1650 Ti sistemde mavi ekran

İşletim sistemi
Windows 11

xiwich

Centipat
Katılım
10 Şubat 2023
Mesajlar
153
Çözümler
3
Yer
Aydın
Daha fazla  
Cinsiyet
Erkek
RAM
16
SSD veya HDD modeli
500 gb m2 ssd
Ekran kartı
1650 ti
İşlemci
r5 4600h
Minidump minidump klasörüm bu. Yardımcı olursanız çok sevinirim.
 
Son düzenleyen: Moderatör:
Chipset güncel değil.

Kod:
fffff807`94ac0000 fffff807`94acd000   amdgpio2   (deferred)             
    Image path: \SystemRoot\System32\drivers\amdgpio2.sys
    Image name: amdgpio2.sys
    Browse all global symbols  functions  data
    Timestamp:        Wed Mar 11 14:15:48 2020 (5E68C864)
    CheckSum:         0001C48D
    ImageSize:        0000D000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:

Chipset güncelleyin.


Ram modellerin birbirinden farklı sonradan eklediğin ramden sonra mı bu hataları almaya başladın ?

Ram testi yapın ve sonuçları burada paylaşın.


Güncel test uygulamasını buradan edinin.


AMD Cleanup Utility ile dahili grafik kartını kaldırın. (iGPu diye geçmektedir.)


Sonrasında en güncel dahili grafik kartı sürücüsünü kurun.


Kod:
8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 00007fffffff0000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8073184f8dc, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9249

    Key  : Analysis.IO.Other.Mb
    Value: 1

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 1

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1887

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 98

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key  : WER.OS.Version
    Value: 10.0.22621.1


FILE_IN_CAB:  061123-16531-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: 7fffffff0000

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8073184f8dc

BUGCHECK_P4: b

READ_ADDRESS: fffff8073231c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 00007fffffff0000

MM_INTERNAL_CODE:  b

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steamwebhelper.exe

TRAP_FRAME:  ffffe180f8ea1f10 -- (.trap 0xffffe180f8ea1f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007fffffff0000 rbx=0000000000000000 rcx=00007fffffff0000
rdx=ffffe180f8ea2258 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073184f8dc rsp=ffffe180f8ea20a0 rbp=ffffe180f8ea26c0
 r8=0000000000000000  r9=0000000000000000 r10=ffffe180f8ea21c0
r11=ffffe04072800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!RtlpxVirtualUnwind+0x48c:
fffff807`3184f8dc 0fb600          movzx   eax,byte ptr [rax] ds:00007fff`ffff0000=??
Resetting default scope

STACK_TEXT: 
ffffe180`f8ea1d98 fffff807`31adbe3d     : 00000000`00000050 00007fff`ffff0000 00000000`00000000 ffffe180`f8ea1f10 : nt!KeBugCheckEx
ffffe180`f8ea1da0 fffff807`3183794f     : 00300031`00300041 00000000`00000000 ffffe180`f8ea1ea9 00000000`00000000 : nt!MiRaisedIrqlFault+0x1a0eed
ffffe180`f8ea1df0 fffff807`31a3cd29     : 00000000`00000000 fffff807`316bc398 ffffe180`f8ea21c0 ffffac83`a786f2f8 : nt!MmAccessFault+0x3af
ffffe180`f8ea1f10 fffff807`3184f8dc     : fffff807`31600000 fffff807`31838506 ffffac83`a7d64840 fffff807`3165b688 : nt!KiPageFault+0x369
ffffe180`f8ea20a0 fffff807`3184d925     : ffffac83`a7d64840 ffffac83`a7d64608 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x48c
ffffe180`f8ea2160 fffff807`318cf15e     : ffffffff`ffffffff ffffac83`a7d646b0 ffffac83`a7d646b0 ffffe180`f8ea2900 : nt!RtlDispatchException+0x215
ffffe180`f8ea28d0 fffff807`31a2d2b2     : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1ae
ffffe180`f8ea2fb0 fffff807`31a2d280     : fffff807`31a418f5 ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffac83`a7d644c8 fffff807`31a418f5     : ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffac83`a7d644d0 fffff807`31a3ce0e     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c8a`d6fca320 : nt!KiExceptionDispatch+0x135
ffffac83`a7d646b0 fffff807`31838506     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x44e
ffffac83`a7d64840 00000000`00000000     : 00000000`00000000 ffffac83`a7d64a00 ffff9c8a`d70e7180 fffff807`31838447 : nt!MiResolvePageTablePage+0x106


SYMBOL_NAME:  nt!RtlpxVirtualUnwind+48c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1778

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  48c

FAILURE_BUCKET_ID:  AV_R_(null)_nt!RtlpxVirtualUnwind

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {955b8b2f-25e7-b167-acd3-0cfdca67a101}

Followup:     MachineOwner
--------

9: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck
Arg2: fffff8033e03b521, Address of the instruction which caused the BugCheck
Arg3: ffffd680fbd32900, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3921

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8920

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3864

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key  : WER.OS.Version
    Value: 10.0.22621.1


FILE_IN_CAB:  061123-18468-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff8033e03b521

BUGCHECK_P3: ffffd680fbd32900

BUGCHECK_P4: 0

CONTEXT:  ffffd680fbd32900 -- (.cxr 0xffffd680fbd32900)
rax=00000000000000ae rbx=ffffc582ef4af080 rcx=0000000000008aae
rdx=ffffc582f18a0158 rsi=ffffd680fbd11180 rdi=0000000000000002
rip=fffff8033e03b521 rsp=ffff8b80321095f0 rbp=0000000000000001
 r8=0000000000000002  r9=0000000000000000 r10=0000000000000001
r11=ffffc582ef4af1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffc582ef4af180
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!KiCommitThreadWait+0x141:
fffff803`3e03b521 c4              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

MISALIGNED_IP:
nt!KiCommitThreadWait+141
fffff803`3e03b521 c4              ???

STACK_TEXT: 
ffff8b80`321095f0 fffff803`3e03a896     : 00000000`00000000 00000000`00000001 00000000`000000ae 00000002`2abbf769 : nt!KiCommitThreadWait+0x141
ffff8b80`321096a0 fffff803`3e5797ac     : ffffc582`f33f8080 ffffc582`ef05c0e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffff8b80`32109a40 fffff803`3e57969e     : ffffc582`ef4af080 00000000`19d55020 00000000`00000000 00000000`1a15fb04 : nt!ObWaitForSingleObject+0xcc
ffff8b80`32109aa0 fffff803`3e240ee8     : 00000000`00000000 ffffd680`fc7493c0 ffff8b80`32109af8 ffffffff`ff676980 : nt!NtWaitForSingleObject+0x3e
ffff8b80`32109ae0 00000000`77051cf3     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1a05edf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77051cf3


SYMBOL_NAME:  nt!KiCommitThreadWait+141

IMAGE_VERSION:  10.0.22621.1778

STACK_COMMAND:  .cxr 0xffffd680fbd32900 ; kb

MODULE_NAME: AuthenticAMD

IMAGE_NAME:  AuthenticAMD.sys

FAILURE_BUCKET_ID:  IP_MISALIGNED_AuthenticAMD.sys

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {716d112a-8330-4bbb-160c-ec98297019d2}

Followup:     MachineOwner
---------
 
Mavi ekrandan bağımsız olarak chipset konusunda bir düzeltme yapmak istiyorum.

Ryzen 5 4600H, FP5 değil FP6 soket soket kullanıyor. O yüzden bu paylaştığın chipset ile uyumlu olmayabilir.

msedge_XgqE8J81Fq.png


Mobil olan FP6 ve FP7 gibi soketler için AMD'nin net olarak paylaştığı sürücüler yok, sadece F5'te olarak, direk soket ismiyle paylaşılmış sürücüler var. O yüzden en azından bu sokette chipset sürücülerini laptop destek sayfasından indirip güncellemek daha mantıklı.
 
Dediğine kısmen katılsam da laptop olarak chipset tek sürücü olduğu için onu önerdim soket tipinin farkındayım.
 
Chipset güncel değil.

Kod:
fffff807`94ac0000 fffff807`94acd000 amdgpio2 (deferred)
 Image path: \SystemRoot\System32\drivers\amdgpio2.sys
 Image name: amdgpio2.sys
 Browse all global symbols functions data.
 Timestamp: Wed Mar 11 14:15:48 2020 (5E68C864)
 CheckSum: 0001C48D.
 ImageSize: 0000D000.
 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
 Information from resource tables:

Chipset güncelleyin.


RAM modellerin birbirinden farklı sonradan eklediğin RAM'den sonra mı bu hataları almaya başladın?

RAM testi yapın ve sonuçları burada paylaşın.


Güncel test uygulamasını buradan edinin.


AMD Cleanup Utility ile dahili grafik kartını kaldırın. (iGPU diye geçmektedir.)


Sonrasında en güncel dahili grafik kartı sürücüsünü kurun.


Kod:
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: 00007fffffff0000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
 bit 1 is set if the fault was due to a write, clear if a read.
 bit 3 is set if the processor decided the fault was due to a corrupted PTE.
 bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
 - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
 bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8073184f8dc, If non-zero, the instruction address which referenced the bad memory.
 address.
Arg4: 000000000000000b, (reserved)

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : AV.Type
 Value: Read.

 Key : Analysis.CPU.mSec
 Value: 3421.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 9249.

 Key : Analysis.IO.Other.Mb
 Value: 1

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 1

 Key : Analysis.Init.CPU.mSec
 Value: 452.

 Key : Analysis.Init.Elapsed.mSec
 Value: 1887.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 98.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x50.

 Key : Bugcheck.Code.Register
 Value: 0x50.

 Key : WER.OS.Branch
 Value: ni_release.

 Key : WER.OS.Timestamp
 Value: 2022-05-06T12:50:00Z

 Key : WER.OS.Version
 Value: 10.0.22621.1

FILE_IN_CAB: 061123-16531-01.dmp

BUGCHECK_CODE: 50.

BUGCHECK_P1: 7fffffff0000.

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8073184f8dc.

BUGCHECK_P4: b

READ_ADDRESS: fffff8073231c468: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 00007fffffff0000.

MM_INTERNAL_CODE: b

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steamwebhelper.exe

TRAP_FRAME: ffffe180f8ea1f10 -- (.trap 0xffffe180f8ea1f10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007fffffff0000 rbx=0000000000000000 rcx=00007fffffff0000
rdx=ffffe180f8ea2258 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073184f8dc rsp=ffffe180f8ea20a0 rbp=ffffe180f8ea26c0
 r8=0000000000000000 r9=0000000000000000 r10=ffffe180f8ea21c0
r11=ffffe04072800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc.
nt!RtlpxVirtualUnwind+0x48c:
fffff807`3184f8dc 0fb600 movzx eax,byte ptr [rax] ds:00007fff`ffff0000=??
Resetting default scope.

STACK_TEXT:
ffffe180`f8ea1d98 fffff807`31adbe3d : 00000000`00000050 00007fff`ffff0000 00000000`00000000 ffffe180`f8ea1f10 : nt!KeBugCheckEx
ffffe180`f8ea1da0 fffff807`3183794f : 00300031`00300041 00000000`00000000 ffffe180`f8ea1ea9 00000000`00000000 : nt!MiRaisedIrqlFault+0x1a0eed
ffffe180`f8ea1df0 fffff807`31a3cd29 : 00000000`00000000 fffff807`316bc398 ffffe180`f8ea21c0 ffffac83`a786f2f8 : nt!MmAccessFault+0x3af
ffffe180`f8ea1f10 fffff807`3184f8dc : fffff807`31600000 fffff807`31838506 ffffac83`a7d64840 fffff807`3165b688 : nt!KiPageFault+0x369
ffffe180`f8ea20a0 fffff807`3184d925 : ffffac83`a7d64840 ffffac83`a7d64608 00000000`00000000 00000000`00000000 : nt!RtlpxVirtualUnwind+0x48c
ffffe180`f8ea2160 fffff807`318cf15e : ffffffff`ffffffff ffffac83`a7d646b0 ffffac83`a7d646b0 ffffe180`f8ea2900 : nt!RtlDispatchException+0x215
ffffe180`f8ea28d0 fffff807`31a2d2b2 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x1ae
ffffe180`f8ea2fb0 fffff807`31a2d280 : fffff807`31a418f5 ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffac83`a7d644c8 fffff807`31a418f5 : ffff9c8a`d70e7800 fffff325`4c049b58 ffffd180`09267600 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffac83`a7d644d0 fffff807`31a3ce0e : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9c8a`d6fca320 : nt!KiExceptionDispatch+0x135
ffffac83`a7d646b0 fffff807`31838506 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x44e
ffffac83`a7d64840 00000000`00000000 : 00000000`00000000 ffffac83`a7d64a00 ffff9c8a`d70e7180 fffff807`31838447 : nt!MiResolvePageTablePage+0x106

SYMBOL_NAME: nt!RtlpxVirtualUnwind+48c

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.1778

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 48c.

FAILURE_BUCKET_ID: AV_R_(null)_nt!RtlpxVirtualUnwind

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {955b8b2f-25e7-b167-acd3-0cfdca67a101}

Followup: MachineOwner.
--------

9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the BugCheck.
Arg2: fffff8033e03b521, Address of the instruction which caused the BugCheck.
Arg3: ffffd680fbd32900, Address of the context record for the exception that caused the BugCheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 3921.

 Key : Analysis.DebugAnalysisManager
 Value: Create.

 Key : Analysis.Elapsed.mSec
 Value: 8920.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 374.

 Key : Analysis.Init.Elapsed.mSec
 Value: 3864.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 99.

 Key : Bugcheck.Code.DumpHeader
 Value: 0x3b.

 Key : Bugcheck.Code.Register
 Value: 0x3b.

 Key : WER.OS.Branch
 Value: ni_release.

 Key : WER.OS.Timestamp
 Value: 2022-05-06T12:50:00Z

 Key : WER.OS.Version
 Value: 10.0.22621.1

FILE_IN_CAB: 061123-18468-01.dmp

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c000001d.

BUGCHECK_P2: fffff8033e03b521.

BUGCHECK_P3: ffffd680fbd32900.

BUGCHECK_P4: 0

CONTEXT: ffffd680fbd32900 -- (.cxr 0xffffd680fbd32900)
rax=00000000000000ae rbx=ffffc582ef4af080 rcx=0000000000008aae
rdx=ffffc582f18a0158 rsi=ffffd680fbd11180 rdi=0000000000000002
rip=fffff8033e03b521 rsp=ffff8b80321095f0 rbp=0000000000000001
 r8=0000000000000002 r9=0000000000000000 r10=0000000000000001
r11=ffffc582ef4af1c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffc582ef4af180
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!KiCommitThreadWait+0x141:
fffff803`3e03b521 c4 ???
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Discord.exe

MISALIGNED_IP:
nt!KiCommitThreadWait+141
fffff803`3e03b521 c4 ???

STACK_TEXT:
ffff8b80`321095f0 fffff803`3e03a896 : 00000000`00000000 00000000`00000001 00000000`000000ae 00000002`2abbf769 : nt!KiCommitThreadWait+0x141
ffff8b80`321096a0 fffff803`3e5797ac : ffffc582`f33f8080 ffffc582`ef05c0e0 00000000`00000000 00000000`00000001 : nt!KeWaitForSingleObject+0x256
ffff8b80`32109a40 fffff803`3e57969e : ffffc582`ef4af080 00000000`19d55020 00000000`00000000 00000000`1a15fb04 : nt!ObWaitForSingleObject+0xcc
ffff8b80`32109aa0 fffff803`3e240ee8 : 00000000`00000000 ffffd680`fc7493c0 ffff8b80`32109af8 ffffffff`ff676980 : nt!NtWaitForSingleObject+0x3e
ffff8b80`32109ae0 00000000`77051cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`1a05edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77051cf3.

SYMBOL_NAME: nt!KiCommitThreadWait+141

IMAGE_VERSION: 10.0.22621.1778

STACK_COMMAND: .cxr 0xffffd680fbd32900 ; kb.

MODULE_NAME: AuthenticAMD.

IMAGE_NAME: AuthenticAMD.sys

FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}

Followup: MachineOwner.
---------

Eski chipset sürücüsüne nasıl dönebilirim sistemi ve oyunları çok zorluyor.
 
Chipset sistemi ve oyunları zorlamaz. Sorun yaşıyorsan chipset sürücüsünü kaldır. Laptop sürücülerini internetten bul oradan yükle.
 

Yeni konular

Geri
Yukarı