Çözüldü Mavi ekran hatası minidump dosya analizi

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

tamahan

Centipat
Katılım
9 Nisan 2021
Mesajlar
210
Daha fazla  
Cinsiyet
Erkek
1. dosya hatasi: WIN32KFULl! Updatespritearea+145
2. dosya hatasi: WIN32KBASe! Hmglock+bc
3. dosya hatasi: Dxgmms2! Vidschisendtoexecutionqueue+2A7

Yardim edebilirseniz sevinirim.
@Recep Baltaş ılgilenebilir misiniz? Lutfen yeni topladim sistemi neden böyle yaptigini anliyamiyorum.
 
Son düzenleme:
RAM'ler bozuk. RAM'leri aldığınız yere götürün ve test sonuçlarınızın ekran görüntülerini belirterek değişim talep edin.

CPU ile anakartı yeni aldım RAM'ler eski sistemden kalma. Mecbur yeni RAM alacagim sanirim.
CPU ile anakartı yeni aldım RAM'ler eski sistemden kalma. Mecbur yeni RAM alacagim sanirim.

CPU ile anakartı yeni aldım RAM'ler eski sistemden kalma. Mecbur yeni RAM alacagim sanirim.

Anakartta sorun yoktur degil mi? Bu teste gore XMP açıķ kapalı iki durumdada çok fazla error verdi RAM'larda degil mi sorun?

 
Son düzenleyen: Moderatör:
Memtest hata veriyorsa belleklerin bozuk olma ihtimali çok yüksek ki sizde XMP kapatınca bile devam etmiş.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: ffffa98d339fd4d5, Address of the instruction which caused the BugCheck
Arg3: ffffa88fd50bee50, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3109

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 20440

    Key  : Analysis.IO.Other.Mb
    Value: 8

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 26

    Key  : Analysis.Init.CPU.mSec
    Value: 249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7300

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  022122-17984-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: ffffa98d339fd4d5

BUGCHECK_P3: ffffa88fd50bee50

BUGCHECK_P4: 0

CONTEXT:  ffffa88fd50bee50 -- (.cxr 0xffffa88fd50bee50)
rax=0000000000000000 rbx=0000000000040064 rcx=ffffc78ef3f042c0
rdx=ffffa9c040614500 rsi=ffffffffa8051215 rdi=0000000000010050
rip=ffffa98d339fd4d5 rsp=ffffa88fd50bf850 rbp=ffffa88fd50bf950
 r8=ffffa88fd50bf780  r9=0000000000000002 r10=7ffffffffffffffc
r11=ffffa88fd50bf740 r12=ffffffffa8051215 r13=ffffa9c0408357e0
r14=0000000000010050 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
win32kfull!UpdateSpriteArea+0x145:
ffffa98d`339fd4d5 498b7d00        mov     rdi,qword ptr [r13] ds:002b:ffffa9c0`408357e0=000000000007058a
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Taskmgr.exe

STACK_TEXT: 
ffffa88f`d50bf850 ffffa98d`338f28a6     : 00000000`00040064 ffffa9c0`44dc5bd0 ffffa9c0`44dc5bd0 00000000`00000002 : win32kfull!UpdateSpriteArea+0x145
ffffa88f`d50bf9b0 ffffa98d`338f2fd4     : ffffa9c0`410a9860 00000000`00000001 ffffa9c0`44e3e010 ffffa9c0`46970110 : win32kfull!zzzBltValidBits+0x736
ffffa88f`d50bfad0 ffffa98d`338ef787     : 00000000`00000001 00000000`00000000 00000000`00000000 ffffa9c0`00000001 : win32kfull!xxxEndDeferWindowPosEx+0x204
ffffa88f`d50bfbb0 ffffa98d`338ef5c1     : ffffa9c0`44dc5bd0 ffffc78e`00000000 ffffa9c0`000003b4 00000000`00000052 : win32kfull!xxxSetWindowPosAndBand+0xc3
ffffa88f`d50bfc40 ffffa98d`338eefc2     : 00000000`00000000 ffffa88f`d50bfd40 00000000`00000000 00000000`00000000 : win32kfull!xxxSetWindowPos+0x79
ffffa88f`d50bfcc0 ffffa98d`32688441     : 00000000`000003b4 00000000`00000020 ffff89ff`000003b4 ffffa98d`00000052 : win32kfull!NtUserSetWindowPos+0x212
ffffa88f`d50bfd80 fffff801`5a208bb5     : 00000000`c000001c ffff90e2`8ae26f18 000000e9`e258d8f0 00000000`00000000 : win32k!NtUserSetWindowPos+0x3d
ffffa88f`d50bfdd0 00007ffe`8d2a14c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000e9`e258d788 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`8d2a14c4


SYMBOL_NAME:  win32kfull!UpdateSpriteArea+145

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.1288

STACK_COMMAND:  .cxr 0xffffa88fd50bee50 ; kb

BUCKET_ID_FUNC_OFFSET:  145

FAILURE_BUCKET_ID:  AV_win32kfull!UpdateSpriteArea

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a6313975-c74c-189c-6455-65de9fdba9a0}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc01c40662d18, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffc0600c43bdac, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2031

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12113

    Key  : Analysis.IO.Other.Mb
    Value: 4

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 14

    Key  : Analysis.Init.CPU.mSec
    Value: 312

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5992

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 99

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  022122-28531-01.dmp

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffc01c40662d18

BUGCHECK_P2: 0

BUGCHECK_P3: ffffc0600c43bdac

BUGCHECK_P4: 0

READ_ADDRESS: fffff80135efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc01c40662d18

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

TRAP_FRAME:  ffffc303ff356b80 -- (.trap 0xffffc303ff356b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000406028e0 rbx=0000000000000000 rcx=000000000000bfa0
rdx=0000000000000b70 rsi=0000000000000000 rdi=0000000000000000
rip=ffffc0600c43bdac rsp=ffffc303ff356d18 rbp=ffffc40180976080
 r8=ffffc01c406028e0  r9=ffffc01c40603010 r10=ffffc01c406028e0
r11=ffffc303ff356ce0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
win32kbase!HmgLock+0xbc:
ffffc060`0c43bdac 498b44c908      mov     rax,qword ptr [r9+rcx*8+8] ds:ffffc01c`40662d18=????????????????
Resetting default scope

STACK_TEXT: 
ffffc303`ff3568d8 fffff801`3564a91f     : 00000000`00000050 ffffc01c`40662d18 00000000`00000000 ffffc303`ff356b80 : nt!KeBugCheckEx
ffffc303`ff3568e0 fffff801`3549f540     : 00000000`00000000 00000000`00000000 ffffc303`ff356c00 00000000`00000000 : nt!MiSystemFault+0x18d3bf
ffffc303`ff3569e0 fffff801`3560555e     : ffffc401`80976080 ffffc01c`4652a8a0 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffc303`ff356b80 ffffc060`0c43bdac     : 00000000`00000000 00000000`2f040b70 ffffc303`ff356e28 ffffc01c`00000000 : nt!KiPageFault+0x35e
ffffc303`ff356d18 ffffc303`ff356e28     : 00000000`2f040b70 ffffc303`ff356e29 0000025a`b6820800 00000000`00000084 : win32kbase!HmgLock+0xbc
ffffc303`ff356d88 00000000`2f040b70     : ffffc303`ff356e29 0000025a`b6820800 00000000`00000084 ffffc303`ff356e28 : 0xffffc303`ff356e28
ffffc303`ff356d90 ffffc303`ff356e29     : 0000025a`b6820800 00000000`00000084 ffffc303`ff356e28 00000000`031c0537 : 0x2f040b70
ffffc303`ff356d98 0000025a`b6820800     : 00000000`00000084 ffffc303`ff356e28 00000000`031c0537 00007ff6`aab0e290 : 0xffffc303`ff356e29
ffffc303`ff356da0 00000000`00000084     : ffffc303`ff356e28 00000000`031c0537 00007ff6`aab0e290 00007ffa`d852cc60 : 0x0000025a`b6820800
ffffc303`ff356da8 ffffc303`ff356e28     : 00000000`031c0537 00007ff6`aab0e290 00007ffa`d852cc60 ffff49b5`7a70192d : 0x84
ffffc303`ff356db0 00000000`031c0537     : 00007ff6`aab0e290 00007ffa`d852cc60 ffff49b5`7a70192d 00000000`00000004 : 0xffffc303`ff356e28
ffffc303`ff356db8 00007ff6`aab0e290     : 00007ffa`d852cc60 ffff49b5`7a70192d 00000000`00000004 ffffc060`0c446212 : 0x31c0537
ffffc303`ff356dc0 00007ffa`d852cc60     : ffff49b5`7a70192d 00000000`00000004 ffffc060`0c446212 00000000`00000001 : 0x00007ff6`aab0e290
ffffc303`ff356dc8 ffff49b5`7a70192d     : 00000000`00000004 ffffc060`0c446212 00000000`00000001 00000000`00000000 : 0x00007ffa`d852cc60
ffffc303`ff356dd0 00000000`00000004     : ffffc060`0c446212 00000000`00000001 00000000`00000000 00000000`00000b70 : 0xffff49b5`7a70192d
ffffc303`ff356dd8 ffffc060`0c446212     : 00000000`00000001 00000000`00000000 00000000`00000b70 00000000`2f040b70 : 0x4
ffffc303`ff356de0 ffffc060`0c769e60     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kbase!NtGdiDeleteObjectApp+0x1e2
ffffc303`ff356e90 ffffc060`0c768c74     : 00000000`00000007 00000000`c000001c 00000000`00000000 00000000`00000000 : win32kfull!NtGdiFlushUserBatchInternal+0x11e0
ffffc303`ff357100 ffffc060`0c4198e1     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiFlushUserBatch+0x24
ffffc303`ff357140 ffffc060`0cab10d1     : 00000000`c000001c fffff801`357a50e0 00000000`00000000 00000000`00000000 : win32kbase!W32CalloutDispatch+0x3b1
ffffc303`ff357350 fffff801`35802b95     : 00000000`00000007 fffff801`35e1ddd0 ffffc401`7f4959d0 ffff532e`cf3a314b : win32k!W32CalloutDispatchThunk+0x31
ffffc303`ff357390 fffff801`35608cb8     : 00000000`00000000 ffffc303`ff357440 00000000`00000000 ffffc060`0cab5efc : nt!PsInvokeWin32Callout+0x55
ffffc303`ff3573c0 00007ffa`d64417c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceGdiTebAccess+0x31
000000aa`7e97e858 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`d64417c4


SYMBOL_NAME:  win32kbase!HmgLock+bc

MODULE_NAME: win32kbase

IMAGE_NAME:  win32kbase.sys

IMAGE_VERSION:  10.0.19041.1526

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  bc

FAILURE_BUCKET_ID:  AV_R_(null)_win32kbase!HmgLock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b2d360eb-e154-ae86-f1e4-5b41ffdb09a6}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000115f86706, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8045bb27ba7, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2000

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13475

    Key  : Analysis.IO.Other.Mb
    Value: 6

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 23

    Key  : Analysis.Init.CPU.mSec
    Value: 358

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10431

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  022222-32546-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 115f86706

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8045bb27ba7

WRITE_ADDRESS: fffff80441cfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000115f86706

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffd20384447040 -- (.trap 0xffffd20384447040)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9383083e5790 rbx=0000000000000000 rcx=0000000000000010
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8045bb27ba7 rsp=ffffd203844471d0 rbp=ffffd20384447299
 r8=0000000115f86706  r9=0000000000000001 r10=fffff80441363320
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgmms2!VidSchiSendToExecutionQueue+0x2a7:
fffff804`5bb27ba7 4c8900          mov     qword ptr [rax],r8 ds:ffff9383`083e5790=0000000000000000
Resetting default scope

STACK_TEXT: 
ffffd203`84446ef8 fffff804`41409569     : 00000000`0000000a 00000001`15f86706 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd203`84446f00 fffff804`41405869     : fffff804`5bb626b0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd203`84447040 fffff804`5bb27ba7     : ffff9383`083e82f0 00000000`00989680 ffff9383`0e084520 ffff9383`083e5000 : nt!KiPageFault+0x469
ffffd203`844471d0 fffff804`5bb873ef     : fffff780`00000000 00000000`3ebe9000 ffff9383`08391000 ffff9383`083e8300 : dxgmms2!VidSchiSendToExecutionQueue+0x2a7
ffffd203`84447300 fffff804`5bbad4f2     : ffff9383`0e767900 ffff9383`08391000 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiSubmitRenderVirtualCommand+0x4cf
ffffd203`84447440 fffff804`5bbad38a     : ffff9383`08391400 fffff804`5bbad2c0 ffff9383`08391000 fffff804`3c9a7100 : dxgmms2!VidSchiRun_PriorityTable+0x152
ffffd203`84447490 fffff804`41355a05     : ffff9383`083e4280 fffff804`00000001 ffff9383`08391000 001fa4ef`bd9bbfff : dxgmms2!VidSchiWorkerThread+0xca
ffffd203`844474d0 fffff804`413fec68     : fffff804`3c9a7180 ffff9383`083e4280 fffff804`413559b0 000001b9`41d74589 : nt!PspSystemThreadStartup+0x55
ffffd203`84447520 00000000`00000000     : ffffd203`84448000 ffffd203`84441000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VidSchiSendToExecutionQueue+2a7

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1645

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a7

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiSendToExecutionQueue

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bd0bcdd2-c024-be08-ece5-f8df05a59e06}

Followup:     MachineOwner
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…