- RAM
- 16 GB DDR4 4000
- SSD veya HDD modeli
- Samsung 970 Evo Plus
- Ekran kartı
- Asus Rog Strix 6700 XT
- Anakart
- Gigabyte x570 Aorus Elite
- İşlemci
- Ryzen 7 3700X
Aldığım mavi ekran hatasından sonra minidump dosyasını WinDbg programıyla açtım ve bunlar yazıyor, pek bir anlam çıkaramadım arkadaşlar. Anlayan biri yardımcı olursa sevinirim. İşletim sistemi Windows 11 22h2.
Kod:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\101722-9781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff800`77200000 PsLoadedModuleList = 0xfffff800`77e133d0
Debug session time: Mon Oct 17 17:26:26.996 2022 (UTC + 3:00)
System Uptime: 0 days 0:58:52.795
Loading Kernel Symbols.
...............................................................
................................................................
.................................................
Loading User Symbols.
Loading unloaded module list.
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`776280f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff503`782e5d80=000000000000000a
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000271d0, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80077424cd3, address which referenced memory.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1343.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 3281.
Key : Analysis.IO.Other.Mb
Value: 20.
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24.
Key : Analysis.Init.CPU.mSec
Value: 140.
Key : Analysis.Init.Elapsed.mSec
Value: 52665.
Key : Analysis.Memory.CommitPeak.Mb
Value: 88.
Key : Bugcheck.Code.DumpHeader
Value: 0xa.
Key : Bugcheck.Code.Register
Value: 0xa.
Key : WER.OS.Branch
Value: ni_release.
Key : WER.OS.Timestamp
Value: 2022-05-06T12:50:00Z
Key : WER.OS.Version
Value: 10.0.22621.1
FILE_IN_CAB: 101722-9781-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b.
BUGCHECK_CODE: a
BUGCHECK_P1: 271d0.
BUGCHECK_P2: ff.
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80077424cd3.
READ_ADDRESS: fffff80077f1c468: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
00000000000271d0.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
TRAP_FRAME: fffff503782e5ec0 -- (.trap 0xfffff503782e5ec0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000400000b1
rdx=0000000000000008 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80077424cd3 rsp=fffff503782e6050 rbp=ffffffffffffffff
r8=000000000000001b r9=fffff78000000294 r10=0000fffff8007759
r11=ffffd1fc51800000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po nc.
nt!KiSetNextClockTickDueTime+0x3a3:
fffff800`77424cd3 4d8bbed0000000 mov r15,qword ptr [r14+0D0h] ds:00000000`000000d0=????????????????
Resetting default scope.
STACK_TEXT:
fffff503`782e5d78 fffff800`7763b0a9 : 00000000`0000000a 00000000`000271d0 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffff503`782e5d80 fffff800`77636fe8 : 00000000`00000000 00000000`00000000 fffffe7f`2971fd8d 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff503`782e5ec0 fffff800`77424cd3 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00027100 : nt!KiPageFault+0x468
fffff503`782e6050 fffff800`7753a7b7 : ffffe201`1e956180 ffffffff`ffffffff fffff503`782e6338 00000000`00000000 : nt!KiSetNextClockTickDueTime+0x3a3
fffff503`782e6290 fffff800`77429739 : 00000008`39b6018b fffff503`782e63d0 00000008`39b5d884 00000008`39b8e679 : nt!KiRestoreClockTickRate+0x77
fffff503`782e62d0 fffff800`77427c19 : 00000000`00000071 00000000`00989680 00000000`00000000 00000000`00000000 : nt!KeResumeClockTimerFromIdle+0x11b9
fffff503`782e6590 fffff800`7742626b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`77624210 : nt!PpmIdleExecuteTransition+0x1949
fffff503`782e6a50 fffff800`7762c064 : 00000000`00000000 ffffab83`4ea35080 ffffab83`6265b080 ffffab83`6105b0c0 : nt!PoIdle+0x67b
fffff503`782e6c40 00000000`00000000 : fffff503`782e7000 fffff503`782e1000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!KiSetNextClockTickDueTime+3a3
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.22621.674
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 3a3.
FAILURE_BUCKET_ID: AV_nt!KiSetNextClockTickDueTime
OS_VERSION: 10.0.22621.1
BUILDLAB_STR: ni_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {3b03e7f6-fe67-541e-503c-30ef34d41bc6}
Followup: MachineOwner.
---------