NVIDIA sistemde mavi ekran hatası

ardaalmynk

Femtopat
Katılım
16 Mayıs 2025
Mesajlar
24
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Bilgisayar boşta olsun ya da olmasın 2 saatte bir mavi ekran veriyor.

BIOS ve NVIDIA driveri günceldir.

Minidump kodu:



Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 45

Microsoft (R) Windows Debugger Version 10.0.27920.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ardaalmynk\Desktop\092825-6984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff804`39400000 PsLoadedModuleList = 0xfffff804`3a02a930
Debug session time: Sun Sep 28 22:02:47.232 2025 (UTC + 3:00)
System Uptime: 0 days 0:22:59.915
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000041`71c9f018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`397fd570 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffff8300`3d8a7d30=000000000000007f
6: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000041`71c9f018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff83003d8a7e70
Arg3: ffffbc84f5c8cfe0
Arg4: fffff8043973f5fc

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1890

    Key  : Analysis.Elapsed.mSec
    Value: 7952

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 484

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2257

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.Version.DbgEng
    Value: 10.0.27920.1001

    Key  : Analysis.Version.Description
    Value: 10.2506.23.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2506.23.1

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x7f

    Key  : Bugcheck.Code.TargetModel
    Value: 0x7f

    Key  : Failure.Bucket
    Value: 0x7f_8_nt!KiDoubleFaultAbort

    Key  : Failure.Hash
    Value: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1

    Key  : WER.System.BIOSRevision
    Value: 5.17.0.0


BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffff83003d8a7e70

BUGCHECK_P3: ffffbc84f5c8cfe0

BUGCHECK_P4: fffff8043973f5fc

FILE_IN_CAB:  092825-6984-01.dmp

FAULTING_THREAD:  ffffe60af3e4b080

TRAP_FRAME:  ffff83003d8a7e70 -- (.trap 0xffff83003d8a7e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc84f5c8d018 rbx=0000000000000000 rcx=000000000010001f
rdx=ffffbc84f5c8d004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043973f5fc rsp=ffffbc84f5c8cfe0 rbp=ffffbc84f5c8d050
 r8=0000000000000000  r9=ffffe60af3e4b080 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlGetExtendedContextLength2+0x2c:
fffff804`3973f5fc e83f070000      call    nt!RtlpValidateContextFlags (fffff804`3973fd40)
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  cs2.exe

STACK_TEXT:
ffff8300`3d8a7d28 fffff804`39811da9     : 00000000`0000007f 00000000`00000008 ffff8300`3d8a7e70 ffffbc84`f5c8cfe0 : nt!KeBugCheckEx
ffff8300`3d8a7d30 fffff804`3980c252     : 45c0220f`44c6b60f 3feb1075`8d45ed33 41000004`70878b48 48006286`a1e8ca8b : nt!KiBugCheckDispatch+0x69
ffff8300`3d8a7e70 fffff804`3973f5fc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2d2
ffffbc84`f5c8cfe0 fffff804`3973c3fd     : ffffbc84`f5c8d318 000004ce`82d87680 000004cf`5a938c00 fffff804`00000000 : nt!RtlGetExtendedContextLength2+0x2c
ffffbc84`f5c8d020 fffff804`39811eec     : ffffbc84`f5c8d420 000004cf`3b090d00 000004ce`82d87680 ffffbc84`f5c8d378 : nt!KiDispatchException+0xcd
ffffbc84`f5c8d1e0 fffff804`3980b978     : 000004ce`00000000 ffffe60a`f3e4b080 00000000`00000000 00000000`00000002 : nt!KiExceptionDispatch+0x12c
ffffbc84`f5c8d3c0 fffff804`3973c417     : f8043973`c417c395 00000000`0010ffff 00000005`02820000 bc84f5c8`d5860000 : nt!KiInvalidOpcodeFault+0x338
ffffbc84`f5c8d556 fffff804`39811eec     : 4357f800`4357f800 4357f800`4357f800 00000000`3f800000 00000000`00000000 : nt!KiDispatchException+0xe7
ffffbc84`f5c8d210 00001f80`0180b978     : 00000000`00000506 00000000`0010001f ffffbc84`f5c8d068 00000000`000004f7 : nt!KiExceptionDispatch+0x12c
ffffbc84`f5c8d3f0 00000000`00000506     : 00000000`0010001f ffffbc84`f5c8d068 00000000`000004f7 00000000`000004d0 : 0x00001f80`0180b978
ffffbc84`f5c8d3f8 00000000`0010001f     : ffffbc84`f5c8d068 00000000`000004f7 00000000`000004d0 00000000`00000000 : 0x506
ffffbc84`f5c8d400 ffffbc84`f5c8d068     : 00000000`000004f7 00000000`000004d0 00000000`00000000 00000000`00000002 : 0x10001f
ffffbc84`f5c8d408 00000000`000004f7     : 00000000`000004d0 00000000`00000000 00000000`00000002 00000000`0010001f : 0xffffbc84`f5c8d068
ffffbc84`f5c8d410 00000000`000004d0     : 00000000`00000000 00000000`00000002 00000000`0010001f 00000000`00000000 : 0x4f7
ffffbc84`f5c8d418 00000000`00000000     : 00000000`00000002 00000000`0010001f 00000000`00000000 00000000`00000000 : 0x4d0


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2d2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.6328

STACK_COMMAND: .process /r /p 0xffffe60b04fa8080; .thread 0xffffe60af3e4b080 ; kb

BUCKET_ID_FUNC_OFFSET:  2d2

FAILURE_BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

Followup:     MachineOwner
---------
 
Bilgisayar boşta olsun ya da olmasın 2 saatte bir mavi ekran veriyor.

BIOS ve NVIDIA driveri günceldir.

Minidump kodu:



Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : true
   AllowNugetExeUpdate : true
   NonInteractiveNuget : true
   AllowNugetMSCredentialProviderInstall : true
   AllowParallelInitializationOfLocalRepositories : true
   EnableRedirectToChakraJsProvider : false

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 45

Microsoft (R) Windows Debugger Version 10.0.27920.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ardaalmynk\Desktop\092825-6984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff804`39400000 PsLoadedModuleList = 0xfffff804`3a02a930
Debug session time: Sun Sep 28 22:02:47.232 2025 (UTC + 3:00)
System Uptime: 0 days 0:22:59.915
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000041`71c9f018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`397fd570 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffff8300`3d8a7d30=000000000000007f
6: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000041`71c9f018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault).  The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
        use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
        use .trap on that value
Else
        .trap on the appropriate frame will show where the trap was taken
        (on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff83003d8a7e70
Arg3: ffffbc84f5c8cfe0
Arg4: fffff8043973f5fc

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1890

    Key  : Analysis.Elapsed.mSec
    Value: 7952

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 484

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2257

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Analysis.Version.DbgEng
    Value: 10.0.27920.1001

    Key  : Analysis.Version.Description
    Value: 10.2506.23.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2506.23.1

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x7f

    Key  : Bugcheck.Code.TargetModel
    Value: 0x7f

    Key  : Failure.Bucket
    Value: 0x7f_8_nt!KiDoubleFaultAbort

    Key  : Failure.Hash
    Value: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1

    Key  : WER.System.BIOSRevision
    Value: 5.17.0.0


BUGCHECK_CODE:  7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffff83003d8a7e70

BUGCHECK_P3: ffffbc84f5c8cfe0

BUGCHECK_P4: fffff8043973f5fc

FILE_IN_CAB:  092825-6984-01.dmp

FAULTING_THREAD:  ffffe60af3e4b080

TRAP_FRAME:  ffff83003d8a7e70 -- (.trap 0xffff83003d8a7e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc84f5c8d018 rbx=0000000000000000 rcx=000000000010001f
rdx=ffffbc84f5c8d004 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8043973f5fc rsp=ffffbc84f5c8cfe0 rbp=ffffbc84f5c8d050
 r8=0000000000000000  r9=ffffe60af3e4b080 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlGetExtendedContextLength2+0x2c:
fffff804`3973f5fc e83f070000      call    nt!RtlpValidateContextFlags (fffff804`3973fd40)
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  cs2.exe

STACK_TEXT:
ffff8300`3d8a7d28 fffff804`39811da9     : 00000000`0000007f 00000000`00000008 ffff8300`3d8a7e70 ffffbc84`f5c8cfe0 : nt!KeBugCheckEx
ffff8300`3d8a7d30 fffff804`3980c252     : 45c0220f`44c6b60f 3feb1075`8d45ed33 41000004`70878b48 48006286`a1e8ca8b : nt!KiBugCheckDispatch+0x69
ffff8300`3d8a7e70 fffff804`3973f5fc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2d2
ffffbc84`f5c8cfe0 fffff804`3973c3fd     : ffffbc84`f5c8d318 000004ce`82d87680 000004cf`5a938c00 fffff804`00000000 : nt!RtlGetExtendedContextLength2+0x2c
ffffbc84`f5c8d020 fffff804`39811eec     : ffffbc84`f5c8d420 000004cf`3b090d00 000004ce`82d87680 ffffbc84`f5c8d378 : nt!KiDispatchException+0xcd
ffffbc84`f5c8d1e0 fffff804`3980b978     : 000004ce`00000000 ffffe60a`f3e4b080 00000000`00000000 00000000`00000002 : nt!KiExceptionDispatch+0x12c
ffffbc84`f5c8d3c0 fffff804`3973c417     : f8043973`c417c395 00000000`0010ffff 00000005`02820000 bc84f5c8`d5860000 : nt!KiInvalidOpcodeFault+0x338
ffffbc84`f5c8d556 fffff804`39811eec     : 4357f800`4357f800 4357f800`4357f800 00000000`3f800000 00000000`00000000 : nt!KiDispatchException+0xe7
ffffbc84`f5c8d210 00001f80`0180b978     : 00000000`00000506 00000000`0010001f ffffbc84`f5c8d068 00000000`000004f7 : nt!KiExceptionDispatch+0x12c
ffffbc84`f5c8d3f0 00000000`00000506     : 00000000`0010001f ffffbc84`f5c8d068 00000000`000004f7 00000000`000004d0 : 0x00001f80`0180b978
ffffbc84`f5c8d3f8 00000000`0010001f     : ffffbc84`f5c8d068 00000000`000004f7 00000000`000004d0 00000000`00000000 : 0x506
ffffbc84`f5c8d400 ffffbc84`f5c8d068     : 00000000`000004f7 00000000`000004d0 00000000`00000000 00000000`00000002 : 0x10001f
ffffbc84`f5c8d408 00000000`000004f7     : 00000000`000004d0 00000000`00000000 00000000`00000002 00000000`0010001f : 0xffffbc84`f5c8d068
ffffbc84`f5c8d410 00000000`000004d0     : 00000000`00000000 00000000`00000002 00000000`0010001f 00000000`00000000 : 0x4f7
ffffbc84`f5c8d418 00000000`00000000     : 00000000`00000002 00000000`0010001f 00000000`00000000 00000000`00000000 : 0x4d0


SYMBOL_NAME:  nt!KiDoubleFaultAbort+2d2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.6328

STACK_COMMAND: .process /r /p 0xffffe60b04fa8080; .thread 0xffffe60af3e4b080 ; kb

BUCKET_ID_FUNC_OFFSET:  2d2

FAILURE_BUCKET_ID:  0x7f_8_nt!KiDoubleFaultAbort

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}

Followup:     MachineOwner
---------
!analyze -v kod çıktısını vermen işe yaramaz, C:\Windows\minidump klasörüne git, ziple, ulaşabileceğimiz bir yerden açık olarak paylaş, indirip bakılıp okunması gerek.

Sistem bilgilerini de yazman gerektiğini söylememe gerek yok değil mi.
 
Güncelledim hocam bakarmısınız tekrar
ntoskrnl.exe hatasına Kernel Trap eklenmiş. Ne zamandır oluyor? Neler değişti sistemde fiziken veya dijitalde?

İyi ihtimaller:
Birkaç gündür oluyorsa, bir güncelleme veya oyun/prog (orjinal veya kırık) sonrası oluşmuş olabilir.

Basitinden başla, DDU ile GPU sürücülerini sil ve tekrar kur. Kontrol et, aynısı devam ediyorsa - oyunlarda kullanılan EasyAntiCheat problem yaratıyordu Program Files(x86) içinde olması gerek, onu sil bir bak. )Mesela Valorant(

BIOS güncellemen var mı bak, bir de XMP seçeneğin mevcutsa onu bir kaldırıp dene.

Kötü ihtimal:
RAM kontrolü yapman gerek MemTest86 ile, forumda rehberi var.
 
ntoskrnl.exe hatasına Kernel Trap eklenmiş. Ne zamandır oluyor? Neler değişti sistemde fiziken veya dijitalde?

İyi ihtimaller:
Birkaç gündür oluyorsa, bir güncelleme veya oyun/prog (orjinal veya kırık) sonrası oluşmuş olabilir.

Basitinden başla, DDU ile GPU sürücülerini sil ve tekrar kur. Kontrol et, aynısı devam ediyorsa - oyunlarda kullanılan EasyAntiCheat problem yaratıyordu Program Files(x86) içinde olması gerek, onu sil bir bak. )Mesela Valorant(

BIOS güncellemen var mı bak, bir de XMP seçeneğin mevcutsa onu bir kaldırıp dene.

Kötü ihtimal:
RAM kontrolü yapman gerek MemTest86 ile, forumda rehberi var.
2 gündür oluyor. Herhangi bir değişiklik olmadı bilgisayarda. Biosu bu sabah güncelledim lakin hata devam etti. Ramın birini çıkardım şuan bekliyorum hata verecek mi diye. Hata devam ederse diğer seçenekleri deneyip geri dönüt yaparım size.
 
2 gündür oluyor. Herhangi bir değişiklik olmadı bilgisayarda. Biosu bu sabah güncelledim lakin hata devam etti. Ramın birini çıkardım şuan bekliyorum hata verecek mi diye. Hata devam ederse diğer seçenekleri deneyip geri dönüt yaparım size.
Sorun devam ederse belirt dosyalara bakarım ben.
 

Technopat Haberler

Geri
Yukarı