Çözüldü Windows 10 "IRQL NOT LESS OR EQUAL" Mavi Ekran Hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Astrein

Hectopat
Katılım
15 Ağustos 2019
Mesajlar
1.016
Çözümler
6
Yer
Istanbul
Daha fazla  
Cinsiyet
Erkek
Öncelikle sistem özelliklerim ile başlayacağım:
  • Gigabyte B450M S2H 3200MHz(O.C)
  • Kingston HyperX Fury Black DDR4 3200MHz 1x8
  • Ryzen 3 1200
  • ASUS RX 560 2GB OC
  • ADATA SU650 ve Segeate Barracuda 500GB

Sistemimi olduğu gibi 4 aydır kullanıyorum, ne hikmettir ki bu "IRQL NOT LESS OR EQUAL" hatasını almaya başladım. İnternette takılırken sorun olmuyor fakat LoL gibi herhangi bir oyuna girdiğimde 35 saniye sonra mavi ekranın üstüne bu hatayı alıyorum.

Çözüm bulamadım, Technopat'ta çözülenlerin hiçbiri çözüm anlatmamış.

Minidump
 
Son düzenleyen: Moderatör:
Çözüm
Raporlara baktım. AMDRSServ.exe ve amdow.exe gözükmekte. AMD ReLive: Desktop Overlay olarak geçiyor. Ekran kartı sürücüsünü DDU ile kaldırın ve güncel sürümü kurun.


Kartta overclock varsa kaldırın. Sorun devam ederse frekansı düşürmeyi veya kartı servise göndermeyi deneyebilirsiniz.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043f06ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 89

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8043f06ae75

WRITE_ADDRESS: fffff8043f5733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8043f42a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8043f42a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  amdow.exe

DPC_STACK_BASE:  FFFFF80442FFEFB0

TRAP_FRAME:  fffff80442ffeab0 -- (.trap 0xfffff80442ffeab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000006eb4d11028 rbx=0000000000000000 rcx=ffff9e8a83202000
rdx=0000006e00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043f06ae75 rsp=fffff80442ffec40 rbp=fffff80442ffed40
 r8=0000000000000000  r9=0000000000000000 r10=ffff9e8a86363c98
r11=fffff80442ffee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff804`3f06ae75 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff804`42ffe968 fffff804`3f1d32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`42ffe970 fffff804`3f1cf62b : ffffd000`05c7eab0 fffff804`42ffee70 ffff9e8a`86c64000 fffff804`48b87913 : nt!KiBugCheckDispatch+0x69
fffff804`42ffeab0 fffff804`3f06ae75 : fffff804`3b1baf80 ffff9e8a`831cc000 ffff9e8a`8ba6d220 fffff804`00000002 : nt!KiPageFault+0x46b
fffff804`42ffec40 fffff804`3f06a4ef : 00000000`00000012 00000000`00989680 00000000`00001511 00000000`00000029 : nt!KiExecuteAllDpcs+0x2e5
fffff804`42ffed80 fffff804`3f1c8525 : 00000000`00000000 fffff804`3b1b8180 ffffd000`05c7ea00 00000000`000400b0 : nt!KiRetireDpcList+0x1ef
fffff804`42ffefb0 fffff804`3f1c8310 : fffff804`3ef766c0 fffff804`3ef602ca 00000000`0000015e 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff880e`0a39cac0 fffff804`3f1c7bc5 : 00000000`000400b0 fffff804`3f1c3041 00000000`00000000 ffff880e`0a39cb80 : nt!KiDispatchInterruptContinue
ffff880e`0a39caf0 fffff804`3f1c3041 : 00000000`00000000 ffff880e`0a39cb80 ffffd000`05c7ea00 ffff9e8a`8beab8e0 : nt!KiDpcInterruptBypass+0x25
ffff880e`0a39cb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\astrien\astrien\111819-8312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff806`33e00000 PsLoadedModuleList = 0xfffff806`34248170
Debug session time: Mon Nov 18 20:39:54.062 2019 (UTC + 3:00)
System Uptime: 0 days 0:02:22.740
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`33fc14e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff806`379fe970=000000000000000a
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80633e6ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 86

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80633e6ae75

WRITE_ADDRESS: fffff806343733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8063422a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8063422a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  AMDRSServ.exe

DPC_STACK_BASE:  FFFFF806379FEFB0

TRAP_FRAME:  fffff806379feab0 -- (.trap 0xfffff806379feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000083e4d5fd31 rbx=0000000000000000 rcx=ffffb30427e02000
rdx=0000008300000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80633e6ae75 rsp=fffff806379fec40 rbp=fffff806379fed40
 r8=0000000000000000  r9=0000000000000000 r10=ffffb3042c93ffa8
r11=fffff806379fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiExecuteAllDpcs+0x2e5:
fffff806`33e6ae75 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff806`379fe968 fffff806`33fd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`379fe970 fffff806`33fcf62b : ffffdf80`5ec69ab0 fffff806`379fee70 ffffb304`2c85e000 fffff806`3d8e7913 : nt!KiBugCheckDispatch+0x69
fffff806`379feab0 fffff806`33e6ae75 : fffff806`2fabff80 ffffb304`27dcc000 fffff806`2fac2f90 fffff806`00000002 : nt!KiPageFault+0x46b
fffff806`379fec40 fffff806`33e6a4ef : fffff806`2fabd180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff806`379fed80 fffff806`33fc8525 : 00000000`00000000 fffff806`2fabd180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffff806`379fefb0 fffff806`33fc8310 : ffffb304`306ee080 00000067`b4bbbdff ffffffff`ffffff92 fffff806`33fc88b2 : nt!KxRetireDpcList+0x5
ffffc48e`37c846a0 fffff806`33fc79e0 : ffffc48e`37c846e0 00000000`00000018 ffffdf80`5e680180 33333333`33333333 : nt!KiDispatchInterruptContinue
ffffc48e`37c846d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80572c6ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 116

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80572c6ae75

WRITE_ADDRESS: fffff805731733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057302a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8057302a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  AMDRSServ.exe

DPC_STACK_BASE:  FFFFF805771FEFB0

TRAP_FRAME:  fffffb80dc556b80 -- (.trap 0xfffffb80dc556b80)
Unable to read trap frame at fffffb80`dc556b80

STACK_TEXT: 
fffff805`771fe968 fffff805`72dd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`771fe970 fffff805`72dcf62b : ffffbc00`a95baab0 fffff805`771fee70 ffffa707`6128f000 fffff805`7db17913 : nt!KiBugCheckDispatch+0x69
fffff805`771feab0 fffff805`72c6ae75 : fffff805`6f36df80 ffffa707`5cdda000 fffff805`6f370f90 fffff805`00000002 : nt!KiPageFault+0x46b
fffff805`771fec40 fffff805`72c6a4ef : fffff805`6f36b180 00000000`00000000 00000000`00000002 00000000`00000014 : nt!KiExecuteAllDpcs+0x2e5
fffff805`771fed80 fffff805`72dc8525 : 00000000`00000000 fffff805`6f36b180 ffffbc00`a95baa00 00000000`0000c071 : nt!KiRetireDpcList+0x1ef
fffff805`771fefb0 fffff805`72dc8310 : fffff805`736cf6c0 fffff805`736b92ca 00000000`00000000 00000000`00000001 : nt!KxRetireDpcList+0x5
fffffb80`dc556930 fffff805`72dc7bc5 : 00000000`0000c071 fffff805`72dc3041 ffffa707`63be5080 fffffb80`dc5569f0 : nt!KiDispatchInterruptContinue
fffffb80`dc556960 fffff805`72dc3041 : ffffa707`63be5080 fffffb80`dc5569f0 ffffbc00`a95baa00 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffb80`dc556970 fffff805`72dd2b72 : ffffa707`63be5080 00000140`23f7ae98 fffffb80`dc556b80 ffffa707`63be5080 : nt!KiInterruptDispatch+0xb1
fffffb80`dc556b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xf0


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013a46ae65, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 85

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8013a46ae65

WRITE_ADDRESS: fffff8013a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8013a82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8013a82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

DPC_STACK_BASE:  FFFFF801405FEFB0

TRAP_FRAME:  fffff801405feab0 -- (.trap 0xfffff801405feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00002821a2af0ee7 rbx=0000000000000000 rcx=ffff9187a8002000
rdx=0000282100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013a46ae65 rsp=fffff801405fec40 rbp=fffff801405fed40
 r8=0000000000000000  r9=0000000000000000 r10=ffff9187a8a2df98
r11=fffff801405fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff801`3a46ae65 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff801`405fe968 fffff801`3a5d30e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`405fe970 fffff801`3a5cf42b : ffffdd01`dd1b3ab0 fffff801`405fee70 ffff9187`aba43000 fffff801`46607913 : nt!KiBugCheckDispatch+0x69
fffff801`405feab0 fffff801`3a46ae65 : fffff801`386d3f80 ffff9187`a7fcc000 fffff801`386d6f90 fffff801`00000002 : nt!KiPageFault+0x46b
fffff801`405fec40 fffff801`3a46a4df : fffff801`386d1180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff801`405fed80 fffff801`3a5c8265 : 00000000`00000000 fffff801`386d1180 00000000`00000000 00000000`0000000b : nt!KiRetireDpcList+0x1ef
fffff801`405fefb0 fffff801`3a5c8050 : 00000000`00000000 fffff801`3a76f0a9 ffff9187`b0f14bf0 ffff9187`000004a0 : nt!KxRetireDpcList+0x5
ffffb907`f60ae870 fffff801`3a5c7720 : 00000000`00000000 fffff801`46437bd5 00000000`00000000 ffff9187`abc6d000 : nt!KiDispatchInterruptContinue
ffffb907`f60ae8a0 fffff801`3a45fa3e : ffff9187`af1bf010 00000000`0000000b ffff9187`b0be6010 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
ffffb907`f60aea30 fffff801`4643f69d : 00000000`00000002 00000000`00000000 00000000`00000000 ffff9187`00000000 : nt!KzLowerIrql+0x1e
ffffb907`f60aea60 fffff801`464b9ae2 : ffff9187`b396fb00 ffff9187`abc6d000 ffff9187`00000000 ffff9187`0000000b : dxgmms2!VidSchiSubmitMmIoFlipCommand+0x82d
ffffb907`f60aeb80 fffff801`464b994a : ffff9187`abc6d400 fffff801`464b9880 ffff9187`abc6d000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x182
ffffb907`f60aebd0 fffff801`3a52a725 : ffff9187`abcb0680 fffff801`00000001 ffff9187`abc6d000 00000067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffb907`f60aec10 fffff801`3a5c886a : ffffdd01`dcb23180 ffff9187`abcb0680 fffff801`3a52a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb907`f60aec60 00000000`00000000 : ffffb907`f60af000 ffffb907`f60a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VidSchiSubmitMmIoFlipCommand+82d

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  82d

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiSubmitMmIoFlipCommand

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {10ee4543-a3ed-1d4b-e6a6-be87ded8170d}

Followup:     MachineOwner
---------
Öncelikle sistem özelliklerim ile başlayacağım:
  • Gigabyte B450M S2H 3200MHz(O.C)
  • Kingston HyperX Fury Black DDR4 3200MHz 1x8
  • Ryzen 3 1200
  • ASUS RX 560 2GB OC
  • ADATA SU650 ve Segeate Barracuda 500GB

Sistemimi olduğu gibi 4 aydır kullanıyorum, ne hikmettir ki bu "IRQL NOT LESS OR EQUAL" hatasını almaya başladım. İnternette takılırken sorun olmuyor fakat LoL gibi herhangi bir oyuna girdiğimde 35 saniye sonra mavi ekranın üstüne bu hatayı alıyorum.

Çözüm bulamadım, Technopat'ta çözülenlerin hiçbiri çözüm anlatmamış.

Minidump
Sisteminizdeki OC yüzünden yaşıyorsunuz bu sorunu.
 
Son düzenleyen: Moderatör:
Öncelikle sistem özelliklerim ile başlayacağım:
  • Gigabyte B450M S2H 3200MHz(O.C)
  • Kingston HyperX Fury Black DDR4 3200MHz 1x8
  • Ryzen 3 1200
  • ASUS RX 560 2GB OC
  • ADATA SU650 ve Segeate Barracuda 500GB

Sistemimi olduğu gibi 4 aydır kullanıyorum, ne hikmettir ki bu "IRQL NOT LESS OR EQUAL" hatasını almaya başladım. İnternette takılırken sorun olmuyor fakat LoL gibi herhangi bir oyuna girdiğimde 35 saniye sonra mavi ekranın üstüne bu hatayı alıyorum.

Çözüm bulamadım, Technopat'ta çözülenlerin hiçbiri çözüm anlatmamış.

Minidump
Ekran kartı sürücünüz DDU ile güvenli mod da kaldır, en güncel sürücüyü yükle. Kullanmıyor isen AMD ReLive özelliğini yükleme.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013a46ae65, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F3

BIOS_DATE:  01/25/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8013a46ae65

WRITE_ADDRESS: fffff8013a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000020

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff801`3a46ae65 49894720        mov     qword ptr [r15+20h],rax

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-18-2019 21:27:42.0900

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DPC_STACK_BASE:  FFFFF801405FEFB0

TRAP_FRAME:  fffff801405feab0 -- (.trap 0xfffff801405feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00002821a2af0ee7 rbx=0000000000000000 rcx=ffff9187a8002000
rdx=0000282100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013a46ae65 rsp=fffff801405fec40 rbp=fffff801405fed40
 r8=0000000000000000  r9=0000000000000000 r10=ffff9187a8a2df98
r11=fffff801405fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff801`3a46ae65 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8013a5d30e9 to fffff8013a5c1220

STACK_TEXT: 
fffff801`405fe968 fffff801`3a5d30e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`405fe970 fffff801`3a5cf42b : ffffdd01`dd1b3ab0 fffff801`405fee70 ffff9187`aba43000 fffff801`46607913 : nt!KiBugCheckDispatch+0x69
fffff801`405feab0 fffff801`3a46ae65 : fffff801`386d3f80 ffff9187`a7fcc000 fffff801`386d6f90 fffff801`00000002 : nt!KiPageFault+0x46b
fffff801`405fec40 fffff801`3a46a4df : fffff801`386d1180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff801`405fed80 fffff801`3a5c8265 : 00000000`00000000 fffff801`386d1180 00000000`00000000 00000000`0000000b : nt!KiRetireDpcList+0x1ef
fffff801`405fefb0 fffff801`3a5c8050 : 00000000`00000000 fffff801`3a76f0a9 ffff9187`b0f14bf0 ffff9187`000004a0 : nt!KxRetireDpcList+0x5
ffffb907`f60ae870 fffff801`3a5c7720 : 00000000`00000000 fffff801`46437bd5 00000000`00000000 ffff9187`abc6d000 : nt!KiDispatchInterruptContinue
ffffb907`f60ae8a0 fffff801`3a45fa3e : ffff9187`af1bf010 00000000`0000000b ffff9187`b0be6010 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
ffffb907`f60aea30 fffff801`4643f69d : 00000000`00000002 00000000`00000000 00000000`00000000 ffff9187`00000000 : nt!KzLowerIrql+0x1e
ffffb907`f60aea60 fffff801`464b9ae2 : ffff9187`b396fb00 ffff9187`abc6d000 ffff9187`00000000 ffff9187`0000000b : dxgmms2!VidSchiSubmitMmIoFlipCommand+0x82d
ffffb907`f60aeb80 fffff801`464b994a : ffff9187`abc6d400 fffff801`464b9880 ffff9187`abc6d000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x182
ffffb907`f60aebd0 fffff801`3a52a725 : ffff9187`abcb0680 fffff801`00000001 ffff9187`abc6d000 00000067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffb907`f60aec10 fffff801`3a5c886a : ffffdd01`dcb23180 ffff9187`abcb0680 fffff801`3a52a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb907`f60aec60 00000000`00000000 : ffffb907`f60af000 ffffb907`f60a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  b2ae1ab07b9fb13d38f5d71646b8c1472dc7e32e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  2bd02632b46b4c9c3e30312e2d9034dddbb74423

THREAD_SHA1_HASH_MOD:  0dccb91bdc1351d3239adf1e286aab134bb117e6

FOLLOWUP_IP:
dxgmms2!VidSchiSubmitMmIoFlipCommand+82d
fffff801`4643f69d 40387597        cmp     byte ptr [rbp-69h],sil

FAULT_INSTR_CODE:  97753840

SYMBOL_STACK_INDEX:  9

SYMBOL_NAME:  dxgmms2!VidSchiSubmitMmIoFlipCommand+82d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  82d

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiSubmitMmIoFlipCommand

BUCKET_ID:  AV_dxgmms2!VidSchiSubmitMmIoFlipCommand

PRIMARY_PROBLEM_CLASS:  AV_dxgmms2!VidSchiSubmitMmIoFlipCommand

TARGET_TIME:  2019-11-10T15:44:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  1449a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_dxgmms2!vidschisubmitmmioflipcommand

FAILURE_ID_HASH:  {10ee4543-a3ed-1d4b-e6a6-be87ded8170d}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021106ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F3

BIOS_DATE:  01/25/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8021106ae75

WRITE_ADDRESS: fffff802115733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000020

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff802`1106ae75 49894720        mov     qword ptr [r15+20h],rax

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  amdow.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-18-2019 21:27:47.0576

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DPC_STACK_BASE:  FFFFF802147FEFB0

TRAP_FRAME:  fffff802147feab0 -- (.trap 0xfffff802147feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00002ca82f39f7d1 rbx=0000000000000000 rcx=ffff8d0900a02000
rdx=00002ca800000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021106ae75 rsp=fffff802147fec40 rbp=fffff802147fed40
 r8=0000000000000000  r9=0000000000000000 r10=ffff8d09033ddfd8
r11=fffff802147fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff802`1106ae75 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802111d32e9 to fffff802111c14e0

STACK_TEXT: 
fffff802`147fe968 fffff802`111d32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff802`147fe970 fffff802`111cf62b : 00000000`00000000 fffff802`147fee70 00000000`00000000 fffff802`1a307b74 : nt!KiBugCheckDispatch+0x69
fffff802`147feab0 fffff802`1106ae75 : fffff802`0c908f80 ffff8d09`009da000 ffff8d09`076f81f0 fffff802`00000002 : nt!KiPageFault+0x46b
fffff802`147fec40 fffff802`1106a4ef : 00000000`00000014 00000000`00989680 00000000`0007bb94 00000000`000000ac : nt!KiExecuteAllDpcs+0x2e5
fffff802`147fed80 fffff802`111c8525 : 00000000`00000000 fffff802`0c906180 00000000`00000000 ffff8d09`090c0a40 : nt!KiRetireDpcList+0x1ef
fffff802`147fefb0 fffff802`111c8310 : ffff8d09`08c0a080 00000067`b4bbbdff ffffffff`ffffff92 fffff802`111c87df : nt!KxRetireDpcList+0x5
ffffb103`d05806a0 fffff802`111c79e0 : ffffb103`d05806e0 00000000`00000000 00000067`b4bbbdff 00000000`00000001 : nt!KiDispatchInterruptContinue
ffffb103`d05806d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0


THREAD_SHA1_HASH_MOD_FUNC:  be9c7f66c06ca302e2336a21f0915afd40ea41fa

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  05a16ddebfa86a93833754145439b45617645fd9

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2e5
fffff802`1106ae75 49894720        mov     qword ptr [r15+20h],rax

FAULT_INSTR_CODE:  20478949

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

BUCKET_ID:  AV_nt!KiExecuteAllDpcs

PRIMARY_PROBLEM_CLASS:  AV_nt!KiExecuteAllDpcs

TARGET_TIME:  2019-11-18T17:33:03.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  b242

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kiexecutealldpcs

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80633e6ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F3

BIOS_DATE:  01/25/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80633e6ae75

WRITE_ADDRESS: fffff806343733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000020

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff806`33e6ae75 49894720        mov     qword ptr [r15+20h],rax

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  AMDRSServ.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-18-2019 21:27:51.0860

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DPC_STACK_BASE:  FFFFF806379FEFB0

TRAP_FRAME:  fffff806379feab0 -- (.trap 0xfffff806379feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000083e4d5fd31 rbx=0000000000000000 rcx=ffffb30427e02000
rdx=0000008300000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80633e6ae75 rsp=fffff806379fec40 rbp=fffff806379fed40
 r8=0000000000000000  r9=0000000000000000 r10=ffffb3042c93ffa8
r11=fffff806379fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiExecuteAllDpcs+0x2e5:
fffff806`33e6ae75 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80633fd32e9 to fffff80633fc14e0

STACK_TEXT: 
fffff806`379fe968 fffff806`33fd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`379fe970 fffff806`33fcf62b : ffffdf80`5ec69ab0 fffff806`379fee70 ffffb304`2c85e000 fffff806`3d8e7913 : nt!KiBugCheckDispatch+0x69
fffff806`379feab0 fffff806`33e6ae75 : fffff806`2fabff80 ffffb304`27dcc000 fffff806`2fac2f90 fffff806`00000002 : nt!KiPageFault+0x46b
fffff806`379fec40 fffff806`33e6a4ef : fffff806`2fabd180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff806`379fed80 fffff806`33fc8525 : 00000000`00000000 fffff806`2fabd180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffff806`379fefb0 fffff806`33fc8310 : ffffb304`306ee080 00000067`b4bbbdff ffffffff`ffffff92 fffff806`33fc88b2 : nt!KxRetireDpcList+0x5
ffffc48e`37c846a0 fffff806`33fc79e0 : ffffc48e`37c846e0 00000000`00000018 ffffdf80`5e680180 33333333`33333333 : nt!KiDispatchInterruptContinue
ffffc48e`37c846d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0


THREAD_SHA1_HASH_MOD_FUNC:  be9c7f66c06ca302e2336a21f0915afd40ea41fa

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  05a16ddebfa86a93833754145439b45617645fd9

THREAD_SHA1_HASH_MOD:  cb5f414824c2521bcc505eaa03e92fa10922dad8

FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2e5
fffff806`33e6ae75 49894720        mov     qword ptr [r15+20h],rax

FAULT_INSTR_CODE:  20478949

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

BUCKET_ID:  AV_nt!KiExecuteAllDpcs

PRIMARY_PROBLEM_CLASS:  AV_nt!KiExecuteAllDpcs

TARGET_TIME:  2019-11-18T17:39:54.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  14096

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kiexecutealldpcs

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80572c6ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450M S2H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F3

BIOS_DATE:  01/25/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450M S2H

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80572c6ae75

WRITE_ADDRESS: fffff805731733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000000000000020

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiExecuteAllDpcs+2e5
fffff805`72c6ae75 49894720        mov     qword ptr [r15+20h],rax

CPU_COUNT: 4

CPU_MHZ: e6d

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  AMDRSServ.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  11-18-2019 21:27:56.0690

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DPC_STACK_BASE:  FFFFF805771FEFB0

TRAP_FRAME:  fffffb80dc556b80 -- (.trap 0xfffffb80dc556b80)
Unable to read trap frame at fffffb80`dc556b80

EXCEPTION_RECORD:  ffffa70763be5080 -- (.exr 0xffffa70763be5080)
ExceptionAddress: ffffa70763be5088
   ExceptionCode: 00200006
  ExceptionFlags: 00000000
NumberParameters: 0

LAST_CONTROL_TRANSFER:  from fffff80572dd32e9 to fffff80572dc14e0

STACK_TEXT: 
fffff805`771fe968 fffff805`72dd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`771fe970 fffff805`72dcf62b : ffffbc00`a95baab0 fffff805`771fee70 ffffa707`6128f000 fffff805`7db17913 : nt!KiBugCheckDispatch+0x69
fffff805`771feab0 fffff805`72c6ae75 : fffff805`6f36df80 ffffa707`5cdda000 fffff805`6f370f90 fffff805`00000002 : nt!KiPageFault+0x46b
fffff805`771fec40 fffff805`72c6a4ef : fffff805`6f36b180 00000000`00000000 00000000`00000002 00000000`00000014 : nt!KiExecuteAllDpcs+0x2e5
fffff805`771fed80 fffff805`72dc8525 : 00000000`00000000 fffff805`6f36b180 ffffbc00`a95baa00 00000000`0000c071 : nt!KiRetireDpcList+0x1ef
fffff805`771fefb0 fffff805`72dc8310 : fffff805`736cf6c0 fffff805`736b92ca 00000000`00000000 00000000`00000001 : nt!KxRetireDpcList+0x5
fffffb80`dc556930 fffff805`72dc7bc5 : 00000000`0000c071 fffff805`72dc3041 ffffa707`63be5080 fffffb80`dc5569f0 : nt!KiDispatchInterruptContinue
fffffb80`dc556960 fffff805`72dc3041 : ffffa707`63be5080 fffffb80`dc5569f0 ffffbc00`a95baa00 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffb80`dc556970 fffff805`72dd2b72 : ffffa707`63be5080 00000140`23f7ae98 fffffb80`dc556b80 ffffa707`63be5080 : nt!KiInterruptDispatch+0xb1
fffffb80`dc556b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xf0


THREAD_SHA1_HASH_MOD_FUNC:  75a1db93098271335e713be53f5c74e0fa4b0a5c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  cf9cff607cdd4e4fba303093ee4d31df166445de

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!KiExecuteAllDpcs+2e5
fffff805`72c6ae75 49894720        mov     qword ptr [r15+20h],rax

FAULT_INSTR_CODE:  20478949

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4efcf7a9

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

BUCKET_ID:  AV_nt!KiExecuteAllDpcs

PRIMARY_PROBLEM_CLASS:  AV_nt!KiExecuteAllDpcs

TARGET_TIME:  2019-11-18T17:36:58.000Z

OSBUILD:  18362

OSSERVICEPACK:  476

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-12-30 02:28:41

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  18bdc

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!kiexecutealldpcs

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
 
Raporlara baktım. AMDRSServ.exe ve amdow.exe gözükmekte. AMD ReLive: Desktop Overlay olarak geçiyor. Ekran kartı sürücüsünü DDU ile kaldırın ve güncel sürümü kurun.


Kartta overclock varsa kaldırın. Sorun devam ederse frekansı düşürmeyi veya kartı servise göndermeyi deneyebilirsiniz.

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8043f06ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 89

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8043f06ae75

WRITE_ADDRESS: fffff8043f5733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8043f42a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8043f42a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  amdow.exe

DPC_STACK_BASE:  FFFFF80442FFEFB0

TRAP_FRAME:  fffff80442ffeab0 -- (.trap 0xfffff80442ffeab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000006eb4d11028 rbx=0000000000000000 rcx=ffff9e8a83202000
rdx=0000006e00000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043f06ae75 rsp=fffff80442ffec40 rbp=fffff80442ffed40
 r8=0000000000000000  r9=0000000000000000 r10=ffff9e8a86363c98
r11=fffff80442ffee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff804`3f06ae75 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff804`42ffe968 fffff804`3f1d32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff804`42ffe970 fffff804`3f1cf62b : ffffd000`05c7eab0 fffff804`42ffee70 ffff9e8a`86c64000 fffff804`48b87913 : nt!KiBugCheckDispatch+0x69
fffff804`42ffeab0 fffff804`3f06ae75 : fffff804`3b1baf80 ffff9e8a`831cc000 ffff9e8a`8ba6d220 fffff804`00000002 : nt!KiPageFault+0x46b
fffff804`42ffec40 fffff804`3f06a4ef : 00000000`00000012 00000000`00989680 00000000`00001511 00000000`00000029 : nt!KiExecuteAllDpcs+0x2e5
fffff804`42ffed80 fffff804`3f1c8525 : 00000000`00000000 fffff804`3b1b8180 ffffd000`05c7ea00 00000000`000400b0 : nt!KiRetireDpcList+0x1ef
fffff804`42ffefb0 fffff804`3f1c8310 : fffff804`3ef766c0 fffff804`3ef602ca 00000000`0000015e 00000000`00000000 : nt!KxRetireDpcList+0x5
ffff880e`0a39cac0 fffff804`3f1c7bc5 : 00000000`000400b0 fffff804`3f1c3041 00000000`00000000 ffff880e`0a39cb80 : nt!KiDispatchInterruptContinue
ffff880e`0a39caf0 fffff804`3f1c3041 : 00000000`00000000 ffff880e`0a39cb80 ffffd000`05c7ea00 ffff9e8a`8beab8e0 : nt!KiDpcInterruptBypass+0x25
ffff880e`0a39cb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------


Microsoft (R) Windows Debugger Version 10.0.19494.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Recep Baltas\Downloads\Compressed\astrien\astrien\111819-8312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff806`33e00000 PsLoadedModuleList = 0xfffff806`34248170
Debug session time: Mon Nov 18 20:39:54.062 2019 (UTC + 3:00)
System Uptime: 0 days 0:02:22.740
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`33fc14e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff806`379fe970=000000000000000a
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80633e6ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 86

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80633e6ae75

WRITE_ADDRESS: fffff806343733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8063422a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8063422a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  AMDRSServ.exe

DPC_STACK_BASE:  FFFFF806379FEFB0

TRAP_FRAME:  fffff806379feab0 -- (.trap 0xfffff806379feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000083e4d5fd31 rbx=0000000000000000 rcx=ffffb30427e02000
rdx=0000008300000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80633e6ae75 rsp=fffff806379fec40 rbp=fffff806379fed40
 r8=0000000000000000  r9=0000000000000000 r10=ffffb3042c93ffa8
r11=fffff806379fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiExecuteAllDpcs+0x2e5:
fffff806`33e6ae75 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff806`379fe968 fffff806`33fd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`379fe970 fffff806`33fcf62b : ffffdf80`5ec69ab0 fffff806`379fee70 ffffb304`2c85e000 fffff806`3d8e7913 : nt!KiBugCheckDispatch+0x69
fffff806`379feab0 fffff806`33e6ae75 : fffff806`2fabff80 ffffb304`27dcc000 fffff806`2fac2f90 fffff806`00000002 : nt!KiPageFault+0x46b
fffff806`379fec40 fffff806`33e6a4ef : fffff806`2fabd180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff806`379fed80 fffff806`33fc8525 : 00000000`00000000 fffff806`2fabd180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffff806`379fefb0 fffff806`33fc8310 : ffffb304`306ee080 00000067`b4bbbdff ffffffff`ffffff92 fffff806`33fc88b2 : nt!KxRetireDpcList+0x5
ffffc48e`37c846a0 fffff806`33fc79e0 : ffffc48e`37c846e0 00000000`00000018 ffffdf80`5e680180 33333333`33333333 : nt!KiDispatchInterruptContinue
ffffc48e`37c846d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80572c6ae75, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 116

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80572c6ae75

WRITE_ADDRESS: fffff805731733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8057302a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8057302a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  AMDRSServ.exe

DPC_STACK_BASE:  FFFFF805771FEFB0

TRAP_FRAME:  fffffb80dc556b80 -- (.trap 0xfffffb80dc556b80)
Unable to read trap frame at fffffb80`dc556b80

STACK_TEXT: 
fffff805`771fe968 fffff805`72dd32e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff805`771fe970 fffff805`72dcf62b : ffffbc00`a95baab0 fffff805`771fee70 ffffa707`6128f000 fffff805`7db17913 : nt!KiBugCheckDispatch+0x69
fffff805`771feab0 fffff805`72c6ae75 : fffff805`6f36df80 ffffa707`5cdda000 fffff805`6f370f90 fffff805`00000002 : nt!KiPageFault+0x46b
fffff805`771fec40 fffff805`72c6a4ef : fffff805`6f36b180 00000000`00000000 00000000`00000002 00000000`00000014 : nt!KiExecuteAllDpcs+0x2e5
fffff805`771fed80 fffff805`72dc8525 : 00000000`00000000 fffff805`6f36b180 ffffbc00`a95baa00 00000000`0000c071 : nt!KiRetireDpcList+0x1ef
fffff805`771fefb0 fffff805`72dc8310 : fffff805`736cf6c0 fffff805`736b92ca 00000000`00000000 00000000`00000001 : nt!KxRetireDpcList+0x5
fffffb80`dc556930 fffff805`72dc7bc5 : 00000000`0000c071 fffff805`72dc3041 ffffa707`63be5080 fffffb80`dc5569f0 : nt!KiDispatchInterruptContinue
fffffb80`dc556960 fffff805`72dc3041 : ffffa707`63be5080 fffffb80`dc5569f0 ffffbc00`a95baa00 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
fffffb80`dc556970 fffff805`72dd2b72 : ffffa707`63be5080 00000140`23f7ae98 fffffb80`dc556b80 ffffa707`63be5080 : nt!KiInterruptDispatch+0xb1
fffffb80`dc556b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceUser+0xf0


SYMBOL_NAME:  nt!KiExecuteAllDpcs+2e5

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e5

FAILURE_BUCKET_ID:  AV_nt!KiExecuteAllDpcs

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b88a28a0-fcde-99e9-6174-619833d00ab9}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8013a46ae65, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 6

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-NG9H4F5

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 85

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 68

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  a

BUGCHECK_P1: 20

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8013a46ae65

WRITE_ADDRESS: fffff8013a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8013a82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8013a82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000020

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

DPC_STACK_BASE:  FFFFF801405FEFB0

TRAP_FRAME:  fffff801405feab0 -- (.trap 0xfffff801405feab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00002821a2af0ee7 rbx=0000000000000000 rcx=ffff9187a8002000
rdx=0000282100000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8013a46ae65 rsp=fffff801405fec40 rbp=fffff801405fed40
 r8=0000000000000000  r9=0000000000000000 r10=ffff9187a8a2df98
r11=fffff801405fee60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KiExecuteAllDpcs+0x2e5:
fffff801`3a46ae65 49894720        mov     qword ptr [r15+20h],rax ds:00000000`00000020=????????????????
Resetting default scope

STACK_TEXT: 
fffff801`405fe968 fffff801`3a5d30e9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff801`405fe970 fffff801`3a5cf42b : ffffdd01`dd1b3ab0 fffff801`405fee70 ffff9187`aba43000 fffff801`46607913 : nt!KiBugCheckDispatch+0x69
fffff801`405feab0 fffff801`3a46ae65 : fffff801`386d3f80 ffff9187`a7fcc000 fffff801`386d6f90 fffff801`00000002 : nt!KiPageFault+0x46b
fffff801`405fec40 fffff801`3a46a4df : fffff801`386d1180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x2e5
fffff801`405fed80 fffff801`3a5c8265 : 00000000`00000000 fffff801`386d1180 00000000`00000000 00000000`0000000b : nt!KiRetireDpcList+0x1ef
fffff801`405fefb0 fffff801`3a5c8050 : 00000000`00000000 fffff801`3a76f0a9 ffff9187`b0f14bf0 ffff9187`000004a0 : nt!KxRetireDpcList+0x5
ffffb907`f60ae870 fffff801`3a5c7720 : 00000000`00000000 fffff801`46437bd5 00000000`00000000 ffff9187`abc6d000 : nt!KiDispatchInterruptContinue
ffffb907`f60ae8a0 fffff801`3a45fa3e : ffff9187`af1bf010 00000000`0000000b ffff9187`b0be6010 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
ffffb907`f60aea30 fffff801`4643f69d : 00000000`00000002 00000000`00000000 00000000`00000000 ffff9187`00000000 : nt!KzLowerIrql+0x1e
ffffb907`f60aea60 fffff801`464b9ae2 : ffff9187`b396fb00 ffff9187`abc6d000 ffff9187`00000000 ffff9187`0000000b : dxgmms2!VidSchiSubmitMmIoFlipCommand+0x82d
ffffb907`f60aeb80 fffff801`464b994a : ffff9187`abc6d400 fffff801`464b9880 ffff9187`abc6d000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x182
ffffb907`f60aebd0 fffff801`3a52a725 : ffff9187`abcb0680 fffff801`00000001 ffff9187`abc6d000 00000067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffb907`f60aec10 fffff801`3a5c886a : ffffdd01`dcb23180 ffff9187`abcb0680 fffff801`3a52a6d0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffb907`f60aec60 00000000`00000000 : ffffb907`f60af000 ffffb907`f60a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VidSchiSubmitMmIoFlipCommand+82d

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.418

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  82d

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiSubmitMmIoFlipCommand

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {10ee4543-a3ed-1d4b-e6a6-be87ded8170d}

Followup:     MachineOwner
---------
 
Çözüm
Sisteminizde ki OC yüzünden yaşıyorsunuz bu sorunu.
O anakartın OC ile çıkabildiği hızdır muhtemelen.
XMP aktif mi kullanıyorsun Astrein?
Hayır, en başta ben de OC kaynaklı sandım. Daha sonra OC'yi kapattım ve aynı süre içerisinde, aynı oyuna girdim ve yaklaşık 20 saniye sonra yine mavi ekrandan aynı hatayı aldım, hiçbir şekilde OC kaynaklı değil yani. Normalde işlemcimi 3.7GHz'de ve XMP açıp bellekleri 3200'de kullanıyorum sadece. Anakartın 3200'e çıkmasını sağlıyorum yoksa belleklerim zaten 3200MHz.

Ayrıca Memtest86'da hiçbir sorun çıkmadı, 4 kere tekrarlandı test. Sonuç olarak donanımsal bir sorun yok büyük ihtimalle.

Şimdi Recep Baltaş'ın tavsiye ettiği ekran kartı sürücülerini silip tekrar yükleyeceğim, sorun çözülürse bildiririm.
Sorun çözülmüş bulunmakta, AMD'nin sürücülerini baştan kurunca problem çözüldü.
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı