IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff820711760af9, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8072a021a69, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2701
BIOS_DATE: 03/24/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 LE R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffff820711760af9
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8072a021a69
READ_ADDRESS: fffff8072a5733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffff820711760af9
CURRENT_IRQL: 0
FAULTING_IP:
nt!PpmIdleExecuteTransition+2f9
fffff807`2a021a69 4138b221040000 cmp byte ptr [r10+421h],sil
CPU_COUNT: 8
CPU_MHZ: cef
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-26-2019 17:32:37.0919
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffc6073cc37640 -- (.trap 0xffffc6073cc37640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8072a021a69 rsp=ffffc6073cc377d8 rbp=ffff810f117dc010
r8=0000000000000000 r9=0000000000000000 r10=ffff8207117606d8
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x2f9:
fffff807`2a021a69 4138b221040000 cmp byte ptr [r10+421h],sil ds:ffff8207`11760af9=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8072a1d32e9 to fffff8072a1c14e0
STACK_TEXT:
ffffc607`3cc374f8 fffff807`2a1d32e9 : 00000000`0000000a ffff8207`11760af9 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffc607`3cc37500 fffff807`2a1cf62b : 00000003`6ee198a6 fffff807`29fc7c40 fffff7f0`4000ed00 fffff807`29fad411 : nt!KiBugCheckDispatch+0x69
ffffc607`3cc37640 fffff807`2a021a69 : fffff807`2a0221c6 0000047a`a064234b 0000047a`a064234b ffff810f`117dc010 : nt!KiPageFault+0x46b
ffffc607`3cc377d8 fffff807`2a0215ce : 00000000`10568b41 00000000`00000003 00000000`00000002 ffff810f`117dc100 : nt!PpmIdleExecuteTransition+0x2f9
ffffc607`3cc37af8 00000000`00000000 : fffff807`2a1c4fe8 ffffffff`00000000 ffff9980`80a80180 ffff810f`15188080 : nt!PoIdle+0x36e
THREAD_SHA1_HASH_MOD_FUNC: f295db201389e48d17c5e15b8497ce252d66f633
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: d5383938033a4adec7df51bbd76bd543a49dab3a
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+2f9
fffff807`2a021a69 4138b221040000 cmp byte ptr [r10+421h],sil
FAULT_INSTR_CODE: 21b23841
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmIdleExecuteTransition+2f9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2f9
FAILURE_BUCKET_ID: AV_nt!PpmIdleExecuteTransition
BUCKET_ID: AV_nt!PpmIdleExecuteTransition
PRIMARY_PROBLEM_CLASS: AV_nt!PpmIdleExecuteTransition
TARGET_TIME: 2019-12-25T16:54:27.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 55e3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!ppmidleexecutetransition
FAILURE_ID_HASH: {0ced0187-972d-f83e-de87-663d75806c32}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8e08bacca5b4, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: ffff81df94dd89f5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
DUMP_TYPE: 2
BUGCHECK_P1: ffff8e08bacca5b4
BUGCHECK_P2: 2
BUGCHECK_P3: ffff81df94dd89f5
BUGCHECK_P4: 2
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
ffff8e08bacca5b4
FAULTING_IP:
+0
ffff81df`94dd89f5 ?? ???
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: cef
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CORRUPT_MODULELIST_AV
BUGCHECK_STR: AV
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-26-2019 17:32:42.0373
ANALYSIS_VERSION: 10.0.18362.1 x86fre
LAST_CONTROL_TRANSFER: from fffff800247e35d6 to fffff800247c14e0
STACK_TEXT:
ffff8e08`bacb1058 fffff800`247e35d6 : 00000000`00000050 ffff8e08`bacca5b4 00000000`00000002 ffff8e08`bacb1300 : 0xfffff800`247c14e0
ffff8e08`bacb1060 00000000`00000050 : ffff8e08`bacca5b4 00000000`00000002 ffff8e08`bacb1300 00000000`00000002 : 0xfffff800`247e35d6
ffff8e08`bacb1068 ffff8e08`bacca5b4 : 00000000`00000002 ffff8e08`bacb1300 00000000`00000002 ffff81df`94dd48bf : 0x50
ffff8e08`bacb1070 00000000`00000002 : ffff8e08`bacb1300 00000000`00000002 ffff81df`94dd48bf 00000000`00000000 : 0xffff8e08`bacca5b4
ffff8e08`bacb1078 ffff8e08`bacb1300 : 00000000`00000002 ffff81df`94dd48bf 00000000`00000000 ffff81df`94fbb0d0 : 0x2
ffff8e08`bacb1080 00000000`00000002 : ffff81df`94dd48bf 00000000`00000000 ffff81df`94fbb0d0 00000003`00000000 : 0xffff8e08`bacb1300
ffff8e08`bacb1088 ffff81df`94dd48bf : 00000000`00000000 ffff81df`94fbb0d0 00000003`00000000 00000000`00000000 : 0x2
ffff8e08`bacb1090 00000000`00000000 : ffff81df`94fbb0d0 00000003`00000000 00000000`00000000 00000000`00000000 : 0xffff81df`94dd48bf
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID: CORRUPT_MODULELIST_AV
PRIMARY_PROBLEM_CLASS: CORRUPT_MODULELIST_AV
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
TARGET_TIME: 2019-12-26T08:16:13.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
ANALYSIS_SESSION_ELAPSED_TIME: f
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:corrupt_modulelist_av
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8068e370a5e, The address that the exception occurred at
Arg3: ffff998b723d86c8, Exception Record Address
Arg4: ffff998b723d7f10, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Write
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2701
BIOS_DATE: 03/24/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 LE R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8068e370a5e
BUGCHECK_P3: ffff998b723d86c8
BUGCHECK_P4: ffff998b723d7f10
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
atikmdag+220a5e
fffff806`8e370a5e d2488b ror byte ptr [rax-75h],cl
EXCEPTION_RECORD: ffff998b723d86c8 -- (.exr 0xffff998b723d86c8)
ExceptionAddress: fffff8068e370a5e (atikmdag+0x0000000000220a5e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 00000000000004bf
Attempt to write to address 00000000000004bf
CONTEXT: ffff998b723d7f10 -- (.cxr 0xffff998b723d7f10)
rax=0000000000000534 rbx=ffff9e8f2d40c000 rcx=ffff9e8f2d406000
rdx=fffff8068e370bf0 rsi=ffff998b723d8a10 rdi=0000000000000030
rip=fffff8068e370a5e rsp=ffff998b723d8900 rbp=ffff9e8f2d409764
r8=0000000000000534 r9=0000000000000000 r10=fffff8068e6ea7a0
r11=ffff998b723d8958 r12=ffff9e8f2d2c6000 r13=0000000000000000
r14=ffff9e8f2d406000 r15=ffff9e8f2d409764
iopl=0 ov up ei ng nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010a86
atikmdag+0x220a5e:
fffff806`8e370a5e d2488b ror byte ptr [rax-75h],cl ds:002b:00000000`000004bf=??
Resetting default scope
CPU_COUNT: 8
CPU_MHZ: cef
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
atikmdag+220a5e
fffff806`8e370a5e d2488b ror byte ptr [rax-75h],cl
BUGCHECK_STR: AV
WRITE_ADDRESS: fffff8067f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
00000000000004bf
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000000000004bf
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-26-2019 17:32:51.0847
ANALYSIS_VERSION: 10.0.18362.1 x86fre
MISALIGNED_IP:
atikmdag+220a5e
fffff806`8e370a5e d2488b ror byte ptr [rax-75h],cl
LAST_CONTROL_TRANSFER: from ffffffff0fffffff to fffff8068e370a5e
STACK_TEXT:
ffff998b`723d8900 ffffffff`0fffffff : 00000000`00000020 00000000`00000000 00000000`00000000 00000000`00000000 : atikmdag+0x220a5e
ffff998b`723d8908 00000000`00000020 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000534 : 0xffffffff`0fffffff
ffff998b`723d8910 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000534 00000000`00000000 : 0x20
THREAD_SHA1_HASH_MOD_FUNC: b707fffe94678f64fa20640ed32c4c0e284df15c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1cc2ae91b1e931294b0703a28d60523a5a679dd2
THREAD_SHA1_HASH_MOD: b707fffe94678f64fa20640ed32c4c0e284df15c
FAULT_INSTR_CODE: c88b48d2
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+220a5e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xffff998b723d7f10 ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_atikmdag.sys
BUCKET_ID: IP_MISALIGNED_atikmdag.sys
PRIMARY_PROBLEM_CLASS: IP_MISALIGNED_atikmdag.sys
TARGET_TIME: 2019-12-26T08:28:17.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 1a756
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:ip_misaligned_atikmdag.sys
FAILURE_ID_HASH: {3ce26958-be6d-9cae-16e3-b57ff51098bd}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff80224e22136, The address that the exception occurred at
Arg3: ffffc9015e091240, Parameter 0 of the exception
Arg4: 0000fffff80234d4, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2701
BIOS_DATE: 03/24/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 LE R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff80224e22136
BUGCHECK_P3: ffffc9015e091240
BUGCHECK_P4: fffff80234d4
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>
FAULTING_IP:
nt!PpmIdleExecuteTransition+9c6
fffff802`24e22136 4c8b7a08 mov r15,qword ptr [rdx+8]
EXCEPTION_PARAMETER1: ffffc9015e091240
EXCEPTION_PARAMETER2: 0000fffff80234d4
BUGCHECK_STR: 0x1E_c000001d
CPU_COUNT: 8
CPU_MHZ: cef
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-26-2019 17:32:55.0486
ANALYSIS_VERSION: 10.0.18362.1 x86fre
EXCEPTION_RECORD: ffffb684beab8001 -- (.exr 0xffffb684beab8001)
ExceptionAddress: c000000000000000
ExceptionCode: 00010000
ExceptionFlags: 00000000
NumberParameters: 36014963
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000000
Parameter[4]: fd00000000000000
Parameter[5]: b0ffffffffffffff
Parameter[6]: d1fffff80224fc34
Parameter[7]: 0201000d0d000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000001000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: e000000000000000
Parameter[13]: 00ffff9b0482e375
Parameter[14]: 0000000000000000
TRAP_FRAME: ffff9b0482e37490 -- (.trap 0xffff9b0482e37490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff80234d4a890 rbp=ffff9b0482e37660
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
0000:0000 ?? ???
Resetting default scope
BAD_STACK_POINTER: fffff80234d4a890
IP_IN_FREE_BLOCK: 0
LAST_CONTROL_TRANSFER: from fffff802250a653e to fffff80224fc14e0
FAILED_INSTRUCTION_ADDRESS:
nt!PpmIdleExecuteTransition+9c6
fffff802`24e22136 4c8b7a08 mov r15,qword ptr [rdx+8]
STACK_TEXT:
ffff9b04`82e365f8 fffff802`250a653e : 00000000`0000001e ffffffff`c000001d fffff802`24e22136 ffffc901`5e091240 : nt!KeBugCheckEx
ffff9b04`82e36600 fffff802`24fca312 : fffff802`25311000 fffff802`24e00000 0005e548`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
ffff9b04`82e36640 fffff802`24ec2fa5 : 00000000`00000000 00000000`00000000 ffff9b04`82e36bb0 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
ffff9b04`82e36670 fffff802`24ec753e : ffff9b04`82e375a8 ffff9b04`82e372f0 ffff9b04`82e375a8 ffffc901`5e080180 : nt!RtlDispatchException+0x4a5
ffff9b04`82e36dc0 fffff802`24fd341d : ffffb684`beab8001 ffffc901`5e080180 ffff9b04`82e37490 00000000`00000000 : nt!KiDispatchException+0x16e
ffff9b04`82e37470 fffff802`24fcd9ab : 00000000`00000000 00000000`00000000 00000002`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffff9b04`82e37650 fffff802`24e22136 : 00000151`57850d16 ffffb684`c33e7010 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffff9b04`82e377e0 fffff802`24e215ce : c0011020`06300046 00400000`00000000 00000000`00000001 01d5bbc7`80321d37 : nt!PpmIdleExecuteTransition+0x9c6
ffff9b04`82e37b00 fffff802`24fc4fe8 : ffffffff`00000000 ffffc901`5e080180 ffffb684`c3ef5680 00000000`000009ba : nt!PoIdle+0x36e
ffff9b04`82e37c60 00000000`00000000 : ffff9b04`82e38000 ffff9b04`82e32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48
THREAD_SHA1_HASH_MOD_FUNC: 21d9502f1f72bcc22e5d110e27e803eefd1e97d7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 484dba9ec5430becf9eb8a1ef2d46640d0951e48
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+9c6
fffff802`24e22136 4c8b7a08 mov r15,qword ptr [rdx+8]
FAULT_INSTR_CODE: 87a8b4c
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!PpmIdleExecuteTransition+9c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9c6
FAILURE_BUCKET_ID: 0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nt!PpmIdleExecuteTransition
BUCKET_ID: 0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nt!PpmIdleExecuteTransition
PRIMARY_PROBLEM_CLASS: 0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nt!PpmIdleExecuteTransition
TARGET_TIME: 2019-12-26T08:36:00.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 82bb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1e_c000001d_stackptr_error_bad_ip_nt!ppmidleexecutetransition
FAILURE_ID_HASH: {2e2b10a2-f326-4bd0-98d4-f54400f2973e}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000813b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8071c5172c5, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: To be filled by O.E.M.
SYSTEM_PRODUCT_NAME: To be filled by O.E.M.
SYSTEM_SKU: SKU
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 2701
BIOS_DATE: 03/24/2016
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: M5A97 LE R2.0
BASEBOARD_VERSION: Rev 1.xx
DUMP_TYPE: 2
BUGCHECK_P1: 813b
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8071c5172c5
READ_ADDRESS: fffff8071c9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000813b
CURRENT_IRQL: 2
FAULTING_IP:
nt!PpmParkCalculateCoreParkingMask+9a5
fffff807`1c5172c5 458a843c80000000 mov r8b,byte ptr [r12+rdi+80h]
CPU_COUNT: 8
CPU_MHZ: cef
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 2
CPU_STEPPING: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: MsMpEng.exe
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 12-26-2019 17:32:58.0564
ANALYSIS_VERSION: 10.0.18362.1 x86fre
DPC_STACK_BASE: FFFF8A0A2C83EFB0
TRAP_FRAME: ffff8a0a2c83e8d0 -- (.trap 0xffff8a0a2c83e8d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000100 rbx=0000000000000000 rcx=0000000000000108
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8071c5172c5 rsp=ffff8a0a2c83ea60 rbp=ffff8a0a2c83eb60
r8=ffff8a0a2c83eac0 r9=0000000000000000 r10=0000000000000000
r11=fffff8071c9757c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!PpmParkCalculateCoreParkingMask+0x9a5:
fffff807`1c5172c5 458a843c80000000 mov r8b,byte ptr [r12+rdi+80h] ds:00000000`00000080=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8071c5d32e9 to fffff8071c5c14e0
STACK_TEXT:
ffff8a0a`2c83e788 fffff807`1c5d32e9 : 00000000`0000000a 00000000`0000813b 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8a0a`2c83e790 fffff807`1c5cf62b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8a0a`2c83e8d0 fffff807`1c5172c5 : ffffe481`a95bee5e fffff807`1c426223 ffffe481`a95bedd0 00000000`00000000 : nt!KiPageFault+0x46b
ffff8a0a`2c83ea60 fffff807`1c504b80 : ffff9581`00000000 ffff8a0a`2c83ed00 fffff807`00000008 0000006d`00000000 : nt!PpmParkCalculateCoreParkingMask+0x9a5
ffff8a0a`2c83ebb0 fffff807`1c46ae95 : ffff9581`53e82f80 ffffe481`a77ec000 ffff9581`53e85f90 ffff9581`00000002 : nt!PpmCheckRun+0x40
ffff8a0a`2c83ec40 fffff807`1c46a4ef : 00000000`00000004 00000000`00989680 ffff8a0a`2c83ee80 00000000`0000001d : nt!KiExecuteAllDpcs+0x305
ffff8a0a`2c83ed80 fffff807`1c5c8525 : 41085d89`48004d8d ffff9581`53e80180 00000000`00000000 00000000`00010000 : nt!KiRetireDpcList+0x1ef
ffff8a0a`2c83efb0 fffff807`1c5c8310 : ffff805f`437e7300 00000000`00000000 00000000`0000000f ffff8a0a`2ef8e1e0 : nt!KxRetireDpcList+0x5
ffff8a0a`2ef8e120 fffff807`1c5c79e0 : fffffa00`067aecb0 ffffd484`dbc1e588 00000002`a9630010 ffffd484`dbc1e510 : nt!KiDispatchInterruptContinue
ffff8a0a`2ef8e150 fffff807`1c5d42f9 : fffff807`1c48023e ffffbe86`fce60000 00000000`00010000 00000000`000a0000 : nt!KiDpcInterrupt+0x2f0
ffff8a0a`2ef8e2e8 fffff807`1c48023e : ffffbe86`fce60000 00000000`00010000 00000000`000a0000 fffff807`1c47e10f : nt!memcpy+0xb9
ffff8a0a`2ef8e2f0 fffff807`1ca1efd8 : 00000000`000c0000 00000000`00010000 00000000`00000001 ffff8a0a`2ef8e420 : nt!CcCopyBytesToUserBuffer+0x6e
ffff8a0a`2ef8e370 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcMapAndCopyFromCache+0x128
THREAD_SHA1_HASH_MOD_FUNC: df940d1fc0ac2e2054d6293bea18539c0a349efd
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 0bc434e4e48e7d653f31a61685a056aa37079315
THREAD_SHA1_HASH_MOD: fe34192f63d13620a8987d294372ee74d699cfee
FOLLOWUP_IP:
nt!PpmParkCalculateCoreParkingMask+9a5
fffff807`1c5172c5 458a843c80000000 mov r8b,byte ptr [r12+rdi+80h]
FAULT_INSTR_CODE: 3c848a45
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmParkCalculateCoreParkingMask+9a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 12dcb470
IMAGE_VERSION: 10.0.18362.535
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9a5
FAILURE_BUCKET_ID: AV_nt!PpmParkCalculateCoreParkingMask
BUCKET_ID: AV_nt!PpmParkCalculateCoreParkingMask
PRIMARY_PROBLEM_CLASS: AV_nt!PpmParkCalculateCoreParkingMask
TARGET_TIME: 2019-12-26T10:22:10.000Z
OSBUILD: 18362
OSSERVICEPACK: 535
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1980-01-11 18:53:20
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 6ab1
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!ppmparkcalculatecoreparkingmask
FAILURE_ID_HASH: {93ade473-965d-d37f-6eac-f820ee4a68b6}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.