Mavi ekran hatası

Sefa ATICI

Yoctopat
Katılım
28 Kasım 2021
Mesajlar
1
Daha fazla  
Cinsiyet
Erkek
 
Son düzenleme:
Sisteminizden Logitech yazılımlarını, özellikle kamera yazılımı mevcutsa kaldırıp bir süre test eder misiniz?

Artı olarak DDU yazılımı ile temizledikten sonra grafik sürücünüzün en güncel sürümünü kurun.

DDU : DDU ile Sürücü Kaldırma Rehberi

Grafik sürücüsü : https://tr.download.nvidia.com/Wind...-win10-win11-64bit-international-dch-whql.exe

Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011d092fc9, The address that the exception occurred at
Arg3: ffffc48aa09aa768, Exception Record Address
Arg4: ffffc48aa09a9fa0, Context Record Address

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for lvrs64.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2843

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 25773

    Key  : Analysis.Init.CPU.mSec
    Value: 640

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2788

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  112421-6250-01.dmp

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8011d092fc9

BUGCHECK_P3: ffffc48aa09aa768

BUGCHECK_P4: ffffc48aa09a9fa0

EXCEPTION_RECORD:  ffffc48aa09aa768 -- (.exr 0xffffc48aa09aa768)
ExceptionAddress: fffff8011d092fc9 (lvrs64+0x0000000000002fc9)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 000001f46952cb74
Attempt to read from address 000001f46952cb74

CONTEXT:  ffffc48aa09a9fa0 -- (.cxr 0xffffc48aa09a9fa0)
rax=0000000000000000 rbx=ffffd68e34d70ce0 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011d092fc9 rsp=ffffc48aa09aa9a0 rbp=000001f46952cb50
 r8=0000000000000000  r9=000001f46952cb50 r10=0000000000000002
r11=000001f46952cb50 r12=ffffd68e34d77ce0 r13=0000000000000000
r14=000001f46952cb50 r15=0000000000000001
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00250246
lvrs64+0x2fc9:
fffff801`1d092fc9 45396924        cmp     dword ptr [r9+24h],r13d ds:002b:000001f4`6952cb74=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff8010defb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 000001f46952cb74

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  000001f46952cb74

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffffc48a`a09aa9a0 00000000`00000000     : ffff8101`b4d00180 ffffd68e`3a30c040 fffff801`0d485d0e 00000000`00000000 : lvrs64+0x2fc9


SYMBOL_NAME:  lvrs64+2fc9

MODULE_NAME: lvrs64

IMAGE_NAME:  lvrs64.sys

STACK_COMMAND:  .cxr 0xffffc48aa09a9fa0 ; kb

BUCKET_ID_FUNC_OFFSET:  2fc9

FAILURE_BUCKET_ID:  AV_lvrs64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {456b553a-a332-622e-ed6e-0ef1efb881db}

Followup:     MachineOwner

Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000007, A driver has unlocked a page more times than it locked it
Arg2: 00000000002be67f, page frame number
Arg3: 0000000000000001, current share count
Arg4: 0000000000000000, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4062

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 14610

    Key  : Analysis.Init.CPU.mSec
    Value: 609

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5079

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  112821-6453-01.dmp

BUGCHECK_CODE:  4e

BUGCHECK_P1: 7

BUGCHECK_P2: 2be67f

BUGCHECK_P3: 1

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  saltanatmt2.bin

STACK_TEXT:
ffff9b8e`c65e6b68 fffff801`1d626327     : 00000000`0000004e 00000000`00000007 00000000`002be67f 00000000`00000001 : nt!KeBugCheckEx
ffff9b8e`c65e6b70 fffff801`1d4840a9     : 00000000`00000000 00000000`00000000 00000000`00000000 000000a3`01210001 : nt!MiPfnReferenceCountIsZero+0x1f1dc7
ffff9b8e`c65e6bb0 fffff801`2a801658     : ffffda81`e68b3000 00000000`00000182 ffffb58f`00000002 ffff9b8e`00000000 : nt!MmUnlockPages+0x7f9
ffff9b8e`c65e6ca0 fffff801`2a8012b2     : 00000000`00000001 ffffb58f`86d48890 00000000`00001f41 ffffda81`e368e000 : dxgmms2!VIDMM_MDL_RANGE::Unlock+0x18
ffff9b8e`c65e6cd0 fffff801`2a8010ed     : ffffb58f`808d5238 ffffb58f`8a92ca60 00000000`00000001 fffff801`2a7b1a87 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::UnlockRange+0xa2
ffff9b8e`c65e6d60 fffff801`2a80c67a     : ffffb58f`8a92ca60 00000000`00000000 ffffb58f`87886310 fffff801`2a7a45e9 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedUnlock+0x79
ffff9b8e`c65e6dc0 fffff801`2a80c5a3     : 00000000`00ab0000 ffffb58f`886c5d50 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Reset+0x92
ffff9b8e`c65e6e40 fffff801`2a80d9a3     : ffff9b8e`c65e6f19 ffffda81`cff03ec8 ffffb58f`00000000 ffffb58f`886c5d50 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Reset+0x63
ffff9b8e`c65e6ed0 fffff801`2a8296e2     : fffff801`2a7df310 00000000`00000001 fffff801`2a7df310 ffffda81`c805bde0 : dxgmms2!VIDMM_GLOBAL::ResetBackingStore+0x1b7
ffff9b8e`c65e6f80 fffff801`2a82a783     : ffffb58f`886c5d50 ffffb58f`886c5d50 00000000`00000000 ffffb58f`8ce8b230 : dxgmms2!VIDMM_SYSMEM_SEGMENT::ReleaseTemporaryResource+0xf2
ffff9b8e`c65e6fc0 fffff801`2a826013     : ffffb58f`8e116080 00000000`00000000 ffffda81`d342e900 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocation+0x5b
ffff9b8e`c65e6ff0 fffff801`2a817f2e     : ffffb58f`8ce8b230 00000000`00205601 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::EvictTemporaryAllocations+0xcf
ffff9b8e`c65e7050 fffff801`2a820b17     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x10e
ffff9b8e`c65e7170 fffff801`2a81d823     : 00000000`00000000 ffffb58f`88ec4cc0 ffffda81`d3426700 fffff801`2a8209aa : dxgmms2!VIDMM_PAGE_TABLE::CommitPageTable+0x6f
ffff9b8e`c65e71c0 fffff801`2a81b8bd     : 00000000`00000000 00000000`80e00000 00000000`00000001 00000000`00a00000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x23b
ffff9b8e`c65e7260 fffff801`2a843dce     : 00000000`00000000 ffffb58f`8829fd20 ffffda81`caedcd01 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x77d
ffff9b8e`c65e73d0 fffff801`2a81ab7a     : 00000000`00000001 ffffb58f`8829fd20 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x28c8e
ffff9b8e`c65e7540 fffff801`2a8181d4     : ffffda81`d707bd10 ffffb58f`00000001 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2f6
ffff9b8e`c65e76c0 fffff801`2a816425     : ffffb58f`00000000 00000000`00000000 ffff9b8e`00000000 ffffb58f`886c5d50 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x3b4
ffff9b8e`c65e77e0 fffff801`2a82c65e     : 00000000`00000002 00000000`00989680 ffffb58f`7ce38a20 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xe25
ffff9b8e`c65e7a00 fffff801`2a836809     : ffffb58f`7ce38950 ffffda81`d342e201 00000000`00000000 00000000`055b3400 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
ffff9b8e`c65e7be0 fffff801`1d555855     : ffffda81`d342e280 fffff801`2a836800 ffffb58f`7ce38950 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff9b8e`c65e7c10 fffff801`1d5fe8f8     : ffff8880`2ed00180 ffffda81`d342e280 fffff801`1d555800 0047004f`004c002e : nt!PspSystemThreadStartup+0x55
ffff9b8e`c65e7c60 00000000`00000000     : ffff9b8e`c65e8000 ffff9b8e`c65e2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_MDL_RANGE::Unlock+18

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1387

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  18

FAILURE_BUCKET_ID:  0x4E_7_dxgmms2!VIDMM_MDL_RANGE::Unlock

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {8e471cc7-b942-f3b2-4c5a-8f665f4483c7}

Followup:     MachineOwner
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…