GTX 1060 sistem mavi ekran hatası

İşletim sistemi
Windows 11
Katılım
20 Haziran 2018
Mesajlar
3.575
Makaleler
1
Çözümler
29
Yer
İzmir
Daha fazla  
Sistem Özellikleri
Ryzen 5 1600, GTX 1060, 16 GB RAM, MSI X370 GAMING Pro Carbon.
Cinsiyet
Erkek
RAM
8X2 3000 MHz
SSD veya HDD modeli
120 GB Corsair LE200
Ekran kartı
GTX 1060 6 GB
Anakart
X370 Gaming Pro Carbon
İşlemci
Ryzen 5 1600
Sanırsam Steam'e girerken mavi ekran oluşmuş. İlk önce güncel değilse Steam güncelleyin. Güncel ise bu adımı es geçebilirsiniz. Ardından DDU ile ekran kartı sürücünüzü silip en güncel sürücüyü temiz bir kurulum ile kurun. Son olarak da Memtest ile RAM testi yapın. Daha çok RAM'den şüpheleniyorum ama bu adımları yaptıktan sonra sorun devam etmesi halinde etiketlemekten çekinmeyin.

Analiz raporu;
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8041a839aa8, Address of the instruction which caused the BugCheck
Arg3: ffffb80996f944b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5078

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 56576

    Key  : Analysis.IO.Other.Mb
    Value: 12

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 16

    Key  : Analysis.Init.CPU.mSec
    Value: 452

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8248

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 98

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key  : WER.OS.Version
    Value: 10.0.22621.1


FILE_IN_CAB:  041823-9796-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8041a839aa8

BUGCHECK_P3: ffffb80996f944b0

BUGCHECK_P4: 0

CONTEXT:  ffffb80996f944b0 -- (.cxr 0xffffb80996f944b0)
rax=79f575124502a008 rbx=ffffe082331e7820 rcx=7ffffffffffffffc
rdx=0000000000000000 rsi=0000000000000000 rdi=f9f575124502a008
rip=fffff8041a839aa8 rsp=ffffb80996f94ed0 rbp=ffffe082331eaab8
 r8=0000000000000000  r9=ffffa7871c644470 r10=fffff8041a8399b0
r11=ffffa78713315be0 r12=ffffe0822d9a1f80 r13=ffffa7871c644470
r14=ffffe0822d304d40 r15=00000000000013b0
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!ExAcquirePushLockExclusiveEx+0xf8:
fffff804`1a839aa8 f0480fba2f00    lock bts qword ptr [rdi],0 ds:002b:f9f57512`4502a008=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

STACK_TEXT: 
ffffb809`96f94ed0 fffff804`1e7dd626     : 00000000`00000000 ffffe082`00000002 ffffa787`1c644474 ffffa787`1c644470 : nt!ExAcquirePushLockExclusiveEx+0xf8
ffffb809`96f94f10 fffff804`1e7db682     : ffffa787`1c644470 ffffe082`331eaab8 ffffa787`1c644474 ffffa787`1c602760 : Ntfs!NtfsRemoveHashEntry+0x96
ffffb809`96f94f80 fffff804`1e7dd2d2     : ffffa787`1c644470 ffffe082`331eaab8 ffffa787`1c644474 00000000`00000000 : Ntfs!NtfsClearRecursiveLcb+0x9e
ffffb809`96f94fd0 fffff804`1e7dcee7     : ffffe082`331eaab8 ffffe082`2d288ca0 00000000`00000000 00000000`00000001 : Ntfs!NtfsRenameLcb+0x5a
ffffb809`96f95010 fffff804`1e7e07b8     : 00000000`00000040 ffffe082`331eaab8 ffffe082`331eaab8 ffffb809`00000000 : Ntfs!NtfsRenameLinkInDir+0x11f
ffffb809`96f95130 fffff804`1e80bf3a     : ffffa787`1c644170 ffffa787`00000000 00000000`0000000a ffffe082`2d2d6d01 : Ntfs!NtfsSetRenameInfo+0xd18
ffffb809`96f955d0 fffff804`1e80b547     : ffffe082`331eaab8 ffffe082`338419b0 ffffe082`2d288c00 00000000`00000000 : Ntfs!NtfsCommonSetInformation+0x82a
ffffb809`96f956a0 fffff804`1a83c275     : ffffe082`2e442aa0 ffffe082`338419b0 ffffe082`331eaab8 ffffb809`96f96000 : Ntfs!NtfsFsdSetInformation+0x157
ffffb809`96f95760 fffff804`1db99f5b     : ffffe082`2e442aa0 ffffe082`2d288ca0 00000000`00000000 ffffe082`33841d50 : nt!IofCallDriver+0x55
ffffb809`96f957a0 fffff804`1db97ba3     : ffffb809`96f95830 00000000`00000000 ffffe082`35444e00 00000000`00000028 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15b
ffffb809`96f95810 fffff804`1a83c275     : ffffe082`338419b0 ffffb809`96f95850 00000000`00000640 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffb809`96f95870 fffff804`1a8648a5     : 01d97205`75b50e4b 01d95e81`4117a100 01d9704d`9c911d17 fffff804`1a8646fd : nt!IofCallDriver+0x55
ffffb809`96f958b0 fffff804`1a86478b     : 00000000`0000009e 00000000`00000000 ffffe082`338419b0 00000000`00000000 : nt!IoCallDriverWithTracing+0x35
ffffb809`96f95900 fffff804`1a867650     : 00000000`00000000 ffffb809`96f95b60 ffffe082`338419b0 00000000`42536f49 : nt!IopCallDriverReference+0x4b
ffffb809`96f95930 fffff804`1aa3e0e8     : 00000000`000005f4 00000000`0342e6f0 00000000`0342ee70 00000000`0000009e : nt!NtSetInformationFile+0xf90
ffffb809`96f95a70 00007ffe`c0a4f134     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0342e5f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c0a4f134


SYMBOL_NAME:  nt!ExAcquirePushLockExclusiveEx+f8

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.1555

STACK_COMMAND:  .cxr 0xffffb80996f944b0 ; kb

BUCKET_ID_FUNC_OFFSET:  f8

FAILURE_BUCKET_ID:  AV_nt!ExAcquirePushLockExclusiveEx

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a4c38749-1c8c-1a85-3a1f-e83a0d92b536}

Followup:     MachineOwner
---------
 

Technopat Haberler

Yeni konular

Geri
Yukarı