IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000009076a70c4e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8014d05446e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M GAMING
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M GAMING
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 9076a70c4e
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8014d05446e
READ_ADDRESS: fffff8014d8fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000009076a70c4e
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemoveWsle+19104e
fffff801`4d05446e 8b4218 mov eax,dword ptr [rdx+18h]
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: chrome.exe
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-15-2020 15:20:00.0519
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffd28cefcd7870 -- (.trap 0xffffd28cefcd7870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd28cefcd7a20 rbx=0000000000000000 rcx=ffff950020043870
rdx=0000009076a70c36 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014d05446e rsp=ffffd28cefcd7a00 rbp=0000024a01732000
r8=0000000000000000 r9=0000000000000000 r10=ffff8ac562b157f8
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!MiRemoveWsle+0x19104e:
fffff801`4d05446e 8b4218 mov eax,dword ptr [rdx+18h] ds:00000090`76a70c4e=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8014cfef929 to fffff8014cfdda20
STACK_TEXT:
ffffd28c`efcd7728 fffff801`4cfef929 : 00000000`0000000a 00000090`76a70c4e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd28c`efcd7730 fffff801`4cfebc29 : ffffd385`9f0b7490 fffff801`4cf160ef 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd28c`efcd7870 fffff801`4d05446e : ffffd385`abdc49c0 0000024a`01732000 ffffffff`ffffffff ffff8ac5`48e37828 : nt!KiPageFault+0x469
ffffd28c`efcd7a00 fffff801`4ceb428c : ffffd385`abdc49c0 1a000000`bed19867 00000000`00000007 ffffd28c`efcd7c40 : nt!MiRemoveWsle+0x19104e
ffffd28c`efcd7a90 fffff801`4cebadcf : 87000000`9fc02867 87000000`9fc02867 87000000`9fc02867 ffff8ac5`40928058 : nt!MiTerminateWsle+0x13c
ffffd28c`efcd7b40 fffff801`4d266a7b : 00000000`00000001 00000000`057e6460 0a000001`d7123121 7fffffff`ffffffff : nt!MiDecommitPages+0x64f
ffffd28c`efcd86f0 fffff801`4d265f26 : ffffd28c`efcd8a60 00000000`00000000 ffffffff`ffffffff 00000000`00004000 : nt!MiDecommitRegion+0xbb
ffffd28c`efcd8960 fffff801`4d265c05 : 00000000`00000000 000000a4`54bfa538 ffff7d24`93932b89 00000000`00000004 : nt!MmFreeVirtualMemory+0x2e6
ffffd28c`efcd8aa0 fffff801`4cfef378 : ffffd385`aa357080 000000a4`54bfca38 ffffd28c`efcd8b80 ffffd28c`efcd8ad0 : nt!NtFreeVirtualMemory+0x95
ffffd28c`efcd8b00 00007ffc`4560b154 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a4`54bfb448 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`4560b154
THREAD_SHA1_HASH_MOD_FUNC: e685de6f5f6f31adc2168553e86df1abcbeded24
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: db07fbc4dea7778d2ba6a4e594f7c468a4580592
THREAD_SHA1_HASH_MOD: bc100a5647b828107ac4e18055e00abcbe1ec406
FOLLOWUP_IP:
nt!MiRemoveWsle+19104e
fffff801`4d05446e 8b4218 mov eax,dword ptr [rdx+18h]
FAULT_INSTR_CODE: 8318428b
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRemoveWsle+19104e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 19104e
FAILURE_BUCKET_ID: AV_nt!MiRemoveWsle
BUCKET_ID: AV_nt!MiRemoveWsle
PRIMARY_PROBLEM_CLASS: AV_nt!MiRemoveWsle
TARGET_TIME: 2020-06-14T13:45:08.000Z
OSBUILD: 19041
OSSERVICEPACK: 329
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 193a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!miremovewsle
FAILURE_ID_HASH: {0d092821-1589-e461-e895-d4070ef18c77}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801794c1398, Address of the instruction which caused the bugcheck
Arg3: fffff607b83c58c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for RzCommon.sys
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450M GAMING
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/27/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450M GAMING
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff801794c1398
BUGCHECK_P3: fffff607b83c58c0
BUGCHECK_P4: 0
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
RzCommon+1398
fffff801`794c1398 ff90d0090000 call qword ptr [rax+9D0h]
CONTEXT: fffff607b83c58c0 -- (.cxr 0xfffff607b83c58c0)
rax=0000000000000000 rbx=0000000000000001 rcx=ffff8007852d6ef0
rdx=00007ff87d006348 rsi=ffff800789cd30c0 rdi=ffff8007852d8f10
rip=fffff801794c1398 rsp=fffff607b83c62c0 rbp=00007ff882625598
r8=000000000000007f r9=fffff80169847f80 r10=0000fffff801697b
r11=fffff607b83c62a0 r12=0000000000000021 r13=0000000000000000
r14=ffff8007853b02f0 r15=00007ff8778e4918
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
RzCommon+0x1398:
fffff801`794c1398 ff90d0090000 call qword ptr [rax+9D0h] ds:002b:00000000`000009d0=????????????????
Resetting default scope
BUGCHECK_STR: 0x3B_c0000005
CPU_COUNT: c
CPU_MHZ: d42
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: Razer Synapse Service.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-JC78BRD
ANALYSIS_SESSION_TIME: 06-15-2020 15:16:40.0237
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from ffff80077d9daa00 to fffff801794c1398
STACK_TEXT:
fffff607`b83c62c0 ffff8007`7d9daa00 : 00000000`00000001 00007ff8`82625598 ffff8007`82ff94d0 ffff8007`852d8f10 : RzCommon+0x1398
fffff607`b83c62c8 00000000`00000001 : 00007ff8`82625598 ffff8007`82ff94d0 ffff8007`852d8f10 fffff801`794c149a : 0xffff8007`7d9daa00
fffff607`b83c62d0 00007ff8`82625598 : ffff8007`82ff94d0 ffff8007`852d8f10 fffff801`794c149a 00000000`00000021 : 0x1
fffff607`b83c62d8 ffff8007`82ff94d0 : ffff8007`852d8f10 fffff801`794c149a 00000000`00000021 fffff607`b83c63e1 : 0x00007ff8`82625598
fffff607`b83c62e0 ffff8007`852d8f10 : fffff801`794c149a 00000000`00000021 fffff607`b83c63e1 ffff8007`89cd30c0 : 0xffff8007`82ff94d0
fffff607`b83c62e8 fffff801`794c149a : 00000000`00000021 fffff607`b83c63e1 ffff8007`89cd30c0 ffff8007`89cd30c0 : 0xffff8007`852d8f10
fffff607`b83c62f0 00000000`00000021 : fffff607`b83c63e1 ffff8007`89cd30c0 ffff8007`89cd30c0 00000000`00000021 : RzCommon+0x149a
fffff607`b83c62f8 fffff607`b83c63e1 : ffff8007`89cd30c0 ffff8007`89cd30c0 00000000`00000021 fffff607`b83c6388 : 0x21
fffff607`b83c6300 ffff8007`89cd30c0 : ffff8007`89cd30c0 00000000`00000021 fffff607`b83c6388 fffff607`b83c6380 : 0xfffff607`b83c63e1
fffff607`b83c6308 ffff8007`89cd30c0 : 00000000`00000021 fffff607`b83c6388 fffff607`b83c6380 00000000`00000000 : 0xffff8007`89cd30c0
fffff607`b83c6310 00000000`00000021 : fffff607`b83c6388 fffff607`b83c6380 00000000`00000000 00000000`00000038 : 0xffff8007`89cd30c0
fffff607`b83c6318 fffff607`b83c6388 : fffff607`b83c6380 00000000`00000000 00000000`00000038 00000000`00000000 : 0x21
fffff607`b83c6320 fffff607`b83c6380 : 00000000`00000000 00000000`00000038 00000000`00000000 00000000`00000000 : 0xfffff607`b83c6388
fffff607`b83c6328 00000000`00000000 : 00000000`00000038 00000000`00000000 00000000`00000000 00000001`00000001 : 0xfffff607`b83c6380
THREAD_SHA1_HASH_MOD_FUNC: 4286490a8867b16dcb691c42fdaed8f662e19f40
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: be656e1d8dd1cdde04be0d3dca3f8020309e0521
THREAD_SHA1_HASH_MOD: 4286490a8867b16dcb691c42fdaed8f662e19f40
FOLLOWUP_IP:
RzCommon+1398
fffff801`794c1398 ff90d0090000 call qword ptr [rax+9D0h]
FAULT_INSTR_CODE: 9d090ff
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: RzCommon+1398
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: RzCommon
IMAGE_NAME: RzCommon.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5e4b536d
STACK_COMMAND: .cxr 0xfffff607b83c58c0 ; kb
BUCKET_ID_FUNC_OFFSET: 1398
FAILURE_BUCKET_ID: 0x3B_c0000005_RzCommon!unknown_function
BUCKET_ID: 0x3B_c0000005_RzCommon!unknown_function
PRIMARY_PROBLEM_CLASS: 0x3B_c0000005_RzCommon!unknown_function
TARGET_TIME: 2020-06-15T00:47:48.000Z
OSBUILD: 19041
OSSERVICEPACK: 329
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 35ac
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_c0000005_rzcommon!unknown_function
FAILURE_ID_HASH: {19b2f29e-8f46-7d83-a3f9-e42980eac0d3}
Followup: MachineOwner
---------
DisplayPort ile bağlı.Hangi bağlantı ile bağlı monitörünüz?
İlginç. Murat hocamın dediğini yapın yine mavi ekran alırsanız yeni minidump dosyasını atarsınız.DisplayPort ile bağlı.
Bu arada hocam sizin monitör drivers için attığınız linkten sağ taraftan ''Standart Monitor Drivers Unsigned Windows'' olani indirdim başarılı bir şekilde yüklendi dedi.İlginç. Murat hocamın dediğini yapın yine mavi ekran alırsanız yeni minidump dosyasını atarsınız.
Yaklaşık yarım saattir açık PC herhangi bir hata almadım.Herhangi bir hata aldığım takdirde yine yazarım.Tamam hata alıyor musunuz şu an?