Çözüldü Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

aliköse

Kilopat
Katılım
20 Kasım 2016
Mesajlar
187
Daha fazla  
Cinsiyet
Erkek
Meslek
Dj
Arkadaşlar selamlar, minidump dosyasını kontrol eder misiniz? Az once aniden bir mavi ekran verdi ve yeniden başlattı sistem kendini.

 
Son düzenleyen: Moderatör:
Çözüm
Memtest86 ile bellek testi yapın.

RGB yazılımlarını, kullandığınız antivirüs programı/programlarını kaldırın.

CMD'yi yönetici olarak çalıştırıp sfc /scannow komutunu uygulayın.

Kod:
Loading Dump File [C:\Users\maksu\Downloads\010921-7843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`54200000 PsLoadedModuleList = 0xfffff801`54e2a2b0
Debug session time: Sat Jan  9 12:53:09.087 2021 (UTC + 3:00)
System Uptime: 0 days 1:52:45.759
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`545f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffd8f`0c328dc0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: ffff81cb128f0f86, Address of the instruction which caused the bugcheck
Arg3: fffffd8f0c3296c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5436

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7259

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: ffff81cb128f0f86

BUGCHECK_P3: fffffd8f0c3296c0

BUGCHECK_P4: 0

CONTEXT:  fffffd8f0c3296c0 -- (.cxr 0xfffffd8f0c3296c0)
rax=0000000000000000 rbx=000000d6000000c8 rcx=fffffd8f0c32a280
rdx=0000000000000800 rsi=ffff8192406067e8 rdi=fffffd8f0c32a280
rip=ffff81cb128f0f86 rsp=fffffd8f0c32a0c0 rbp=fffffd8f0c32a1f0
 r8=0000000000000001  r9=7fff819240690eb8 r10=fffff80154461420
r11=fffffd8f0c32a0e0 r12=ffff978d869d2108 r13=ffff81cb12aa40d0
r14=ffff81cb12adc0c0 r15=ffff819240690000
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050287
win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+0x22:
ffff81cb`128f0f86 07              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
fffffd8f`0c32a0c0 ffff81cb`12a58903     : 000000d6`000000c8 000000d6`000000c8 ffff8192`406067e8 00000000`00000140 : win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+0x22
fffffd8f`0c32a0f0 ffff81cb`12a49baa     : ffff8192`406067d0 ffff81cb`12a49c95 ffff978d`869d2108 ffff8192`406062d0 : win32kbase!CMouseProcessor::ProcessInput+0x4c7
fffffd8f`0c32a330 ffff81cb`12a49f13     : ffff8192`406062d0 0000000f`c0d6717b ffff8192`406067d0 ffff978d`869d2108 : win32kbase!CMouseSensor::FlushMouseReports+0x42
fffffd8f`0c32a370 ffff81cb`12a49e44     : ffff8192`44cf7690 00000000`00000018 ffff8192`40606200 ffff8192`406062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
fffffd8f`0c32a3c0 ffff81cb`12a3c04a     : ffff81cb`12aa0700 fffffd8f`0c32a500 ffff8192`406062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
fffffd8f`0c32a400 ffff81cb`128f4c1d     : 00000000`00000040 ffff81cb`12aa0700 00000000`00000001 ffff978d`86c6d170 : win32kbase!CBaseInput::OnReadNotification+0x52a
fffffd8f`0c32a540 ffff81cb`128f4d52     : ffff978d`86ce6080 ffff8192`4069c6a0 00000000`00000006 ffff4e07`8e8ed612 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
fffffd8f`0c32a680 ffff81cb`128e86de     : ffff81cb`12ae82a0 ffff8192`4069c6a0 ffff81cb`12ae1970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
fffffd8f`0c32a6b0 ffff81cb`128e8430     : 00000000`00000006 ffff81cb`12ae82a0 00000000`00000006 ffff8192`4069c6a0 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
fffffd8f`0c32a6e0 ffff81cb`11ec07a8     : ffff8192`4061b050 ffff8192`4061b050 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
fffffd8f`0c32a810 ffff81cb`11ec0374     : 00000000`00000004 00000000`00000004 00000000`0000000d ffff81cb`12ae9a70 : win32kfull!xxxDesktopThreadWaiter+0x130
fffffd8f`0c32a890 ffff81cb`129560c3     : ffff978d`86ce6080 ffff978d`86ce6080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
fffffd8f`0c32a970 ffff81cb`11e58d80     : ffff978d`86ce6080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffd8f`0c32aaa0 ffff81cb`11ca474d     : ffff978d`86ce6080 ffff978d`86ce6080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffd8f`0c32aad0 fffff801`546071b8     : ffff978d`00000005 00000000`00000005 0000021a`08404150 00000000`000004c0 : win32k!NtUserCallNoParam+0x15
fffffd8f`0c32ab00 00007fff`b99310e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d9`39c7fd48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b99310e4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffff81cb128f0f86 - win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+22
    [ 0f:07 ]
1 error : !win32kbase (ffff81cb128f0f86)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xfffffd8f0c3296c0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
Memtest86 ile bellek testi yapın.

RGB yazılımlarını, kullandığınız antivirüs programı/programlarını kaldırın.

CMD'yi yönetici olarak çalıştırıp sfc /scannow komutunu uygulayın.

Kod:
Loading Dump File [C:\Users\maksu\Downloads\010921-7843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff801`54200000 PsLoadedModuleList = 0xfffff801`54e2a2b0
Debug session time: Sat Jan  9 12:53:09.087 2021 (UTC + 3:00)
System Uptime: 0 days 1:52:45.759
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`545f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffd8f`0c328dc0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: ffff81cb128f0f86, Address of the instruction which caused the bugcheck
Arg3: fffffd8f0c3296c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5436

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7259

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 94

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: ffff81cb128f0f86

BUGCHECK_P3: fffffd8f0c3296c0

BUGCHECK_P4: 0

CONTEXT:  fffffd8f0c3296c0 -- (.cxr 0xfffffd8f0c3296c0)
rax=0000000000000000 rbx=000000d6000000c8 rcx=fffffd8f0c32a280
rdx=0000000000000800 rsi=ffff8192406067e8 rdi=fffffd8f0c32a280
rip=ffff81cb128f0f86 rsp=fffffd8f0c32a0c0 rbp=fffffd8f0c32a1f0
 r8=0000000000000001  r9=7fff819240690eb8 r10=fffff80154461420
r11=fffffd8f0c32a0e0 r12=ffff978d869d2108 r13=ffff81cb12aa40d0
r14=ffff81cb12adc0c0 r15=ffff819240690000
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050287
win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+0x22:
ffff81cb`128f0f86 07              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

STACK_TEXT: 
fffffd8f`0c32a0c0 ffff81cb`12a58903     : 000000d6`000000c8 000000d6`000000c8 ffff8192`406067e8 00000000`00000140 : win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+0x22
fffffd8f`0c32a0f0 ffff81cb`12a49baa     : ffff8192`406067d0 ffff81cb`12a49c95 ffff978d`869d2108 ffff8192`406062d0 : win32kbase!CMouseProcessor::ProcessInput+0x4c7
fffffd8f`0c32a330 ffff81cb`12a49f13     : ffff8192`406062d0 0000000f`c0d6717b ffff8192`406067d0 ffff978d`869d2108 : win32kbase!CMouseSensor::FlushMouseReports+0x42
fffffd8f`0c32a370 ffff81cb`12a49e44     : ffff8192`44cf7690 00000000`00000018 ffff8192`40606200 ffff8192`406062d0 : win32kbase!CMouseSensor::ProcessInputWithRateLimitingIfEnabled+0xb3
fffffd8f`0c32a3c0 ffff81cb`12a3c04a     : ffff81cb`12aa0700 fffffd8f`0c32a500 ffff8192`406062d0 00000000`00000000 : win32kbase!CMouseSensor::ProcessInput+0x54
fffffd8f`0c32a400 ffff81cb`128f4c1d     : 00000000`00000040 ffff81cb`12aa0700 00000000`00000001 ffff978d`86c6d170 : win32kbase!CBaseInput::OnReadNotification+0x52a
fffffd8f`0c32a540 ffff81cb`128f4d52     : ffff978d`86ce6080 ffff8192`4069c6a0 00000000`00000006 ffff4e07`8e8ed612 : win32kbase!CBaseInput::OnDispatcherObjectSignaled+0x31d
fffffd8f`0c32a680 ffff81cb`128e86de     : ffff81cb`12ae82a0 ffff8192`4069c6a0 ffff81cb`12ae1970 00000000`00000000 : win32kbase!CBaseInput::_OnDispatcherObjectSignaled+0x12
fffffd8f`0c32a6b0 ffff81cb`128e8430     : 00000000`00000006 ffff81cb`12ae82a0 00000000`00000006 ffff8192`4069c6a0 : win32kbase!LegacyInputDispatcher::Dispatch+0x52
fffffd8f`0c32a6e0 ffff81cb`11ec07a8     : ffff8192`4061b050 ffff8192`4061b050 00000000`00000004 00000000`00000001 : win32kbase!LegacyInputDispatcher::WaitAndDispatch+0x100
fffffd8f`0c32a810 ffff81cb`11ec0374     : 00000000`00000004 00000000`00000004 00000000`0000000d ffff81cb`12ae9a70 : win32kfull!xxxDesktopThreadWaiter+0x130
fffffd8f`0c32a890 ffff81cb`129560c3     : ffff978d`86ce6080 ffff978d`86ce6080 00000000`00000000 00000000`00000005 : win32kfull!xxxDesktopThread+0x544
fffffd8f`0c32a970 ffff81cb`11e58d80     : ffff978d`86ce6080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc3
fffffd8f`0c32aaa0 ffff81cb`11ca474d     : ffff978d`86ce6080 ffff978d`86ce6080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x70
fffffd8f`0c32aad0 fffff801`546071b8     : ffff978d`00000005 00000000`00000005 0000021a`08404150 00000000`000004c0 : win32k!NtUserCallNoParam+0x15
fffffd8f`0c32ab00 00007fff`b99310e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d9`39c7fd48 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`b99310e4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffff81cb128f0f86 - win32kbase!CMouseProcessor::MouseInputDataEx::TestProcessingOption+22
    [ 0f:07 ]
1 error : !win32kbase (ffff81cb128f0f86)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xfffffd8f0c3296c0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
 
Çözüm

Yeni konular

Geri
Yukarı