Çözüldü Windows 10 çeşitli mavi ekran hataları

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

gunerbey

Centipat
Katılım
9 Kasım 2019
Mesajlar
60
Çözümler
3
Daha fazla  
Cinsiyet
Erkek
Meslek
öğrenci/yazılım
Bugün bilgisayarımı açtığımda sürekli mavi ekran hatası almaya başladım. İlk başta "amdsystem.sys" hatası aldım daha sonra "KERNEL_SECURITY_CHECK_FAILURE", "DRIVER_IRQL_NOT_LESS_EQUAL", "IRQL_NOT_LESS_EQUAL" hatalarını aldım. Ethernet ve Wireless driverlarını güncelledim. Bu konu hakkında yardımlarınızı bekliyorum. Şimdiden teşekkürler.

PC özellikleri;
  • Ryzen 7 3700X.
  • Gigabyte RTX 2060 Super winforce OC.
  • Corsair Vengeance 300 MHz.
  • MSI X570 GAMING Wi-Fi Edge.
  • Cooler Master 650W 80+ PSU.
 
Çözüm
Chipset sürücüsünü güncelledim ve henüz mavi ekran almadım yardımlarınız için teşekkür ederim arkadaşlar.
Tabii yardım edelim öncelikle dosyaları gönderin.
 
Chipset sürücüsünü güvenli mod ile kaldır güncelle, aynı şekilde ekran kartını da ayrıca Memtest86 testi yapar mısın?
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffff9c80b0739ff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9c80b0739f48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 4

BUGCHECK_P2: ffff9c80b0739ff0

BUGCHECK_P3: ffff9c80b0739f48

BUGCHECK_P4: 0

TRAP_FRAME:  ffff9c80b0739ff0 -- (.trap 0xffff9c80b0739ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff818ca06be000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffff818ca06c4000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023aa4f1df rsp=ffff9c80b073a180 rbp=ffff9c80b073a6f0
 r8=ffff818ca06c4000  r9=ffff9c80b073a700 r10=ffff9c80b0725440
r11=ffffd0811a2c8f90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12ea53:
fffff802`3aa4f1df cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff9c80b0739f48 -- (.exr 0xffff9c80b0739f48)
ExceptionAddress: fffff8023aa4f1df (nt!RtlpGetStackLimitsEx+0x000000000012ea53)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

CPU_COUNT: 10

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_INCORRECT_STACK

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-07-2019 16:47:48.0650

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  ffff9c80b0739cc8

LAST_CONTROL_TRANSFER:  from fffff8023a9d32e9 to fffff8023a9c14e0

STACK_TEXT: 
ffff9c80`b0739cc8 fffff802`3a9d32e9 : 00000000`00000139 00000000`00000004 ffff9c80`b0739ff0 ffff9c80`b0739f48 : nt!KeBugCheckEx
ffff9c80`b0739cd0 fffff802`3a9d3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff9c80`b0739e10 fffff802`3a9d1aa5 : fffff802`3a927368 fffff802`3ac0ec84 ffff9c80`b073a7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff9c80`b0739ff0 fffff802`3aa4f1df : fffff802`3ac0edc4 00000000`00000000 ffff9c80`b073a1f0 fffff802`3a9c3730 : nt!KiRaiseSecurityCheckFailure+0x325
ffff9c80`b073a180 fffff802`3aa2e919 : ffff818c`a06c1a00 fffff802`3ac0edc4 ffff9c80`b073a6f0 00000000`00000003 : nt!RtlpGetStackLimitsEx+0x12ea53
ffff9c80`b073a1b0 fffff802`3a8c795e : ffff818c`a06c3508 ffff9c80`b073ae30 ffff818c`a06c3508 ffff9c80`b0714180 : nt!RtlDispatchException+0x16b9f9
ffff9c80`b073a900 fffff802`3a9c2362 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffff9c80`b073afb0 fffff802`3a9c2330 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff818c`a06c33c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue


THREAD_SHA1_HASH_MOD_FUNC:  9be8e2d65604a89c1f9c8df1b4abc21efb751398

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  dee98a898510a409a322c767f1045877c16cbf70

THREAD_SHA1_HASH_MOD:  9f457f347057f10e1df248e166a3e95e6570ecfe

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff802`3a9d3710 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

TARGET_TIME:  2019-12-06T20:14:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  29ce

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 000000000000000d, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: d

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff80236f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000000

CURRENT_IRQL:  d

FAULTING_IP:
+0
00000000`00000000 ??              ???

PROCESS_NAME:  System

CPU_COUNT: 10

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-07-2019 16:47:41.0698

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffff9a018cbdfdd0 -- (.trap 0xffff9a018cbdfdd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff7c10021e001 rbx=0000000000000000 rcx=0000000000000286
rdx=0000000000000027 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=ffff9a018cbdff60 rbp=ffffee072c4d1660
 r8=000000000000fc01  r9=0000000000000000 r10=fffff80236a1ec90
r11=ffff9a018cbdff00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

LAST_CONTROL_TRANSFER:  from fffff80236bd32e9 to fffff80236bc14e0

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ??              ???

STACK_TEXT: 
ffff9a01`8cbdfc88 fffff802`36bd32e9 : 00000000`0000000a 00000000`00000000 00000000`0000000d 00000000`00000008 : nt!KeBugCheckEx
ffff9a01`8cbdfc90 fffff802`36bcf62b : 00000000`00000053 ffffee07`2c4d1660 00000000`00000246 fffff802`374b7d97 : nt!KiBugCheckDispatch+0x69
ffff9a01`8cbdfdd0 00000000`00000000 : ffffb787`344cc800 00000000`00000000 00000000`00000000 ffff498d`6702171b : nt!KiPageFault+0x46b


THREAD_SHA1_HASH_MOD_FUNC:  bf99962f16aee8a6a536cfcc5454c0cd4db15ac9

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  497aaf2f8d4f907c0c9bce6ce025c930b885e2b8

THREAD_SHA1_HASH_MOD:  2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b

FOLLOWUP_IP:
nt!KiPageFault+46b
fffff802`36bcf62b 33c0            xor     eax,eax

FAULT_INSTR_CODE:  ffb0c033

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+46b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  46b

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

PRIMARY_PROBLEM_CLASS:  AV_CODE_AV_NULL_IP_nt!KiPageFault

TARGET_TIME:  2019-12-06T20:32:47.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  6121

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_code_av_null_ip_nt!kipagefault

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000096, The exception code that was not handled
Arg2: fffff805799fa8bd, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000096

BUGCHECK_P2: fffff805799fa8bd

BUGCHECK_P3: 0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - <Unable to get error code text>

FAULTING_IP:
amdppm!C1Idle+2d
fffff805`799fa8bd 0f30            wrmsr

BUGCHECK_STR:  0x1E_c0000096

CPU_COUNT: 10

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-07-2019 16:47:44.0750

ANALYSIS_VERSION: 10.0.18362.1 x86fre

EXCEPTION_RECORD:  ffffb50b5a844a28 -- (.exr 0xffffb50b5a844a28)
ExceptionAddress: 0000000000000003
   ExceptionCode: 00000000
  ExceptionFlags: 00000003
NumberParameters: 1
   Parameter[0]: 0000000100060000

LAST_CONTROL_TRANSFER:  from fffff805676a653e to fffff805675c14e0

STACK_TEXT: 
fffffb8a`c70c2598 fffff805`676a653e : 00000000`0000001e ffffffff`c0000096 fffff805`799fa8bd 00000000`00000000 : nt!KeBugCheckEx
fffffb8a`c70c25a0 fffff805`675ca312 : fffff805`67911000 fffff805`67400000 0005e560`00ab6000 00000000`0010001f : nt!KiFatalExceptionHandler+0x22
fffffb8a`c70c25e0 fffff805`674c33c5 : 00000000`00000000 00000000`00000000 fffffb8a`c70c2b50 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0x12
fffffb8a`c70c2610 fffff805`674c795e : fffffb8a`c70c3548 fffffb8a`c70c3290 fffffb8a`c70c3548 ffffc701`48b23180 : nt!RtlDispatchException+0x4a5
fffffb8a`c70c2d60 fffff805`675d341d : ffffb50b`5a844a28 00000000`000000c8 00000000`00000000 ffffb50b`5a841010 : nt!KiDispatchException+0x16e
fffffb8a`c70c3410 fffff805`675cf1a2 : ffffb50b`57acbd00 00000000`00000000 00000000`00000000 00001f80`00eb0000 : nt!KiExceptionDispatch+0x11d
fffffb8a`c70c35f0 fffff805`799fa8bd : 00000000`00000000 ffffb50b`5ab98340 00000000`00000002 ffffb50b`57bf64c0 : nt!KiGeneralProtectionFault+0x322
fffffb8a`c70c3780 fffff805`799fa863 : ffffb50b`606f7060 00000000`00989680 ffffc701`48b23100 0000005c`1c6aa7e3 : amdppm!C1Idle+0x2d
fffffb8a`c70c37b0 fffff805`67421e7c : 00000000`0000001e 00000000`00000000 ffffb50b`5fbbe010 00000000`0000001e : amdppm!AcpiCStateIdleExecute+0x23
fffffb8a`c70c37e0 fffff805`674215ce : 00000000`00000001 3ff67930`b17f0000 00000000`00000001 00000000`00000000 : nt!PpmIdleExecuteTransition+0x70c
fffffb8a`c70c3b00 fffff805`675c4fe8 : ffffffff`00000000 ffffc701`48b23180 ffffb50b`61b2c080 00000000`000001f8 : nt!PoIdle+0x36e
fffffb8a`c70c3c60 00000000`00000000 : fffffb8a`c70c4000 fffffb8a`c70be000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  df09734c4143233ed78c1447192041dd7b715337

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b82f34663e2f9536d85e66159c854528e3f17c56

THREAD_SHA1_HASH_MOD:  a60d30349ae0db9fd556e9bf02f1bd0e3c94e0b6

FOLLOWUP_IP:
amdppm!C1Idle+2d
fffff805`799fa8bd 0f30            wrmsr

FAULT_INSTR_CODE:  3eb300f

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  amdppm!C1Idle+2d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.387

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2d

FAILURE_BUCKET_ID:  0x1E_c0000096_amdppm!C1Idle

BUCKET_ID:  0x1E_c0000096_amdppm!C1Idle

PRIMARY_PROBLEM_CLASS:  0x1E_c0000096_amdppm!C1Idle

TARGET_TIME:  2019-12-06T19:57:52.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  80e5

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000096_amdppm!c1idle

FAILURE_ID_HASH:  {f14e7d56-f10d-e495-44a0-dba70772f8da}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00001802590275c8, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8025a3542f9, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 1802590275c8

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8025a3542f9

READ_ADDRESS: fffff8025a5733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 00001802590275c8

CURRENT_IRQL:  d

FAULTING_IP:
nt!_guard_retpoline_indirect_rax+19
fffff802`5a3542f9 4d0fa313        bt      qword ptr [r11],r10

CPU_COUNT: 10

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-07-2019 16:47:52.0212

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffbc05f0aed410 -- (.trap 0xffffbc05f0aed410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80259f766c0 rbx=0000000000000000 rcx=ffffc101f90c0e00
rdx=0000026100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025a3542f9 rsp=ffffbc05f0aed5a8 rbp=ffffbc05f0aed660
 r8=000000000000b701  r9=0000000000000000 r10=0000fffff80259f7
r11=fffff8025a022a90 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz ac pe nc
nt!_guard_retpoline_indirect_rax+0x19:
fffff802`5a3542f9 4d0fa313        bt      qword ptr [r11],r10 ds:fffff802`5a022a90=f72b00002e74b389
Resetting default scope

EXCEPTION_RECORD:  fffff802677da8aa -- (.exr 0xfffff802677da8aa)
ExceptionAddress: 0f03eb300f000000
   ExceptionCode: 1374db85
  ExceptionFlags: 48d38b48
NumberParameters: -2092373842
   Parameter[0]: 5340cccccccccccc
   Parameter[1]: 8b4cda8b20ec8348
   Parameter[2]: 33c0330974d285c1
   Parameter[3]: 854d300f48488dd2
   Parameter[4]: c3e8c88b490874c0
   Parameter[5]: 00003676e8ffff78
   Parameter[6]: 48d38b481374db85
   Parameter[7]: 48b920eac148c38b
   Parameter[8]: 0f03eb300f000000
   Parameter[9]: c35b20c48348e8ae
   Parameter[10]: 8948cccccccccccc
   Parameter[11]: 102474894808245c
   Parameter[12]: 8bc03320ec834857
   Parameter[13]: 48000092f30587da
   Parameter[14]: 484b7501f883f98b

LAST_CONTROL_TRANSFER:  from fffff8025a1d32e9 to fffff8025a1c14e0

STACK_TEXT: 
ffffbc05`f0aed2c8 fffff802`5a1d32e9 : 00000000`0000000a 00001802`590275c8 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffbc05`f0aed2d0 fffff802`5a1cf62b : 0000002c`fbe6c5d8 00000001`b699de88 00000000`0000000f ffffc101`fbe59010 : nt!KiBugCheckDispatch+0x69
ffffbc05`f0aed410 fffff802`5a3542f9 : fffff802`59f602ca 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffbc05`f0aed5a8 fffff802`59f602ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!_guard_retpoline_indirect_rax+0x19
ffffbc05`f0aed5b0 fffff802`5a1c34f4 : 00000000`00000000 ffffbc05`f0aed660 ffffc101`f90c0e00 00000000`00000000 : hal!HalPerformEndOfInterrupt+0x1a
ffffbc05`f0aed5e0 fffff802`677ddf72 : fffff802`677da8aa 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x44
ffffbc05`f0aed778 fffff802`677da8aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : amdppm!C1Halt+0x2
ffffbc05`f0aed780 fffff802`677da863 : ffffc102`0106d820 00000000`00989680 ffffd581`04723100 00000261`928f8048 : amdppm!C1Idle+0x1a
ffffbc05`f0aed7b0 fffff802`5a021e7c : 00000000`00000005 00000000`00000000 ffffc101`ff911010 00000000`00000005 : amdppm!AcpiCStateIdleExecute+0x23
ffffbc05`f0aed7e0 fffff802`5a0215ce : 00000000`00000003 00000000`00000002 ffffc101`ff911100 00000000`00000008 : nt!PpmIdleExecuteTransition+0x70c
ffffbc05`f0aedb00 fffff802`5a1c4fe8 : ffffffff`00000000 ffffd581`04723180 ffffc102`08905080 00000000`00000a68 : nt!PoIdle+0x36e
ffffbc05`f0aedc60 00000000`00000000 : ffffbc05`f0aee000 ffffbc05`f0ae8000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  25f3cf9317170b1fd8b0a6a89e673450e50d794b

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  3dd857807a710cf50e8f4a73cfc51fdc527e0b38

THREAD_SHA1_HASH_MOD:  eb73543b9c0dbddc1ffc116fda6eded5338b33b8

FOLLOWUP_IP:
nt!_guard_retpoline_indirect_rax+19
fffff802`5a3542f9 4d0fa313        bt      qword ptr [r11],r10

FAULT_INSTR_CODE:  13a30f4d

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!_guard_retpoline_indirect_rax+19

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  19

FAILURE_BUCKET_ID:  AV_nt!_guard_retpoline_indirect_rax

BUCKET_ID:  AV_nt!_guard_retpoline_indirect_rax

PRIMARY_PROBLEM_CLASS:  AV_nt!_guard_retpoline_indirect_rax

TARGET_TIME:  2019-12-06T20:55:36.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  48f7

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!_guard_retpoline_indirect_rax

FAILURE_ID_HASH:  {ecb1e4bb-da69-101a-7ebc-fefbb5cc154a}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffa9, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803373c3580, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffffffffa9

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803373c3580

READ_ADDRESS: fffff803377733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffffa9

CURRENT_IRQL:  d

FAULTING_IP:
nt!KiInterruptDispatchNoLockNoEtw+d0
fffff803`373c3580 0fb64da9        movzx   ecx,byte ptr [rbp-57h]

CPU_COUNT: 10

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-07-2019 16:47:56.0133

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff50ddf8c3450 -- (.trap 0xfffff50ddf8c3450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000b88 rbx=0000000000000000 rcx=ffff8c01c5523180
rdx=ffff8c01c5528d00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803373c3580 rsp=fffff50ddf8c35e0 rbp=0000000000000000
 r8=0000000000000678  r9=0000000000000000 r10=0000fffff80337cc
r11=ffff7bfa0c200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!KiInterruptDispatchNoLockNoEtw+0xd0:
fffff803`373c3580 0fb64da9        movzx   ecx,byte ptr [rbp-57h] ss:0018:ffffffff`ffffffa9=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff803373d32e9 to fffff803373c14e0

STACK_TEXT: 
fffff50d`df8c3308 fffff803`373d32e9 : 00000000`0000000a ffffffff`ffffffa9 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff50d`df8c3310 fffff803`373cf62b : ffff396c`151b5bc2 fffff803`37263350 ffffc70b`7de32000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff50d`df8c3450 fffff803`373c3580 : 00000000`00000000 00000000`00000000 ffffc70b`7acd0d00 00000000`00000001 : nt!KiPageFault+0x46b
fffff50d`df8c35e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xd0


THREAD_SHA1_HASH_MOD_FUNC:  f19b917bdc8ec225dc20eaf3d5d2796b819ae012

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d619259f9814ba0695f6a0888471d2925dd924e4

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!KiInterruptDispatchNoLockNoEtw+d0
fffff803`373c3580 0fb64da9        movzx   ecx,byte ptr [rbp-57h]

FAULT_INSTR_CODE:  a94db60f

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiInterruptDispatchNoLockNoEtw+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  AV_nt!KiInterruptDispatchNoLockNoEtw

BUCKET_ID:  AV_nt!KiInterruptDispatchNoLockNoEtw

PRIMARY_PROBLEM_CLASS:  AV_nt!KiInterruptDispatchNoLockNoEtw

TARGET_TIME:  2019-12-06T20:42:23.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  841e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kiinterruptdispatchnolocknoetw

FAILURE_ID_HASH:  {bcca90df-4502-e14c-7f58-c4a4248ee927}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı