Crash/Mavi Ekran Hataları

cany98

Hectopat
Katılım
15 Mayıs 2019
Mesajlar
138
Merhaba, geçen aydan beri çok defa mavi ekran hatası almaktayım. Bir ara sistemi geri yüklemekle sorunu çözdüğümü zannetmiştim ama tekrar nüksetmeye başladı. Chipset güncellemesi yaptığımda çok fazla hata almaya başlamıştım, BIOS güncellemesi sonrası çok fazla almamıştım, ekran kartı güncellemesi sonrası da çok hata ile karşılaştım. Aralık ayında aldığım hataların minidump dosyaları hakkında link aşağıdadır.


Sistem özellikleri:
  • AMD Ryzen 5 3600
  • Gigabyte B450M S2H
  • Gigabyte NVIDIA GeForce RTX 2060
  • Adata XPG Gammix D30 2x8GB Ram
  • Toshiba OCZ TR200 240GB SDD
  • Seagate Barracuda 1TB HDD
 

Şu an Memtest ile işlem yapmaktayım. Bittiğinde paylaşacağım.
 

Memtest yaptım 4 aşamada da bir sorun çıkmadı. Fotoğrafını yükleyemiyorum bir türlü. Ama bir error veya hata ile karşılaşmadım. Sıfır hata yazıyor. LAN sürücü güncellemesi yaptım. Ekran kartını güncellemeye korkar oldum.
 
Merhaba bu güne kadar herhangi bir mavi ekran almadım fakat 5 dakika önce kadar bir mavi ekran hatası daha aldım. IRQL NOT LESS OR QEUAL olarak görünüyordu hata nedeni. Yakında kafayı yiyeceğim bilgisayarım daha 4 aylık falan nasıl bu kadar çok mavi ekran yiyorum anlamış değilim. Yardımcı olmanızı rica ediyorum, minidump aşağıda.

 
SteelSeries, DAEMON Tools araçların kaldır, ayrıca bellek testinin fotoğrafı gelmedi?
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000004c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80739e227cf, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 4c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80739e227cf

READ_ADDRESS: fffff8073a3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000004c

CURRENT_IRQL:  2

FAULTING_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c      mov     ebx,dword ptr [r12+4Ch]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  SteelSeriesEngine3.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-19-2019 23:13:11.0318

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffc685ad2cf780 -- (.trap 0xffffc685ad2cf780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000003ab000 rbx=0000000000000000 rcx=ffffc685ad2cf8d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80739e227cf rsp=ffffc685ad2cf910 rbp=0000000000000000
r8=000000010000002b  r9=000000010000002e r10=ffffb200ef521180
r11=ffff8707154b20c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!PpmIdlePrepare+0x3df:
fffff807`39e227cf 418b5c244c      mov     ebx,dword ptr [r12+4Ch] ds:00000000`0000004c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80739fd32e9 to fffff80739fc14e0

STACK_TEXT:
ffffc685`ad2cf638 fffff807`39fd32e9 : 00000000`0000000a 00000000`0000004c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc685`ad2cf640 fffff807`39fcf62b : ffffb200`ef521180 fffff807`39fc86ef 00000067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffc685`ad2cf780 fffff807`39e227cf : fffff807`00000000 00000000`00000000 fffff807`ffffffff 00000000`00000001 : nt!KiPageFault+0x46b
ffffc685`ad2cf910 fffff807`39fd2d18 : ffff8707`130b3080 ffff8707`1432a080 ffffffff`ffffd8f0 ffff8707`106c4360 : nt!PpmIdlePrepare+0x3df
ffffc685`ad2cfb00 244c8948`084a8b48 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
3b490814`8d48c0b7 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x244c8948`084a8b48


THREAD_SHA1_HASH_MOD_FUNC:  d08901c35a843805fec90a89a75f8fd30f8a6732

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1f79b73238d2b1934bc9b069d6da99e249105d38

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c      mov     ebx,dword ptr [r12+4Ch]

FAULT_INSTR_CODE:  245c8b41

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdlePrepare+3df

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  3df

FAILURE_BUCKET_ID:  AV_nt!PpmIdlePrepare

BUCKET_ID:  AV_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  AV_nt!PpmIdlePrepare

TARGET_TIME:  2019-12-19T19:36:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2ed9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!ppmidleprepare

FAILURE_ID_HASH:  {dd7d0096-4602-c4e5-a984-978d6ab3aa71}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000004c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80739e227cf, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 4c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80739e227cf

READ_ADDRESS: fffff8073a3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
000000000000004c

CURRENT_IRQL:  2

FAULTING_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c      mov     ebx,dword ptr [r12+4Ch]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  SteelSeriesEngine3.exe

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  12-19-2019 23:13:11.0318

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  ffffc685ad2cf780 -- (.trap 0xffffc685ad2cf780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000003ab000 rbx=0000000000000000 rcx=ffffc685ad2cf8d0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80739e227cf rsp=ffffc685ad2cf910 rbp=0000000000000000
r8=000000010000002b  r9=000000010000002e r10=ffffb200ef521180
r11=ffff8707154b20c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!PpmIdlePrepare+0x3df:
fffff807`39e227cf 418b5c244c      mov     ebx,dword ptr [r12+4Ch] ds:00000000`0000004c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80739fd32e9 to fffff80739fc14e0

STACK_TEXT:
ffffc685`ad2cf638 fffff807`39fd32e9 : 00000000`0000000a 00000000`0000004c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc685`ad2cf640 fffff807`39fcf62b : ffffb200`ef521180 fffff807`39fc86ef 00000067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffc685`ad2cf780 fffff807`39e227cf : fffff807`00000000 00000000`00000000 fffff807`ffffffff 00000000`00000001 : nt!KiPageFault+0x46b
ffffc685`ad2cf910 fffff807`39fd2d18 : ffff8707`130b3080 ffff8707`1432a080 ffffffff`ffffd8f0 ffff8707`106c4360 : nt!PpmIdlePrepare+0x3df
ffffc685`ad2cfb00 244c8948`084a8b48 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
3b490814`8d48c0b7 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x244c8948`084a8b48


THREAD_SHA1_HASH_MOD_FUNC:  d08901c35a843805fec90a89a75f8fd30f8a6732

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1f79b73238d2b1934bc9b069d6da99e249105d38

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!PpmIdlePrepare+3df
fffff807`39e227cf 418b5c244c      mov     ebx,dword ptr [r12+4Ch]

FAULT_INSTR_CODE:  245c8b41

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdlePrepare+3df

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  3df

FAILURE_BUCKET_ID:  AV_nt!PpmIdlePrepare

BUCKET_ID:  AV_nt!PpmIdlePrepare

PRIMARY_PROBLEM_CLASS:  AV_nt!PpmIdlePrepare

TARGET_TIME:  2019-12-19T19:36:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2ed9

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!ppmidleprepare

FAILURE_ID_HASH:  {dd7d0096-4602-c4e5-a984-978d6ab3aa71}

Followup:     MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…