Mavi Ekran - Kernel Inpage Data Hatası

İşletim sistemi
Windows 10

upe

Decapat
Katılım
11 Ocak 2020
Mesajlar
54
Merhaba arkadaşlar,
Bilgisayarımda ara ara bu mavi ekran hatasını yaşıyorum. %90 PC'yi açarken oluyor, PC açılmadan bu hatayı veriyor ve reset atıyor, daha sonra bir sıkıntı olmuyor bir süreliğine. Yani 3 haftada bir, birkaç ayda bir falan alıyorum bu hatayı pek sık değil. Sebebi ne olabilir?
Sistem bilgilerim: ASRock B450M-HDV - Ryzen 5 1600 AF - GTX 1660 - 8 GB DDR4 RAM - 250GB + 250GB SSD + 500GB - 400W Aerocool VX Plus

Minidump Dosyalarım: Minidump
 
Son düzenleyen: Moderatör:
DDU ile ekran kartı sürücüsünü kaldırıp yeniden kurun.

Easy Anti Cheat, MSI Afterburner, AIDA64, Samsung Magician ve Vanguard'ı kaldırın. Sorun geçince tekrar yükleyebilirsiniz.

Aşağıdaki rehberi uygulayın.

BİOS'u 4.10 sürümüne güncelleyin.

Windows 10 20H2 sürümüne geçin.

Sorun devam ederse dosyaları paylaşmayı unutmayın.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Desktop\111920-16546-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`04000000 PsLoadedModuleList = 0xfffff802`044461b0
Debug session time: Thu Nov 19 16:31:27.854 2020 (UTC + 3:00)
System Uptime: 1 days 2:16:30.615
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
Loading unloaded module list
................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`041c3b20 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffb787`84035c30=000000000000001e
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000006, The exception code that was not handled
Arg2: fffff8020469be82, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 000001e919987048, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15373

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000006

BUGCHECK_P2: fffff8020469be82

BUGCHECK_P3: 0

BUGCHECK_P4: 1e919987048

EXCEPTION_PARAMETER2:  000001e919987048

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
ffffb787`84035c28 fffff802`041e91a9     : 00000000`0000001e ffffffff`c0000006 fffff802`0469be82 00000000`00000000 : nt!KeBugCheckEx
ffffb787`84035c30 fffff802`041d5a5d     : ffffa78d`2fcd1600 fffff802`040ccb06 00000000`00001000 ffffb787`840364c0 : nt!KiDispatchException+0x1d33f9
ffffb787`840362e0 fffff802`041d1c43     : 00000000`00000000 ffffa78d`4386ddf0 00000000`022e36d8 00000000`00000000 : nt!KiExceptionDispatch+0x11d
ffffb787`840364c0 fffff802`0469be82     : fffff802`0465429f 00000000`32d00b78 ffffb787`84036980 00000000`00000000 : nt!KiPageFault+0x443
ffffb787`84036658 fffff802`0465429f     : 00000000`32d00b78 ffffb787`84036980 00000000`00000000 ffff928e`75a15de0 : nt!HvpGetCellPaged+0xa2
ffffb787`84036660 fffff802`04652b99     : 00000001`ffffffff 00000000`022e36d8 ffffb787`84037158 ffff928e`00000000 : nt!CmpDoCompareKeyName+0x2f
ffffb787`840366b0 fffff802`045fb71a     : ffff928e`75a15de0 00000000`00000000 ffffb787`840368a8 ffffb787`84036930 : nt!CmpWalkOneLevel+0x709
ffffb787`840367c0 fffff802`045f8784     : 00000000`0000001c ffffb787`84036b10 ffffb787`84036ad8 00000000`00000000 : nt!CmpDoParseKey+0x9fa
ffffb787`84036a60 fffff802`045f666f     : ffffa78d`406906c0 ffff928e`78722e01 00000000`00000000 00000000`00000000 : nt!CmpParseKey+0x274
ffffb787`84036c80 fffff802`045f4ad1     : ffffa78d`40690600 ffffb787`84036ec8 00000000`00000240 ffffa78d`2faf86c0 : nt!ObpLookupObjectName+0x78f
ffffb787`84036e40 fffff802`045fdfec     : 00000000`00000001 00000000`00000000 00000000`00000000 ffffa78d`2faf86c0 : nt!ObOpenObjectByNameEx+0x201
ffffb787`84036f80 fffff802`045fde6d     : ffffb787`84037450 ffffb787`840372f0 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x5c
ffffb787`84036fd0 fffff802`045ffe8f     : ffffffff`80004ef0 ffffb787`84037300 00000000`00000000 fffff802`041c7940 : nt!CmOpenKey+0x29d
ffffb787`84037230 fffff802`041d5358     : 00000000`00000000 fffff802`046f2a8b ffffa78d`3957c2c0 00000000`00000000 : nt!NtOpenKeyEx+0xf
ffffb787`84037270 fffff802`041c7940     : fffff802`045c3788 ffffa78d`2fbfec10 fffff802`0403bccf 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffb787`84037408 fffff802`045c3788     : ffffa78d`2fbfec10 fffff802`0403bccf 00000000`00000000 ffffa78d`3957c2c0 : nt!KiServiceLinkage
ffffb787`84037410 fffff802`045c36b2     : 00000000`00000000 ffffffff`80004390 ffff928e`5c4eb650 ffff928e`5b444d70 : nt!_RegRtlOpenKeyTransacted+0xc0
ffffb787`840374b0 fffff802`046f1f24     : 00000000`c0000034 ffffb787`84037540 ffff928e`5c4eb650 ffff928e`76c1c8e0 : nt!SysCtxRegOpenKey+0x3a
ffffb787`840374f0 fffff802`046f1e36     : ffffb787`84037670 00000000`00020019 00000000`00000002 ffff928e`76c1c8e0 : nt!DrvDbOpenObjectRegKey+0xe0
ffffb787`84037570 fffff802`046f1ba0     : 00000000`20207050 fffff802`0436e06d 00000000`0000000b 00000000`00000000 : nt!DrvDbOpenDriverPackageRegKey+0x3a
ffffb787`840375d0 fffff802`045bc05b     : 00000000`00000008 00000000`00000009 ffffb787`840377c0 ffff928e`00000000 : nt!DrvDbDispatchDriverPackage+0x80
ffffb787`84037630 fffff802`045bbf82     : 00000000`00020019 ffffb787`84037729 ffff928e`5b474db0 01000000`00000001 : nt!_PnpOpenObjectRegKeyDispatch+0xa7
ffffb787`840376c0 fffff802`046ce3b2     : 00000000`00000000 00000000`0344bd34 00000000`00000008 ffffb787`840377c0 : nt!_PnpOpenObjectRegKey+0xc2
ffffb787`84037770 fffff802`045bb83e     : ffffb787`84037978 00000000`00000024 00000000`00000010 00000000`00000000 : nt!PiCMOpenObjectKey+0x116
ffffb787`84037810 fffff802`045bb763     : ffffb787`84037958 ffffb787`84037b80 00000000`00000dd0 fffff802`045fa48e : nt!PiCMHandleIoctl+0xbe
ffffb787`84037850 fffff802`046d1b2a     : 00000000`00000000 fffff802`046d1ac0 ffff928e`5ae06c90 fffff802`0403fc54 : nt!PiCMFastIoDeviceDispatch+0x53
ffffb787`840378a0 fffff802`045f23ab     : 00000000`00000dd0 00000000`00000001 00000000`00000000 ffffa78d`3b8b74a0 : nt!PiDaFastIoDispatch+0x6a
ffffb787`84037900 fffff802`045f1c76     : 00000000`00000082 00000000`00000000 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x71b
ffffb787`84037a20 fffff802`041d5358     : 00000000`00000000 ffffa78d`44d29c70 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffffb787`84037a90 00000000`770f1cbc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0340f038 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770f1cbc


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.1198

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x1E_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4a484c8f-b27f-a196-02b8-d62b4b7090ff}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı