i5-480M Sistem Mavi Ekran Hatası

İşletim sistemi
Windows 10

hikodaci

Femtopat
Katılım
21 Şubat 2021
Mesajlar
11
Daha fazla  
Cinsiyet
Erkek
Merhabalar,

Sürekli farklı hatalarda mavi ekran alıyorum. Bazen de mavi ekran almadan laptop donuyor. Driverlar güncel temiz Windows 10 da kurdum.

Eski ve yeni dump dosyalarım aşağıdadır. Yardımlar için şimdiden teşekkür ederim.


Intel Core i5 480M.
NVIDIA GT420M.
6 GB (4+2) RAM.
500GB SSD mevcut.
 
Soruna Qualcomm Atheros ağ kartı sürücüsü neden olmuş. Ağ kartı sürücümüzü güncelleyelim. Qualcomm Atheros kartının donanım bilgilerini paylaşın buna uygun sürücüyü bulalım.
Aygıt Yöneticisi>Ağ Bağdaştırıcıları> Qualcomm Atheros (çıkması gerekli.)

Fare ile sağ tık yapın. Özellikler yazısına tıklayın. Daha sonra yukarıda tıkladığınızda açılan menüde Ayrıntılar kısmı var. Buradan Özellik Açıklaması yazan yere tıklayıp Donanım Kimliklerini seçin. Ve buraya paylaşın.
 
Soruna Qualcomm Atheros ağ kartı sürücüsü neden olmuş. Ağ kartı sürücümüzü güncelleyelim. Qualcomm Atheros kartının donanım bilgilerini paylaşın buna uygun sürücüyü bulalım.
Aygıt Yöneticisi>Ağ Bağdaştırıcıları> Qualcomm Atheros (çıkması gerekli.)

Fare ile sağ tık yapın. Özellikler yazısına tıklayın. Daha sonra yukarıda tıkladığınızda açılan menüde Ayrıntılar kısmı var. Buradan Özellik Açıklaması yazan yere tıklayıp Donanım Kimliklerini seçin. Ve buraya paylaşın.
Merhaba ben de bundan şüphelendiğim için internetten aratıp bir güncelleme yaptım şu an fena değil gibi bir hata almadım fakat yine de aşağıda dediklerinizi yaptım şu bilgiler çıktı eğer daha yeni versiyon var ise kurmak isterim.

PCI\VEN_168C&DEV_002E&SUBSYS_E034105B&REV_01
PCI\VEN_168C&DEV_002E&SUBSYS_E034105B
PCI\VEN_168C&DEV_002E&CC_028000
PCI\VEN_168C&DEV_002E&CC_0280
Şu an bende 10.0.3.456 versiyon yüklü
 
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\hazar\AppData\Local\Temp\7zO0D51FF03\021821-7000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`08800000 PsLoadedModuleList = 0xfffff801`0942a390
Debug session time: Thu Feb 18 13:21:52.172 2021 (UTC + 3:00)
System Uptime: 1 days 0:04:06.912
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
.....................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`08bf5a80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`6412a8d0=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe700a791daf0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80108c5e366, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6936

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-5L92TCS

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 12420

Key : Analysis.Memory.CommitPeak.Mb
Value: 96

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: a

BUGCHECK_P1: ffffe700a791daf0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80108c5e366

WRITE_ADDRESS: fffff801094fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010940f330: Unable to get Flags value from nt!KdVersionBlock
fffff8010940f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe700a791daf0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Zoom.exe

TRAP_FRAME: fffff8806412aa10 -- (.trap 0xfffff8806412aa10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000a0 rbx=0000000000000000 rcx=fffff8806412abe4
rdx=00000000000000a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80108c5e366 rsp=fffff8806412aba0 rbp=ffffe788a8baa050
r8=00000000000000e7 r9=0000000000000ec0 r10=000000000000006b
r11=ffffe788a8e36b80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!HalBuildScatterGatherListV2+0x176426:
fffff801`08c5e366 830f01 or dword ptr [rdi],1 ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
fffff880`6412a8c8 fffff801`08c07a69 : 00000000`0000000a ffffe700`a791daf0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`6412a8d0 fffff801`08c03d69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`6412aa10 fffff801`08c5e366 : ffffe788`a8baa1a0 ffffe788`b0aa2b60 ffffe788`a8b18f50 00000000`000000e7 : nt!KiPageFault+0x469
fffff880`6412aba0 fffff801`0acc4d1b : ffffe788`aaebc370 ffffe788`a8baa050 ffffe788`000000a0 ffffe788`b0aa2b60 : nt!HalBuildScatterGatherListV2+0x176426
fffff880`6412ac30 fffff801`0d571351 : 00000000`a8e54f0c ffffe788`0000000c ffffe788`a8e54fac ffffe788`a8baa1a0 : ndis!NdisMAllocateNetBufferSGList+0x11b
fffff880`6412acf0 fffff801`0d56f5e0 : ffffe788`a8854030 ffffe788`a8e54fac ffffe788`00000000 ffffe788`a8e550ac : athwnx!MpPerformScatterGather+0x1ed
fffff880`6412ad50 fffff801`0d5778bc : ffffe788`a8854030 ffffe788`a8e54fac ffffe788`ad6e11c0 ffffe788`b0aa2b9c : athwnx!Mp11PerformScatterGather+0x84
fffff880`6412ad90 fffff801`0d3ab0c4 : ffffe788`a8b36e60 ffffe788`a8e550ac 00000000`00000000 ffffe788`a8e55144 : athwnx!RtlStringCchCopyNA+0xa14
fffff880`6412add0 fffff801`0d3b3f39 : ffffe788`a8b36e60 ffffe788`a8e550ac 00000000`00000000 ffffe788`a8e55144 : athwnx!_ath_queue_txbuf+0xe38
fffff880`6412ae00 fffff801`0d3b0ad3 : ffffe788`a8b36e60 ffffe788`a8e550ac 00000000`00000000 ffffe788`a8e55144 : athwnx!ath_txto_tasklet+0x2d5
fffff880`6412ae30 fffff801`0d46d337 : ffffe788`a885b030 ffffe788`a8e550ac ffffe788`a8e55144 ffffe788`a8e55144 : athwnx!ath_tx_start+0x8f
fffff880`6412ae90 fffff801`0d58940b : ffffe788`a8e550ac fffff801`0acfd47c ffffe788`a8e54fac 00000000`00000000 : athwnx!ath_tx_send+0x32b
fffff880`6412af30 fffff801`0d57d295 : ffffe788`a8e550ac fffff801`0d530ec6 ffffe788`a8e550ac ffffe788`00000000 : athwnx!wbuf_xmit_queue+0x13
fffff880`6412af60 fffff801`0d533141 : ffffe788`a8e2c030 ffffe788`a8e550ac ffffe788`a8e34030 fffff801`0d443faa : athwnx!Port11ProcessSend+0x55
fffff880`6412afa0 fffff801`0d53401b : ffffe788`a8e34030 ffffe788`a8e550ac 00000000`00000000 ffffe788`b0aa2ba0 : athwnx!ieee80211_send_wbuf+0x285
fffff880`6412b010 fffff801`0d5726f0 : ffffe788`a8e34030 ffffe788`a8e550ac 00000000`00000246 fffff801`08af3fe4 : athwnx!wlan_vap_send+0x80f
fffff880`6412b0b0 fffff801`0d571aa9 : ffffe788`a8854030 ffffe788`a8e54fac 00000000`00000000 ffffe788`a8baa1a0 : athwnx!MpTransmitTxMSDU+0x5f0
fffff880`6412b140 fffff801`0d56e82f : ffffe788`a8854030 ffffe788`a8e54fac 00000000`00000000 ffffe788`a6ba8b00 : athwnx!MpSendPendingTxMSDUs+0x61
fffff880`6412b190 fffff801`0d56e088 : ffffe788`a8854030 ffffe788`b04d2e00 fffff880`00000000 00000000`00000001 : athwnx!MPSendNetBufferLists_1+0x683
fffff880`6412b230 fffff801`0acc50ae : ffffe788`a8854030 ffffe788`b04d2e00 00000000`00000000 00000000`00000001 : athwnx!MPSendNetBufferLists+0xa0
fffff880`6412b270 fffff801`0acc4f9e : fffff801`0b281000 ffffe788`b04d2e00 ffffe788`00000000 fffff801`0acc4f90 : ndis!ndisMSendNBLToMiniportInternal+0xfe
fffff880`6412b340 fffff801`0acc58e8 : ffffe788`b1703a01 ffffe788`b04d2e00 ffffe788`aaeeaa20 fffff801`0af4a954 : ndis!ndisMSendNBLToMiniport+0xe
fffff880`6412b380 fffff801`0acfe185 : 00000000`00000000 fffff880`6412b449 ffffe788`a8baa1a0 fffff801`00000000 : ndis!ndisCallSendHandler+0x58
fffff880`6412b3d0 fffff801`0acc25dd : 00000000`00000000 ffffe788`a8baa1a0 ffffe788`ac7fd3f0 00000001`00000000 : ndis!ndisInvokeNextSendHandler+0x191
fffff880`6412b4a0 fffff801`0af8fcbd : ffffe788`a6b8fc30 ffffe788`b1703a40 00000000`00000000 ffffe788`00000000 : ndis!NdisSendNetBufferLists+0x17d
fffff880`6412b5a0 fffff801`0af8f9e7 : ffffe788`acb18990 00000000`00000000 00000000`00000800 ffffe788`ac989d00 : tcpip!FlpSendPacketsHelper+0x2bd
fffff880`6412b650 fffff801`0af45bc5 : 00000000`00000000 fffff801`0b109230 ffffe788`a855b8e8 00000000`00000000 : tcpip!FlSendPackets+0x57
fffff880`6412b680 fffff801`0af450e3 : 0000d6dc`61220004 00000000`00000000 fffff801`0b109230 ffffe788`acf74040 : tcpip!IppFragmentPackets+0x2a5
fffff880`6412b760 fffff801`0af44d68 : ffffe788`a855b8e8 00000000`00000001 00000000`00000000 00000000`0000f8b3 : tcpip!IppDispatchSendPacketHelper+0xbf
fffff880`6412b830 fffff801`0af439b8 : ffffe788`a855b9c8 00000000`00000004 00000000`00000000 ffffe788`a855b8e8 : tcpip!IppPacketizeDatagrams+0x2e8
fffff880`6412b960 fffff801`0af43500 : 00000000`00000000 00000000`00000000 fffff801`0b109230 ffffe788`b0b7e3f0 : tcpip!IppSendDatagramsCommon+0x498
fffff880`6412bae0 fffff801`0af3240d : 00000000`00006122 ffffe788`a856d0a0 ffffe788`a8566122 ffffe788`a856d0a0 : tcpip!IpNlpSendDatagrams+0x40
fffff880`6412bb20 fffff801`0af315dc : 00000000`00000000 00000000`00000004 00000000`00000000 33333333`33333333 : tcpip!UdpSendMessagesOnPath+0x7ad
fffff880`6412bfc0 fffff801`0af31325 : ffffe788`aa07ef01 fffff801`0af31310 fffff880`6412c440 fffff880`6412c440 : tcpip!UdpSendMessages+0x29c
fffff880`6412c330 fffff801`08b54488 : fffff880`6412c590 ffffe788`adb1e890 3c5efe44`00000000 00000000`00000000 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffff880`6412c360 fffff801`08b543fd : fffff801`0af31310 fffff880`6412c440 00000000`00000000 00000000`00000170 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff880`6412c3d0 fffff801`0af82a2b : fffff880`6412c500 00000000`00000170 00000000`00000001 fffff801`0c0820c0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff880`6412c410 fffff801`0c09d898 : fffff880`6412c780 fffff880`6412ccc0 ffffe788`aa07ef40 fffff880`6412ccc0 : tcpip!UdpTlProviderSendMessages+0x7b
fffff880`6412c490 fffff801`0c081fb5 : 00000000`00000000 fffff801`00000000 00000000`00000000 00000000`20206f49 : afd!AfdFastDatagramSend+0x658
fffff880`6412c680 fffff801`08dfcee2 : 00000000`00000000 00000000`00012023 fffff880`6412ccc0 ffffe788`affdfab0 : afd!AfdFastIoDeviceControl+0x1825
fffff880`6412ca20 fffff801`08dfcb46 : 00000000`00000001 00000000`00000eac 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x382
fffff880`6412cb60 fffff801`08c074b8 : 00000000`00000000 fffff880`00000001 00000000`00000000 ffffe788`b0b2a660 : nt!NtDeviceIoControlFile+0x56
fffff880`6412cbd0 00000000`773b1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`165bf1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773b1cfc


SYMBOL_NAME: athwnx!MpPerformScatterGather+1ed

MODULE_NAME: athwnx

IMAGE_NAME: athwnx.sys

IMAGE_VERSION: 3.0.2.202

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1ed

FAILURE_BUCKET_ID: AV_athwnx!MpPerformScatterGather

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {9a22d509-1ae3-3269-4008-592ac4ecbb06}

Followup: MachineOwner
---------

0: kd> lmvm athwnx
Browse full module list
start end module name
fffff801`0d2e0000 fffff801`0d707000 athwnx (pdb symbols) C:\ProgramData\Dbg\sym\athwnx.pdb\794BB0DFCC2C4D27AC0C1EBC39B2506D1\athwnx.pdb
Loaded symbol image file: athwnx.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\athwnx.sys\56D55527427000\athwnx.sys
Image path: \SystemRoot\System32\drivers\athwnx.sys
Image name: athwnx.sys
Browse all global symbols functions data
Timestamp: Tue Mar 1 11:39:03 2016 (56D55527)
CheckSum: 0040B4A8
ImageSize: 00427000
File version: 3.0.2.202
Product version: 3.0.2.202
File flags: 8 (Mask 3F) Private
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Qualcomm Atheros Communications, Inc.
ProductName: Driver for Qualcomm Atheros CB42/CB43/MB42/MB43 Network Adapter
InternalName: ATHR.SYS
OriginalFilename: ATHR.SYS
ProductVersion: 3.0.2.202
FileVersion: 3.0.2.202
FileDescription: Qualcomm Atheros Extensible Wireless LAN device driver
LegalCopyright: Copyright (C) 2001-2010 Qualcomm Atheros Communications, Inc.
Yalnız ürünün sürümü 3.0.0.202 olarak görünmekte.

Bu linkten indirip yeniden kurmayı dener misiniz? Yeniden sürümü kontrol etmenizi rica edeceğim, cihazda kurulu olan sürücüyü.
 
Microsoft (r) Windows debugger version 10.0.20153.1000 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\hazar\AppData\Local\Temp\7zO0D51FF03\021821-7000-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (4 procs) Free X64.
PROduct: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff801`08800000 psloadedmodulelist = 0xfffff801`0942a390
Debug session time: Thu feb 18 13:21:52.172 2021 (utc + 3:00)
System uptime: 1 days 0:04:06.912
Loading kernel symbols.



Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
Nt! Kebugcheckex:
Fffff801'08BF5a80 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffff880'6412A8D0 = 000000000000000A.
0: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

Irql_not_less_or_equal (a)
An attempt was made to Access'a pageable (or completely invalid) address at an.
İnterrupt request Level (ırql) that is too High. This is usually.
Caused by drivers using improper addresses.
If a kernel debugger is available GET the stack backtrace.
Arguments:
Arg1: FffFE700A791daf0, Memory referenced.
Arg2: 0000000000000002, ırql.
Arg3: 0000000000000001, bitfield:
Bit 0: Value 0 = read operation, 1 = write operation.
Bit 3: Value 0 = not an execute operation, 1 = execute operation (only on chips which Support this Level of status)
Arg4: FffFF80108C5e366, address which referenced Memory.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 6936.

Key: Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007E on desktop-5L92tcs

Key: Analysis. Debugdata.
Value: Createobject.

Key: Analysis. Debugmodel.
Value: Createobject.

Key: Analysis. Elapsed. Msec.
Value: 12420.

Key: Analysis. Memory. Commitpeak. MB.
Value: 96.

Key: Analysis. System.
Value: Createobject.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Addıtıonal_xml: 1

Os_buıld_layers: 1

Bugcheck_code: A

Bugcheck_p1: FffFE700A791daf0.

Bugcheck_p2: 2

Bugcheck_p3: 1

Bugcheck_p4: FFFFF80108C5E366.

Wrıte_address: FffFF801094fb390: Unable to GET mivisiblestate.
Unable to GET nonpagedpoolstart.
Unable to GET nonpagedpoolend.
Unable to GET pagedpoolstart.
Unable to GET pagedpoolend.
FffFF8010940F330: Unable to GET flags Value from nt! Kdversionblock.
FffFF8010940F330: Unable to GET flags Value from nt! Kdversionblock.
Unable to GET nt! Mmspecialpagesınuse.
FffFE700A791daf0.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: Zoom.exe

Trap_frame: FFFFF8806412AA10 -- (.trap 0xfffff8806412aa10)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 00000000000000A0 rbx = 0000000000000000 rcx = fffFF8806412abe4.
Rdx = 00000000000000A0 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF80108C5e366 rsp = fffFF8806412aba0 rbp = fffFE788A8Baa050.
R8 = 00000000000000E7 R9 = 0000000000000EC0 R10 = 000000000000006B.
R11 = fffFE788A8E36B80 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei pl nzna pe nc.
Nt! Halbuildscattergatherlistv2+0x176426:
Fffff801'08C5e366 830F01 or dword ptr [rdi],1 DS: 00000000'00000000=?
Resetting default scope.

Stack_text:
Fffff880'6412A8C8 fffff801'08C07A69: 00000000'0000000A ffffe700'A791DAF0 00000000'00000002 00000000'00000001: Nt! Kebugcheckex.
Fffff880'6412A8D0 fffff801'08C03D69: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! Kibugcheckdispatch+0x69
Fffff880'6412AA10 fffff801'08C5e366: Ffffe788'a8baa1a0 ffffe788'b0aa2B60 ffffe788'a8B18F50 00000000'000000E7: Nt! Kipagefault+0x469
Fffff880'6412ABA0 fffff801'0acc4D1b: Ffffe788'aaebc370 ffffe788'a8baa050 ffffe788'000000A0 ffffe788'b0aa2b60: Nt! Halbuildscattergatherlistv2+0x176426
Fffff880'6412AC30 fffff801'0D571351: 00000000'a8E54F0C ffffe788'0000000C ffffe788'a8E54fac ffffe788'a8baa1a0: Ndis! Ndismallocatenetbuffersglist+0x11B
Fffff880'6412ACF0 fffff801'0D56F5E0: Ffffe788'A8854030 ffffe788'a8E54fac ffffe788'00000000 ffffe788'a8E550AC: Athwnx! Mpperformscattergather+0x1ed
Fffff880'6412AD50 fffff801'0D5778BC: Ffffe788'A8854030 ffffe788'a8E54fac ffffe788'AD6e11C0 ffffe788'b0aa2b9C: Athwnx! MP11PERFormscattergather+0x84
Fffff880'6412AD90 fffff801'0D3ab0C4: Ffffe788'a8b36e60 ffffe788'a8E550AC 00000000'00000000 ffffe788'a8E55144: Athwnx! Rtlstringcchcopyna+0xa14
Fffff880'6412ADD0 fffff801'0D3b3F39: Ffffe788'a8b36e60 ffffe788'a8E550AC 00000000'00000000 ffffe788'a8E55144: Athwnx! _ath_queue_txbuf+0xe38
Fffff880'6412AE00 fffff801'0D3b0ad3: Ffffe788'a8b36e60 ffffe788'a8E550AC 00000000'00000000 ffffe788'a8E55144: Athwnx! Ath_txto_tasklet+0x2D5
Fffff880'6412AE30 fffff801'0D46D337: Ffffe788'A885B030 ffffe788'a8E550AC ffffe788'a8E55144 ffffe788'a8E55144: Athwnx! Ath_tx_start+0x8F
Fffff880'6412AE90 fffff801'0D58940B: Ffffe788'a8E550AC fffff801'0acfd47C ffffe788'a8E54fac 00000000'00000000: Athwnx! Ath_tx_send+0x32B
Fffff880'6412AF30 fffff801'0D57D295: Ffffe788'a8E550AC fffff801'0D530EC6 ffffe788'a8E550AC ffffe788'00000000: Athwnx! Wbuf_xmit_queue+0x13
Fffff880'6412AF60 fffff801'0D533141: Ffffe788'a8e2C030 ffffe788'a8E550AC ffffe788'a8e34030 fffff801'0D443FAA: Athwnx! PoRT11PROCesssend+0x55
Fffff880'6412AFA0 fffff801'0D53401B: Ffffe788'a8e34030 ffffe788'a8E550AC 00000000'00000000 ffffe788'b0aa2ba0: Athwnx! İeEE80211_send_wbuf+0x285
Fffff880'6412B010 fffff801'0D5726F0: Ffffe788'a8e34030 ffffe788'a8E550AC 00000000'00000246 fffff801'08AF3fe4: Athwnx! Wlan_vap_send+0x80F
Fffff880'6412B0B0 fffff801'0D571AA9: Ffffe788'A8854030 ffffe788'a8E54fac 00000000'00000000 ffffe788'a8baa1a0: Athwnx! Mptransmittxmsdu+0x5F0
Fffff880'6412B140 fffff801'0D56E82F: Ffffe788'A8854030 ffffe788'a8E54fac 00000000'00000000 ffffe788'a6ba8b00: Athwnx! Mpsendpendingtxmsdus+0x61
Fffff880'6412B190 fffff801'0D56E088: Ffffe788'A8854030 ffffe788'B04D2e00 fffff880'00000000 00000000'00000001: Athwnx! Mpsendnetbufferlists_1+0x683
Fffff880'6412B230 fffff801'0acc50ae: Ffffe788'A8854030 ffffe788'B04D2e00 00000000'00000000 00000000'00000001: Athwnx! Mpsendnetbufferlists+0xa0
Fffff880'6412B270 fffff801'0acc4F9e: Fffff801'0B281000 ffffe788'B04D2e00 ffffe788'00000000 fffff801'0acc4F90: Ndis! Ndismsendnbltominiportınternal+0xfe
Fffff880'6412B340 fffff801'0acc58e8: Ffffe788'B1703A01 ffffe788'B04D2e00 ffffe788'aaeeaa20 fffff801'0 AF4A954: Ndis! Ndismsendnbltominiport+0xe
Fffff880'6412B380 fffff801'0acfe185: 00000000'00000000 fffff880'6412B449 ffffe788'a8baa1a0 fffff801'00000000: Ndis! Ndiscallsendhandler+0x58
Fffff880'6412B3D0 fffff801'0acc25dd: 00000000'00000000 ffffe788'a8baa1a0 ffffe788'AC7fd3F0 00000001'00000000: Ndis! Ndisınvokenextsendhandler+0x191
Fffff880'6412B4A0 fffff801'0 AF8fcbd: Ffffe788'a6b8fc30 ffffe788'B1703A40 00000000'00000000 ffffe788'00000000: Ndis! Ndissendnetbufferlists+0x17D
Fffff880'6412B5A0 fffff801'0 AF8F9e7: Ffffe788'acb18990 00000000'00000000 00000000'00000800 ffffe788'AC989D00: Tcpip! Flpsendpacketshelper+0x2bd
Fffff880'6412B650 fffff801'0 AF45bc5: 00000000'00000000 fffff801'0B109230 ffffe788'A855B8E8 00000000'00000000: Tcpip! Flsendpackets+0x57
Fffff880'6412B680 fffff801'0 AF450e3: 0000D6DC'61220004 00000000'00000000 fffff801'0B109230 ffffe788'acf74040: Tcpip! Ippfragmentpackets+0x2A5
Fffff880'6412B760 fffff801'0 AF44D68: Ffffe788'A855B8E8 00000000'00000001 00000000'00000000 00000000'0000F8B3: Tcpip! Ippdispatchsendpackethelper+0xbf
Fffff880'6412B830 fffff801'0 AF439b8: Ffffe788'A855B9C8 00000000'00000004 00000000'00000000 ffffe788'A855B8E8: Tcpip! Ipppacketizedatagrams+0x2e8
Fffff880'6412B960 fffff801'0 AF43500: 00000000'00000000 00000000'00000000 fffff801'0B109230 ffffe788'b0b7e3F0: Tcpip! Ippsenddatagramscommon+0x498
Fffff880'6412BAE0 fffff801'0 AF3240D: 00000000'00006122 ffffe788'A856D0A0 ffffe788'A8566122 ffffe788'A856D0A0: Tcpip! Ipnlpsenddatagrams+0x40
Fffff880'6412BB20 fffff801'0 AF315DC: 00000000'00000000 00000000'00000004 00000000'00000000 33333333'33333333: Tcpip! Udpsendmessagesonpath+0x7ad
Fffff880'6412BFC0 fffff801'0 AF31325: Ffffe788'AA07EF01 fffff801'0 AF31310 fffff880'6412C440 fffff880'6412C440: Tcpip! Udpsendmessages+0x29C
Fffff880'6412C330 fffff801'08b54488: Fffff880'6412C590 ffffe788'ADB1e890 3C5Efe44'00000000 00000000'00000000: Tcpip! Udptlprovidersendmessagescalloutroutine+0x15
Fffff880'6412C360 fffff801'08b543fd: Fffff801'0 AF31310 fffff880'6412C440 00000000'00000000 00000000'00000170: Nt! Keexpandkernelstackandcalloutınternal+0x78
Fffff880'6412C3D0 fffff801'0 AF82a2b: Fffff880'6412C500 00000000'00000170 00000000'00000001 fffff801'0C0820C0: Nt! Keexpandkernelstackandcalloutex+0x1D
Fffff880'6412C410 fffff801'0C09D898: Fffff880'6412C780 fffff880'6412CCC0 ffffe788'AA07EF40 fffff880'6412CCC0: Tcpip! Udptlprovidersendmessages+0x7B
Fffff880'6412C490 fffff801'0C081FB5: 00000000'00000000 fffff801'00000000 00000000'00000000 00000000'20206F49: Afd! Afdfastdatagramsend+0x658
Fffff880'6412C680 fffff801'08dfcee2: 00000000'00000000 00000000'00012023 fffff880'6412CCC0 ffffe788'affdfab0: Afd! Afdfastıodevicecontrol+0x1825
Fffff880'6412CA20 fffff801'08dfcb46: 00000000'00000001 00000000'00000EAC 00000000'00000001 00000000'00000000: Nt! Iopxxxcontrolfile+0x382
Fffff880'6412CB60 fffff801'08C074b8: 00000000'00000000 fffff880'00000001 00000000'00000000 ffffe788'b0b2A660: Nt! Ntdeviceıocontrolfile+0x56
Fffff880'6412CBD0 00000000'773b1cfc: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: Nt! Kisystemservicecopyend+0x28
00000000'165BF1e8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x773b1cfc.

Symbol_name: Athwnx! Mpperformscattergather+1ed

Module_name: Athwnx.

Image_name: athwnx.sys

Image_versıon: 3.0.2.202

Stack_command: Thread. Cxr; KB.

Bucket_ıd_func_offset: 1ed.

Faılure_bucket_ıd: Av_athwnx! Mpperformscattergather

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {9A22D509-1AE3-3269-4008-592AC4ecbb06}

Followup: Machineowner.
---------

0: Kd> lmvm athwnx.
Browse Full module list.
Start end module name.
Fffff801'0D2e0000 fffff801'0D707000 athwnx (pdb symbols) C:\ProgramData\Dbg\sym\athwnx.pdb\794BB0DFCC2C4D27AC0C1EBC39B2506D1\athwnx.pdb
Loaded symbol image file: athwnx.sys
Mapped Memory image file: C:\ProgramData\Dbg\sym\athwnx.sys\56D55527427000\athwnx.sys
Image path: \SystemRoot\System32\drivers\athwnx.sys
Image name: athwnx.sys
Browse all global symbols functions data.
Timestamp: Tue mar 1 11:39:03 2016 (56D55527)
Checksum: 0040B4A8.
Imagesize: 00427000.
File version: 3.0.2.202
Product version: 3.0.2.202
File flags: 8 (mask 3F) private.
File OS: 40004 nt Win32.
File type: 3.6 driver.
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
Companyname: Qualcomm atheros communications, ınc.
Productname: Driver for Qualcomm atheros CB42/CB43/MB42/MB43 network adapter.
Internalname: ATHR.SYS
Originalfilename: ATHR.SYS
Productversion: 3.0.2.202
Fileversion: 3.0.2.202
Filedescription: Qualcomm atheros extensible Wireless LAN device driver.
Legalcopyright: Copyright (C) 2001-2010 Qualcomm atheros communications, ınc.
Yalnız ürünün sürümü 3.0. 0. 202 olarak görünmekte.

Bu linkten indirip yeniden kurmayı dener misiniz? Yeniden sürümü kontrol etmenizi rica edeceğim, cihazda kurulu olan sürücüyü.

Bu paylaştığınız sürümü bu konuyu açtıktan sonra kendimce minidump dosyalarının içeriğine bakarken şüphelenerek yeni versiyon olarak güncelledim. Sizin paylaştığınız versiyon şu an kurulu ve bu Update'den sonra birkaç gündür bilgisayar hata vermemekte. Sanıyorum düzeldi. Teşekkür ederim.
 
tekrar bir mavi ekran aldım ve minidump dosyasını analiz ettiğimde aşağıdaki çözümlemeyi aldım.

[CODE title="minidump"]SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8015f82b333, Address of the instruction which caused the bugcheck
Arg3: ffffb90f16c0c050, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9983

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-PN9C3Q2

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 60928

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8015f82b333

BUGCHECK_P3: ffffb90f16c0c050

BUGCHECK_P4: 0

CONTEXT: ffffb90f16c0c050 -- (.cxr 0xffffb90f16c0c050)
rax=00ffffa90fbf5815 rbx=ffffa90fbf5846a0 rcx=0000000000100002
rdx=0000000074a6e68a rsi=0000000000000028 rdi=ffff99068a9d10a0
rip=fffff8015f82b333 rsp=ffffb90f16c0ca50 rbp=0000000000100002
r8=ffff99068b3fe001 r9=fffff8015f200000 r10=0000fffff8015f00
r11=ffff99068a6f8240 r12=ffffb90f16c0cb78 r13=0000000000000000
r14=a90fbf5846a07acf r15=ffffa90fc198d080
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ObpReferenceObjectByHandleWithTag+0x1a3:
fffff801`5f82b333 384228 cmp byte ptr [rdx+28h],al ds:002b:00000000`74a6e6b2=??
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: MsMpEng.exe

STACK_TEXT:
ffffb90f`16c0ca50 fffff801`5f82b17e : ffffa90f`bf6e1080 fffff801`b92e5d20 00000000`74a6e68a ffffffff`ff1ab301 : nt!ObpReferenceObjectByHandleWithTag+0x1a3
ffffb90f`16c0cae0 fffff801`5f4cd647 : 00000000`00000000 ffffa90f`bf5846d0 00000000`7ffe0386 ffffb90f`16c0ccc0 : nt!ObReferenceObjectByHandle+0x2e
ffffb90f`16c0cb30 fffff801`5f6075b8 : ffffa90f`c198d080 000000d4`4d57f7d8 00007fff`00000000 00000265`65e50c68 : nt!NtAssociateWaitCompletionPacket+0xc7
ffffb90f`16c0cbd0 00007fff`0d08de04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d4`4d57f7b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0d08de04


SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+1a3

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.844

STACK_COMMAND: .cxr 0xffffb90f16c0c050 ; kb

BUCKET_ID_FUNC_OFFSET: 1a3

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ObpReferenceObjectByHandleWithTag

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3d4819ec-af64-be43-ac98-a6e960db3861}

Followup: MachineOwner
---------[/CODE]
 
Merhaba. Sanırım mavi ekran Disk kaynaklı oluşmuş. HDD/SSD aygıtlarınıza bir hata taraması yapar mısınız?
HD Tune yazılımını indirip "Error Scan" yazan yere tıklayın. "Quick Scan" özelliğinin tik işaretini kaldırıp testi yapın. "Health" yani sağlık yazan kısmın fotoğrafını paylaşın. Hata taraması sonucunu da.
 

Yeni konular

Geri
Yukarı