Windows 10 "DRIVER_IRQL_NOT_LESS_OR_EQUAL" Mavi Ekran Hatası

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\frzb\Downloads\100420-5687-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`40600000 PsLoadedModuleList = 0xfffff802`4122a310
Debug session time: Sun Oct  4 18:21:18.795 2020 (UTC + 3:00)
System Uptime: 0 days 3:49:29.431
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`409f3ea0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff802`4586b430=000000000000000a
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000795b20fbd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8025d7c30da, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5218

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-PF8M28O

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 29976

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 795b20fbd0

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8025d7c30da

READ_ADDRESS: fffff802412fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8024120f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8024120f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 000000795b20fbd0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8024586b570 -- (.trap 0xfffff8024586b570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000b5 rbx=0000000000000000 rcx=000000795b20fbd0
rdx=00000000000000b5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025d7c30da rsp=fffff8024586b700 rbp=000000000000003d
 r8=0000000000000001  r9=000000000005c600 r10=0000fffff8025d7c
r11=ffff9ef972e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
amdppm!WriteGenAddrEx+0x6:
fffff802`5d7c30da 80390a          cmp     byte ptr [rcx],0Ah ds:00000079`5b20fbd0=??
Resetting default scope

STACK_TEXT: 
fffff802`4586b428 fffff802`40a05e69     : 00000000`0000000a 00000079`5b20fbd0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`4586b430 fffff802`40a02169     : 00000000`00000007 00000000`00000000 00000000`00000008 fffff802`5d7c2d23 : nt!KiBugCheckDispatch+0x69
fffff802`4586b570 fffff802`5d7c30da     : 00000000`000026df 00000000`00000000 fffff802`5d7c1bb0 00000000`00000000 : nt!KiPageFault+0x469
fffff802`4586b700 fffff802`5d7c415e     : 00000000`00000000 ffffbf01`dcb94010 00000000`00000000 fffff802`3d93a2e8 : amdppm!WriteGenAddrEx+0x6
fffff802`4586b730 fffff802`40994709     : fffff802`3d932180 00000000`00000000 ffffbf01`df978000 00000000`00000001 : amdppm!PerfControlCpc+0x5e
fffff802`4586b760 fffff802`4099457d     : 00000000`00000000 ffffbf01`df978300 ffffbf01`df978010 00000000`00000000 : nt!PpmPerfArbitratorApplyProcessorState+0xe5
fffff802`4586b7c0 fffff802`40904287     : ffffbf01`df978310 00000000`00000000 00000000`00000004 fffff802`4586b960 : nt!PpmPerfApplyProcessorState+0xc1
fffff802`4586b830 fffff802`408e9a3e     : fffff802`3d935240 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PpmPerfAction+0x87
fffff802`4586b860 fffff802`408e8d24     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff802`4586b9d0 fffff802`409f7a0e     : 00000000`00000000 fffff802`3d932180 fffff802`41326600 ffffbf01`e378a0c0 : nt!KiRetireDpcList+0x1f4
fffff802`4586bc60 00000000`00000000     : fffff802`4586c000 fffff802`45866000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  amdppm!WriteGenAddrEx+6

MODULE_NAME: amdppm

IMAGE_NAME:  amdppm.sys

IMAGE_VERSION:  10.0.19041.208

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  6

FAILURE_BUCKET_ID:  AV_amdppm!WriteGenAddrEx

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {07832aa6-2c4c-94fd-1040-ee733b7393cb}

Followup:     MachineOwner
---------

0: kd> lmvm amdppm
Browse full module list
start             end                 module name
fffff802`5d7c0000 fffff802`5d7fb000   amdppm   # (pdb symbols)          C:\ProgramData\Dbg\sym\amdppm.pdb\DCC255E80BFE34F58F44FA772ED8EAD81\amdppm.pdb
    Loaded symbol image file: amdppm.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\amdppm.sys\B45EF06B3b000\amdppm.sys
    Image path: \SystemRoot\System32\drivers\amdppm.sys
    Image name: amdppm.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        B45EF06B (This is a reproducible build file hash, not a timestamp)
    CheckSum:         0003798E
    ImageSize:        0003B000
    File version:     10.0.19041.208
    Product version:  10.0.19041.208
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     amdppm.sys
        OriginalFilename: amdppm.sys
        ProductVersion:   10.0.19041.208
        FileVersion:      10.0.19041.208 (WinBuild.160101.0800)
        FileDescription:  Processor Device Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.

Hata dosyan bu hata yapan program Microsoft dosyası eğer Windows'un güncel değilse güncelle.
Sürücülerininde güncellemeni öneririm.
 
Artı -1 Eksi

Geri
Yukarı