Bitmek bilmeyen mavi ekran hatası

Yakuup

Hectopat
Katılım
9 Ekim 2020
Mesajlar
109
Çözümler
1
Oyundayken bi' 10 dakikaya mavi ekran yiyorum, sorunun kaynağı ne olabilir? Minidump dosyamı ekledim.

Minidump
 
Son düzenleyen: Moderatör:
Bir ekran kartınızı resetleyin (CTRL+Shift+Windows tuşu+b) tuşu ile yapabilirsiniz bilgisayarınızın içini açın ve temizleyin soğumaya bırakın bir de mavi ekran hata kodunu söyler misiniz hata kodu ile hangi hatadan olduğunu anlayabiliriz.
 
Artı -1 Eksi

Minidump varken bunların hiçbirine gerek yok dostum. Dediğin şeylerin hepsi ezber.

Sorunun RAM'lerden kaynaklandığını düşünüyorum. Bu doğrultuda Memtest ile stres testi yapmanızı isteyeceğim.


Yalnız ben biraz acemiyim. Yanlış tespit olmaması için @EgeN7 hocamın bakmasını rica edeceğim.
 
Son düzenleme:
BIOS güncelleyin.


Chipset güncelleyin.


Realtek sürücüsünü güncelle.


Ekran kartı sürücüsünü DDU ile kaldırın.


NVIDIA sitesinden ekran kartı sürücüsünü indirip yükleyin.


Kod:
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffdc0fc539c2d0, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffdc0fc539c2d0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.PTE
    Value: Valid

    Key  : AV.Type
    Value: Execute

    Key  : Analysis.CPU.mSec
    Value: 3092

    Key  : Analysis.Elapsed.mSec
    Value: 8429

    Key  : Analysis.IO.Other.Mb
    Value: 1

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 2

    Key  : Analysis.Init.CPU.mSec
    Value: 561

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9639

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 101

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: AV_X_(null)_dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::_DXGDEVICELOCKONAPPROPRIATETHREADMODEL

    Key  : Failure.Hash
    Value: {90793167-1008-e1c9-6835-886d9e98e00a}


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffdc0fc539c2d0

BUGCHECK_P2: 11

BUGCHECK_P3: ffffdc0fc539c2d0

BUGCHECK_P4: 2

FILE_IN_CAB:  061123-43750-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

WRITE_ADDRESS: fffff8047bf1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffdc0fc539c2d0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NVIDIA RTX Voi

TRAP_FRAME:  ffffdc0fc539ba50 -- (.trap 0xffffdc0fc539ba50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffdc0fc539bcb8
rdx=ffffdc0fc539bd98 rsi=0000000000000000 rdi=0000000000000000
rip=ffffdc0fc539c2d0 rsp=ffffdc0fc539bbe0 rbp=ffffdc0fc539c200
 r8=0000005a784ffa38  r9=ffffdc0fc539bd98 r10=0000000000000007
r11=fffff8047b200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffffdc0f`c539c2d0 00a0c1d8fd7f    add     byte ptr [rax+7FFDD8C1h],ah ds:00000000`7ffdd8c1=??
Resetting default scope

STACK_TEXT: 
ffffdc0f`c539bbe0 00007ffd`d8b60000     : 00007ffd`d8b726bd 0000005a`784ffa10 00007ffd`d8c1aa38 ffffdc0f`c539bd00 : 0xffffdc0f`c539c2d0
ffffdc0f`c539bbe8 00007ffd`d8b726bd     : 0000005a`784ffa10 00007ffd`d8c1aa38 ffffdc0f`c539bd00 ffffdc0f`c539c201 : 0x00007ffd`d8b60000
ffffdc0f`c539bbf0 0000005a`784ffa10     : 00007ffd`d8c1aa38 ffffdc0f`c539bd00 ffffdc0f`c539c201 ffffdc0f`c539bcb8 : 0x00007ffd`d8b726bd
ffffdc0f`c539bbf8 00007ffd`d8c1aa38     : ffffdc0f`c539bd00 ffffdc0f`c539c201 ffffdc0f`c539bcb8 ffffdc0f`c539c308 : 0x0000005a`784ffa10
ffffdc0f`c539bc00 ffffdc0f`c539bd00     : ffffdc0f`c539c201 ffffdc0f`c539bcb8 ffffdc0f`c539c308 00000000`784ffa10 : 0x00007ffd`d8c1aa38
ffffdc0f`c539bc08 ffffdc0f`c539c201     : ffffdc0f`c539bcb8 ffffdc0f`c539c308 00000000`784ffa10 fffff804`7b411900 : 0xffffdc0f`c539bd00
ffffdc0f`c539bc10 ffffdc0f`c539bcb8     : ffffdc0f`c539c308 00000000`784ffa10 fffff804`7b411900 00007ffd`d8b726bd : 0xffffdc0f`c539c201
ffffdc0f`c539bc18 ffffdc0f`c539c308     : 00000000`784ffa10 fffff804`7b411900 00007ffd`d8b726bd ffffdc0f`00000000 : 0xffffdc0f`c539bcb8
ffffdc0f`c539bc20 00000000`784ffa10     : fffff804`7b411900 00007ffd`d8b726bd ffffdc0f`00000000 ffffdc0f`c539c200 : 0xffffdc0f`c539c308
ffffdc0f`c539bc28 fffff804`7b411900     : 00007ffd`d8b726bd ffffdc0f`00000000 ffffdc0f`c539c200 ffffdc0f`00000001 : 0x784ffa10
ffffdc0f`c539bc30 fffff804`7b411230     : ffffdc0f`c539cae0 00000000`00000000 00007ffd`d8b726bd 00007ffd`d8c1aa38 : nt!RtlpLookupFunctionEntryForStackWalks+0x1e0
ffffdc0f`c539bca0 fffff804`7b4108ec     : 00000000`00000001 00000000`00000101 00000000`00000001 fffff804`7b669cf0 : nt!RtlpWalkFrameChain+0x910
ffffdc0f`c539c3e0 fffff804`7b66a47c     : 00000000`00001000 ffffdc0f`c539c460 00000000`00000000 ffffdc0f`c5397000 : nt!RtlWalkFrameChain+0x11c
ffffdc0f`c539c430 fffff804`7b66a2b3     : ffffcc07`34510000 ffffcc07`20143310 ffffdc0f`c539c7f0 fffff804`8a1c4288 : nt!EtwpTraceStackWalk+0x190
ffffdc0f`c539c510 fffff804`7b41b25a     : ffffcc07`34454731 fffff804`7befd350 00000000`00000001 ffffcc07`34454080 : nt!EtwpStackWalkApc+0x1d3
ffffdc0f`c539c790 fffff804`7b41a24b     : 00000000`00000000 00000000`00000000 00000000`00000004 fffff804`00000000 : nt!KiDeliverApc+0x2ba
ffffdc0f`c539c850 fffff804`7b4cd2da     : 00000000`00000000 ffffdc0f`c539cb60 00000000`00000000 00000000`00000020 : nt!KiCheckForKernelApcDelivery+0x2b
ffffdc0f`c539c880 fffff804`8f60bf26     : 00000000`00000000 ffffcc07`34dd4810 00000000`00000000 00000000`00000401 : nt!KeLeaveCriticalRegion+0x3a
ffffdc0f`c539c8b0 fffff804`8f81569a     : ffffdc0f`c539c988 ffffa406`55cb85a0 ffffdc0f`c539c988 00000000`00000000 : dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::~DXGDEVICELOCKONAPPROPRIATETHREADMODEL+0x36
ffffdc0f`c539c8e0 fffff804`8f90ca1b     : 00000175`2cb68780 ffffcc07`34454080 00000000`deadbeef 00000000`00000400 : dxgkrnl!DxgkSubmitCommandToHwQueueInternal+0x4c2
ffffdc0f`c539cab0 fffff804`7b63dce8     : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueue+0xb
ffffdc0f`c539cae0 00007ffd`d88b5fd4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005a`784f67d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d88b5fd4


STACK_COMMAND:  .trap 0xffffdc0fc539ba50 ; kb

SYMBOL_NAME:  dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::~DXGDEVICELOCKONAPPROPRIATETHREADMODEL+36

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.23403.1001

BUCKET_ID_FUNC_OFFSET:  36

FAILURE_BUCKET_ID:  AV_X_(null)_dxgkrnl!DXGDEVICELOCKONAPPROPRIATETHREADMODEL::_DXGDEVICELOCKONAPPROPRIATETHREADMODEL

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {90793167-1008-e1c9-6835-886d9e98e00a}

Followup:     MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa205465f6ed0, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffa205465f6ed0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.PTE
    Value: Valid

    Key  : AV.Type
    Value: Execute

    Key  : Analysis.CPU.mSec
    Value: 3421

    Key  : Analysis.Elapsed.mSec
    Value: 5154

    Key  : Analysis.IO.Other.Mb
    Value: 27

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 30

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 64361

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: AV_X_(null)_nt!MiSystemFault

    Key  : Failure.Hash
    Value: {49578414-34a9-c6dc-c795-b8c5552d5975}


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa205465f6ed0

BUGCHECK_P2: 11

BUGCHECK_P3: ffffa205465f6ed0

BUGCHECK_P4: 2

FILE_IN_CAB:  061323-38890-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

WRITE_ADDRESS: fffff8041bf1c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa205465f6ed0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffffa205465f6650 -- (.trap 0xffffa205465f6650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa205465f68b8
rdx=ffffa205465f6998 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa205465f6ed0 rsp=ffffa205465f67e0 rbp=ffffa205465f6e00
 r8=00000005106ff9d8  r9=ffffa205465f6998 r10=0000000000000007
r11=fffff8041b200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffffa205`465f6ed0 00a08b87f87f    add     byte ptr [rax+7FF8878Bh],ah ds:00000000`7ff8878b=??
Resetting default scope

STACK_TEXT: 
ffffa205`465f6428 fffff804`1b681b13     : 00000000`00000050 ffffa205`465f6ed0 00000000`00000011 ffffa205`465f6650 : nt!KeBugCheckEx
ffffa205`465f6430 fffff804`1b45758c     : 00007ff8`87730000 00000000`00000011 ffffa205`465f65e9 00000000`00000000 : nt!MiSystemFault+0x22d4a3
ffffa205`465f6530 fffff804`1b639b29     : fffff804`1b2b4fd0 fffff804`1b411a14 00000000`00000001 fffff804`1b63dce8 : nt!MmAccessFault+0x29c
ffffa205`465f6650 ffffa205`465f6ed0     : 00007ff8`87730000 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 : nt!KiPageFault+0x369
ffffa205`465f67e0 00007ff8`87730000     : 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 : 0xffffa205`465f6ed0
ffffa205`465f67e8 00007ff8`8777f547     : 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 : 0x00007ff8`87730000
ffffa205`465f67f0 00000005`106ff990     : 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 : 0x00007ff8`8777f547
ffffa205`465f67f8 00007ff8`878bc3c4     : ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 : 0x00000005`106ff990
ffffa205`465f6800 ffffa205`465f6900     : ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 : 0x00007ff8`878bc3c4
ffffa205`465f6808 ffffa205`465f6e01     : ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 : 0xffffa205`465f6900
ffffa205`465f6810 ffffa205`465f68b8     : ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 : 0xffffa205`465f6e01
ffffa205`465f6818 ffffa205`465f6f08     : 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 : 0xffffa205`465f68b8
ffffa205`465f6820 00000000`106ff990     : fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 : 0xffffa205`465f6f08
ffffa205`465f6828 fffff804`1b411900     : 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 0000017c`00000001 : 0x106ff990
ffffa205`465f6830 fffff804`1b411230     : ffffa205`465f7ae0 00000000`00000000 00007ff8`8777f547 00007ff8`878bc3c4 : nt!RtlpLookupFunctionEntryForStackWalks+0x1e0
ffffa205`465f68a0 fffff804`1b4108ec     : 00000000`00000001 00000000`00000101 00000000`00000001 fffff804`1b669cf0 : nt!RtlpWalkFrameChain+0x910
ffffa205`465f6fe0 fffff804`1b66a47c     : 00000000`00001000 ffffa205`465f7060 00000000`00000000 ffffa205`465f2000 : nt!RtlWalkFrameChain+0x11c
ffffa205`465f7030 fffff804`1b66a2b3     : ffffa205`465f7150 00000000`00000000 ffffa205`465f73f0 fffff804`1b579e5e : nt!EtwpTraceStackWalk+0x190
ffffa205`465f7110 fffff804`1b41b25a     : fffff804`1b5917b0 fffff804`1b6b8cd0 00000000`0000002f ffffa408`93ac5040 : nt!EtwpStackWalkApc+0x1d3
ffffa205`465f7390 fffff804`1b4cec5a     : 00000001`ffffff00 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiDeliverApc+0x2ba
ffffa205`465f7450 fffff804`1b496b5e     : 00000000`00000000 00000000`00000000 0000017c`8f046470 ffffa408`8b3a2070 : nt!KeWaitForSingleObject+0x6ea
ffffa205`465f77f0 fffff804`1b8c4bf6     : 0000017c`8e293968 ffffa408`93ac5040 ffffa205`465f78d8 00000000`00020000 : nt!AlpcpSignalAndWait+0x5e
ffffa205`465f7830 fffff804`1b8c48e7     : ffffa205`465f7910 0000017c`8e293968 0000017c`8f046470 00000005`106fd268 : nt!AlpcpReceiveSynchronousReply+0x56
ffffa205`465f7890 fffff804`1b8c2099     : ffffa408`8b3a2070 00000000`00020000 0000017c`8f046470 0000017c`8e293968 : nt!AlpcpProcessSynchronousRequest+0x397
ffffa205`465f79b0 fffff804`1b63dce8     : ffffa408`93ac5040 ffffa205`465f7b60 00000005`106fd238 ffffa205`465f7a88 : nt!NtAlpcSendWaitReceivePort+0x1d9
ffffa205`465f7a70 00007ff8`877cff74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`106fd218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`877cff74


SYMBOL_NAME:  nt!MiSystemFault+22d4a3

MODULE_NAME: nt

IMAGE_VERSION:  10.0.23403.1001

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  22d4a3

FAILURE_BUCKET_ID:  AV_X_(null)_nt!MiSystemFault

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {49578414-34a9-c6dc-c795-b8c5552d5975}

Followup:     MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa205465f6ed0, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffa205465f6ed0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.PTE
    Value: Valid

    Key  : AV.Type
    Value: Execute

    Key  : Analysis.CPU.mSec
    Value: 3311

    Key  : Analysis.Elapsed.mSec
    Value: 3302

    Key  : Analysis.IO.Other.Mb
    Value: 27

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 30

    Key  : Analysis.Init.CPU.mSec
    Value: 7139

    Key  : Analysis.Init.Elapsed.mSec
    Value: 72629

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: AV_X_(null)_nt!MiSystemFault

    Key  : Failure.Hash
    Value: {49578414-34a9-c6dc-c795-b8c5552d5975}


BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa205465f6ed0

BUGCHECK_P2: 11

BUGCHECK_P3: ffffa205465f6ed0

BUGCHECK_P4: 2

FILE_IN_CAB:  061323-38890-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

WRITE_ADDRESS: Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffa205465f6ed0

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  ffffa205465f6650 -- (.trap 0xffffa205465f6650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa205465f68b8
rdx=ffffa205465f6998 rsi=0000000000000000 rdi=0000000000000000
rip=ffffa205465f6ed0 rsp=ffffa205465f67e0 rbp=ffffa205465f6e00
 r8=00000005106ff9d8  r9=ffffa205465f6998 r10=0000000000000007
r11=fffff8041b200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffffa205`465f6ed0 00a08b87f87f    add     byte ptr [rax+7FF8878Bh],ah ds:00000000`7ff8878b=??
Resetting default scope

STACK_TEXT: 
ffffa205`465f6428 fffff804`1b681b13     : 00000000`00000050 ffffa205`465f6ed0 00000000`00000011 ffffa205`465f6650 : nt!KeBugCheckEx
ffffa205`465f6430 fffff804`1b45758c     : 00007ff8`87730000 00000000`00000011 ffffa205`465f65e9 00000000`00000000 : nt!MiSystemFault+0x22d4a3
ffffa205`465f6530 fffff804`1b639b29     : fffff804`1b2b4fd0 fffff804`1b411a14 00000000`00000001 fffff804`1b63dce8 : nt!MmAccessFault+0x29c
ffffa205`465f6650 ffffa205`465f6ed0     : 00007ff8`87730000 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 : nt!KiPageFault+0x369
ffffa205`465f67e0 00007ff8`87730000     : 00007ff8`8777f547 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 : 0xffffa205`465f6ed0
ffffa205`465f67e8 00007ff8`8777f547     : 00000005`106ff990 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 : 0x00007ff8`87730000
ffffa205`465f67f0 00000005`106ff990     : 00007ff8`878bc3c4 ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 : 0x00007ff8`8777f547
ffffa205`465f67f8 00007ff8`878bc3c4     : ffffa205`465f6900 ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 : 0x00000005`106ff990
ffffa205`465f6800 ffffa205`465f6900     : ffffa205`465f6e01 ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 : 0x00007ff8`878bc3c4
ffffa205`465f6808 ffffa205`465f6e01     : ffffa205`465f68b8 ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 : 0xffffa205`465f6900
ffffa205`465f6810 ffffa205`465f68b8     : ffffa205`465f6f08 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 : 0xffffa205`465f6e01
ffffa205`465f6818 ffffa205`465f6f08     : 00000000`106ff990 fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 : 0xffffa205`465f68b8
ffffa205`465f6820 00000000`106ff990     : fffff804`1b411900 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 : 0xffffa205`465f6f08
ffffa205`465f6828 fffff804`1b411900     : 00007ff8`8777f547 ffffa205`00000000 00000000`00000000 0000017c`00000001 : 0x106ff990
ffffa205`465f6830 fffff804`1b411230     : ffffa205`465f7ae0 00000000`00000000 00007ff8`8777f547 00007ff8`878bc3c4 : nt!RtlpLookupFunctionEntryForStackWalks+0x1e0
ffffa205`465f68a0 fffff804`1b4108ec     : 00000000`00000001 00000000`00000101 00000000`00000001 fffff804`1b669cf0 : nt!RtlpWalkFrameChain+0x910
ffffa205`465f6fe0 fffff804`1b66a47c     : 00000000`00001000 ffffa205`465f7060 00000000`00000000 ffffa205`465f2000 : nt!RtlWalkFrameChain+0x11c
ffffa205`465f7030 fffff804`1b66a2b3     : ffffa205`465f7150 00000000`00000000 ffffa205`465f73f0 fffff804`1b579e5e : nt!EtwpTraceStackWalk+0x190
ffffa205`465f7110 fffff804`1b41b25a     : fffff804`1b5917b0 fffff804`1b6b8cd0 00000000`0000002f ffffa408`93ac5040 : nt!EtwpStackWalkApc+0x1d3
ffffa205`465f7390 fffff804`1b4cec5a     : 00000001`ffffff00 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiDeliverApc+0x2ba
ffffa205`465f7450 fffff804`1b496b5e     : 00000000`00000000 00000000`00000000 0000017c`8f046470 ffffa408`8b3a2070 : nt!KeWaitForSingleObject+0x6ea
ffffa205`465f77f0 fffff804`1b8c4bf6     : 0000017c`8e293968 ffffa408`93ac5040 ffffa205`465f78d8 00000000`00020000 : nt!AlpcpSignalAndWait+0x5e
ffffa205`465f7830 fffff804`1b8c48e7     : ffffa205`465f7910 0000017c`8e293968 0000017c`8f046470 00000005`106fd268 : nt!AlpcpReceiveSynchronousReply+0x56
ffffa205`465f7890 fffff804`1b8c2099     : ffffa408`8b3a2070 00000000`00020000 0000017c`8f046470 0000017c`8e293968 : nt!AlpcpProcessSynchronousRequest+0x397
ffffa205`465f79b0 fffff804`1b63dce8     : ffffa408`93ac5040 ffffa205`465f7b60 00000005`106fd238 ffffa205`465f7a88 : nt!NtAlpcSendWaitReceivePort+0x1d9
ffffa205`465f7a70 00007ff8`877cff74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000005`106fd218 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`877cff74


SYMBOL_NAME:  nt!MiSystemFault+22d4a3

MODULE_NAME: nt

IMAGE_VERSION:  10.0.23403.1001

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  22d4a3

FAILURE_BUCKET_ID:  AV_X_(null)_nt!MiSystemFault

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {49578414-34a9-c6dc-c795-b8c5552d5975}

Followup:     MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…