Birden fazla mavi ekran hatası

İşletim sistemi
Windows 10

ChooseMyCreo

Femtopat
Katılım
1 Şubat 2022
Mesajlar
2
Daha fazla  
Cinsiyet
Erkek
RAM
Corsair 16GB 3200MHz DDR4 CMK16GX4M1Z3200C16
SSD veya HDD modeli
Hı-level 512gb Ssd M.2 Nvme Hlv-m2pcıessd2280\512g
Ekran kartı
Asus DUAL-RX580-O8G-GAMING 8GB 256Bit GDDR5
Anakart
Asus TUF B450-PRO GAMING DDR4 S+V+GL AM4 (ATX)
İşlemci
AMD Ryzen 5 3500X 3.6/4.1GHz AM4 - MPK
Bundan 2 ay önce, bir oyuna girerken PC direkt kitlenip kapandı. Sorun oyunda sandım ve başka oyuna girmeye çalıştım. Aynı hatayı diğer oyunlarda da aldım. Hatadan sonra ekran kartı devre dışı kalıyordu ve driverını silip yüklemem gerekiyordu. PC'yi formatladım ama düzelmedi. Belli oyunlarda hata alıyordum belli oyunlarda almıyordum formattan sonra. Ekran kartını garantiye gönderdim ve herhangi bir sorun algılanamadı. Bu süre zarfında başka ekran kartıyla denedim ve sorun geçmedi.
Ekran kartım geri gelince Memtest86 ile RAM'leri test ettim birden fazla kez test ettim ( tek modül 16 GB RAM var) ve hiçbir hata bulunamadı. Geçtiğimiz hafta ise PC açılır açılmaz mavi ekran verecek kadar kafayı yedi, yeni işletim sistemi bile kuramıyordum kurulum aşamasında mavi ekran veriyordu. BIOS'u güncelledim ve işletim sistemi kurabildim. Hata azaldı fakat bu sefer de aşağıdaki hataları verdi. 2 gündür birbirinden farklı bu 4 hatayı aldım. Her mavi ekran yediğimde farklı hatalar çıkıyor. Ne olur yardım edin kafayı yedim atık.
Bu birinci.

Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\013122-5437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`49000000 PsLoadedModuleList = 0xfffff806`49c2a2b0
Debug session time: Mon Jan 31 07:29:09.855 2022 (UTC + 3:00)
System Uptime: 0 days 0:44:16.502
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`493f72e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff868b`4e3f73f0=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064920c842, address which referenced memory

Debugging Details:
------------------

Bu 2. hata

Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\013122-5546-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0e800000 PsLoadedModuleList = 0xfffff804`0f42a2b0
Debug session time: Mon Jan 31 09:13:53.826 2022 (UTC + 3:00)
System Uptime: 0 days 1:44:18.465
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0ebf72e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8402`6f310470=0000000000000139
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff84026f310790, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff84026f3106e8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 3406

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 56920

 Key : Analysis.Init.CPU.mSec
 Value: 311

 Key : Analysis.Init.Elapsed.mSec
 Value: 12283

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 81

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY

 Key : FailFast.Type
 Value: 3

 Key : WER.OS.Branch
 Value: vb_release

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 013122-5546-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff84026f310790

BUGCHECK_P3: ffff84026f3106e8

BUGCHECK_P4: 0

TRAP_FRAME: ffff84026f310790 -- (.trap 0xffff84026f310790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbf821eff36c8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040ea805df rsp=ffff84026f310920 rbp=ffff84026f3109e9
 r8=0000000000000000 r9=0000000000000000 r10=ffffa980695e7180
r11=ffff84026f310a70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nt!KeWaitForMultipleObjects+0x43f:
fffff804`0ea805df cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff84026f3106e8 -- (.exr 0xffff84026f3106e8)
ExceptionAddress: fffff8040ea805df (nt!KeWaitForMultipleObjects+0x000000000000043f)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001
NumberParameters: 1
 Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff8402`6f310468 fffff804`0ec09269 : 00000000`00000139 00000000`00000003 ffff8402`6f310790 ffff8402`6f3106e8 : nt!KeBugCheckEx
ffff8402`6f310470 fffff804`0ec09690 : 00000000`0000000c fffff804`21429562 ffffbf82`22102058 ffff8402`6f3106c0 : nt!KiBugCheckDispatch+0x69
ffff8402`6f3105b0 fffff804`0ec07a23 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff804`0ea0c800 : nt!KiFastFailDispatch+0xd0
ffff8402`6f310790 fffff804`0ea805df : ffff8402`6f310970 fffff804`0ea86c0a ffffbf82`1ef50000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff8402`6f310920 fffff804`225c49a0 : 00000000`00000000 00000000`00000000 ffff8402`6f310b10 fffff804`21417cdb : nt!KeWaitForMultipleObjects+0x43f
ffff8402`6f310a30 00000000`00000000 : 00000000`00000000 ffff8402`6f310b10 fffff804`21417cdb ffffbf82`2208c800 : amdkmdag+0x13749a0

SYMBOL_NAME: amdkmdag+13749a0

MODULE_NAME: amdkmdag

IMAGE_NAME: amdkmdag.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 13749a0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_amdkmdag!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c7ee0261-4e2c-7ca0-fdcc-d386e7e1e09d}

Followup: MachineOwner
---------

Bu 3. hata

Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\013122-5843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`20e00000 PsLoadedModuleList = 0xfffff803`21a2a2b0
Debug session time: Mon Jan 31 14:24:49.444 2022 (UTC + 3:00)
System Uptime: 0 days 5:10:31.083
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`211f72e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb881`207aa740=0000000000000192
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffffd2093dac3080, The address of the thread.
Arg2: ffff848725aaa250, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 3265

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 17711

 Key : Analysis.Init.CPU.mSec
 Value: 328

 Key : Analysis.Init.Elapsed.mSec
 Value: 13895

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 75

 Key : WER.OS.Branch
 Value: vb_release

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 013122-5843-01.dmp

BUGCHECK_CODE: 192

BUGCHECK_P1: ffffd2093dac3080

BUGCHECK_P2: ffff848725aaa250

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: DbgX.Shell.exe

STACK_TEXT:
ffffb881`207aa738 fffff803`21007c0b : 00000000`00000192 ffffd209`3dac3080 ffff8487`25aaa250 00000000`00000000 : nt!KeBugCheckEx
ffffb881`207aa740 fffff803`2dded14f : ffff8487`25aaa210 ffffd209`3dac3080 ffffb881`00000000 ffffd209`48b58810 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffb881`207aa780 fffff803`2108f825 : ffffd209`3334aa60 ffffd209`00000048 0000017a`25188160 ffffd209`37f31a40 : Npfs!NpFsdRead+0xaf
ffffb881`207aa830 fffff803`1fbe46a6 : 00000000`00000000 00000000`00000001 ffffd209`3dac3080 fffff803`213f5f01 : nt!IofCallDriver+0x55
ffffb881`207aa870 fffff803`2108f825 : ffffd209`37f31a40 0000017a`2bbeaf50 ffffb881`207aab80 00000000`0000120c : FLTMGR!FltpDispatch+0xd6
ffffb881`207aa8d0 fffff803`21475b58 : ffffd209`37f31a40 00000000`00000000 00000000`00000000 00000000`0000120c : nt!IofCallDriver+0x55
ffffb881`207aa910 fffff803`2148c939 : ffffd209`00000000 ffffb881`207aab80 ffffd209`476e9660 ffffb881`207aab80 : nt!IopSynchronousServiceTail+0x1a8
ffffb881`207aa9b0 fffff803`21208cb8 : 00000000`00000000 00000000`0000120c 00000000`00000000 0000017a`2bbeaf50 : nt!NtReadFile+0x599
ffffb881`207aaa90 00007fff`6ecace34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004e`182fe848 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6ecace34

SYMBOL_NAME: Npfs!NpFsdRead+af

MODULE_NAME: Npfs

IMAGE_NAME: Npfs.SYS

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: af

FAILURE_BUCKET_ID: 0x192_Npfs!NpFsdRead

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {cdf2a433-e086-7095-87b2-bd2524ed5444}

Followup: MachineOwner
---------

Bu 4. hata

Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\020122-6281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`57400000 PsLoadedModuleList = 0xfffff807`5802a2b0
Debug session time: Tue Feb 1 12:12:25.369 2022 (UTC + 3:00)
System Uptime: 0 days 21:47:10.017
Loading Kernel Symbols
...............................................................
................................................................
................................................................
....
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`577f72e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff380`59d6b950=0000000000000001
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
BugCheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 00007ffe20e507c4, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 0000000000000001, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: fffff38059d6bb80, Call type (0 - system call, 1 - worker routine)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2859

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 10102

 Key : Analysis.Init.CPU.mSec
 Value: 327

 Key : Analysis.Init.Elapsed.mSec
 Value: 4540

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 78

 Key : WER.OS.Branch
 Value: vb_release

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

FILE_IN_CAB: 020122-6281-01.dmp

BUGCHECK_CODE: 1

BUGCHECK_P1: 7ffe20e507c4

BUGCHECK_P2: 0

BUGCHECK_P3: 1

BUGCHECK_P4: fffff38059d6bb80

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: services.exe

STACK_TEXT:
fffff380`59d6b948 fffff807`57809269 : 00000000`00000001 00007ffe`20e507c4 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
fffff380`59d6b950 fffff807`57809133 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff380`59d6ba90 00007ffe`20e507c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000088`0af7faa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`20e507c4

SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1466

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1fe

FAILURE_BUCKET_ID: 0x1_SysCallNum_1d3_nt!KiSystemServiceExitPico

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {306e1bdc-5abf-94e4-0e0d-24998a339f01}

Followup: MachineOwner
---------
 
Son düzenleme:

Yeni konular

Geri
Yukarı