DPC Watchdog mavi ekran hatası

alposki046

Femtopat
Katılım
15 Eylül 2020
Mesajlar
11
Arkadaslar selamlar, Monster Abra A5 v12.1 model bir Notebook'a sahibim. Yaşadığım sorun tam olarak harici ekran kartını devreye sokan oyunlara girdiğimde 5 dakika sonra ekran donuyor, bilgisayar kilitleniyor ve mavi ekran veriyor. Kesinlikle oyun oynayamıyorum. Yardımınıza çok ihtiyacım var şimdiden cok teşekkür ederim. Saygılar.

WhatsApp Image 2020-09-15 at 12.58.40.jpeg
WhatsApp Image 2020-09-15 at 12.59.27.jpeg
 
Intel grafik biriminin sürücülerini güncelleyin. Harici ekran kartınızın sürücülerini DDU ile kaldırıp güncelleyin. OC gibi bir işlem yaptıysanız kaldırın. Isı durumları nasıl? Çok ısınıyorsa macu değişimi ve fan/kasa temizliği yapın.
 
Intel grafik biriminin sürücülerini güncelleyin. Harici ekran kartınızın sürücülerini DDU ile kaldırıp güncelleyin. OC gibi bir işlem yaptıysanız kaldırın. Isı durumları nasıl? Çok ısınıyorsa macu değişimi ve fan/kasa temizliği yapın.
bakımdan yeni geldi termal macun fan temizliği yapıldı. OC hiç yapmadım.Harici ekran kartını DDU ile kaldırmayı deniyeceğim.
Belleklere tarama yapabilir misin? Ayrıca ekran kartı driver'ının güncel olduğundan emin olun.
Tam olarak nasıl tarama yapılacağını bilmiyorum.Yönlendirebilirseniz yaparım tabii.
 
Memtest86 ile bellek testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Kod:
MACHINE_CHECK_EXCEPTION (9c)
A fatal Machine Check Exception has occurred.
KeBugCheckEx parameters;
    x86 Processors
        If the processor has ONLY MCE feature available (For example Intel
        Pentium), the parameters are:
        1 - Low  32 bits of P5_MC_TYPE MSR
        2 - Address of MCA_EXCEPTION structure
        3 - High 32 bits of P5_MC_ADDR MSR
        4 - Low  32 bits of P5_MC_ADDR MSR
        If the processor also has MCA feature available (For example Intel
        Pentium Pro), the parameters are:
        1 - Bank number
        2 - Address of MCA_EXCEPTION structure
        3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
        4 - Low  32 bits of MCi_STATUS MSR for the MCA bank that had the error
    IA64 Processors
        1 - Bugcheck Type
            1 - MCA_ASSERT
            2 - MCA_GET_STATEINFO
                SAL returned an error for SAL_GET_STATEINFO while processing MCA.
            3 - MCA_CLEAR_STATEINFO
                SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
            4 - MCA_FATAL
                FW reported a fatal MCA.
            5 - MCA_NONFATAL
                SAL reported a recoverable MCA and we don't support currently
                support recovery or SAL generated an MCA and then couldn't
                produce an error record.
            0xB - INIT_ASSERT
            0xC - INIT_GET_STATEINFO
                  SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
            0xD - INIT_CLEAR_STATEINFO
                  SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
            0xE - INIT_FATAL
                  Not used.
        2 - Address of log
        3 - Size of log
        4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
    AMD64 Processors
        1 - Bank number
        2 - Address of MCA_EXCEPTION structure
        3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
        4 - Low  32 bits of MCi_STATUS MSR for the MCA bank that had the error
Arguments:
Arg1: 0000000080000001
Arg2: fffff8051e097b10
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x9C_GenuineIntel

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  setup.exe

CURRENT_IRQL:  f

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80519ab52a9 to fffff805199f3ea0

STACK_TEXT: 
fffff805`1e097ac8 fffff805`19ab52a9 : 00000000`0000009c 00000000`80000001 fffff805`1e097b10 00000000`00000000 : nt!KeBugCheckEx
fffff805`1e097ad0 fffff805`19ab5704 : 00000000`00000004 fffff805`1e097e50 00000000`00000000 00000000`00000004 : nt!HalpMcaReportError+0x149
fffff805`1e097c40 fffff805`19ab491b : 00000000`00000000 00000000`80000001 fffff805`1e097ed0 00000000`00000000 : nt!HalpMceHandlerWithRendezvous+0x11c
fffff805`1e097c70 fffff805`19ab7165 : ffffaa8b`240f5740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpHandleMachineCheck+0x5f
fffff805`1e097ca0 fffff805`19b0c999 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalHandleMcheck+0x35
fffff805`1e097cd0 fffff805`19a02ffa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiHandleMcheck+0x9
fffff805`1e097d00 fffff805`19a02cb7 : fffff805`00000000 fffff805`19a02bec 00000000`0010bd87 00000000`00000000 : nt!KxMcheckAbort+0x7a
fffff805`1e097e40 fffff805`19921140 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff880`059dd8f0 : nt!KiMcheckAbort+0x277
ffffeb8d`592fed20 fffff805`19920f58 : 00000000`00000000 ffffeb8d`592fef00 00000000`00000000 00000000`00000000 : nt!KeFlushMultipleRangeTb+0x160
ffffeb8d`592fedc0 fffff805`19928c33 : fffff805`1a24ef40 fffff880`00000000 fffff805`00000000 ffffeb8d`592fee48 : nt!MiFlushTbList+0x88
ffffeb8d`592fedf0 fffff805`198b27f2 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc0fc`028c8f98 : nt!MiTerminateWsleCluster+0x363
ffffeb8d`592fefa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedPtes+0x1f2


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff805198f15ac-fffff805198f15b0  5 bytes - nt!MiResolveDemandZeroFault+36c
    [ d7 be 7d fb f6:17 38 70 e0 c0 ]
    fffff805198f15f9 - nt!MiResolveDemandZeroFault+3b9 (+0x4d)
    [ f6:c0 ]
    fffff805199963ae-fffff805199963b1  4 bytes - nt!MiFreeUltraMapping+32 (+0xa4db5)
    [ a0 7d fb f6:20 70 e0 c0 ]
10 errors : !nt (fffff805198f15ac-fffff805199963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80681cfa320
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that   ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x133

PROCESS_NAME:  PathOfExile_x6

CURRENT_IRQL:  d

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff806814795de to fffff806813f3ea0

STACK_TEXT: 
fffff806`86c7be18 fffff806`814795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`81cfa320 : nt!KeBugCheckEx
fffff806`86c7be20 fffff806`8130518d : 000000c7`4927a088 00000000`00000000 fffff806`86c74300 fffff806`7e971180 : nt!KeAccumulateTicks+0x17118e
fffff806`86c7be80 fffff806`8130500a : fffff806`81cf3840 fffff806`86c74310 00000000`000053f1 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff806`86c7bf30 fffff806`81280795 : fffff806`81cf3840 00000000`00000000 00000000`00000000 ffffe253`5613a082 : nt!HalpTimerClockIpiRoutine+0x1a
fffff806`86c7bf60 fffff806`813f594a : fffff806`86c74310 fffff806`81cf3840 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff806`86c7bfb0 fffff806`813f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff806`86c74290 fffff806`9b695788 : fffff806`9b032f57 00000000`00000000 ffffd303`94bd87e0 ffffd303`00000001 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff806`86c74428 fffff806`9b032f57 : 00000000`00000000 ffffd303`94bd87e0 ffffd303`00000001 00000000`00000000 : nvlddmkm+0x765788
fffff806`86c74430 00000000`00000000 : ffffd303`94bd87e0 ffffd303`00000001 00000000`00000000 00000000`00000000 : nvlddmkm+0x102f57


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8067fd8cd05-fffff8067fd8cd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff8067fd8cd0c-fffff8067fd8cd10  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00 00:e8 8f fd 4a 01 ]
    fffff8067fd8cd1a-fffff8067fd8cd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8067fd8cd21-fffff8067fd8cd25  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00 00:e8 3a 3c 55 01 ]
    fffff8067fd8cd6a-fffff8067fd8cd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff8067fd8cd71-fffff8067fd8cd77  7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 3a 34 55 01 4c 8b ]
    fffff8067fd8cd7d-fffff8067fd8cd81  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
    [ 0f 1f 44 00 00:e8 0e 0f 48 01 ]
28 errors : !FLTMGR (fffff8067fd8cd05-fffff8067fd8cd81)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803474fa320
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that   ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x133

PROCESS_NAME:  PathOfExile_x6

CURRENT_IRQL:  d

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80346c795de to fffff80346bf3ea0

STACK_TEXT: 
fffff803`4a47be18 fffff803`46c795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`474fa320 : nt!KeBugCheckEx
fffff803`4a47be20 fffff803`46b0518d : 000000b6`a62ebdc4 00000000`00000000 fffff803`4a473e00 fffff803`41fdf180 : nt!KeAccumulateTicks+0x17118e
fffff803`4a47be80 fffff803`46b0500a : fffff803`474f3840 fffff803`4a473e90 fffff803`00004cca 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff803`4a47bf30 fffff803`46a80795 : fffff803`474f3840 fffff803`4a47bf40 00000000`00000010 ffff14ba`95fddb0c : nt!HalpTimerClockIpiRoutine+0x1a
fffff803`4a47bf60 fffff803`46bf594a : fffff803`4a473e90 fffff803`474f3840 00000000`0000000e 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`4a47bfb0 fffff803`46bf5eb7 : fffff803`4a473f50 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff803`4a473e10 fffff803`5ee3e47f : 00000000`00000002 fffff803`46aea558 00000000`00000020 fffff803`5f6089f4 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff803`4a473fa0 00000000`00000002 : fffff803`46aea558 00000000`00000020 fffff803`5f6089f4 00000000`00000002 : nvlddmkm+0x11e47f
fffff803`4a473fa8 fffff803`46aea558 : 00000000`00000020 fffff803`5f6089f4 00000000`00000002 fffff803`5ee3e64b : 0x2
fffff803`4a473fb0 fffff803`4a474100 : 00000000`00000002 fffff803`5f6087f0 00000000`0000001f fffff803`5ee23e47 : nt!RtlpGetStackLimits+0x28
fffff803`4a473fe0 00000000`00000002 : fffff803`5f6087f0 00000000`0000001f fffff803`5ee23e47 00000000`00000002 : 0xfffff803`4a474100
fffff803`4a473fe8 fffff803`5f6087f0 : 00000000`0000001f fffff803`5ee23e47 00000000`00000002 00000000`0000001f : 0x2
fffff803`4a473ff0 00000000`0000001f : fffff803`5ee23e47 00000000`00000002 00000000`0000001f 00000000`00000019 : nvlddmkm+0x8e87f0
fffff803`4a473ff8 fffff803`5ee23e47 : 00000000`00000002 00000000`0000001f 00000000`00000019 00000000`00000004 : 0x1f
fffff803`4a474000 00000000`00000002 : 00000000`0000001f 00000000`00000019 00000000`00000004 000623cb`5f608180 : nvlddmkm+0x103e47
fffff803`4a474008 00000000`0000001f : 00000000`00000019 00000000`00000004 000623cb`5f608180 fffff803`5f6089f4 : 0x2
fffff803`4a474010 00000000`00000019 : 00000000`00000004 000623cb`5f608180 fffff803`5f6089f4 5f608180`00000005 : 0x1f
fffff803`4a474018 00000000`00000004 : 000623cb`5f608180 fffff803`5f6089f4 5f608180`00000005 000000ff`000000ff : 0x19
fffff803`4a474020 000623cb`5f608180 : fffff803`5f6089f4 5f608180`00000005 000000ff`000000ff 5f608180`00000040 : 0x4
fffff803`4a474028 fffff803`5f6089f4 : 5f608180`00000005 000000ff`000000ff 5f608180`00000040 c01401aa`a039c965 : 0x000623cb`5f608180
fffff803`4a474030 5f608180`00000005 : 000000ff`000000ff 5f608180`00000040 c01401aa`a039c965 00000000`00000000 : nvlddmkm+0x8e89f4
fffff803`4a474038 000000ff`000000ff : 5f608180`00000040 c01401aa`a039c965 00000000`00000000 fffff803`4a46e000 : 0x5f608180`00000005
fffff803`4a474040 5f608180`00000040 : c01401aa`a039c965 00000000`00000000 fffff803`4a46e000 00000000`00000000 : 0x000000ff`000000ff
fffff803`4a474048 c01401aa`a039c965 : 00000000`00000000 fffff803`4a46e000 00000000`00000000 fffff803`4a475000 : 0x5f608180`00000040
fffff803`4a474050 00000000`00000000 : fffff803`4a46e000 00000000`00000000 fffff803`4a475000 00000000`0000000f : 0xc01401aa`a039c965


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff803433fcd05-fffff803433fcd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff803433fcd0c-fffff803433fcd10  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00 00:e8 8f fd 63 03 ]
    fffff803433fcd1a-fffff803433fcd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff803433fcd21-fffff803433fcd25  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00 00:e8 3a 3c 6e 03 ]
    fffff803433fcd6a-fffff803433fcd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff803433fcd71-fffff803433fcd77  7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 3a 34 6e 03 4c 8b ]
    fffff803433fcd7d-fffff803433fcd81  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
    [ 0f 1f 44 00 00:e8 0e 0f 61 03 ]
28 errors : !FLTMGR (fffff803433fcd05-fffff803433fcd81)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff804816fa320
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that   ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x133

PROCESS_NAME:  System

CURRENT_IRQL:  d

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80480e795de to fffff80480df3ea0

STACK_TEXT: 
fffff804`83a7be18 fffff804`80e795de : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`816fa320 : nt!KeBugCheckEx
fffff804`83a7be20 fffff804`80d0518d : 000000b6`ba42734e 00000000`00000000 fffff804`83a74100 fffff804`7b6df180 : nt!KeAccumulateTicks+0x17118e
fffff804`83a7be80 fffff804`80d0500a : fffff804`816f3840 fffff804`83a74110 fffff804`00004cce 00000000`00000000 : nt!KeClockInterruptNotify+0xbd
fffff804`83a7bf30 fffff804`80c80795 : fffff804`816f3840 00000000`00000000 00000000`00000000 ffff04e2`aad27621 : nt!HalpTimerClockIpiRoutine+0x1a
fffff804`83a7bf60 fffff804`80df594a : fffff804`83a74110 fffff804`816f3840 fffff804`83a742c0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff804`83a7bfb0 fffff804`80df5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff804`83a74090 fffff804`9867379c : 00000000`00000003 fffff804`9868e47f 00000000`00000003 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff804`83a74220 00000000`00000003 : fffff804`9868e47f 00000000`00000003 00000000`00000000 00000000`00000a22 : nvlddmkm+0x10379c
fffff804`83a74228 fffff804`9868e47f : 00000000`00000003 00000000`00000000 00000000`00000a22 fffff804`98e589f4 : 0x3
fffff804`83a74230 00000000`00000003 : 00000000`00000000 00000000`00000a22 fffff804`98e589f4 00000000`0000000e : nvlddmkm+0x11e47f
fffff804`83a74238 00000000`00000000 : 00000000`00000a22 fffff804`98e589f4 00000000`0000000e fffff804`9867407d : 0x3


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8047cafcd05-fffff8047cafcd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff8047cafcd0c-fffff8047cafcd10  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00 00:e8 8f fd 13 04 ]
    fffff8047cafcd1a-fffff8047cafcd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8047cafcd21-fffff8047cafcd25  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00 00:e8 3a 3c 1e 04 ]
    fffff8047cafcd6a-fffff8047cafcd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff8047cafcd71-fffff8047cafcd77  7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 3a 34 1e 04 4c 8b ]
    fffff8047cafcd7d-fffff8047cafcd81  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
    [ 0f 1f 44 00 00:e8 0e 0f 11 04 ]
28 errors : !FLTMGR (fffff8047cafcd05-fffff8047cafcd81)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff805458cc960, Address of the instruction which caused the bugcheck
Arg3: ffffde09c5f76720, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!RtlpHpVsChunkSplit+590
fffff805`458cc960 8b4bf8          mov     ecx,dword ptr [rbx-8]

CONTEXT:  ffffde09c5f76720 -- (.cxr 0xffffde09c5f76720;r)
rax=ffa3d608ff6198bc rbx=ffa3d608ff6198bc rcx=000000009d818225
rdx=00000000001a0000 rsi=00000000000000e1 rdi=ffff9c89feca2e40
rip=fffff805458cc960 rsp=ffffde09c5f77120 rbp=ffffde09c5f77198
 r8=1818c8ba62c337d8  r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=000000000000001a r13=ffff9c89feca2000
r14=ffff9c89f2200280 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!RtlpHpVsChunkSplit+0x590:
fffff805`458cc960 8b4bf8          mov     ecx,dword ptr [rbx-8] ds:002b:ffa3d608`ff6198b4=????????
Last set context:
rax=ffa3d608ff6198bc rbx=ffa3d608ff6198bc rcx=000000009d818225
rdx=00000000001a0000 rsi=00000000000000e1 rdi=ffff9c89feca2e40
rip=fffff805458cc960 rsp=ffffde09c5f77120 rbp=ffffde09c5f77198
 r8=1818c8ba62c337d8  r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=000000000000001a r13=ffff9c89feca2000
r14=ffff9c89f2200280 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
nt!RtlpHpVsChunkSplit+0x590:
fffff805`458cc960 8b4bf8          mov     ecx,dword ptr [rbx-8] ds:002b:ffa3d608`ff6198b4=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x3B

PROCESS_NAME:  WerFault.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff805458cc1fa to fffff805458cc960

STACK_TEXT: 
ffffde09`c5f77120 fffff805`458cc1fa : 0000001a`0000001a ffff9c89`feca2030 00000000`0000001a 00000000`00000000 : nt!RtlpHpVsChunkSplit+0x590
ffffde09`c5f771e0 fffff805`458cf778 : 00000000`00000000 00000000`00000e00 ffffde09`c5f77321 00000000`00000e00 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffde09`c5f77240 fffff805`458ceebf : ffffdf0e`00000000 00000000`00000008 00000000`74536d4d 00000000`00000000 : nt!ExAllocateHeapPool+0x888
ffffde09`c5f77380 fffff805`45944916 : 00000000`80000000 00000000`00000db8 00000000`74536d4d ffffde09`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffde09`c5f773d0 fffff805`45952177 : 00000000`00000000 ffffde09`c5f77490 00000000`000001b7 00000000`00000000 : nt!MiAllocatePool+0x86
ffffde09`c5f77420 fffff805`45944082 : ffffffff`ffffffff ffffffff`ffffffff ffffdf0e`e413cdf0 00000000`00000000 : nt!MiCreatePrototypePtes+0x53
ffffde09`c5f774d0 fffff805`45ce5ce7 : ffffdf0e`00000001 00000000`000001b7 00000000`00000000 ffffde09`000001b7 : nt!MiAddViewsForSection+0x3c2
ffffde09`c5f775d0 fffff805`45ce57cc : 00000000`00000001 00000000`00000000 ffffde09`c5f778a8 ffffde09`c5f778b8 : nt!MiMapViewOfDataSection+0x197
ffffde09`c5f77700 fffff805`45ce48a9 : 00000000`00000000 ffffde09`c5f77a80 00000018`16477e20 00000000`00000000 : nt!MiMapViewOfSection+0x34c
ffffde09`c5f77850 fffff805`45a058b5 : ffffdf0e`e83c8080 00000018`16477de8 00000000`00000000 00000000`00000000 : nt!NtMapViewOfSection+0x159
ffffde09`c5f77990 00007ffe`6a88c2c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000018`16477dc8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`6a88c2c4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff80544135ed8-fffff80544135ed9  2 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1b8
    [ 48 ff:4c 8b ]
    fffff80544135edf-fffff80544135ee3  5 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1bf (+0x07)
    [ 0f 1f 44 00 00:e8 3c 66 74 01 ]
    fffff80544135ef1-fffff80544135ef2  2 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1d1 (+0x12)
    [ 48 ff:4c 8b ]
    fffff80544135ef8-fffff80544135efe  7 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1d8 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 73 94 7a 01 4c 8b ]
    fffff80544135f04-fffff80544135f08  5 bytes - FLTMGR!FltpPerformPreCallbacksWorker+1e4 (+0x0c)
    [ 0f 1f 44 00 00:e8 87 7d 6d 01 ]
    fffff80544135f45-fffff80544135f46  2 bytes - FLTMGR!FltpPerformPreCallbacksWorker+225 (+0x41)
    [ 48 ff:4c 8b ]
    fffff80544135f4c-fffff80544135f50  5 bytes - FLTMGR!FltpPerformPreCallbacksWorker+22c (+0x07)
    [ 0f 1f 44 00 00:e8 6f 60 70 01 ]
    fffff8054413b9fd-fffff8054413b9fe  2 bytes - FLTMGR!FltpSynchronizedOperationCompletion+d (+0x5ab1)
    [ 48 ff:4c 8b ]
    fffff8054413ba04-fffff8054413ba08  5 bytes - FLTMGR!FltpSynchronizedOperationCompletion+14 (+0x07)
    [ 0f 1f 44 00 00:e8 f7 d7 78 01 ]
    fffff8054413ba2b-fffff8054413ba2c  2 bytes - FLTMGR!FltReleasePushLockEx+b (+0x27)
    [ 48 ff:4c 8b ]
    fffff8054413ba32-fffff8054413ba38  7 bytes - FLTMGR!FltReleasePushLockEx+12 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 19 42 7a 01 4c 8b ]
    fffff8054413ba3e-fffff8054413ba42  5 bytes - FLTMGR!FltReleasePushLockEx+1e (+0x0c)
    [ 0f 1f 44 00 00:e8 2d 47 7a 01 ]
    fffff8054416cd05-fffff8054416cd06  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+35
    [ 48 ff:4c 8b ]
    fffff8054416cd0c-fffff8054416cd10  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+3c (+0x07)
    [ 0f 1f 44 00 00:e8 8f fd 6c 01 ]
    fffff8054416cd1a-fffff8054416cd1b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+4a (+0x0e)
    [ 48 ff:4c 8b ]
    fffff8054416cd21-fffff8054416cd25  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+51 (+0x07)
    [ 0f 1f 44 00 00:e8 3a 3c 77 01 ]
    fffff8054416cd6a-fffff8054416cd6b  2 bytes - FLTMGR!DeleteStreamListCtrlCallback+9a (+0x49)
    [ 48 ff:4c 8b ]
    fffff8054416cd71-fffff8054416cd77  7 bytes - FLTMGR!DeleteStreamListCtrlCallback+a1 (+0x07)
    [ 0f 1f 44 00 00 48 ff:e8 3a 34 77 01 4c 8b ]
    fffff8054416cd7d-fffff8054416cd81  5 bytes - FLTMGR!DeleteStreamListCtrlCallback+ad (+0x0c)
    [ 0f 1f 44 00 00:e8 0e 0f 6a 01 ]
77 errors : !FLTMGR (fffff80544135ed8-fffff8054416cd81)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffde09c5f76720 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Son düzenleme:
Tam olarak nasıl tarama yapılacağını bilmiyorum. Yönlendirebilirseniz yaparım tabii.

@Recep Baltaş hocamın yaptığı rehbere bakabilirsiniz.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 
Intel grafik biriminin sürücülerini güncelleyin. Harici ekran kartınızın sürücülerini DDU ile kaldırıp güncelleyin. OC gibi bir işlem yaptıysanız kaldırın. Isı durumları nasıl? Çok ısınıyorsa macu değişimi ve fan/kasa temizliği yapın.
DDU ile ekran kartı sürücülerini kaldırıp en güncel versiyonunu kurdum fakat sorun hala devam ediyor.
 

Geri
Yukarı