IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

İşletim sistemi
Windows 10

Denko34

Decapat
Katılım
20 Kasım 2020
Mesajlar
21
Daha fazla  
Cinsiyet
Erkek
İyi günler arkadaşlar siteye yeni kayıt oldum ve gecen hafta kendime ilk bilgisayarımı topladım topladığım günden beri ise sürekli BSoD almaktayım.
Farklı farklı kodlarla almaktaydım memtest ve windows formatları denedim bütün sürücüleri güncellemeyi de denedim. Hiç anlamadığım konu ise mavi ekranı 4-5 saat oyun oynayıp bilgisayarı zorladığımda hiç almıyorum ama başka uygulamaları veya browserları bir süre kullanınca BSoD veriyor bazen ise bilgisayarı hiç kullanmayınca da veriyor.


Ryzen 5 3600
Msi 1660 Super Gaming X
2x8Gb Corsair Vengeance rgb Pro
480Gb Crucial BX500
Gigabyte B450m s2h
Thermaltake Smart BX1 650W

Lütfen birisi beni kurtarsın.
 
Son düzenleyen: Moderatör:
AMD APU Driver
(Note) Win10 ver.2004 supported.

OS:Windows 10 64bit indirebildim

AMD Chipset Driver
(Note) Win10 ver.2004 supported.

OS:Windows 10 64bit
yüklemeye calışırken fail veriyor
Ağ kartı kullanmıyorum sanırım sadece lan kullanıyorum onu da aygıt yöneticisinden ağ bölümünden güncellemiştim
 
Sorun nedir? İşlemciniz R5 3600 olduğu için görselde attığım chipset sürücüsünü indireceksin.
 

Dosya Ekleri

  • resim_2020-11-21_154831.png
    resim_2020-11-21_154831.png
    5,9 KB · Görüntüleme: 43
Yükledim çalıştırdım böyle bir ekran gösteriyor. size az önce attığım RAR dosyasında ise installation log paylaştım.
 

Dosya Ekleri

  • Ekran Alıntısı.PNG
    Ekran Alıntısı.PNG
    70,5 KB · Görüntüleme: 41
  • Ekran Alıntısı2.PNG
    Ekran Alıntısı2.PNG
    114 KB · Görüntüleme: 40
Son düzenleyen: Moderatör:
Realtek ağ kartı sürücüsünü güncellediniz mi?
Vanguard kaldırınız.
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8036eafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\drivers\amdkmpfd.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmpfd.sys
Unable to load image \SystemRoot\System32\drivers\amd_sata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_sata.sys
Unable to load image \SystemRoot\System32\drivers\amd_xata.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amd_xata.sys
Unable to load image \SystemRoot\system32\drivers\wd\WdFilter.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for WdFilter.sys
Unable to load image \SystemRoot\System32\drivers\amdpsp.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdpsp.sys
Unable to load image \SystemRoot\System32\drivers\amdxe.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdxe.sys
Unable to load image \SystemRoot\System32\drivers\amdfendr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdfendr.sys
Unable to load image \SystemRoot\system32\drivers\peauth.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for peauth.sys
Unable to load image \SystemRoot\system32\drivers\wd\WdNisDrv.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for WdNisDrv.sys
Unable to load image \SystemRoot\System32\drivers\rt640x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for rt640x64.sys
Unable to load image \SystemRoot\system32\drivers\RTKVHD64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for RTKVHD64.sys
Unable to load image \SystemRoot\System32\drivers\drmk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for drmk.sys
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\nvppc.inf_amd64_51dcd2a6fae8e495\UcmCxUcsiNvppc.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for UcmCxUcsiNvppc.sys
Unable to load image \SystemRoot\System32\drivers\AMDPCIDev.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for AMDPCIDev.sys
Unable to load image \SystemRoot\System32\drivers\amdgpio2.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdgpio2.sys
Unable to load image \SystemRoot\System32\drivers\amdgpio3.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdgpio3.sys
Unable to load image \SystemRoot\system32\drivers\nvvad64v.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvvad64v.sys
Unable to load image \SystemRoot\System32\drivers\NvModuleTracker.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for NvModuleTracker.sys
Unable to load image \SystemRoot\System32\drivers\nvvhci.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvvhci.sys
Unable to load image \SystemRoot\system32\drivers\nvhda64v.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvhda64v.sys
Unable to load image \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_8e1b465b962975a0\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11405

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 146517

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 486

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8036eafb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff50d466a75e0 -- (.trap 0xfffff50d466a75e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005a9e201b rbx=0000000000000000 rcx=fffff50d466a7808
rdx=ffffa78c9e4f2b88 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036e0becd7 rsp=fffff50d466a7770 rbp=ffffa78c9bc4ccc0
 r8=fffff50d466a7a00  r9=000000000000002f r10=0000fffff8036e07
r11=ffffd4f9f4400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!KeYieldProcessorEx+0x17:
fffff803`6e0becd7 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffffe500`eb2bae18 fffff803`6e2873f6     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`6eafb320 : nt!KeBugCheckEx
ffffe500`eb2bae20 fffff803`6e126853     : 000008b3`b913244c ffffe500`eb2a1180 00000000`00000000 ffffe500`eb2a1180 : nt!KeAccumulateTicks+0x15e346
ffffe500`eb2bae80 fffff803`6e12633a     : ffffa78c`924c9480 fffff50d`466a7660 ffffa78c`9c4e2100 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffe500`eb2baf30 fffff803`6e02ecd5     : ffffa78c`924c9480 fffff803`6e09f937 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffe500`eb2baf60 fffff803`6e1f6cba     : fffff50d`466a7660 ffffa78c`924c9480 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffe500`eb2bafb0 fffff803`6e1f7227     : fffff50d`466a7808 ffffe500`eb2a1180 ffffa78c`924c9480 ffffa78c`9e4f2b88 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff50d`466a75e0 fffff803`6e0becd7     : ffffffff`ffffffd2 fffff803`6e0c5efe 00000000`00000010 00000000`00040286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff50d`466a7770 fffff803`6e0c5efa     : ffffe500`00000000 ffffa78c`9c4e2080 00000000`0000000c fffff50d`466a77dc : nt!KeYieldProcessorEx+0x17
fffff50d`466a77a0 fffff803`6e0c5001     : ffff73bf`f1fa4f24 ffffa78c`00000002 00000000`00000000 fffff803`6e4efe11 : nt!KiDeferredReadySingleThread+0xc3a
fffff50d`466a7990 fffff803`6e0c4a8a     : 00000000`00060001 00000000`00000000 ffffa78c`9e4f2c60 00000000`00000000 : nt!KiExitDispatcher+0x141
fffff50d`466a7a00 fffff803`6e4bfe2d     : ffffa78c`00000000 fffff50d`466a7b80 fffff50d`466a7aa8 ffffa78c`9c4e21c0 : nt!KeSetEvent+0xea
fffff50d`466a7a90 fffff803`6e206bb8     : ffffa78c`9e771280 ffffa78c`9e34d0c0 00000000`00000000 ffffa78c`00000000 : nt!NtSetEvent+0xbd
fffff50d`466a7b00 00007ffd`7440bf64     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000002e`e83feb18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`7440bf64


SYMBOL_NAME:  nt!KeAccumulateTicks+15e346

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  15e346

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

1: kd> !blackboxntfs

NTFS Blackbox Data

Record 0:
  Record type:    1 (Slow I/O Timeout)
  Record length:  32
        Irp:      ffffa78c99096a20
        Scb:      ffffa78c93e4ed30
        Thread:   ffffa78c9d692040

Record 1:
  Record type:    1 (Slow I/O Timeout)
  Record length:  32
        Irp:      ffffa78c9d6e2a20
        Scb:      ffffcf09929c4700
        Thread:   ffffa78c9c584040

Record 2:
  Record type:    1 (Slow I/O Timeout)
  Record length:  32
        Irp:      ffffa78c9ed7a010
        Scb:      ffffcf098fd04700
        Thread:   ffffa78c976b5040

3 Slow I/O Timeout Records Found
0 Oplock Break Timeout Records Found
 
Realtek ağ kartı sürücüsünü güncellediniz mi? Evet.
HDD Sentinel ile diskinizin sağlık durumunu paylaşınız.
Yeni minidumplar son 20 dakika mini4.rar
 

Dosya Ekleri

  • 3.PNG
    3.PNG
    28,2 KB · Görüntüleme: 47
Son düzenleyen: Moderatör:
CrystalDiskMark ile de hız testi yapınız.
RAM'lerden birini çıkarabilir misiniz?
Vanguard kaldırmamışsınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: fffff80515281010, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80515280f68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5467

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 11623

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: fffff80515281010

BUGCHECK_P3: fffff80515280f68

BUGCHECK_P4: 0

TRAP_FRAME:  fffff80515281010 -- (.trap 0xfffff80515281010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8182b9e000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffa8182ba4000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050fc3111f rsp=fffff805152811a0 rbp=fffff80515281710
 r8=fffffa8182ba4000  r9=fffff80515281728 r10=fffffa8182ba3e40
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x1de6ef:
fffff805`0fc3111f cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff80515280f68 -- (.exr 0xfffff80515280f68)
ExceptionAddress: fffff8050fc3111f (nt!RtlpGetStackLimitsEx+0x00000000001de6ef)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  setup.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  fffff80515280ce8

STACK_TEXT: 
fffff805`15280ce8 fffff805`0fc07169     : 00000000`00000139 00000000`00000004 fffff805`15281010 fffff805`15280f68 : nt!KeBugCheckEx
fffff805`15280cf0 fffff805`0fc07590     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff805`15280e30 fffff805`0fc05923     : fffff805`152817c0 00000000`00000000 fffff805`15280a60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff805`15281010 fffff805`0fc3111f     : 00000000`097dc1c8 00007ffd`70e11f4c fffff805`15281710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff805`152811a0 fffff805`0fc312ed     : fffff805`15281710 00000000`00000000 fffffa81`82ba3e40 fffff805`00000004 : nt!RtlpGetStackLimitsEx+0x1de6ef
fffff805`152811d0 fffff805`0fa519a6     : fffffa81`82ba3438 fffff805`15281e20 fffffa81`82ba3438 ffff973f`feb87088 : nt!RtlDispatchException+0x1de7cd
fffff805`152818f0 fffff805`0fbf60a2     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff805`15281fb0 fffff805`0fbf6070     : fffff805`0fc072a5 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffa81`82ba32f8 fffff805`0fc072a5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffa81`82ba3300 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8468

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 20130

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff8076c8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8076c80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8076c80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000000

PROCESS_NAME:  System

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  fffff8077086ba30 -- (.trap 0xfffff8077086ba30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd98129189180 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8077086bbc0 rbp=0000000100981600
 r8=0000000000000000  r9=0000000000000020 r10=0000000000000007
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

FAILED_INSTRUCTION_ADDRESS:
+0
00000000`00000000 ??              ???

STACK_TEXT: 
fffff807`7086b8e8 fffff807`6c007169     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff807`7086b8f0 fffff807`6c003469     : ffffa303`d9816d50 00000000`00000000 00000000`00000200 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff807`7086ba30 00000000`00000000     : fffff807`68964180 ffffa303`d9844200 ffffa303`00000004 fffff807`7086bbfc : nt!KiPageFault+0x469


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}

Followup:     MachineOwner
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffb823d8c2f40, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffffb823d8c2e98, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7312

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 43337

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffb823d8c2f40

BUGCHECK_P3: fffffb823d8c2e98

BUGCHECK_P4: 0

TRAP_FRAME:  fffffb823d8c2f40 -- (.trap 0xfffffb823d8c2f40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd50f56d981a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd50f5a6321a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8055e47048d rsp=fffffb823d8c30d0 rbp=00000000e05f5899
 r8=00000000e05cb013  r9=fffff80558fccfb0 r10=fffff80558fcaac0
r11=fffffb823d8c3100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiInsertTimerTable+0x18f1fd:
fffff805`5e47048d cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffb823d8c2e98 -- (.exr 0xfffffb823d8c2e98)
ExceptionAddress: fffff8055e47048d (nt!KiInsertTimerTable+0x000000000018f1fd)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffffb82`3d8c2c18 fffff805`5e407169     : 00000000`00000139 00000000`00000003 fffffb82`3d8c2f40 fffffb82`3d8c2e98 : nt!KeBugCheckEx
fffffb82`3d8c2c20 fffff805`5e407590     : ffffe501`39a8fe70 ffffe501`00000003 ffffe501`00000000 ffffe501`3a0e3db0 : nt!KiBugCheckDispatch+0x69
fffffb82`3d8c2d60 fffff805`5e405923     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffffb82`3d8c2f40 fffff805`5e47048d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffffb82`3d8c30d0 fffff805`5e2df5fd     : ffffd50f`56d98080 00000000`00000000 fffffb82`3d8c3251 fffff805`5e2ca900 : nt!KiInsertTimerTable+0x18f1fd
fffffb82`3d8c3150 fffff805`5e2be4ce     : ffffd50f`00000017 fffff805`00000000 00000000`00000001 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
fffffb82`3d8c31f0 fffff805`5e6bc750     : fffffb82`3d8c35b0 00000000`00000001 ffffd50f`56378830 fffff805`00000000 : nt!KeWaitForMultipleObjects+0x2be
fffffb82`3d8c3300 fffff805`5e6bc429     : 00000000`00000000 ffffd50f`560dc008 fffffb82`3d8c3848 00000000`00000000 : nt!ObWaitForMultipleObjects+0x2f0
fffffb82`3d8c3800 fffff805`5e406bb8     : 00000000`00000020 fffff805`6913c0f6 ffffd50f`56d98080 ffffd50f`5a5c1460 : nt!NtWaitForMultipleObjects+0x119
fffffb82`3d8c3a90 00007ffe`3ec8c8f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000028`7ccff3d8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3ec8c8f4


SYMBOL_NAME:  nt!KiInsertTimerTable+18f1fd

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18f1fd

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup:     MachineOwner
---------*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80124338a19, Address of the instruction which caused the bugcheck
Arg3: ffffe58a32be86e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22872

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80124338a19

BUGCHECK_P3: ffffe58a32be86e0

BUGCHECK_P4: 0

CONTEXT:  ffffe58a32be86e0 -- (.cxr 0xffffe58a32be86e0)
rax=0000000000000023 rbx=0000000000004765 rcx=ffffe58a32be9190
rdx=0000000000000198 rsi=fffffb00000d62f0 rdi=0000000000000007
rip=fffff80124338a19 rsp=ffffe58a32be90e0 rbp=ffffab89ebc34d60
 r8=fffff08000000000  r9=0000007ffffffff8 r10=0000000fffffffff
r11=fffff0f87c3e1fff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff0fffffffff8
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!MmCheckCachedPageStates+0x3e9:
fffff801`24338a19 488b5218        mov     rdx,qword ptr [rdx+18h] ds:002b:00000000`000001b0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT: 
ffffe58a`32be90e0 fffff801`2431f6b5     : ffffab89`00000000 00000000`00000000 ffffe58a`32be9320 ffffe58a`32be9304 : nt!MmCheckCachedPageStates+0x3e9
ffffe58a`32be92b0 fffff801`2431e63a     : ffffab89`f6bd0af0 0000026d`5e20f070 ffffe58a`32be94a8 00000000`00000000 : nt!CcMapAndCopyInToCache+0x605
ffffe58a`32be9450 fffff801`25f098eb     : ffffe58a`32be95c0 00000000`00001000 00000000`0089487b 00000000`00001000 : nt!CcCopyWriteEx+0xea
ffffe58a`32be94d0 fffff801`1fcd73fb     : 00000000`00000000 ffffe58a`32be98e8 ffffe58a`32be98a8 0000026d`5e20f070 : Ntfs!NtfsCopyWriteA+0x44b
ffffe58a`32be9800 fffff801`1fcd44d7     : ffffe58a`32be9910 ffffe58a`32be98a8 ffffab89`f31e3b20 ffffab89`f31e3a20 : FLTMGR!FltpPerformFastIoCall+0x16b
ffffe58a`32be9860 fffff801`1fd0b215     : ffffe58a`32bea000 ffffe58a`32be4000 ffffab89`f7848c00 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0x107
ffffe58a`32be98e0 fffff801`246b8c4d     : ffffab89`f6e5a5c0 000000a9`885fee90 000000a9`885fee90 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffffe58a`32be9990 fffff801`24406bb8     : 00000000`00000000 00000000`00000000 00000000`00000000 000000a9`885feed0 : nt!NtWriteFile+0x43d
ffffe58a`32be9a90 00007ffa`fa58bea4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a9`885fee18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fa58bea4


SYMBOL_NAME:  nt!MmCheckCachedPageStates+3e9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.630

STACK_COMMAND:  .cxr 0xffffe58a32be86e0 ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  3e9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!MmCheckCachedPageStates

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {95c8cd5e-ad74-738f-240d-7e0daa1b3116}

Followup:     MachineOwner
---------
 
Son düzenleme:
BSoDlerin bir veya iki tanesi sürücüyü DDU ile kaldırıp tekrar NVDIA'nın sayfasından indirirken gerçekleşti.
Şu an tek RAM'ı çıkarttım.
Tekrar mavi ekran verdi ekran görüntüsü alırken. 5.rar
 

Dosya Ekleri

  • 4.PNG
    4.PNG
    11,5 KB · Görüntüleme: 38
  • 5.PNG
    5.PNG
    9,7 KB · Görüntüleme: 42
Son düzenleyen: Moderatör:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı