Çözüldü Her seferinde farklı mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Çözüm
Belleklerde bireysel olarak sorun yok ama iki farklı bellek kullandığınızdan uyumsuzluk var.

Belleklerinizi Kit alın. Sorun belleklerde. Kit almadan da konuya cevap yazmayın, boş bir mesaj olur zira...



Değiştirince sonuçtan haberdar edin.
RAM'lerden kaynaklanabilir.
 
Son düzenleyen: Moderatör:
İki hata ekran kartı gibi ama asıl sorun RAM'lerde. Bellek testi yapıp sonucunu paylaşın:


Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000008, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8065bb3ab76, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4218

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 75640

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 8

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8065bb3ab76

READ_ADDRESS: fffff806496fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8064960f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8064960f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff8064f61ca20 -- (.trap 0xfffff8064f61ca20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8065bf49b01 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000deb0dff6 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8065bb3ab76 rsp=fffff8064f61cbb0 rbp=00000000deb0dff6
 r8=0000000000000007  r9=0000000000000000 r10=0000000000000003
r11=ffffd38de806b020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
amdkmdag+0x4ab76:
fffff806`5bb3ab76 488b01          mov     rax,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
fffff806`4f61c8d8 fffff806`48defa29     : 00000000`0000000a 00000000`00000000 00000000`00000008 00000000`00000000 : nt!KeBugCheckEx
fffff806`4f61c8e0 fffff806`48debd29     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff806`4f61ca20 fffff806`5bb3ab76     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff806`4f61cbb0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`def4fef5 : amdkmdag+0x4ab76


SYMBOL_NAME:  amdkmdag+4ab76

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4ab76

FAILURE_BUCKET_ID:  AV_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c753a2f9-94a6-448f-1d0e-e079b3442215}

Followup:     MachineOwner
---------

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff933fff600950, Virtual address for the attempted write.
Arg2: 1a0000008d971025, PTE contents.
Arg3: ffffcb8da3a374f0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys
*** WARNING: Unable to verify checksum for win32kbase.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4359

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7848

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff933fff600950

BUGCHECK_P2: 1a0000008d971025

BUGCHECK_P3: ffffcb8da3a374f0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  spoolsv.exe

TRAP_FRAME:  ffffcb8da3a374f0 -- (.trap 0xffffcb8da3a374f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff933fff600950
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070a8b542b rsp=ffffcb8da3a37680 rbp=ffffcb8da3a37780
 r8=ffffa5077dc74080  r9=ffff9349a4cfffd8 r10=ffff9349a4d267f8
r11=00007ffffffeffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiResolveSharedZeroFault+0x27b:
fffff807`0a8b542b 48893e          mov     qword ptr [rsi],rdi ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffcb8d`a3a372f8 fffff807`0aa87340     : 00000000`000000be ffff933f`ff600950 1a000000`8d971025 ffffcb8d`a3a374f0 : nt!KeBugCheckEx
ffffcb8d`a3a37300 fffff807`0a812dcf     : 1a000000`8d971025 00000000`00000003 ffffcb8d`a3a37570 00000000`00000000 : nt!MiRaisedIrqlFault+0x14baec
ffffcb8d`a3a37350 fffff807`0a9ebb1e     : 00000000`00000000 00000000`00000000 ffffcb8d`a3a37610 ffffa507`7f04f080 : nt!MmAccessFault+0x4ef
ffffcb8d`a3a374f0 fffff807`0a8b542b     : 00000000`00000000 ffffa507`7dc74700 ffffcb8d`a3a377d8 ffffa507`7dc74700 : nt!KiPageFault+0x35e
ffffcb8d`a3a37680 fffff807`0a821826     : ffffa507`00000000 ffffcb8d`00000000 00000000`00000100 00000000`00000005 : nt!MiResolveSharedZeroFault+0x27b
ffffcb8d`a3a377e0 fffff807`0a813382     : ffffcb8d`a3a37a20 ffffcb8d`a3a37960 ffffcb8d`a3a37970 ffffcb8d`a3a37908 : nt!MiZeroFault+0x316
ffffcb8d`a3a378d0 fffff807`0a812a4a     : 00000000`00000100 00000000`00000000 00000000`00000100 fffff807`00000018 : nt!MiUserFault+0x3c2
ffffcb8d`a3a37960 fffff807`0a9ebb1e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x16a
ffffcb8d`a3a37b00 00007ffe`c012adf0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000000`0049f198 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c012adf0


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffcd8e6b082160-ffffcd8e6b082179  26 bytes - win32kbase!CitpCleanupGlobalImpactContext+40
    [ cc cc cc cc 48 89 5c 24:48 8b 02 49 3b 00 77 09 ]
    ffffcd8e6b082186-ffffcd8e6b08219a  21 bytes - win32kbase!CitpContextCleanup+22 (+0x26)
    [ 84 c0 0f 84 ca 00 00 00:45 88 01 85 d2 0f 84 8d ]
    ffffcd8e6b0821a7-ffffcd8e6b0821ca  36 bytes - win32kbase!CitpContextCleanup+43 (+0x21)
    [ 4c 8b 4f 60 bb 2f cb 04:01 74 44 83 ea 02 75 2c ]
    ffffcd8e6b0821cc-ffffcd8e6b082246  123 bytes - win32kbase!CitpContextCleanup+68 (+0x25)
    [ b6 01 48 6b cb 25 48 03:11 12 41 09 42 10 41 c6 ]
    ffffcd8e6b082248-ffffcd8e6b082254  13 bytes - win32kbase!CitpContextCleanup+e4 (+0x7c)
    [ 03 d8 49 ff c1 41 0f b6:81 ec 00 01 00 00 48 8b ]
    ffffcd8e6b082256-ffffcd8e6b08225f  10 bytes - win32kbase!CitpContextCleanup+f2 (+0x0e)
    [ 03 d8 45 33 c9 45 33 c0:33 c4 48 89 45 27 44 8b ]
    ffffcd8e6b08fd30-ffffcd8e6b08fd53  36 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+24 (+0xdada)
    [ d8 85 c0 78 17 48 8d 4f:48 83 ec 28 48 8b ca e8 ]
    ffffcd8e6b08fd55-ffffcd8e6b08fd8c  56 bytes - win32kbase!CompositionInputObject::QueryInputQueueTypes+49 (+0x25)
    [ 5c 24 30 48 8b 74 24 40:d1 4d 85 c9 0f 95 c2 41 ]
    ffffcd8e6b08fd93-ffffcd8e6b08fda0  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+27 (+0x3e)
    [ 89 47 04 48 8b 4b 38 48:01 0f 84 e3 ec 06 00 41 ]
    ffffcd8e6b08fda7-ffffcd8e6b08fdb4  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+3b (+0x14)
    [ 89 47 08 48 8b 4b 40 48:48 01 00 00 74 44 48 8b ]
    ffffcd8e6b08fdbb-ffffcd8e6b08fdc8  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+4f (+0x14)
    [ 89 47 0c 48 8b 4b 48 48:01 0f ba 69 10 09 eb 2e ]
    ffffcd8e6b08fdcf-ffffcd8e6b08fddc  14 bytes - win32kbase!CInputSink::QueryInputQueueTypes+63 (+0x14)
    [ 89 47 10 48 8b 4b 50 48:01 3a c2 74 1d c0 e2 03 ]
    ffffcd8e6b08fde3-ffffcd8e6b08fdf4  18 bytes - win32kbase!CInputSink::QueryInputQueueTypes+77 (+0x14)
    [ 48 8b 5c 24 30 89 47 14:92 4c 01 00 00 c6 00 01 ]
    ffffcd8e6b08fdf6-ffffcd8e6b08fe2f  58 bytes - win32kbase!CInputSink::QueryInputQueueTypes+8a (+0x13)
    [ cc cc cc cc cc cc cc cc:8a 89 4c 01 00 00 8a c1 ]
    ffffcd8e6b090c10-ffffcd8e6b090c22  19 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+d0 (+0xe1a)
    [ 10 0d 8b 43 10 48 89 5d:48 83 ec 28 8b ca 45 33 ]
    ffffcd8e6b090c24-ffffcd8e6b090c7e  91 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+e4 (+0x14)
    [ 8b d6 48 8b cb e8 de 06:83 c4 28 c3 cc cc cc cc ]
    ffffcd8e6b090c80-ffffcd8e6b090c8f  16 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+140 (+0x5c)
    [ 89 5d 20 0f ba e0 12 73:3b 08 77 2c 49 8b 00 48 ]
    ffffcd8e6b090c91-ffffcd8e6b090cd0  64 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+151 (+0x11)
    [ 8b cb e8 f8 05 00 00 84:3b ca 72 0c 48 8b 05 8c ]
    ffffcd8e6b090cd3 - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+193 (+0x42)
    [ 5c:7c ]
    ffffcd8e6b090cd5-ffffcd8e6b090cfd  41 bytes - win32kbase!DirectComposition::CCompositionSpotLightMarshaler::EmitUpdateCommands+195 (+0x02)
    [ 30 40 8a c7 48 8b 7c 24:50 85 db 78 3f 48 8d 54 ]
    ffffcd8e6b090cff-ffffcd8e6b090d0f  17 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitUpdateCommand<<lambda_5a7aae95d2af49f4475e794f2d9a8b36> >+f (+0x2a)
    [ 00 48 8b c2 49 8b d8 48:8d 54 24 20 e8 34 23 00 ]
702 errors : !win32kbase (ffffcd8e6b082160-ffffcd8e6b090d0f)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffe6c81c81000
Arg3: 0000000000000010
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3249

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6357

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffffe6c81c81000

BUGCHECK_P3: 10

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffff303`85e5ddc8 fffff802`04254286     : 00000000`0000001a 00000000`00041792 fffffe6c`81c81000 00000000`00000010 : nt!KeBugCheckEx
fffff303`85e5ddd0 fffff802`040119f1     : 00000000`00000003 fffffe6c`81c81000 fffff303`85e5e2a0 00000000`00000003 : nt!MiDeleteVa+0x191f46
fffff303`85e5dec0 fffff802`04011d10     : 00000000`00000000 ffffb50b`932ed700 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
fffff303`85e5df50 fffff802`04011d10     : 00000000`00000000 ffffb50b`932ed700 fffffe7f`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
fffff303`85e5dfe0 fffff802`04011d10     : fffff303`85e5e2a0 ffffb50b`932ed700 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
fffff303`85e5e070 fffff802`0400e61b     : 00000000`00000000 ffffb50b`932ed700 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
fffff303`85e5e100 fffff802`040c22f1     : fffff303`85e5e2a0 ffffb50b`00000001 ffffa06f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff303`85e5e200 fffff802`044c0a00     : 00000000`00000282 fffff802`0400c95e fffff303`00000000 ffffb50b`84093040 : nt!MiDeletePagablePteRange+0x491
fffff303`85e5e680 fffff802`040f4548     : ffffb50b`932ed080 00000000`019e7080 00000000`00000002 fffff802`00000000 : nt!MiDeleteVadBitmap+0x8c
fffff303`85e5e710 fffff802`044c087c     : ffffb50b`932ed080 ffffb50b`932ed7c0 ffffb50b`932ed700 ffffb50b`908e7080 : nt!MiDeleteFinalPageTables+0xc8
fffff303`85e5e7d0 fffff802`044bf06f     : ffffb50b`932ed080 fffff303`85e5e890 ffffb50b`908e7080 ffffb50b`932ed4c8 : nt!MmDeleteProcessAddressSpace+0x64
fffff303`85e5e820 fffff802`0440c4f0     : ffffb50b`932ed050 ffffb50b`932ed050 00000000`00000000 ffffb50b`84082640 : nt!PspProcessDelete+0x13f
fffff303`85e5e8b0 fffff802`04024eb7     : 00000000`00000000 00000000`00000000 fffff303`85e5ea39 ffffb50b`932ed080 : nt!ObpRemoveObjectRoutine+0x80
fffff303`85e5e910 fffff802`043f4bbe     : ffffb50b`84082640 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc7
fffff303`85e5e950 fffff802`043fb11c     : 00000000`000018e0 00000000`00000000 00000000`00000000 00000060`7f3fec48 : nt!ObCloseHandleTableEntry+0x29e
fffff303`85e5ea90 fffff802`041ef478     : ffffb50b`908e7000 000001c1`a27ac330 fffff303`85e5eb80 ffffb50b`00000000 : nt!NtClose+0xec
fffff303`85e5eb00 00007ff9`d004af74     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000060`7f3fece8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`d004af74


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8011dafa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 40963

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8011dafa318

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff80122a1ccd0 -- (.trap 0xfffff80122a1ccd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8012e7a8930 rbx=0000000000000000 rcx=ffffd58d42802000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8012e7b3188 rsp=fffff80122a1ce60 rbp=ffffd58d3c6f9ad0
 r8=0000000000000000  r9=ffffd58d44db8360 r10=0000fffff8012e7a
r11=ffffa178b4a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
amdkmdag+0xb3188:
fffff801`2e7b3188 48897c2440      mov     qword ptr [rsp+40h],rdi ss:fffff801`22a1cea0=ffffd58d3bef4c10
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steam.exe

STACK_TEXT: 
fffff801`22a1c958 fffff801`1d259472     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`1dafa318 : nt!KeBugCheckEx
fffff801`22a1c960 fffff801`1d0cef5d     : 000008cf`be12b738 fffff801`19c54180 00000000`00000246 00000000`0004fb87 : nt!KeAccumulateTicks+0x18bff2
fffff801`22a1c9c0 fffff801`1d0c8651     : ffffd58d`00000006 00000000`0002f846 fffff801`19c54180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff801`22a1ca10 fffff801`1d0ca4eb     : 00000000`00000000 fffff801`22a1cd00 fffff801`1da31820 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff801`22a1cb50 fffff801`1d0c7722     : fffff801`22a1ccd0 fffff801`22a1cd50 fffff801`22a1cd50 00000000`00000000 : nt!KeClockInterruptNotify+0x2bb
fffff801`22a1cc00 fffff801`1d008705     : 0000000b`e12fc979 fffff801`1daf38e0 fffff801`1daf3990 00000000`00000002 : nt!HalpTimerClockInterrupt+0xe2
fffff801`22a1cc30 fffff801`1d1df4ca     : fffff801`22a1cd50 fffff801`1daf38e0 000008cf`be1282d2 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`22a1cc80 fffff801`1d1dfa37     : fffff801`2eb3e370 ffffd58d`deadbeef ffffd58d`42790000 00000000`0000ef00 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff801`22a1ccd0 fffff801`2e7b3188     : ffffd58d`461ee000 00000000`00000000 fffff801`22a1ced0 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff801`22a1ce60 ffffd58d`461ee000     : 00000000`00000000 fffff801`22a1ced0 00000000`00000002 00000000`00000000 : amdkmdag+0xb3188
fffff801`22a1ce68 00000000`00000000     : fffff801`22a1ced0 00000000`00000002 00000000`00000000 fffff801`2e7a894c : 0xffffd58d`461ee000


SYMBOL_NAME:  amdkmdag+b3188

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b3188

FAILURE_BUCKET_ID:  0x133_ISR_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ce335412-b260-6bc1-3af9-ea5584f041c4}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff805096fa318, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5093

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 64146

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff805096fa318

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff8050f81ccd0 -- (.trap 0xfffff8050f81ccd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8050f81cf58
rdx=ffff9b0820cc6000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80508c3a8c4 rsp=fffff8050f81ce60 rbp=fffff8050f81ced0
 r8=0000000000000002  r9=0000000000000002 r10=0000fffff8051c95
r11=fffff8050f81cd30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!EtwpLogKernelEvent+0x34:
fffff805`08c3a8c4 418bf1          mov     esi,r9d
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  audiodg.exe

STACK_TEXT: 
fffff805`0f81cae8 fffff805`08e5956a     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`096fa318 : nt!KeBugCheckEx
fffff805`0f81caf0 fffff805`08cca30d     : 00001b24`e44470eb 00000000`00000000 fffff805`0f81cd00 fffff805`06a15180 : nt!KeAccumulateTicks+0x18c0ca
fffff805`0f81cb50 fffff805`08cca18a     : fffff805`096f3840 fffff805`0f81cd50 fffff805`000f5e60 fffff805`00000000 : nt!KeClockInterruptNotify+0xbd
fffff805`0f81cc00 fffff805`08c08725     : fffff805`096f3840 00000000`00000286 fffff805`0f81cc58 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
fffff805`0f81cc30 fffff805`08ddf60a     : fffff805`0f81cd50 fffff805`096f3840 00000000`00000010 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff805`0f81cc80 fffff805`08ddfb77     : fffff805`1ccf2690 ffff9b08`deadbeef ffff9b08`27a2c000 00000000`0000ef00 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff805`0f81ccd0 fffff805`08c3a8c4     : ffff9b08`2b380000 00000000`00000000 fffff805`0f81ced0 00000000`00000002 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff805`0f81ce60 fffff805`08c377ff     : 00000000`00000000 ffff9b08`20cc6000 00000000`00000001 00000000`00000002 : nt!EtwpLogKernelEvent+0x34
fffff805`0f81cf10 fffff805`08ddf3ab     : fffff805`06a15180 ffffc20d`98d728b0 ffffc700`44300780 fffff805`08ddf60a : nt!PerfInfoLogInterrupt+0xef
fffff805`0f81cf90 fffff805`08ddf657     : fffff805`06a15180 fffff805`08cec475 00000000`00000000 00001f80`00000200 : nt!KiInterruptSubDispatch+0x13b
ffffc20d`98d72830 fffff805`08cd31e0     : 4173c15f`17d19200 57577e12`ea805a9f 1acce8da`9e3d6800 ffffc20d`98d729e0 : nt!KiInterruptDispatch+0x37
ffffc20d`98d729c0 fffff805`08de49a6     : ffffffff`ffffff00 fffff805`08de4231 00000000`01000010 00000000`00000286 : nt!KiQuantumEnd+0xc0
ffffc20d`98d72ac0 fffff805`08de4245     : 00000000`00000001 fffff805`08ddf6d1 00000000`00000001 00000000`00797931 : nt!KiDispatchInterruptContinue+0x16
ffffc20d`98d72af0 fffff805`08ddf6d1     : 00000000`00000001 00000000`00797931 ffffc20d`00000000 ffff9b08`00000000 : nt!KiDpcInterruptBypass+0x25
ffffc20d`98d72b00 00007ffb`6a9ab8e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000008a`2a37d5e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`6a9ab8e4


SYMBOL_NAME:  nt!KeAccumulateTicks+18c0ca

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18c0ca

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------
 
Kod:
https://ftp.hp.com/pub/softpaq/sp93001-93500/sp93282.exe
BIOS güncel değil güncelleyin.

**** Bunları da yükleyin: Yükleme bitmesini, Windows açılmasını bekleyin.
Kod:
https://ftp.hp.com/pub/softpaq/sp96001-96500/sp96325.exe
https://ftp.hp.com/pub/softpaq/sp87501-88000/sp87520.exe

Takılı olan ses aygıtlarını çıkartın USB ve jack kısımlarından.

Ekran kartı sürücünüzü DDU rehberindeki anlatıma göre uygulayıp güncel GPU sürücülerinizi yükleyin.
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…