MSI Z170A M7 Sistemde mavi ekran hatası

İşletim sistemi
Windows 10

Jaruda

Hectopat
Katılım
9 Nisan 2017
Mesajlar
25
Daha fazla  
Cinsiyet
Erkek
Herkese merhaba. Yaklaşık 2-3 aydır her gün mavi ekran hatası alıyorum. Önceden böyle bir şey yoktu. RAM'lerden şüphelenip anakartıma uygun 2X 8 GB RAM aldım. Temiz format attım ancak hala mavi ekran devam etmekte. Gerçekten delirmek üzereyim arkadaşlar. Konudan anlayanları yardıma bekliyorum. Bu arada RAM'lerimi ov yapıp 3200MHz de çalıştırıyorum.

Google Drive'la Tanışın – Tüm dosyalarınız için tek bir yer bu minidump dosyam yardımınz için şimdiden çok teşekkür ederim.

Güncelleme: Sistem özellikler:

 
Son düzenleyen: Moderatör:
Recep Baltaş'a artık şu konuda bir şeyler söylememiz lazım.

Arkadaşlar ntkrnlmp.exe dosyası zaten herhangi bir mavi ekran alındığı çöken standart dosyadır.
Recep Bey'e saygım sonsuz ama buna dayanarak her bu dosya gördüğümüze RAM hatası deseydik memlekette RAM kalmazdı.

@Jaruda boş ver o zaman.
Muhtemelen senin yaptığın elle yükseltme bunu tetikledi.

Elle yaptığın OC işlemini geri çek ve XMP de kapat.
Eğer MEMORY_MANAGEMENT, CRITICAL_OBJECT_STRUCTION gibi hatalar görürsek XMP kapalı RAM testi isteyeceğim.

Elle OC yapmadım zaten, yapmasını da bilmiyorum. sadece BIOS da XMP açmıştım o zaman onu kapatıp tekrar test yapacağım.
 
Son düzenleyen: Moderatör:
Tamamdır, test yapabilirsin.

XMP kapattıktan sonra ilk yaptığın gibi çalıştırabilirsin.
Hocam bu da XMP kapalıyken:

jcdndrw.jpeg
my3k06s.jpeg
 
Son düzenleyen: Moderatör:
Bu arada RAM'lerimi ov yapıp 3200MHz de çalıştırıyorum.
Yapma. Normal hızında çalıştır. OV yapınca tabii ki mavi ekran alabilirsin.
Fare kontrolcüsü çöküyor.
Sanal belleği kapatın.
Ekran kartı çöküyor.
Bu kadar şey birden olmaz. Bu sürücüler bellekte olduğu için bellek sorununa hangisi denk gelirse o geçer rapora. Murat gibi tek rapora bakıp adama her şeyi sildirmeyelim...
Recep Bey'e saygım sonsuz ama buna dayanarak her bu dosya gördüğümüze RAM hatası deseydik memlekette RAM kalmazdı.
Ben öyle bir şey mi dedim? Olabilir diyorum, insanlar onu sanki ayet yazmışım gibi alıyor. Kendiniz analiz etmeyi öğrenseniz fena olmayacak.
Elle OC yapmadım zaten, yapmasını da bilmiyorum. sadece BIOS da XMP açmıştım o zaman onu kapatıp tekrar test yapacağım.
O zaman niye OverVoltage ile bellekleri yüksek frekansta kullanıyorum diyorsunuz? Bilmediğiniz terimleri kullanmayın o zaman?



Sorun çözmeye temelden başlanır. Konu 3 sayfa olmuş ne adamın sistemi sorulmuş ne de aldığım RAM'in marka/modeli. Bakıyorum dosyalara.




Burada kesin RAM diyebileceğim bir sorun yok. Zaten konuda sorunun 2-3 ay önce başladığını ve yeni RAM almana rağmen devam ettiğini yazmışsın. RAM testleri temiz çıkmış. Bazen bozuk olsa da tespit edemiyor program ama bunu geçelim.

  • İlk olarak BIOS'u sıfırlayın.
  • Sonrasında işlemci soğutucu ne kadar sıkılı buna bir bakın. 2-3 ay önce işlemci temizliği veya işlemci soğutucu değişimi yaptınız mı? Gerekirse işlemci soğutucyu sökün, macunu değiştirin ve soğutucuyu yeniden takın. Ama bu defa aşırı sıkmayın! Bu çok önemli.
Sonuçtan haberdar edin.

Ayrıca! Detaylı sistem özelliklerinizi de yazın, konunun başında yazmanız veya size sorulması gereken!

Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000800000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804354c0dce, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12116

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10532

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 800000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff804354c0dce

WRITE_ADDRESS: fffff80435efa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000800000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffff808b9bed4840 -- (.trap 0xffff808b9bed4840)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000023a rbx=0000000000000000 rcx=ffff808b9bed4a38
rdx=0000000000800000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804354c0dce rsp=ffff808b9bed49d0 rbp=ffff808b9bed4ab9
 r8=ffff968000007000  r9=0000000000000072 r10=00000000001fe877
r11=ffff808b9bed49d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0xe:
fffff804`354c0dce 48890a          mov     qword ptr [rdx],rcx ds:00000000`00800000=????????????????
Resetting default scope

STACK_TEXT:
ffff808b`9bed46f8 fffff804`35609169     : 00000000`0000000a 00000000`00800000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff808b`9bed4700 fffff804`35605469     : 00000000`00000002 ffff8181`dc145088 00000000`00000000 ffffc93f`46bebb18 : nt!KiBugCheckDispatch+0x69
ffff808b`9bed4840 fffff804`354c0dce     : 00000000`00000001 00000000`00000002 00000000`001fe872 fffff804`35e50a80 : nt!KiPageFault+0x469
ffff808b`9bed49d0 fffff804`3543ea29     : 00000000`00000000 00000000`00000000 ffff808b`9bed4ab9 ffff9380`05fb9560 : nt!KxWaitForLockOwnerShip+0xe
ffff808b`9bed4a00 fffff804`3543b047     : 00000000`001fe872 80000000`00000000 00000000`00000001 00000000`00000072 : nt!MiInsertPageInFreeOrZeroedList+0x839
ffff808b`9bed4b20 fffff804`354b0ade     : ffff808b`9bed4dd0 ffffb608`e5dcc0c0 00000000`00000000 ffff808b`9bed5810 : nt!MiDeletePteList+0x547
ffff808b`9bed4c00 fffff804`357f9c0d     : ffffb608`dde34080 ffffb608`e76e0588 ffff808b`00000000 fffff804`00000000 : nt!MiDecommitPages+0x121e
ffff808b`9bed57d0 fffff804`357f9273     : ffff808b`9bed5950 00000000`00000000 ffff808b`9bed5950 ffffb608`e76e0560 : nt!MiDecommitRegion+0x7d
ffff808b`9bed5850 fffff804`357f8b65     : 00000000`00000000 ffffb608`ea3f0de0 00000000`000005dc fffff804`357f761a : nt!MmFreeVirtualMemory+0x6d3
ffff808b`9bed59a0 fffff804`35608bb5     : ffffb608`dde34080 000056b4`00000001 00000000`00000000 ffff808b`9bed5a80 : nt!NtFreeVirtualMemory+0x95
ffff808b`9bed5a00 00007ff9`295ed134     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000aa`9c80d078 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`295ed134


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1237

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000080440, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8017c287f4d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for USBXHCI.SYS
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4624

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 18727

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 14100

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 89

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 80440

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8017c287f4d

READ_ADDRESS: fffff8017ccfa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000080440

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff801826b0930 -- (.trap 0xfffff801826b0930)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000003d0 rbx=0000000000000000 rcx=00000000000803d0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017c287f4d rsp=fffff801826b0ac0 rbp=0000000073ebb800
 r8=00000000000000fc  r9=00000000000000ff r10=00000000000000ff
r11=fffff8017a587180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiDeferredReadySingleThread+0xacd:
fffff801`7c287f4d f6417002        test    byte ptr [rcx+70h],2 ds:00000000`00080440=??
Resetting default scope

STACK_TEXT:
fffff801`826b07e8 fffff801`7c409169     : 00000000`0000000a 00000000`00080440 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff801`826b07f0 fffff801`7c405469     : fffff801`81dd4cb0 ffffe002`dac08030 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff801`826b0930 fffff801`7c287f4d     : fffff801`826b0c38 fffff801`826b0eb0 ffffe002`d6bb45a0 fffff801`81db010e : nt!KiPageFault+0x469
fffff801`826b0ac0 fffff801`7c2871c1     : 00000000`00000000 fffff801`826b0df8 00000000`00000000 00000000`00000000 : nt!KiDeferredReadySingleThread+0xacd
fffff801`826b0cb0 fffff801`7c2854b7     : 00000000`00000000 ffffe002`d6cfed10 ffffe002`dd45b080 ffffe002`da565008 : nt!KiExitDispatcher+0x141
fffff801`826b0d20 fffff801`7c284f57     : 00000000`00000000 fffff801`826b0e06 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff801`826b0e10 fffff801`97bc5056     : 00000000`00000018 fffff801`826b0eb0 ffffe002`e08ef010 fffff801`826ab000 : nt!IofCompleteRequest+0x17
fffff801`826b0e40 fffff801`95153aa8     : 00000000`00000002 ffffe002`da770720 ffffe002`db3edd70 fffff801`826b0f24 : mouclass!MouseClassServiceCallback+0x476
fffff801`826b0ee0 fffff801`7c28508e     : 00000000`00000000 fffff801`826b1000 00000000`00000001 fffff801`00000000 : mouhid!MouHid_ReadComplete+0x758
fffff801`826b0f80 fffff801`7c284f57     : 00000000`00000008 00000000`00000006 ffffe002`db3dd1d0 ffffe002`dba03630 : nt!IopfCompleteRequest+0x11e
fffff801`826b1070 fffff801`950daef5     : ffffe002`dba03630 00000000`00000009 ffffe002`dba03620 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff801`826b10a0 fffff801`950da7ed     : ffffe002`db3dd1d0 ffffe002`db3dd102 ffffe002`db3dd1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff801`826b11a0 fffff801`7c28508e     : ffffe002`dba04010 ffffe002`dba04010 fffff801`826b1201 ffffe002`dba0448b : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff801`826b1240 fffff801`7c284f57     : 00000000`00000001 00000000`00000000 ffffe002`db3c6060 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff801`826b1330 fffff801`80fa811a     : 00000000`00000000 ffffe002`da8af9e0 ffffe002`dba04010 fffff801`826b1410 : nt!IofCompleteRequest+0x17
fffff801`826b1360 fffff801`80fa5bbf     : ffffe002`db1e3802 ffffe002`db3ca0d0 ffffe002`dba04010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff801`826b13f0 fffff801`97a0bdbd     : 00000000`ffffff02 ffffe002`db1e36b0 ffffe002`db3c6440 ffffe002`db3c6440 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff801`826b1450 00000000`ffffff02     : ffffe002`db1e36b0 ffffe002`db3c6440 ffffe002`db3c6440 00000000`00000008 : USBXHCI+0xbdbd
fffff801`826b1458 ffffe002`db1e36b0     : ffffe002`db3c6440 ffffe002`db3c6440 00000000`00000008 fffff801`826b14f8 : 0xffffff02
fffff801`826b1460 ffffe002`db3c6440     : ffffe002`db3c6440 00000000`00000008 fffff801`826b14f8 00000000`00000008 : 0xffffe002`db1e36b0
fffff801`826b1468 ffffe002`db3c6440     : 00000000`00000008 fffff801`826b14f8 00000000`00000008 fffff801`826b1500 : 0xffffe002`db3c6440
fffff801`826b1470 00000000`00000008     : fffff801`826b14f8 00000000`00000008 fffff801`826b1500 00000000`00000008 : 0xffffe002`db3c6440
fffff801`826b1478 fffff801`826b14f8     : 00000000`00000008 fffff801`826b1500 00000000`00000008 00000000`00000000 : 0x8
fffff801`826b1480 00000000`00000008     : fffff801`826b1500 00000000`00000008 00000000`00000000 ffffe002`db3c6440 : 0xfffff801`826b14f8
fffff801`826b1488 fffff801`826b1500     : 00000000`00000008 00000000`00000000 ffffe002`db3c6440 fffff801`97a0bc81 : 0x8
fffff801`826b1490 00000000`00000008     : 00000000`00000000 ffffe002`db3c6440 fffff801`97a0bc81 ffffe002`db1e3850 : 0xfffff801`826b1500
fffff801`826b1498 00000000`00000000     : ffffe002`db3c6440 fffff801`97a0bc81 ffffe002`db1e3850 00000000`00000009 : 0x8


SYMBOL_NAME:  mouclass!MouseClassServiceCallback+476

MODULE_NAME: mouclass

IMAGE_NAME:  mouclass.sys

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  476

FAILURE_BUCKET_ID:  AV_mouclass!MouseClassServiceCallback

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3fadc39d-265d-0b16-bd05-b10d335aff49}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8012cb47b92, Address of the instruction which caused the BugCheck
Arg3: fffffe05de60dbb0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3514

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 75591

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 14111

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8012cb47b92

BUGCHECK_P3: fffffe05de60dbb0

BUGCHECK_P4: 0

CONTEXT:  fffffe05de60dbb0 -- (.cxr 0xfffffe05de60dbb0)
rax=fffff8012d4a40e0 rbx=ffffd301689e4300 rcx=004a2f7c008ba0d4
rdx=ffffd301689e4300 rsi=ffffd301689e4328 rdi=ffffd30168bf0610
rip=fffff8012cb47b92 rsp=fffffe05de60e5b0 rbp=ffffd3016325b000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=000000000000001b r12=0000000000000000 r13=ffffd301688ffdb0
r14=0000000000000000 r15=ffffd301689f82d0
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nvlddmkm+0x97b92:
fffff801`2cb47b92 f0ff4918        lock dec dword ptr [rcx+18h] ds:002b:004a2f7c`008ba0ec=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  vulkandriverquery.exe

STACK_TEXT:
fffffe05`de60e5b0 ffffd301`683fd3f0     : ffffd301`6325b000 00000000`4d52564e fffff801`2cb52a35 00000000`0e1a1048 : nvlddmkm+0x97b92
fffffe05`de60e5b8 ffffd301`6325b000     : 00000000`4d52564e fffff801`2cb52a35 00000000`0e1a1048 fffff801`2cbd0012 : 0xffffd301`683fd3f0
fffffe05`de60e5c0 00000000`4d52564e     : fffff801`2cb52a35 00000000`0e1a1048 fffff801`2cbd0012 ffffd301`685ce6c0 : 0xffffd301`6325b000
fffffe05`de60e5c8 fffff801`2cb52a35     : 00000000`0e1a1048 fffff801`2cbd0012 ffffd301`685ce6c0 00000000`4d52564e : 0x4d52564e
fffffe05`de60e5d0 00000000`0e1a1048     : fffff801`2cbd0012 ffffd301`685ce6c0 00000000`4d52564e ffffd301`6325b000 : nvlddmkm+0xa2a35
fffffe05`de60e5d8 fffff801`2cbd0012     : ffffd301`685ce6c0 00000000`4d52564e ffffd301`6325b000 fffff801`2cb5392f : 0xe1a1048
fffffe05`de60e5e0 ffffd301`685ce6c0     : 00000000`4d52564e ffffd301`6325b000 fffff801`2cb5392f ffffd301`68bf0610 : nvlddmkm+0x120012
fffffe05`de60e5e8 00000000`4d52564e     : ffffd301`6325b000 fffff801`2cb5392f ffffd301`68bf0610 fffff801`2d02dcf6 : 0xffffd301`685ce6c0
fffffe05`de60e5f0 ffffd301`6325b000     : fffff801`2cb5392f ffffd301`68bf0610 fffff801`2d02dcf6 00000000`0e1a1048 : 0x4d52564e
fffffe05`de60e5f8 fffff801`2cb5392f     : ffffd301`68bf0610 fffff801`2d02dcf6 00000000`0e1a1048 ffffd301`689e4328 : 0xffffd301`6325b000
fffffe05`de60e600 ffffd301`68bf0610     : fffff801`2d02dcf6 00000000`0e1a1048 ffffd301`689e4328 ffffd301`6325b000 : nvlddmkm+0xa392f
fffffe05`de60e608 fffff801`2d02dcf6     : 00000000`0e1a1048 ffffd301`689e4328 ffffd301`6325b000 fffff801`2cb603be : 0xffffd301`68bf0610
fffffe05`de60e610 00000000`0e1a1048     : ffffd301`689e4328 ffffd301`6325b000 fffff801`2cb603be 00000000`00000028 : nvlddmkm+0x57dcf6
fffffe05`de60e618 ffffd301`689e4328     : ffffd301`6325b000 fffff801`2cb603be 00000000`00000028 fffff801`2cd9d2b4 : 0xe1a1048
fffffe05`de60e620 ffffd301`6325b000     : fffff801`2cb603be 00000000`00000028 fffff801`2cd9d2b4 ffffd301`68bf0520 : 0xffffd301`689e4328
fffffe05`de60e628 fffff801`2cb603be     : 00000000`00000028 fffff801`2cd9d2b4 ffffd301`68bf0520 00000000`00000009 : 0xffffd301`6325b000
fffffe05`de60e630 00000000`00000028     : fffff801`2cd9d2b4 ffffd301`68bf0520 00000000`00000009 ffffd301`6325b000 : nvlddmkm+0xb03be
fffffe05`de60e638 fffff801`2cd9d2b4     : ffffd301`68bf0520 00000000`00000009 ffffd301`6325b000 ffffd301`6325b000 : 0x28
fffffe05`de60e640 ffffd301`68bf0520     : 00000000`00000009 ffffd301`6325b000 ffffd301`6325b000 00000000`00000000 : nvlddmkm+0x2ed2b4
fffffe05`de60e648 00000000`00000009     : ffffd301`6325b000 ffffd301`6325b000 00000000`00000000 fffff801`2ccefd81 : 0xffffd301`68bf0520
fffffe05`de60e650 ffffd301`6325b000     : ffffd301`6325b000 00000000`00000000 fffff801`2ccefd81 ffffd301`632b1000 : 0x9
fffffe05`de60e658 ffffd301`6325b000     : 00000000`00000000 fffff801`2ccefd81 ffffd301`632b1000 ffffd301`6325b000 : 0xffffd301`6325b000
fffffe05`de60e660 00000000`00000000     : fffff801`2ccefd81 ffffd301`632b1000 ffffd301`6325b000 ffffd301`6325b000 : 0xffffd301`6325b000


SYMBOL_NAME:  nvlddmkm+97b92

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffffe05de60dbb0 ; kb

BUCKET_ID_FUNC_OFFSET:  97b92

FAILURE_BUCKET_ID:  0x3B_c0000005_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {63c41bff-3ea4-15a0-a72c-26a548d17abe}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80638aa66c2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3327

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11008

    Key  : Analysis.Init.CPU.mSec
    Value: 577

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11257

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 48

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80638aa66c2

READ_ADDRESS: fffff806394fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000048

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steamwebhelper.exe

TRAP_FRAME:  fffffc8dd1c97780 -- (.trap 0xfffffc8dd1c97780)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff958ea636bd68
rdx=00000000000000a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80638aa66c2 rsp=fffffc8dd1c97910 rbp=fffffc8dd1c97a10
 r8=0000000000000000  r9=0000000000000002 r10=ffff958ea636bcb0
r11=ffff8500071813a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiCompleteProtoPteFault+0x402:
fffff806`38aa66c2 488b4048        mov     rax,qword ptr [rax+48h] ds:00000000`00000048=????????????????
Resetting default scope

STACK_TEXT:
fffffc8d`d1c97638 fffff806`38c09169     : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffffc8d`d1c97640 fffff806`38c05469     : 00000000`00000000 ffff958e`a8bad800 00000000`00000000 1a000001`e5fdb867 : nt!KiBugCheckDispatch+0x69
fffffc8d`d1c97780 fffff806`38aa66c2     : ffff958e`a8bad700 ffff8d3f`fc5c4e18 ffff8500`06f03690 0a000002`50123025 : nt!KiPageFault+0x469
fffffc8d`d1c97910 fffff806`38aa84b6     : fffffc8d`d1c97bc0 0a000002`5dfe6121 00000000`00000000 00000007`00000000 : nt!MiCompleteProtoPteFault+0x402
fffffc8d`d1c97a60 fffff806`38aa1345     : fffffc8d`d1c97bc0 00000000`00000000 fffffc8d`d1c97ba0 fffffc8d`d1c97d60 : nt!MiResolveProtoPteFault+0xbb6
fffffc8d`d1c97b60 fffff806`38a9f289     : 00000000`00000100 00000000`00000100 00000000`c0000016 ffffa581`3fce2048 : nt!MiDispatchFault+0x3d5
fffffc8d`d1c97ca0 fffff806`38c0535e     : 00000000`40000a00 00000000`00000000 fffffc8d`d1c97ec0 00000000`00000000 : nt!MmAccessFault+0x189
fffffc8d`d1c97e40 00007ff8`b8977430     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000a6`4e11e4a8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`b8977430


SYMBOL_NAME:  nt!MiCompleteProtoPteFault+402

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1237

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  402

FAILURE_BUCKET_ID:  AV_nt!MiCompleteProtoPteFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5689a27c-2595-a41c-3bcf-ff09719714e4}

Followup:     MachineOwner
---------

Machine ID Information [From Smbios 3.0, DMIVersion 0, Size=4139]
BiosMajorRelease = 5
BiosMinorRelease = 12
BiosVendor = American Megatrends Inc.
BiosVersion = 1.L0
BiosReleaseDate = 06/28/2018
SystemManufacturer = MSI
SystemProductName = MS-7976
SystemFamily = Default string
SystemVersion = 1.0
SystemSKU = Default string
BaseBoardManufacturer = MSI
BaseBoardProduct = Z170A GAMING M7 (MS-7976)
BaseBoardVersion = 1.0
 
Son düzenleme:
Arkadaşlar sanırım ortam gerildi ama lütfen gerilmeyin. Buradaki herkesin amacı iyi niyetiyle insanlara yardım etmek bunu biliyorum. Recep bey ben neden orada RAM'lere ov yaptım dedim vallahi bende bilmiyorum :D Sanırım çok fazla bu hata ile ilgili şeyler okudum oradan aklımda kaldı RAM'lere manuel olarak hiçbir şey yapmadım sadece BIOS'dan XMP açtım o şekilde kullandım 3200MHz RAM'leri 2144 de kullanmak istemedim açıkçası.

Sistem özelliklerim de şu şekilde:

Ekran kartı: GTX 1080 Ti Founders Edition
İşlemci: i7 6700K overclock yapmadım normal kullanıyorum
Anakart: MSI Z170A M7
RAM: Corsair Vengeance 16 GB(2x8GB) 3200MHz DDR4 RAM (CMK16GX4M2E3200C16)
İşletim sistemi: Windows 10 Pro
İşlemci soğutucu: CORSAIR H80i V2 Hydro Serisi Sıvı CPU Soğutma
PSU: Seasonic X-850 80+Gold 850W
SSD: Samsung 960 EVO 500GB
 
Son düzenleyen: Moderatör:

Yeni konular

Geri
Yukarı