1) BIOS'unuzu
7C52v3D
sürümüne yükseltin.
Best AMD AM4 B450 Micro-ATX motherboard, Turbo M.2, USB 3.2 Gen 1, MSI PRO
tr.msi.com
2) aşağıdaki ağ sürücüsünü indirip kurun.
Sonrasında sonuçları paylaşırsanız sevinirim. Kolay gelsin.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000fff, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8053a91b67e, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8608.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 30225.
Key : Analysis.Init.CPU.mSec
Value: 1171.
Key : Analysis.Init.Elapsed.mSec
Value: 5318.
Key : Analysis.Memory.CommitPeak.Mb
Value: 90.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042922-14703-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: fff.
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff8053a91b67e.
WRITE_ADDRESS: fffff8053b0fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
0000000000000fff.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NVIDIA Share.exe
TRAP_FRAME: ffffb10edb01b5d0 -- (.trap 0xffffb10edb01b5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff805388dd180
rdx=fffff8053a400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053a91b67e rsp=ffffb10edb01b760 rbp=ffffb10edb01b7a8
r8=ffffb10edb01b820 r9=fffff805388dd180 r10=0000000000000fff
r11=ffffb10edb01b730 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!KiSendHeteroRescheduleIntRequestHelper+0x34e:
fffff805`3a91b67e 498937 mov qword ptr [r15],rsi ds:00000000`00000000=????????????????
Resetting default scope.
STACK_TEXT:
ffffb10e`db01b488 fffff805`3a809869 : 00000000`0000000a 00000000`00000fff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb10e`db01b490 fffff805`3a805b69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb10e`db01b5d0 fffff805`3a91b67e : 00000000`00000000 ffff8d8f`8a826080 00000000`00000000 00000000`00000c00 : nt!KiPageFault+0x469
ffffb10e`db01b760 fffff805`3a91b2e4 : 00000000`0000000b 00000000`00000fff ffffb10e`db01b820 fffff805`388dd180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x34e
ffffb10e`db01b7f0 fffff805`3a81a470 : fffff805`ffffffff 00000000`00000000 ffff9e0b`00000000 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffb10e`db01b820 fffff805`3a60bd2f : ffff8d8f`00000000 00000001`0000000b ffffb10e`db01b9e0 00000000`00000000 : nt!KiSwapThread+0x20e170
ffffb10e`db01b8d0 fffff805`3a60b5d3 : ffffc081`00000090 fffff805`00000000 000f8067`b4bbbd01 ffff8d8f`8aec81c0 : nt!KiCommitThreadWait+0x14f
ffffb10e`db01b970 fffff805`3a9f8951 : ffff8d8f`8aae15e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffb10e`db01ba60 fffff805`3a9f89fa : ffff8d8f`8aec8080 00000047`246ff718 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffb10e`db01bac0 fffff805`3a8092b8 : 00000230`ee4b7f50 00000000`0000000e ffffb10e`db01bb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffb10e`db01bb00 00007ff9`54e2cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000047`246ff6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`54e2cdf4
SYMBOL_NAME: nt!KiSendHeteroRescheduleIntRequestHelper+34e
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1645
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 34e.
FAILURE_BUCKET_ID: AV_nt!KiSendHeteroRescheduleIntRequestHelper
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {b807f91c-7695-f3c2-28ae-134d847fcb2e}
Followup: MachineOwner.
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending.
code and original DPC routine.
Arguments:
Arg1: fffff80642127a00, Original thread which is the cause of the failure.
Arg2: ffffc10aba2d0640, New thread.
Arg3: 0000000000000000, Stack address of the original thread.
Arg4: 0000000000000000.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6452.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 23467.
Key : Analysis.Init.CPU.mSec
Value: 1031.
Key : Analysis.Init.Elapsed.mSec
Value: 9059.
Key : Analysis.Memory.CommitPeak.Mb
Value: 81.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042822-13781-01.dmp
BUGCHECK_CODE: b8.
BUGCHECK_P1: fffff80642127a00.
BUGCHECK_P2: ffffc10aba2d0640.
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_THREAD: fffff80642127a00.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
STACK_TEXT:
fffff806`45871590 fffff806`416872e5 : ffffc10a`b1feb1f0 fffff806`42127a00 fffff806`54321bb0 00000000`00000000 : nt!KiSwapContext+0x76
fffff806`458716d0 fffff806`41685437 : 00000000`00000000 00000000`00000000 ffffc10a`b1feb080 00000000`00000000 : nt!KiExitDispatcher+0x295
fffff806`45871740 fffff806`41684ed7 : 00000000`00000000 fffff806`3d856102 ffffc10a`00000000 ffffc10a`b2a6b080 : nt!IopfCompleteRequest+0x547
fffff806`45871830 fffff806`5093a1b9 : 00000000`00000000 ffffc10a`b50514e0 00000000`00000000 fffff806`3d856180 : nt!IofCompleteRequest+0x17
fffff806`45871860 fffff806`5093adee : 00000000`00000002 ffffc10a`b1e70b20 fffff806`3d856180 fffff806`45871b10 : afd+0x5a1b9
fffff806`458718b0 fffff806`41681702 : ffffc10a`b1e70b60 fffff806`3d856180 fffff806`3d856180 00000000`00000002 : afd+0x5adee
fffff806`458718e0 fffff806`41699add : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00351cfd : nt!KiProcessExpiredTimerList+0x172
fffff806`458719d0 fffff806`417fb40e : 00000000`00000000 fffff806`3d856180 fffff806`42127a00 ffffc10a`b4494080 : nt!KiRetireDpcList+0x5dd
fffff806`45871c60 00000000`00000000 : fffff806`45872000 fffff806`4586c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: afd+5a1b9
MODULE_NAME: afd.
IMAGE_NAME: afd.sys
IMAGE_VERSION: 10.0.19041.1645
STACK_COMMAND: .process /r /p 0xfffff80642124a00; .thread 0xfffff80642127a00 ; kb.
BUCKET_ID_FUNC_OFFSET: 5a1b9.
FAILURE_BUCKET_ID: 0xB8_afd!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {d21a8df2-5ebc-d989-f7e8-4ac32e8539ce}
Followup: MachineOwner.
---------[/CODE]