Ryzen 5 3600X RX 5700 XT sistemde mavi ekran hatası

İşletim sistemi
Windows 10

STRoot

Femtopat
Katılım
13 Haziran 2024
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
Minidump Rapor Linki
https://paste2.org/p3ZUBDtO
RAM
Corsair DDR4 Vengeance RGB Pro 2x8GB 3200 CL16
Ekran kartı
RX 5700 XT GAMING X
Anakart
B450M
İşlemci
Ryzen 5 3600X
Selamlar. Ara ara mavi ekran hatası ile karşılaşıyorum. Canlı yayındayken bir anda tüm her şey gidiyor yayın da bunlara dahil ama hatayı hala çözemedim. Yardımcı olabilir misiniz?

DMP dosyası aşağıda gönderilmiştir. Bu hata Discord'dan mı kaynaklı yoksa farklı şey mi bilmiyorum. Şimdiden teşekkürler.

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true

   EnableRedirectToV8JsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\062524-6875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff802`64c00000 PsLoadedModuleList = 0xfffff802`6582a360
Debug session time: Tue Jun 25 01:02:04.092 2024 (UTC + 2:00)
System Uptime: 0 days 0:54:22.737
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000096`8873a018).  Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`64ffdb50 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff60c`a92d7380=000000000000003b
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8026502a61e, Address of the instruction which caused the BugCheck
Arg3: fffff60ca92d7c80, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2499

    Key  : Analysis.Elapsed.mSec
    Value: 3949

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2412

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x3b

    Key  : Bugcheck.Code.TargetModel
    Value: 0x3b

    Key  : Failure.Bucket
    Value: AV_nt!MiUnlockWorkingSetExclusive

    Key  : Failure.Hash
    Value: {7ee8fd8f-9d86-9976-87b7-738c59fe5d1b}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8026502a61e

BUGCHECK_P3: fffff60ca92d7c80

BUGCHECK_P4: 0

FILE_IN_CAB:  062524-6875-01.dmp

CONTEXT:  fffff60ca92d7c80 -- (.cxr 0xfffff60ca92d7c80)
rax=0000000000000000 rbx=ffffdc8cfd76d7c0 rcx=fffff802605c3180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffdc8cfd76d700
rip=fffff8026502a61e rsp=fffff60ca92d8680 rbp=0000000000000000
 r8=fffff60ca92d8770  r9=0000000000000000 r10=0000000000000001
r11=00000232bb270000 r12=0000000000000000 r13=0000000000000001
r14=0000000001000000 r15=00000000ffffffde
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!MiUnlockWorkingSetExclusive+0x1fed9e:
fffff802`6502a61e 498b1e          mov     rbx,qword ptr [r14] ds:002b:00000000`01000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

STACK_TEXT:
fffff60c`a92d8680 fffff802`64e62884     : ffffdc8c`fd76d080 00000000`00000000 ffffdc8c`fd76d7c0 fffff802`605c3180 : nt!MiUnlockWorkingSetExclusive+0x1fed9e
fffff60c`a92d86c0 fffff802`65231e29     : ffffdc8d`02b8b8c0 ffffdc8d`02ac6258 ffffdc8c`fd76d080 00000000`00000000 : nt!MiGetVadWakeList+0x94
fffff60c`a92d8700 fffff802`65231d4f     : ffffdc8d`02b8b8c0 ffffdc8c`fde8b080 ffffdc8c`fd76d080 fffff802`64e62c05 : nt!MiReleaseVadEventBlocks+0x39
fffff60c`a92d8750 fffff802`64e6169e     : ffffdc8d`02ac6258 ffffdc8d`02b8b8c0 00000000`00000000 ffffdc8c`fd76d080 : nt!MiRemoveVadCharges+0xff
fffff60c`a92d87d0 fffff802`64e2b7a1     : 00000000`00000002 ffffb688`00000001 ffffdc8c`fde8b080 ffffdc8d`00000000 : nt!MiFinishVadDeletion+0x10e
fffff60c`a92d8870 fffff802`6528fbf9     : 00000000`00000000 00000000`00000000 00000096`00000000 ffffdc8c`fd76d080 : nt!MiDeleteVad+0xa11
fffff60c`a92d8970 fffff802`6528f9d2     : ffffdc8d`02b8b8c0 00000000`00000000 ffffdc8c`fd76d080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff60c`a92d89a0 fffff802`6528f849     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff60c`a92d8a80 fffff802`6528d08c     : ffffdc8c`fde8b080 00000000`00000000 00000000`00000000 ffffdc8c`fd76d080 : nt!NtUnmapViewOfSectionEx+0x99
fffff60c`a92d8ad0 fffff802`65011b08     : ffffdc8c`fde8b080 00000000`0000ffff fffff60c`a92d8b80 ffffdc8c`fbcb1a80 : nt!NtUnmapViewOfSection+0xc
fffff60c`a92d8b00 00007ffe`1672daa4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`97ffe438 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1672daa4


SYMBOL_NAME:  nt!MiUnlockWorkingSetExclusive+1fed9e

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.4522

STACK_COMMAND:  .cxr 0xfffff60ca92d7c80 ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1fed9e

FAILURE_BUCKET_ID:  AV_nt!MiUnlockWorkingSetExclusive

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7ee8fd8f-9d86-9976-87b7-738c59fe5d1b}

Followup:     MachineOwner
---------

Günceldir.
 
Son düzenleme:
Selamlar. Ara ara mavi ekran hatası ile karşılaşıyorum. Canlı yayındayken bir anda tüm her şey gidiyor yayın da bunlara dahil ama hatayı hala çözemedim. Yardımcı olabilir misiniz?

DMP dosyası aşağıda gönderilmiştir. Bu hata Discord'dan mı kaynaklı yoksa farklı şey mi bilmiyorum. Şimdiden teşekkürler.

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit
 UseExperimentalFeatureForNugetShare : true
 AllowNugetExeUpdate : true
 NonInteractiveNuget : true
 AllowNugetMSCredentialProviderInstall : true
 AllowParallelInitializationOfLocalRepositories : true

 EnableRedirectToV8JsProvider : false

 -- Configuring repositories
 ----> Repository : LocalInstalled, Enabled: true
 ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\062524-6875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff802`64c00000 PsLoadedModuleList = 0xfffff802`6582a360
Debug session time: Tue Jun 25 01:02:04.092 2024 (UTC + 2:00)
System Uptime: 0 days 0:54:22.737
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000096`8873a018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`64ffdb50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff60c`a92d7380=000000000000003b
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8026502a61e, Address of the instruction which caused the BugCheck
Arg3: fffff60ca92d7c80, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2499

 Key : Analysis.Elapsed.mSec
 Value: 3949

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 452

 Key : Analysis.Init.Elapsed.mSec
 Value: 2412

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 91

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x3b

 Key : Bugcheck.Code.TargetModel
 Value: 0x3b

 Key : Failure.Bucket
 Value: AV_nt!MiUnlockWorkingSetExclusive

 Key : Failure.Hash
 Value: {7ee8fd8f-9d86-9976-87b7-738c59fe5d1b}

 Key : WER.OS.Branch
 Value: vb_release

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8026502a61e

BUGCHECK_P3: fffff60ca92d7c80

BUGCHECK_P4: 0

FILE_IN_CAB: 062524-6875-01.dmp

CONTEXT: fffff60ca92d7c80 -- (.cxr 0xfffff60ca92d7c80)
rax=0000000000000000 rbx=ffffdc8cfd76d7c0 rcx=fffff802605c3180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffdc8cfd76d700
rip=fffff8026502a61e rsp=fffff60ca92d8680 rbp=0000000000000000
 r8=fffff60ca92d8770 r9=0000000000000000 r10=0000000000000001
r11=00000232bb270000 r12=0000000000000000 r13=0000000000000001
r14=0000000001000000 r15=00000000ffffffde
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050206
nt!MiUnlockWorkingSetExclusive+0x1fed9e:
fffff802`6502a61e 498b1e mov rbx,qword ptr [r14] ds:002b:00000000`01000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

STACK_TEXT:
fffff60c`a92d8680 fffff802`64e62884 : ffffdc8c`fd76d080 00000000`00000000 ffffdc8c`fd76d7c0 fffff802`605c3180 : nt!MiUnlockWorkingSetExclusive+0x1fed9e
fffff60c`a92d86c0 fffff802`65231e29 : ffffdc8d`02b8b8c0 ffffdc8d`02ac6258 ffffdc8c`fd76d080 00000000`00000000 : nt!MiGetVadWakeList+0x94
fffff60c`a92d8700 fffff802`65231d4f : ffffdc8d`02b8b8c0 ffffdc8c`fde8b080 ffffdc8c`fd76d080 fffff802`64e62c05 : nt!MiReleaseVadEventBlocks+0x39
fffff60c`a92d8750 fffff802`64e6169e : ffffdc8d`02ac6258 ffffdc8d`02b8b8c0 00000000`00000000 ffffdc8c`fd76d080 : nt!MiRemoveVadCharges+0xff
fffff60c`a92d87d0 fffff802`64e2b7a1 : 00000000`00000002 ffffb688`00000001 ffffdc8c`fde8b080 ffffdc8d`00000000 : nt!MiFinishVadDeletion+0x10e
fffff60c`a92d8870 fffff802`6528fbf9 : 00000000`00000000 00000000`00000000 00000096`00000000 ffffdc8c`fd76d080 : nt!MiDeleteVad+0xa11
fffff60c`a92d8970 fffff802`6528f9d2 : ffffdc8d`02b8b8c0 00000000`00000000 ffffdc8c`fd76d080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff60c`a92d89a0 fffff802`6528f849 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
fffff60c`a92d8a80 fffff802`6528d08c : ffffdc8c`fde8b080 00000000`00000000 00000000`00000000 ffffdc8c`fd76d080 : nt!NtUnmapViewOfSectionEx+0x99
fffff60c`a92d8ad0 fffff802`65011b08 : ffffdc8c`fde8b080 00000000`0000ffff fffff60c`a92d8b80 ffffdc8c`fbcb1a80 : nt!NtUnmapViewOfSection+0xc
fffff60c`a92d8b00 00007ffe`1672daa4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000096`97ffe438 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`1672daa4

SYMBOL_NAME: nt!MiUnlockWorkingSetExclusive+1fed9e

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.4522

STACK_COMMAND: .cxr 0xfffff60ca92d7c80 ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 1fed9e

FAILURE_BUCKET_ID: AV_nt!MiUnlockWorkingSetExclusive

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7ee8fd8f-9d86-9976-87b7-738c59fe5d1b}

Followup: MachineOwner
---------

Günceldir.

Minidump dosyanı paylaş.
Discord sil. Bir süre gözlemle.
 

Technopat Haberler

Yeni konular

Geri
Yukarı