Çözüldü ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 11

KafiLee

Zeptopat
Katılım
29 Mart 2024
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
RAM
Kingston Fury 3600 mhz
SSD veya HDD modeli
Corsair MP510
Ekran kartı
MSI GTX 1660 Super
Anakart
MSI B450 Tomahawk
İşlemci
AMD ryzen 5 3600
PUBG ve RDR2 oyunlarını oynarken belli bir aşamadan sonra mavi ekran hatası alıyorum, Windows 11 kullanıyorum, minidump dosyasını ekleyeceğim (not: Memtest sonucu temiz çıkmıştır RAM'larda herhagi bir sorun yok) yardımcı olursanız sevinirim yaklaşık 3-4 aydır bu hatayı sürekli alıyorum bu sebeple daha önce kullandığım RAM'ların bozuk olduğunu düşünerek yeni RAM aldım buna rağmen mavi ekran hatası devam ediyor.

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true

   EnableRedirectToV8JsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds


************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds

   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Erkam\Desktop\012124-6812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff804`07600000 PsLoadedModuleList = 0xfffff804`082134a0
Debug session time: Sun Jan 21 16:19:29.624 2024 (UTC + 3:00)
System Uptime: 3 days 17:19:35.259
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
.............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000001c`72204018).  Type ".hh dbgerr001" for details
Loading unloaded module list
...........................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`07a16b00 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff800e`9bf0f010=00000000000000be
11: kd> !analyze -v
*******************************************************************************
*
Bugcheck Analysis                                    *
*

*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffa178ff809000, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffff800e9bf0f230, (reserved)
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2046

    Key  : Analysis.Elapsed.mSec
    Value: 8557

    Key  : Analysis.IO.Other.Mb
    Value: 23

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 26

    Key  : Analysis.Init.CPU.mSec
    Value: 217

    Key  : Analysis.Init.Elapsed.mSec
    Value: 61639

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xbe

    Key  : Bugcheck.Code.TargetModel
    Value: 0xbe

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : Failure.Bucket
    Value: AV_nt!MiSystemFault

    Key  : Failure.Hash
    Value: {d80c40a2-5000-439f-696b-1bd8abb14be3}


BUGCHECK_CODE:  be

BUGCHECK_P1: ffffa178ff809000

BUGCHECK_P2: 8a00000000200121

BUGCHECK_P3: ffff800e9bf0f230

BUGCHECK_P4: b

FILE_IN_CAB:  012124-6812-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  myacsvc.exe

TRAP_FRAME:  ffff800e9bf0f230 -- (.trap 0xffff800e9bf0f230)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa178ff808fd0 rbx=0000000000000000 rcx=ffffa178ff808fd0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80407a2d265 rsp=ffff800e9bf0f3c8 rbp=ffff800e9bf0f560
 r8=0000000000000010  r9=ffffa178ff808ff6 r10=ffffa178ff809000
r11=ffffffffffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe nc
nt!memset+0xa5:
fffff804`07a2d265 410f1101        movups  xmmword ptr [r9],xmm0 ds:ffffa178`ff808ff6=????????????????????????????????
Resetting default scope

STACK_TEXT:
ffff800e`9bf0f008 fffff804`07a8c96f     : 00000000`000000be ffffa178`ff809000 8a000000`00200121 ffff800e`9bf0f230 : nt!KeBugCheckEx
ffff800e`9bf0f010 fffff804`0786211c     : 00000000`00000000 00000000`00000003 00000000`00000000 ffffa178`ff809000 : nt!MiSystemFault+0x1fd55f
ffff800e`9bf0f110 fffff804`07a27929     : ffff800e`9bf0f378 00000000`00000001 00000000`00000000 ffff800e`9bf0f378 : nt!MmAccessFault+0x29c
ffff800e`9bf0f230 fffff804`07a2d265     : fffff804`07849b28 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x369
ffff800e`9bf0f3c8 fffff804`07849b28     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!memset+0xa5
ffff800e`9bf0f3d0 fffff804`08032203     : 00000000`000001b8 00000000`78048034 00000000`78047e7c ffff800e`9bf0f430 : nt!RtlClearBitsEx+0x98
ffff800e`9bf0f400 fffff804`08032188     : ffffb588`ec2ec010 00000000`ffffffff 00000000`00000000 fffff804`7e7c0000 : nt!MiMarkRetpolineBits+0x63
ffff800e`9bf0f430 fffff804`07ed2d4d     : ffffb588`ec2ec010 ffffb588`ec2ec010 00000000`ffffffff 00000000`00000000 : nt!MiMarkKernelImageRetpolineBits+0x34
ffff800e`9bf0f460 fffff804`07deb0f1     : ffffb588`00000001 00000000`ffffffff 00000000`00001b7e ffff827c`023f3e00 : nt!MiUnloadSystemImage+0x1b2b1d
ffff800e`9bf0f640 fffff804`07e48c20     : ffffb588`e8778e00 ffff800e`9bf0f7e0 00000000`00000000 00000000`00000000 : nt!MmUnloadSystemImage+0x41
ffff800e`9bf0f670 fffff804`07cf352e     : ffffb588`e8778e00 ffffb588`e8778e00 ffffd787`08c557e0 ffffb588`e8778e00 : nt!IopDeleteDriver+0x40
ffff800e`9bf0f6c0 fffff804`0787dff3     : 00000000`00000000 00000000`00000000 ffff800e`9bf0f7e0 ffffb588`e8778e30 : nt!ObpRemoveObjectRoutine+0x7e
ffff800e`9bf0f720 fffff804`07a6adba     : 00000000`00000000 ffffb588`e8778e30 ffff800e`9bf0f7e0 ffffb588`e8778e30 : nt!ObfDereferenceObject+0x93
ffff800e`9bf0f760 fffff804`078828b5     : ffffb588`e92efbe0 fffff804`078ebe00 ffffb588`ebeb63b0 fffff804`07881e23 : nt!IopCompleteUnloadOrDelete+0x262aea
ffff800e`9bf0f820 fffff804`07cf9c62     : ffffb588`f4d5dc70 00000000`00000000 00000000`00000000 ffffb588`e92efbe0 : nt!IopDecrementDeviceObjectRef+0x165
ffff800e`9bf0f870 fffff804`07cf352e     : ffffb588`de6f3980 ffffb588`f4d5dc40 ffffb588`f4d5dc40 ffff800e`9bf0fa49 : nt!IopDeleteFile+0x1c2
ffff800e`9bf0f8f0 fffff804`078ec627     : 00000000`00000000 00000000`00000000 ffff800e`9bf0fa49 ffffb588`f4d5dc70 : nt!ObpRemoveObjectRoutine+0x7e
ffff800e`9bf0f950 fffff804`07d437d4     : 00000000`00000001 00000000`00000001 00000000`00000180 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7
ffff800e`9bf0f990 fffff804`07d403a9     : 00000000`7ffe0380 00000125`5d67b810 00000000`00000180 00000125`5d650000 : nt!ObpCloseHandle+0x2a4
ffff800e`9bf0fab0 fffff804`07a2bbe8     : ffffb588`e43e40c0 ffff800e`9bf0fb60 00000125`5d67c870 ffffffff`94b62e00 : nt!NtClose+0x39
ffff800e`9bf0fae0 00007fff`0404f554     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001c`727ff9b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0404f554


SYMBOL_NAME:  nt!MiSystemFault+1fd55f

MODULE_NAME: nt

IMAGE_VERSION:  10.0.22621.3007

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1fd55f

FAILURE_BUCKET_ID:  AV_nt!MiSystemFault

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d80c40a2-5000-439f-696b-1bd8abb14be3}

Followup:     MachineOwner
---------
 
 
BIOS güncelle. Sonra restore defaults save yap.
XMP açık ise kapat. BIOS'ta RAM değerini 3200 MHZ yap.
Logitech araçlarını sil. Corshair araçların sil. DDU ile NVidia sil ve güncel sürücüyü indir yükle. Güncel ağ ve chipset sürücünü yükle.
 
Çözüm

Yeni konular

Geri
Yukarı