb52af8f664ebdb0a7322917295d92230a3de05 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e582783d64de53ea39b28692770c41b4dc51541f THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791 FOLLOWUP_IP: nt!ExpWnfWorkItemRoutine+0 fffff801`5c8d39f0 4883ec28 sub rsp,28h FAULT_INSTR_CODE: 28ec8348 SYMBOL_NAME: nt!ExpWnfWorkItemRoutine+0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 29371fe3 IMAGE_VERSION: 10.0.18362.628 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 0 FAILURE_BUCKET_ID: 0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine BUCKET_ID: 0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine PRIMARY_PROBLEM_CLASS: 0x1_SysCallNum_0_nt!ExpWnfWorkItemRoutine TARGET_TIME: 2020-02-09T19:37:06.000Z OSBUILD: 18362 OSSERVICEPACK: 628 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1991-11-30 08:21:39 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 2920 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1_syscallnum_0_nt!expwnfworkitemroutine FAILURE_ID_HASH: {10e36050-f896-7f32-c18d-23b6c4b2f487} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80430719a81, Address of the instruction which caused the bugcheck Arg3: ffffa28ecf44b010, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for WdFilter.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80430719a81 BUGCHECK_P3: ffffa28ecf44b010 BUGCHECK_P4: 0 EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text> FAULTING_IP: Ntfs!NtfsCleanupIrpContext+221 fffff804`30719a81 488b10 mov rdx,qword ptr [rax] CONTEXT: ffffa28ecf44b010 -- (.cxr 0xffffa28ecf44b010) rax=00010000000015fa rbx=ffffa28ecf44bd20 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=ffffa28ecf44bd58 rip=fffff80430719a81 rsp=ffffa28ecf44ba00 rbp=0000000000000000 r8=00000000ffffffff r9=7fffa50cbfafa408 r10=7ffffffffffffffc r11=ffffa28ecf44b9f8 r12=ffffcc0cf8934528 r13=0000000000000000 r14=ffffcc0cf89341b0 r15=ffffa28ecf44bdc0 iopl=0 nv up ei pl nz na po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050207 Ntfs!NtfsCleanupIrpContext+0x221: fffff804`30719a81 488b10 mov rdx,qword ptr [rax] ds:002b:00010000`000015fa=???????????????? Resetting default scope BUGCHECK_STR: 0x3B_c0000005 CPU_COUNT: c CPU_MHZ: e10 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: MsMpEng.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-10-2020 20:46:33.0150 ANALYSIS_VERSION: 10.0.18362.1 x86fre LAST_CONTROL_TRANSFER: from fffff804307196cf to fffff80430719a81 STACK_TEXT: ffffa28e`cf44ba00 fffff804`307196cf : ffffa50c`bf562900 fffff804`00000001 ffffa28e`cf44bd20 00000000`00000000 : Ntfs!NtfsCleanupIrpContext+0x221 ffffa28e`cf44ba60 fffff804`30819a00 : 00000000`00000000 ffffcc0d`06ecfde0 00000000`00000000 ffffcc0d`06ecfde0 : Ntfs!NtfsExtendedCompleteRequestInternal+0x13f ffffa28e`cf44bad0 fffff804`308184a1 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`000000ba 00000000`00000002 : Ntfs!NtfsCommonQueryInformation+0xf80 ffffa28e`cf44bbd0 fffff804`30818a60 : ffffa28e`cf44bd20 ffffa50c`c7d739c0 ffffa50c`c7d739c0 ffffa50c`bf8f9718 : Ntfs!NtfsFsdDispatchSwitch+0x141 ffffa28e`cf44bd00 fffff804`2ba31f79 : 00000000`00000000 fffff804`2bb00740 00000000`0000000b ffff0da0`b642b304 : Ntfs!NtfsFsdDispatchWait+0x40 ffffa28e`cf44bfa0 fffff804`2fd1e99c : ffffa50c`c79b52f0 00000000`00000000 ffffa50c`cdaa0c10 ffffa50c`c9f5331c : nt!IofCallDriver+0x59 ffffa28e`cf44bfe0 fffff804`2fd1e6b9 : 00000000`00000000 ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpGetFileName+0x19c ffffa28e`cf44c080 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`c79b52f0 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x39 ffffa28e`cf44c0e0 fffff804`2fd1df71 : ffffa50c`c79b52f0 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30 ffffa28e`cf44c130 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1 ffffa28e`cf44c190 fffff804`2fce8325 : 00000000`00008000 ffffcc0c`ffff7fff ffffa50c`c32fc660 00000000`00000000 : FLTMGR!FltpGetFileNameInformation+0x4bf ffffa28e`cf44c230 fffff804`3ea2e487 : ffffa28e`cf44c448 ffffa50c`cc079700 00000000`00000004 fffff804`2baa09a6 : FLTMGR!FltGetFileNameInformation+0x195 ffffa28e`cf44c2b0 fffff804`2fd1e6fe : 00000000`00003000 ffffa50c`c759f260 ffffa50c`cc079700 fffff804`2baa077e : luafv!LuafvGenerateFileName+0x57 ffffa28e`cf44c2e0 fffff804`2fd1e430 : ffffcc0c`f8934100 ffffa50c`cc079700 ffffa50c`c32fc6c8 fffff804`2ba6b465 : FLTMGR!FltpCallOpenedFileNameHandler+0x7e ffffa28e`cf44c340 fffff804`2fd1df71 : ffffa50c`cc079700 00000000`00000000 00000000`00000000 ffffa50c`c32fc6c8 : FLTMGR!FltpGetNormalizedFileNameWorker+0x30 ffffa28e`cf44c390 fffff804`2fce74cf : ffffa28e`cf44d000 ffffa28e`cf447000 ffffa50c`cdaa0c10 ffffa50c`c32fc6c8 : FLTMGR!FltpCreateFileNameInformation+0xf1 ffffa28e`cf44c3f0 fffff804`2fce8325 : 00000000`00008000 ffffa50c`ffff7fff ffffa50c`c32fc660 ffffa50c`c60c2010 : FLTMGR!FltpGetFileNameInformation+0x4bf ffffa28e`cf44c490 fffff804`306da09a : ffffa28e`cf44c618 ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 : FLTMGR!FltGetFileNameInformation+0x195 ffffa28e`cf44c510 ffffa28e`cf44c618 : ffffa50c`c65680f8 ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 : WdFilter+0x3a09a ffffa28e`cf44c518 ffffa50c`c65680f8 : ffffa50c`c32fc660 ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 : 0xffffa28e`cf44c618 ffffa28e`cf44c520 ffffa50c`c32fc660 : ffffa50c`c65680f8 ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 : 0xffffa50c`c65680f8 ffffa28e`cf44c528 ffffa50c`c65680f8 : ffffa28e`cf44c600 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a : 0xffffa50c`c32fc660 ffffa28e`cf44c530 ffffa28e`cf44c600 : 00000000`00000000 ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 : 0xffffa50c`c65680f8 ffffa28e`cf44c538 00000000`00000000 : ffffa28e`cf44c688 fffff804`306da03a ffffa50c`c65680f8 00000000`00000000 : 0xffffa28e`cf44c600 THREAD_SHA1_HASH_MOD_FUNC: cfa66520a66b412456d5c69544130de72c5f7111 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0217f078f2a472046edead16c595337a005d9424 THREAD_SHA1_HASH_MOD: a6a06051b0876c1d7b117f1d0b30f134853e0c32 FOLLOWUP_IP: luafv!LuafvGenerateFileName+57 fffff804`3ea2e487 8bd8 mov ebx,eax FAULT_INSTR_CODE: c085d88b SYMBOL_STACK_INDEX: c SYMBOL_NAME: luafv!LuafvGenerateFileName+57 FOLLOWUP_NAME: MachineOwner MODULE_NAME: luafv IMAGE_NAME: luafv.sys DEBUG_FLR_IMAGE_TIMESTAMP: 8a8e82a IMAGE_VERSION: 10.0.18362.53 STACK_COMMAND: .cxr 0xffffa28ecf44b010 ; kb BUCKET_ID_FUNC_OFFSET: 57 FAILURE_BUCKET_ID: 0x3B_c0000005_luafv!LuafvGenerateFileName BUCKET_ID: 0x3B_c0000005_luafv!LuafvGenerateFileName PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_luafv!LuafvGenerateFileName TARGET_TIME: 2020-02-06T14:02:30.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 99f5 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_c0000005_luafv!luafvgeneratefilename FAILURE_ID_HASH: {528d35d3-ff80-5f65-e340-8b82fd9b5a30} Followup: MachineOwner --------- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: fffff80540db0088, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 00000000000000b7, value 0 = read operation, 1 = write operation Arg4: fffff80540db0088, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202 DUMP_TYPE: 2 BUGCHECK_P1: fffff80540db0088 BUGCHECK_P2: ff BUGCHECK_P3: b7 BUGCHECK_P4: fffff80540db0088 CURRENT_IRQL: 0 FAULTING_IP: +0 fffff805`40db0088 ?? ??? ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target. BUGCHECK_STR: DISABLED_INTERRUPT_FAULT CPU_COUNT: c CPU_MHZ: e10 CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 71 CPU_STEPPING: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: System ANALYSIS_SESSION_HOST: DESKTOP-18V31A3 ANALYSIS_SESSION_TIME: 02-10-2020 20:46:29.0383 ANALYSIS_VERSION: 10.0.18362.1 x86fre TRAP_FRAME: fffff6889eaa7610 -- (.trap 0xfffff6889eaa7610) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff80540db0088 rbx=0000000000000000 rcx=ffff840a468f9188 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80540db0088 rsp=fffff6889eaa77a8 rbp=ffff840a468de010 r8=0000000000000001 r9=ffff840a468f90d0 r10=0000fffff80540db r11=ffffd37d42600000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz na pe nc fffff805`40db0088 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80563bd32e9 to fffff80563bc14e0 STACK_TEXT: fffff688`9eaa74c8 fffff805`63bd32e9 : 00000000`0000000a fffff805`40db0088 00000000`000000ff 00000000`000000b7 : nt!KeBugCheckEx fffff688`9eaa74d0 fffff805`63bcf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff688`9eaa7610 fffff805`40db0088 : fffff805`6750a863 ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 : nt!KiPageFault+0x46b fffff688`9eaa77a8 fffff805`6750a863 : ffff840a`424cfec0 00000000`00989680 ffffe381`907c5100 000032f9`05d26bb3 : 0xfffff805`40db0088 fffff688`9eaa77b0 fffff805`63a21e7c : 00000000`00000035 00000000`00000000 ffff840a`468de010 00000000`00000035 : amdppm!AcpiCStateIdleExecute+0x23 fffff688`9eaa77e0 fffff805`63a215ce : 00000000`00000003 00000000`00000002 ffff840a`468de100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c fffff688`9eaa7b00 fffff805`63bc4fe8 : ffffffff`00000000 ffffe381`907c5180 ffff840a`4be61080 00000000`00000d14 : nt!PoIdle+0x36e fffff688`9eaa7c60 00000000`00000000 : fffff688`9eaa8000 fffff688`9eaa2000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48 THREAD_SHA1_HASH_MOD_FUNC: 202d15306e0cc33d1baba638b271a0a711a33f51 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5353dcac572e4947ce17e9703e4373879184aa42 THREAD_SHA1_HASH_MOD: 6f8028aef8dcafa1703c129d6f17905076f3b53a FOLLOWUP_IP: amdppm!AcpiCStateIdleExecute+23 fffff805`6750a863 90 nop FAULT_INSTR_CODE: 48c03390 SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: amdppm!AcpiCStateIdleExecute+23 FOLLOWUP_NAME: MachineOwner MODULE_NAME: amdppm IMAGE_NAME: amdppm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.18362.387 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 23 FAILURE_BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute BUCKET_ID: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute PRIMARY_PROBLEM_CLASS: DISABLED_INTERRUPT_FAULT_CODE_AV_amdppm!AcpiCStateIdleExecute TARGET_TIME: 2020-02-05T02:12:26.000Z OSBUILD: 18362 OSSERVICEPACK: 592 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1972-08-22 03:24:00 BUILDDATESTAMP_STR: 190318-1202 BUILDLAB_STR: 19h1_release BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202 ANALYSIS_SESSION_ELAPSED_TIME: 9a34 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:disabled_interrupt_fault_code_av_amdppm!acpicstateidleexecute FAILURE_ID_HASH: {ecc2fd4d-3006-9cb6-c7fc-79e201867827} Followup: MachineOwner ---------
Windows'un aracı pek iyi sayılmaz.Memtest86 yerine Windows'un bellek tanılama aracı olur mu?
USB yok şu an elimde ne yazık ki, anca yarın sonucu atabilirim o zaman.Olmaz.
Her mavi ekrandan sonra kendini güvenli mod da başlatıyor, o durumda mavi ekran verdiğini hatırlamıyorum.Güvenli mod da açıp mavi ekran verip vermediğine bakın vermiyorsa sürücü sorunudur veriyorsa ya Windows ya da donanımdır.