mel10
Femtopat
- Katılım
- 21 Aralık 2020
- Mesajlar
- 14
Daha fazla
- Cinsiyet
- Erkek
Merhaba, bilgisayarı açtıktan sonra bazen 15 dakikada bazen saatte bir mavi ekran hataları alıyorum. Önce oyun ekranından atıyor sonra Chrome çöküyor ve mavi ekran veriyor. "IRQL_NOT_LESS_OR_EQUAL (a) hata kodları sürekli değişmekte 3-4 kere format atıp güncel sürücüleri kurdum memtest86 ram testi yapıldı hiç bir sorun çıkmadı ssd kontrolü yapıldı onda da sorun yok. Ancak mavi ekran hataları hala devam etmekte..
son aldığım mavi ekran hatası bu şekilde.
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffffd1811931c008
Arg3: 8000000002c62867
Arg4: ffffd1fc033e9310
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J3PINCA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15216
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffffd1811931c008
BUGCHECK_P3: 8000000002c62867
BUGCHECK_P4: ffffd1fc033e9310
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff9488`3249eba8 fffff806`7d49a5b9 : 00000000`0000001a 00000000`00000403 ffffd181`1931c008 80000000`02c62867 : nt!KeBugCheckEx
ffff9488`3249ebb0 fffff806`7d49ad6e : 00000000`00000000 ffff9488`3249f2c0 ffffd181`1931d000 ffff9488`3249f210 : nt!MiDeletePteRun+0x17b9
ffff9488`3249edc0 fffff806`7d40bedd : 00000000`00000000 ffffe68b`e9b05700 ffff9488`3249f210 ffffd181`1931cff8 : nt!MiDeleteVaTail+0x6e
ffff9488`3249edf0 fffff806`7d40bafb : ffffd1e8`00000000 ffffe68b`e9b05700 ffff9488`00000000 ffff9488`3249f260 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9488`3249ee90 fffff806`7d40bafb : ffffd1e8`f4604648 ffffe68b`e9b05700 ffff9488`00000001 ffff9488`3249f270 : nt!MiWalkPageTablesRecursively+0x88b
ffff9488`3249ef30 fffff806`7d40bafb : ffffd1e8`f4604000 ffffe68b`e9b05700 ffff9488`00000002 ffff9488`3249f280 : nt!MiWalkPageTablesRecursively+0x88b
ffff9488`3249efd0 fffff806`7d45de6b : 00000000`00000000 ffffe68b`e9b05700 00000000`00000003 ffff9488`3249f290 : nt!MiWalkPageTablesRecursively+0x88b
ffff9488`3249f070 fffff806`7d49b991 : ffff9488`3249f210 ffffe68b`00000000 00000000`00000002 010000f0`00000000 : nt!MiWalkPageTables+0x36b
ffff9488`3249f170 fffff806`7d46baf0 : 00000000`00000001 ffff9488`00000000 ffffe68b`e9b05550 ffffffff`ffffffff : nt!MiDeletePagablePteRange+0x4f1
ffff9488`3249f480 fffff806`7d835343 : ffffe68b`e7ced080 00000000`00000000 ffffe68b`00000000 ffffe68b`00000000 : nt!MiDeleteVad+0x360
ffff9488`3249f590 fffff806`7d8335ff : ffffe68b`ed468bb0 ffffe68b`ed468bb0 ffffe68b`ed4687f0 ffffe68b`e9b05080 : nt!MiCleanVad+0x43
ffff9488`3249f5c0 fffff806`7d85d6e4 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe68b`e9b05080 : nt!MmCleanProcessAddressSpace+0x137
ffff9488`3249f640 fffff806`7d906596 : ffffe68b`e9b05080 ffffaf0d`bc122060 ffff9488`3249f890 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9488`3249f6d0 fffff806`7d8d22e8 : ffffe68b`c0000374 00000000`00000001 ffff9488`3249f8e0 0000003b`9ef31000 : nt!PspExitThread+0x5f6
ffff9488`3249f7d0 fffff806`7d467fb7 : 00000000`402f0088 00000000`00000000 00000000`00000000 fffff806`7d40ecc6 : nt!KiSchedulerApcTerminate+0x38
ffff9488`3249f810 fffff806`7d5f9d20 : 0000003b`a0fff6e8 ffff9488`3249f8c0 ffff9488`3249fa80 00000232`00000000 : nt!KiDeliverApc+0x487
ffff9488`3249f8c0 fffff806`7d60725f : ffffe68b`e7ced080 ffffe68b`e8454860 ffff9488`3249fa18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff9488`3249fa00 00007ffa`e756c034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000003b`a0fff6b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e756c034
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff858f89dd2928, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801172367de, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for Netwtw08.sys
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5280
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J3PINCA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 17950
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffff858f89dd2928
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff801172367de
READ_ADDRESS: fffff80117cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80117c0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80117c0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff858f89dd2928
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffae0e1bd215a0 -- (.trap 0xffffae0e1bd215a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000007f rbx=0000000000000000 rcx=ffff858f064df4d0
rdx=ffff858f89dd2918 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801172367de rsp=ffffae0e1bd21730 rbp=ffffae0e1bd21860
r8=ffff858f064df4d0 r9=00000000bbc7fade r10=ffffae0e1bd21820
r11=ffff858f061ffd40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!RtlLookupEntryHashTable+0x6e:
fffff801`172367de 488b4210 mov rax,qword ptr [rdx+10h] ds:ffff858f`89dd2928=????????????????
Resetting default scope
STACK_TEXT:
ffffae0e`1bd21458 fffff801`17407169 : 00000000`0000000a ffff858f`89dd2928 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffae0e`1bd21460 fffff801`17403469 : fffff801`33e32d90 fffff801`33ad8ec3 fffff801`33e32d90 ffff858f`07560f10 : nt!KiBugCheckDispatch+0x69
ffffae0e`1bd215a0 fffff801`172367de : 00000000`00000000 ffff858f`0eaced50 ffff858f`0754cbb0 fffff801`3432c9aa : nt!KiPageFault+0x469
ffffae0e`1bd21730 fffff801`1c563cbc : ffff858f`07549000 00000000`00000001 00000000`ffffffff fffff801`34381c9d : nt!RtlLookupEntryHashTable+0x6e
ffffae0e`1bd21760 fffff801`1c563088 : 00000000`b8fffe3f 00000000`00989680 00000000`bbc7fade ffff858f`02e45100 : tcpip+0x13cbc
ffffae0e`1bd21a10 fffff801`1c56174e : ffff858f`02eacc00 ffff858f`0e1fbb01 ffff858f`00000004 00000000`00000000 : tcpip+0x13088
ffffae0e`1bd21b00 fffff801`1c57399a : 00000000`00000000 00000000`00000001 ffff858f`0e69dbd0 00000000`00000000 : tcpip+0x1174e
ffffae0e`1bd21b40 fffff801`1c5ce57f : ffff858f`0c67dcc0 ffff858f`0c694960 00000000`00000006 00000000`00000000 : tcpip+0x2399a
ffffae0e`1bd21dd0 fffff801`1720d468 : ffff858f`06575120 00000000`00000002 ffff858f`0224e040 ffffae0e`1bd220c8 : tcpip+0x7e57f
ffffae0e`1bd21f20 fffff801`1720d3dd : fffff801`1c5ce450 ffffae0e`1bd220c8 ffff858f`02e9b8e0 fffff801`1c4723af : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffae0e`1bd21f90 fffff801`1c5c15ed : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffae0e`1bd21fd0 fffff801`1c5c0ccd : 00000000`00000001 ffffae0e`1bd22130 ffff858f`0c694960 fffff801`36741168 : tcpip+0x715ed
ffffae0e`1bd22030 fffff801`1c301eb1 : 00000000`00000001 ffff858f`0c3c6f11 00000000`00000020 00000000`00000001 : tcpip+0x70ccd
ffffae0e`1bd222e0 fffff801`1c301ccb : ffff858f`0c66b8e0 ffff858f`0e690001 ffff858f`00000000 fffff801`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x141
ffffae0e`1bd223c0 fffff801`1c307ef1 : ffff858f`06d851a0 fffff801`362bd501 ffff858f`06d851a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffffae0e`1bd22440 fffff801`1c33dee3 : ffff858f`0e69dbd0 ffffae0e`1bd22511 00000000`00000000 00000000`00000000 : ndis!ndisCallReceiveHandler+0x61
ffffae0e`1bd22490 fffff801`1c304a94 : 00000000`00004d98 00000000`00000000 ffff858f`06d851a0 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffffae0e`1bd22560 fffff801`34381f88 : 00000000`00000000 ffff858f`08f5a820 ffffae0e`1bd22650 ffff858f`0eaced50 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffffae0e`1bd225f0 fffff801`34347167 : 00000048`00000001 00000000`00000000 ffff858f`01802340 fffff801`00000000 : wdiwifi!CPort::IndicateFrames+0x2d8
ffffae0e`1bd22690 fffff801`3432bb67 : ffff858f`0eaced50 ffffae0e`1bd227b9 ffff858f`0754cbb0 fffff801`173fc422 : wdiwifi!CAdapter::IndicateFrames+0x137
ffffae0e`1bd22700 fffff801`3432c2a6 : 00000000`00000000 00000000`00000003 ffff858f`0754cbb0 00000000`00000004 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain+0x7f7
ffffae0e`1bd22820 fffff801`34328142 : ffff858f`0eaced50 ffffae0e`1bd22948 00000000`00000000 00000000`0010003f : wdiwifi!CRxMgr::RxInOrderDataInd+0x35a
ffffae0e`1bd228c0 fffff801`33a5e8ec : 00000000`00000000 ffff858f`045292d0 ffff858f`074fedd0 ffff9c01`49d40180 : wdiwifi!AdapterRxInorderDataInd+0x92
ffffae0e`1bd22910 00000000`00000000 : ffff858f`045292d0 ffff858f`074fedd0 ffff9c01`49d40180 ffffae0e`1bd22940 : Netwtw08+0x5e8ec
SYMBOL_NAME: wdiwifi!CPort::IndicateFrames+2d8
MODULE_NAME: wdiwifi
IMAGE_NAME: wdiwifi.sys
IMAGE_VERSION: 10.0.19041.488
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2d8
FAILURE_BUCKET_ID: AV_wdiwifi!CPort::IndicateFrames
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d5daa917-7cc2-aeed-4c07-9628e8d7643d}
Followup: MachineOwner
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: ffffd1811931c008
Arg3: 8000000002c62867
Arg4: ffffd1fc033e9310
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2437
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-J3PINCA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 15216
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffffd1811931c008
BUGCHECK_P3: 8000000002c62867
BUGCHECK_P4: ffffd1fc033e9310
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff9488`3249eba8 fffff806`7d49a5b9 : 00000000`0000001a 00000000`00000403 ffffd181`1931c008 80000000`02c62867 : nt!KeBugCheckEx
ffff9488`3249ebb0 fffff806`7d49ad6e : 00000000`00000000 ffff9488`3249f2c0 ffffd181`1931d000 ffff9488`3249f210 : nt!MiDeletePteRun+0x17b9
ffff9488`3249edc0 fffff806`7d40bedd : 00000000`00000000 ffffe68b`e9b05700 ffff9488`3249f210 ffffd181`1931cff8 : nt!MiDeleteVaTail+0x6e
ffff9488`3249edf0 fffff806`7d40bafb : ffffd1e8`00000000 ffffe68b`e9b05700 ffff9488`00000000 ffff9488`3249f260 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9488`3249ee90 fffff806`7d40bafb : ffffd1e8`f4604648 ffffe68b`e9b05700 ffff9488`00000001 ffff9488`3249f270 : nt!MiWalkPageTablesRecursively+0x88b
ffff9488`3249ef30 fffff806`7d40bafb : ffffd1e8`f4604000 ffffe68b`e9b05700 ffff9488`00000002 ffff9488`3249f280 : nt!MiWalkPageTablesRecursively+0x88b
ffff9488`3249efd0 fffff806`7d45de6b : 00000000`00000000 ffffe68b`e9b05700 00000000`00000003 ffff9488`3249f290 : nt!MiWalkPageTablesRecursively+0x88b
ffff9488`3249f070 fffff806`7d49b991 : ffff9488`3249f210 ffffe68b`00000000 00000000`00000002 010000f0`00000000 : nt!MiWalkPageTables+0x36b
ffff9488`3249f170 fffff806`7d46baf0 : 00000000`00000001 ffff9488`00000000 ffffe68b`e9b05550 ffffffff`ffffffff : nt!MiDeletePagablePteRange+0x4f1
ffff9488`3249f480 fffff806`7d835343 : ffffe68b`e7ced080 00000000`00000000 ffffe68b`00000000 ffffe68b`00000000 : nt!MiDeleteVad+0x360
ffff9488`3249f590 fffff806`7d8335ff : ffffe68b`ed468bb0 ffffe68b`ed468bb0 ffffe68b`ed4687f0 ffffe68b`e9b05080 : nt!MiCleanVad+0x43
ffff9488`3249f5c0 fffff806`7d85d6e4 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe68b`e9b05080 : nt!MmCleanProcessAddressSpace+0x137
ffff9488`3249f640 fffff806`7d906596 : ffffe68b`e9b05080 ffffaf0d`bc122060 ffff9488`3249f890 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9488`3249f6d0 fffff806`7d8d22e8 : ffffe68b`c0000374 00000000`00000001 ffff9488`3249f8e0 0000003b`9ef31000 : nt!PspExitThread+0x5f6
ffff9488`3249f7d0 fffff806`7d467fb7 : 00000000`402f0088 00000000`00000000 00000000`00000000 fffff806`7d40ecc6 : nt!KiSchedulerApcTerminate+0x38
ffff9488`3249f810 fffff806`7d5f9d20 : 0000003b`a0fff6e8 ffff9488`3249f8c0 ffff9488`3249fa80 00000232`00000000 : nt!KiDeliverApc+0x487
ffff9488`3249f8c0 fffff806`7d60725f : ffffe68b`e7ced080 ffffe68b`e8454860 ffff9488`3249fa18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff9488`3249fa00 00007ffa`e756c034 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000003b`a0fff6b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`e756c034
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.685
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner