3 hafta önce sistem topladım. Oyun oynarken çökme problemi yaşıyorum, yardımcı olursanız sevinirim.
Son düzenleyen: Moderatör:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804730019c1, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7213
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 1
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804730019c1
READ_ADDRESS: fffff804738fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000001
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffffba08708ca3e0 -- (.trap 0xffffba08708ca3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00007ffffffeffff rbx=0000000000000000 rcx=ffffba08708ca6e0
rdx=ffff8b87a322c340 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804730019c1 rsp=ffffba08708ca578 rbp=0000000000010000
r8=0000000000000000 r9=0000000000010169 r10=0000000000010000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac po cy
nt!KiGeneralProtectionFault+0x1:
fffff804`730019c1 4881ec58010000 sub rsp,158h
Resetting default scope
STACK_TEXT:
ffffba08`708ca298 fffff804`73005e69 : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffba08`708ca2a0 fffff804`73002169 : 000a4c64`0000ffff 00000000`000000ff 00000000`ffffffff ffffba08`00000000 : nt!KiBugCheckDispatch+0x69
ffffba08`708ca3e0 fffff804`730019c1 : 00000000`00010000 00000000`0000a668 fffff804`732dda09 00000000`00000010 : nt!KiPageFault+0x469
ffffba08`708ca578 fffff804`732dda09 : ffff8b87`a3691a80 ffffba08`708ca669 ffff8b87`a3f84080 fffff804`72f43fd1 : nt!KiGeneralProtectionFault+0x1
ffffba08`708ca5b0 fffff804`732dd884 : 00000000`00000000 ffff8b87`a322c340 00000000`00010000 00000000`00000000 : nt!MiFindEmptyAddressRange+0xf9
ffffba08`708ca630 fffff804`732e5e7e : ffff8b87`00000000 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiSelectUserAddress+0x114
ffffba08`708ca6d0 fffff804`732e57cc : 00000000`00000004 ffffc088`00000000 ffffba08`708ca9a8 ffffba08`708ca9b8 : nt!MiMapViewOfDataSection+0x32e
ffffba08`708ca800 fffff804`732e48a9 : 00000000`00000000 ffffba08`708cab80 0000003d`090e7fa8 00000000`00000000 : nt!MiMapViewOfSection+0x34c
ffffba08`708ca950 fffff804`730058b8 : ffff8b87`a3f84080 0000003d`090e7f68 0000003d`090e7fe8 00000000`00000000 : nt!NtMapViewOfSection+0x159
ffffba08`708caa90 00007ffb`8cb8c2c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003d`090e7f48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8cb8c2c4
SYMBOL_NAME: nt!KiGeneralProtectionFault+1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1
FAILURE_BUCKET_ID: AV_nt!KiGeneralProtectionFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {dd04af12-f86f-9688-c9a3-e403f84a6db3}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80679a07080, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: fffff80679a07080, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7845
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff80679a07080
BUGCHECK_P2: 10
BUGCHECK_P3: fffff80679a07080
BUGCHECK_P4: 2
READ_ADDRESS: fffff806292fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff80679a07080
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffffef01dd79bf50 -- (.trap 0xffffef01dd79bf50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000670 rbx=0000000000000000 rcx=ffffef01dd79c120
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80679a07080 rsp=ffffef01dd79c0e8 rbp=ffffef01dd79c790
r8=000000000000066f r9=0000000000000007 r10=0000000000000000
r11=0000021e67397550 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
fffff806`79a07080 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
fffff806`79a07080 ?? ???
STACK_TEXT:
ffffef01`dd79bca8 fffff806`28a86729 : 00000000`00000050 fffff806`79a07080 00000000`00000010 ffffef01`dd79bf50 : nt!KeBugCheckEx
ffffef01`dd79bcb0 fffff806`288eeb80 : ffff8002`7bfa08f0 00000000`00000010 ffffef01`dd79bfd0 00000000`00000000 : nt!MiSystemFault+0x13faf9
ffffef01`dd79bdb0 fffff806`28a0205e : 00000000`00000000 ffff8002`79719c60 00000000`00000000 00020002`00000438 : nt!MmAccessFault+0x400
ffffef01`dd79bf50 fffff806`79a07080 : fffff806`28883d83 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 : nt!KiPageFault+0x35e
ffffef01`dd79c0e8 fffff806`28883d83 : 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 00000000`001f0003 : 0xfffff806`79a07080
ffffef01`dd79c0f0 fffff806`28a05fac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x223
ffffef01`dd79c920 fffff806`28a01ce0 : ffff8002`7b42d080 ffff8002`7b425080 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffef01`dd79cb00 00007ffa`1c214f9c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
000000cc`0e8af860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1c214f9c
CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
7 errors : !nt (fffff80628883d8a-fffff80628883dba)
fffff80628883d80 32 18 00 e9 da fe ff ff 4c 8b *e3 98 00 00 00 4c 2.......L......L
fffff80628883d90 89 65 *c5 48 8b 45 20 8b 80 7c *9c 00 00 a8 01 75 .e.H.E ..|.....u
fffff80628883da0 5c 65 *2f 8b 04 25 88 01 00 00 *eb 8b 88 b8 00 00 \e/..%..........
fffff80628883db0 00 48 *28 b9 80 05 00 00 00 74 *fe 81 3b 02 00 00 .H(......t..;...
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}
Followup: memory_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff804874afbaa, The address that the exception occurred at
Arg3: ffffe30debe1e080, Parameter 0 of the exception
Arg4: ffffe30de8c75b20, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 19018
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff804874afbaa
BUGCHECK_P3: ffffe30debe1e080
BUGCHECK_P4: ffffe30de8c75b20
EXCEPTION_PARAMETER1: ffffe30debe1e080
EXCEPTION_PARAMETER2: ffffe30de8c75b20
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
BAD_STACK_POINTER: fffff8047aa80158
FAILED_INSTRUCTION_ADDRESS:
nvlddmkm+fbaa
fffff804`874afbaa 46898c112c010000 mov dword ptr [rcx+r10+12Ch],r9d
STACK_TEXT:
fffff804`7aa80158 fffff804`76cf4d4e : 00000000`0000001e ffffffff`c000001d fffff804`874afbaa ffffe30d`ebe1e080 : nt!KeBugCheckEx
fffff804`7aa80160 fffff804`76bfcd62 : fffff804`76cf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff804`7aa801a0 fffff804`76a85027 : fffff804`7aa80710 00000000`00000000 fffff804`7aa72fb0 fffff804`76bfaee5 : nt!RtlpExecuteHandlerForException+0x12
fffff804`7aa801d0 fffff804`76a83ce6 : fffff804`7aa6fce8 fffff804`7aa80e20 fffff804`7aa6fce8 00000000`00000000 : nt!RtlDispatchException+0x297
fffff804`7aa808f0 fffff804`76bf4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff804`7aa80fb0 fffff804`76bf4d00 : fffff804`76c05fa5 00000000`0000003f 00000000`0000003f 00000000`00000020 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff804`7aa6fba8 fffff804`76c05fa5 : 00000000`0000003f 00000000`0000003f 00000000`00000020 fffff804`76ac7423 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff804`7aa6fbb0 fffff804`76c004e9 : ffffe30d`e8c75b20 fffff804`87c7a0e8 00000000`00000003 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff804`7aa6fd90 fffff804`874afbaa : fffff804`87c79cf8 ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 : nt!KiInvalidOpcodeFault+0x329
fffff804`7aa6ff28 fffff804`87c79cf8 : ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 : nvlddmkm+0xfbaa
fffff804`7aa6ff30 ffffe30d`e8c46000 : fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f : nvlddmkm+0x7d9cf8
fffff804`7aa6ff38 fffff804`87cb4338 : 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 : 0xffffe30d`e8c46000
fffff804`7aa6ff40 00000000`00000001 : ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 00000000`00000004 : nvlddmkm+0x814338
fffff804`7aa6ff48 ffffe30d`e8c75b20 : ffffaba0`48dd044f 00000000`00000000 00000000`00000004 fffff804`87c8052c : 0x1
fffff804`7aa6ff50 ffffaba0`48dd044f : 00000000`00000000 00000000`00000004 fffff804`87c8052c 00000000`00000007 : 0xffffe30d`e8c75b20
fffff804`7aa6ff58 00000000`00000000 : 00000000`00000004 fffff804`87c8052c 00000000`00000007 fffff804`7aa70070 : 0xffffaba0`48dd044f
SYMBOL_NAME: nvlddmkm+fbaa
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fbaa
FAILURE_BUCKET_ID: 0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b1419c26-9117-4912-480f-77f62d207e93}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd680673c6e70
Arg3: 0000000063f5ba10
Arg4: fffff80205088acc
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14042
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: ffffd680673c6e70
BUGCHECK_P3: 63f5ba10
BUGCHECK_P4: fffff80205088acc
TRAP_FRAME: ffffd680673c6e70 -- (.trap 0xffffd680673c6e70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffb50fe67b1000
rdx=ffffb50fe67b1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80205088acc rsp=0000000063f5ba10 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!EtwpWaitForBufferReferenceCount+0x14:
fffff802`05088acc 5b pop rbx
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_STACK_POINTER: 0000000063f5ba10
STACK_TEXT:
ffffd680`673c6d28 fffff802`04e05e69 : 00000000`0000007f 00000000`00000008 ffffd680`673c6e70 00000000`63f5ba10 : nt!KeBugCheckEx
ffffd680`673c6d30 fffff802`04e00c83 : 00009abf`fffffe21 ccccffff`fde0e9c0 49dc8b4c`cccccccc 49186b89`49105b89 : nt!KiBugCheckDispatch+0x69
ffffd680`673c6e70 fffff802`05088acc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3
00000000`63f5ba10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpWaitForBufferReferenceCount+0x14
SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 2c3
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80265ecb98e, Address of the instruction which caused the bugcheck
Arg3: fffff6029c5f65b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12948
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80265ecb98e
BUGCHECK_P3: fffff6029c5f65b0
BUGCHECK_P4: 0
CONTEXT: fffff6029c5f65b0 -- (.cxr 0xfffff6029c5f65b0)
rax=0000000000000f30 rbx=2175f3dacb5196d7 rcx=fffff5ffc00034f8
rdx=0000000000000020 rsi=fffff59244767dd0 rdi=fffff59244767dc0
rip=fffff80265ecb98e rsp=fffff6029c5f6fb0 rbp=fffff6029c5f7b80
r8=0000000000000030 r9=fffff5ffc0001000 r10=0000000000000020
r11=00000000000000ff r12=000000000000002b r13=00000000000000a9
r14=0000000000000020 r15=0000000079737355
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!ExFreeHeapPool+0x21e:
fffff802`65ecb98e 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:2175f3da`cb5196ff=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: League of Legends.exe
STACK_TEXT:
fffff602`9c5f6fb0 fffff802`665b2019 : 00000000`00000001 00000000`00000001 fffff5cd`39df37b0 01000000`00100000 : nt!ExFreeHeapPool+0x21e
fffff602`9c5f7090 fffff5cd`39df3802 : 00000000`00000000 fffff592`44cf1010 00000000`00021cff ffffbd85`24351080 : nt!ExFreePool+0x9
fffff602`9c5f70c0 fffff5cd`39245697 : 00000000`00000000 fffff592`44767dd0 fffff592`44767dd0 fffff592`44cf1010 : win32kfull!Win32FreePoolImpl+0x52
fffff602`9c5f70f0 fffff5cd`39d67b58 : 00000000`00000000 fffff592`44cf1010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37
fffff602`9c5f7120 fffff5cd`39556fcf : fffff602`9c5f7aa8 00000000`00000000 fffff602`ffffffff 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508
fffff602`9c5f7a50 fffff802`660058b8 : fffff592`44cf1010 fffff5cd`39df14a3 00000000`71da7a70 ffffbd85`24351080 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
fffff602`9c5f7a90 00007fff`a3239014 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`14d2e2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a3239014
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.508
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff6029c5f65b0 ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}
Followup: Pool_corruption
---------
Belleklerinizde sorun görünüyor, test yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Ayrıca ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000001, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff804730019c1, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5452 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7213 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 1 BUGCHECK_P2: ff BUGCHECK_P3: 0 BUGCHECK_P4: fffff804730019c1 READ_ADDRESS: fffff804738fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000001 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VALORANT-Win64-Shipping.exe TRAP_FRAME: ffffba08708ca3e0 -- (.trap 0xffffba08708ca3e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00007ffffffeffff rbx=0000000000000000 rcx=ffffba08708ca6e0 rdx=ffff8b87a322c340 rsi=0000000000000000 rdi=0000000000000000 rip=fffff804730019c1 rsp=ffffba08708ca578 rbp=0000000000010000 r8=0000000000000000 r9=0000000000010169 r10=0000000000010000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz ac po cy nt!KiGeneralProtectionFault+0x1: fffff804`730019c1 4881ec58010000 sub rsp,158h Resetting default scope STACK_TEXT: ffffba08`708ca298 fffff804`73005e69 : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx ffffba08`708ca2a0 fffff804`73002169 : 000a4c64`0000ffff 00000000`000000ff 00000000`ffffffff ffffba08`00000000 : nt!KiBugCheckDispatch+0x69 ffffba08`708ca3e0 fffff804`730019c1 : 00000000`00010000 00000000`0000a668 fffff804`732dda09 00000000`00000010 : nt!KiPageFault+0x469 ffffba08`708ca578 fffff804`732dda09 : ffff8b87`a3691a80 ffffba08`708ca669 ffff8b87`a3f84080 fffff804`72f43fd1 : nt!KiGeneralProtectionFault+0x1 ffffba08`708ca5b0 fffff804`732dd884 : 00000000`00000000 ffff8b87`a322c340 00000000`00010000 00000000`00000000 : nt!MiFindEmptyAddressRange+0xf9 ffffba08`708ca630 fffff804`732e5e7e : ffff8b87`00000000 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiSelectUserAddress+0x114 ffffba08`708ca6d0 fffff804`732e57cc : 00000000`00000004 ffffc088`00000000 ffffba08`708ca9a8 ffffba08`708ca9b8 : nt!MiMapViewOfDataSection+0x32e ffffba08`708ca800 fffff804`732e48a9 : 00000000`00000000 ffffba08`708cab80 0000003d`090e7fa8 00000000`00000000 : nt!MiMapViewOfSection+0x34c ffffba08`708ca950 fffff804`730058b8 : ffff8b87`a3f84080 0000003d`090e7f68 0000003d`090e7fe8 00000000`00000000 : nt!NtMapViewOfSection+0x159 ffffba08`708caa90 00007ffb`8cb8c2c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000003d`090e7f48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8cb8c2c4 SYMBOL_NAME: nt!KiGeneralProtectionFault+1 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1 FAILURE_BUCKET_ID: AV_nt!KiGeneralProtectionFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dd04af12-f86f-9688-c9a3-e403f84a6db3} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff80679a07080, memory referenced. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation. Arg3: fffff80679a07080, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6608 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7845 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: fffff80679a07080 BUGCHECK_P2: 10 BUGCHECK_P3: fffff80679a07080 BUGCHECK_P4: 2 READ_ADDRESS: fffff806292fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse fffff80679a07080 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VALORANT-Win64-Shipping.exe TRAP_FRAME: ffffef01dd79bf50 -- (.trap 0xffffef01dd79bf50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000670 rbx=0000000000000000 rcx=ffffef01dd79c120 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80679a07080 rsp=ffffef01dd79c0e8 rbp=ffffef01dd79c790 r8=000000000000066f r9=0000000000000007 r10=0000000000000000 r11=0000021e67397550 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc fffff806`79a07080 ?? ??? Resetting default scope FAILED_INSTRUCTION_ADDRESS: +0 fffff806`79a07080 ?? ??? STACK_TEXT: ffffef01`dd79bca8 fffff806`28a86729 : 00000000`00000050 fffff806`79a07080 00000000`00000010 ffffef01`dd79bf50 : nt!KeBugCheckEx ffffef01`dd79bcb0 fffff806`288eeb80 : ffff8002`7bfa08f0 00000000`00000010 ffffef01`dd79bfd0 00000000`00000000 : nt!MiSystemFault+0x13faf9 ffffef01`dd79bdb0 fffff806`28a0205e : 00000000`00000000 ffff8002`79719c60 00000000`00000000 00020002`00000438 : nt!MmAccessFault+0x400 ffffef01`dd79bf50 fffff806`79a07080 : fffff806`28883d83 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 : nt!KiPageFault+0x35e ffffef01`dd79c0e8 fffff806`28883d83 : 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 00000000`001f0003 : 0xfffff806`79a07080 ffffef01`dd79c0f0 fffff806`28a05fac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x223 ffffef01`dd79c920 fffff806`28a01ce0 : ffff8002`7b42d080 ffff8002`7b425080 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c ffffef01`dd79cb00 00007ffa`1c214f9c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 000000cc`0e8af860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1c214f9c CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 7 errors : !nt (fffff80628883d8a-fffff80628883dba) fffff80628883d80 32 18 00 e9 da fe ff ff 4c 8b *e3 98 00 00 00 4c 2.......L......L fffff80628883d90 89 65 *c5 48 8b 45 20 8b 80 7c *9c 00 00 a8 01 75 .e.H.E ..|.....u fffff80628883da0 5c 65 *2f 8b 04 25 88 01 00 00 *eb 8b 88 b8 00 00 \e/..%.......... fffff80628883db0 00 48 *28 b9 80 05 00 00 00 74 *fe 81 3b 02 00 00 .H(......t..;... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: STRIDE STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511} Followup: memory_corruption --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled Arg2: fffff804874afbaa, The address that the exception occurred at Arg3: ffffe30debe1e080, Parameter 0 of the exception Arg4: ffffe30de8c75b20, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 19018 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc000001d BUGCHECK_P2: fffff804874afbaa BUGCHECK_P3: ffffe30debe1e080 BUGCHECK_P4: ffffe30de8c75b20 EXCEPTION_PARAMETER1: ffffe30debe1e080 EXCEPTION_PARAMETER2: ffffe30de8c75b20 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: League of Legends.exe BAD_STACK_POINTER: fffff8047aa80158 FAILED_INSTRUCTION_ADDRESS: nvlddmkm+fbaa fffff804`874afbaa 46898c112c010000 mov dword ptr [rcx+r10+12Ch],r9d STACK_TEXT: fffff804`7aa80158 fffff804`76cf4d4e : 00000000`0000001e ffffffff`c000001d fffff804`874afbaa ffffe30d`ebe1e080 : nt!KeBugCheckEx fffff804`7aa80160 fffff804`76bfcd62 : fffff804`76cf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 fffff804`7aa801a0 fffff804`76a85027 : fffff804`7aa80710 00000000`00000000 fffff804`7aa72fb0 fffff804`76bfaee5 : nt!RtlpExecuteHandlerForException+0x12 fffff804`7aa801d0 fffff804`76a83ce6 : fffff804`7aa6fce8 fffff804`7aa80e20 fffff804`7aa6fce8 00000000`00000000 : nt!RtlDispatchException+0x297 fffff804`7aa808f0 fffff804`76bf4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 fffff804`7aa80fb0 fffff804`76bf4d00 : fffff804`76c05fa5 00000000`0000003f 00000000`0000003f 00000000`00000020 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffff804`7aa6fba8 fffff804`76c05fa5 : 00000000`0000003f 00000000`0000003f 00000000`00000020 fffff804`76ac7423 : nt!KiExceptionDispatchOnExceptionStackContinue fffff804`7aa6fbb0 fffff804`76c004e9 : ffffe30d`e8c75b20 fffff804`87c7a0e8 00000000`00000003 00000000`00000000 : nt!KiExceptionDispatch+0x125 fffff804`7aa6fd90 fffff804`874afbaa : fffff804`87c79cf8 ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 : nt!KiInvalidOpcodeFault+0x329 fffff804`7aa6ff28 fffff804`87c79cf8 : ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 : nvlddmkm+0xfbaa fffff804`7aa6ff30 ffffe30d`e8c46000 : fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f : nvlddmkm+0x7d9cf8 fffff804`7aa6ff38 fffff804`87cb4338 : 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 : 0xffffe30d`e8c46000 fffff804`7aa6ff40 00000000`00000001 : ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 00000000`00000004 : nvlddmkm+0x814338 fffff804`7aa6ff48 ffffe30d`e8c75b20 : ffffaba0`48dd044f 00000000`00000000 00000000`00000004 fffff804`87c8052c : 0x1 fffff804`7aa6ff50 ffffaba0`48dd044f : 00000000`00000000 00000000`00000004 fffff804`87c8052c 00000000`00000007 : 0xffffe30d`e8c75b20 fffff804`7aa6ff58 00000000`00000000 : 00000000`00000004 fffff804`87c8052c 00000000`00000007 fffff804`7aa70070 : 0xffffaba0`48dd044f SYMBOL_NAME: nvlddmkm+fbaa MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: fbaa FAILURE_BUCKET_ID: 0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {b1419c26-9117-4912-480f-77f62d207e93} Followup: MachineOwner --------- UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: ffffd680673c6e70 Arg3: 0000000063f5ba10 Arg4: fffff80205088acc Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8046 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 14042 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7f BUGCHECK_P1: 8 BUGCHECK_P2: ffffd680673c6e70 BUGCHECK_P3: 63f5ba10 BUGCHECK_P4: fffff80205088acc TRAP_FRAME: ffffd680673c6e70 -- (.trap 0xffffd680673c6e70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffb50fe67b1000 rdx=ffffb50fe67b1000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80205088acc rsp=0000000063f5ba10 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000001 r10=0000000000000001 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!EtwpWaitForBufferReferenceCount+0x14: fffff802`05088acc 5b pop rbx Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System BAD_STACK_POINTER: 0000000063f5ba10 STACK_TEXT: ffffd680`673c6d28 fffff802`04e05e69 : 00000000`0000007f 00000000`00000008 ffffd680`673c6e70 00000000`63f5ba10 : nt!KeBugCheckEx ffffd680`673c6d30 fffff802`04e00c83 : 00009abf`fffffe21 ccccffff`fde0e9c0 49dc8b4c`cccccccc 49186b89`49105b89 : nt!KiBugCheckDispatch+0x69 ffffd680`673c6e70 fffff802`05088acc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3 00000000`63f5ba10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpWaitForBufferReferenceCount+0x14 SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2c3 FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80265ecb98e, Address of the instruction which caused the bugcheck Arg3: fffff6029c5f65b0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 11296 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 12948 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80265ecb98e BUGCHECK_P3: fffff6029c5f65b0 BUGCHECK_P4: 0 CONTEXT: fffff6029c5f65b0 -- (.cxr 0xfffff6029c5f65b0) rax=0000000000000f30 rbx=2175f3dacb5196d7 rcx=fffff5ffc00034f8 rdx=0000000000000020 rsi=fffff59244767dd0 rdi=fffff59244767dc0 rip=fffff80265ecb98e rsp=fffff6029c5f6fb0 rbp=fffff6029c5f7b80 r8=0000000000000030 r9=fffff5ffc0001000 r10=0000000000000020 r11=00000000000000ff r12=000000000000002b r13=00000000000000a9 r14=0000000000000020 r15=0000000079737355 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!ExFreeHeapPool+0x21e: fffff802`65ecb98e 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:2175f3da`cb5196ff=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: League of Legends.exe STACK_TEXT: fffff602`9c5f6fb0 fffff802`665b2019 : 00000000`00000001 00000000`00000001 fffff5cd`39df37b0 01000000`00100000 : nt!ExFreeHeapPool+0x21e fffff602`9c5f7090 fffff5cd`39df3802 : 00000000`00000000 fffff592`44cf1010 00000000`00021cff ffffbd85`24351080 : nt!ExFreePool+0x9 fffff602`9c5f70c0 fffff5cd`39245697 : 00000000`00000000 fffff592`44767dd0 fffff592`44767dd0 fffff592`44cf1010 : win32kfull!Win32FreePoolImpl+0x52 fffff602`9c5f70f0 fffff5cd`39d67b58 : 00000000`00000000 fffff592`44cf1010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37 fffff602`9c5f7120 fffff5cd`39556fcf : fffff602`9c5f7aa8 00000000`00000000 fffff602`ffffffff 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508 fffff602`9c5f7a50 fffff802`660058b8 : fffff592`44cf1010 fffff5cd`39df14a3 00000000`71da7a70 ffffbd85`24351080 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f fffff602`9c5f7a90 00007fff`a3239014 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`14d2e2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a3239014 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.508 MODULE_NAME: Pool_Corruption STACK_COMMAND: .cxr 0xfffff6029c5f65b0 ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064} Followup: Pool_corruption ---------
Ramleri test ettim bu sonuç çıktı. Ramleri tek tek test yaptım ikisinde de problem gözükmedi.Belleklerinizde sorun görünüyor, test yapın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Ayrıca ekran kartınızın sürücüsünü DDU ile kaldırıp güncelleyin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000001, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff804730019c1, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5452 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7213 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 1 BUGCHECK_P2: ff BUGCHECK_P3: 0 BUGCHECK_P4: fffff804730019c1 READ_ADDRESS: fffff804738fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8047380f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000001 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VALORANT-Win64-Shipping.exe TRAP_FRAME: ffffba08708ca3e0 -- (.trap 0xffffba08708ca3e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00007ffffffeffff rbx=0000000000000000 rcx=ffffba08708ca6e0 rdx=ffff8b87a322c340 rsi=0000000000000000 rdi=0000000000000000 rip=fffff804730019c1 rsp=ffffba08708ca578 rbp=0000000000010000 r8=0000000000000000 r9=0000000000010169 r10=0000000000010000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl nz ac po cy nt!KiGeneralProtectionFault+0x1: fffff804`730019c1 4881ec58010000 sub rsp,158h Resetting default scope STACK_TEXT: ffffba08`708ca298 fffff804`73005e69 : 00000000`0000000a 00000000`00000001 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx ffffba08`708ca2a0 fffff804`73002169 : 000a4c64`0000ffff 00000000`000000ff 00000000`ffffffff ffffba08`00000000 : nt!KiBugCheckDispatch+0x69 ffffba08`708ca3e0 fffff804`730019c1 : 00000000`00010000 00000000`0000a668 fffff804`732dda09 00000000`00000010 : nt!KiPageFault+0x469 ffffba08`708ca578 fffff804`732dda09 : ffff8b87`a3691a80 ffffba08`708ca669 ffff8b87`a3f84080 fffff804`72f43fd1 : nt!KiGeneralProtectionFault+0x1 ffffba08`708ca5b0 fffff804`732dd884 : 00000000`00000000 ffff8b87`a322c340 00000000`00010000 00000000`00000000 : nt!MiFindEmptyAddressRange+0xf9 ffffba08`708ca630 fffff804`732e5e7e : ffff8b87`00000000 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiSelectUserAddress+0x114 ffffba08`708ca6d0 fffff804`732e57cc : 00000000`00000004 ffffc088`00000000 ffffba08`708ca9a8 ffffba08`708ca9b8 : nt!MiMapViewOfDataSection+0x32e ffffba08`708ca800 fffff804`732e48a9 : 00000000`00000000 ffffba08`708cab80 0000003d`090e7fa8 00000000`00000000 : nt!MiMapViewOfSection+0x34c ffffba08`708ca950 fffff804`730058b8 : ffff8b87`a3f84080 0000003d`090e7f68 0000003d`090e7fe8 00000000`00000000 : nt!NtMapViewOfSection+0x159 ffffba08`708caa90 00007ffb`8cb8c2c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 0000003d`090e7f48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`8cb8c2c4 SYMBOL_NAME: nt!KiGeneralProtectionFault+1 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 1 FAILURE_BUCKET_ID: AV_nt!KiGeneralProtectionFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {dd04af12-f86f-9688-c9a3-e403f84a6db3} Followup: MachineOwner --------- PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff80679a07080, memory referenced. Arg2: 0000000000000010, value 0 = read operation, 1 = write operation. Arg3: fffff80679a07080, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6608 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 7845 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 50 BUGCHECK_P1: fffff80679a07080 BUGCHECK_P2: 10 BUGCHECK_P3: fffff80679a07080 BUGCHECK_P4: 2 READ_ADDRESS: fffff806292fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock fffff8062920f2e0: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse fffff80679a07080 MM_INTERNAL_CODE: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VALORANT-Win64-Shipping.exe TRAP_FRAME: ffffef01dd79bf50 -- (.trap 0xffffef01dd79bf50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000670 rbx=0000000000000000 rcx=ffffef01dd79c120 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80679a07080 rsp=ffffef01dd79c0e8 rbp=ffffef01dd79c790 r8=000000000000066f r9=0000000000000007 r10=0000000000000000 r11=0000021e67397550 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc fffff806`79a07080 ?? ??? Resetting default scope FAILED_INSTRUCTION_ADDRESS: +0 fffff806`79a07080 ?? ??? STACK_TEXT: ffffef01`dd79bca8 fffff806`28a86729 : 00000000`00000050 fffff806`79a07080 00000000`00000010 ffffef01`dd79bf50 : nt!KeBugCheckEx ffffef01`dd79bcb0 fffff806`288eeb80 : ffff8002`7bfa08f0 00000000`00000010 ffffef01`dd79bfd0 00000000`00000000 : nt!MiSystemFault+0x13faf9 ffffef01`dd79bdb0 fffff806`28a0205e : 00000000`00000000 ffff8002`79719c60 00000000`00000000 00020002`00000438 : nt!MmAccessFault+0x400 ffffef01`dd79bf50 fffff806`79a07080 : fffff806`28883d83 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 : nt!KiPageFault+0x35e ffffef01`dd79c0e8 fffff806`28883d83 : 00000000`00000438 ffffd88a`20cf9d70 d88a2265`c6400000 00000000`001f0003 : 0xfffff806`79a07080 ffffef01`dd79c0f0 fffff806`28a05fac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x223 ffffef01`dd79c920 fffff806`28a01ce0 : ffff8002`7b42d080 ffff8002`7b425080 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c ffffef01`dd79cb00 00007ffa`1c214f9c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 000000cc`0e8af860 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`1c214f9c CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 7 errors : !nt (fffff80628883d8a-fffff80628883dba) fffff80628883d80 32 18 00 e9 da fe ff ff 4c 8b *e3 98 00 00 00 4c 2.......L......L fffff80628883d90 89 65 *c5 48 8b 45 20 8b 80 7c *9c 00 00 a8 01 75 .e.H.E ..|.....u fffff80628883da0 5c 65 *2f 8b 04 25 88 01 00 00 *eb 8b 88 b8 00 00 \e/..%.......... fffff80628883db0 00 48 *28 b9 80 05 00 00 00 74 *fe 81 3b 02 00 00 .H(......t..;... MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: STRIDE STACK_COMMAND: .thread ; .cxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511} Followup: memory_corruption --------- KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled Arg2: fffff804874afbaa, The address that the exception occurred at Arg3: ffffe30debe1e080, Parameter 0 of the exception Arg4: ffffe30de8c75b20, Parameter 1 of the exception Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5343 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 19018 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc000001d BUGCHECK_P2: fffff804874afbaa BUGCHECK_P3: ffffe30debe1e080 BUGCHECK_P4: ffffe30de8c75b20 EXCEPTION_PARAMETER1: ffffe30debe1e080 EXCEPTION_PARAMETER2: ffffe30de8c75b20 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: League of Legends.exe BAD_STACK_POINTER: fffff8047aa80158 FAILED_INSTRUCTION_ADDRESS: nvlddmkm+fbaa fffff804`874afbaa 46898c112c010000 mov dword ptr [rcx+r10+12Ch],r9d STACK_TEXT: fffff804`7aa80158 fffff804`76cf4d4e : 00000000`0000001e ffffffff`c000001d fffff804`874afbaa ffffe30d`ebe1e080 : nt!KeBugCheckEx fffff804`7aa80160 fffff804`76bfcd62 : fffff804`76cf4d2c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22 fffff804`7aa801a0 fffff804`76a85027 : fffff804`7aa80710 00000000`00000000 fffff804`7aa72fb0 fffff804`76bfaee5 : nt!RtlpExecuteHandlerForException+0x12 fffff804`7aa801d0 fffff804`76a83ce6 : fffff804`7aa6fce8 fffff804`7aa80e20 fffff804`7aa6fce8 00000000`00000000 : nt!RtlDispatchException+0x297 fffff804`7aa808f0 fffff804`76bf4d32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186 fffff804`7aa80fb0 fffff804`76bf4d00 : fffff804`76c05fa5 00000000`0000003f 00000000`0000003f 00000000`00000020 : nt!KxExceptionDispatchOnExceptionStack+0x12 fffff804`7aa6fba8 fffff804`76c05fa5 : 00000000`0000003f 00000000`0000003f 00000000`00000020 fffff804`76ac7423 : nt!KiExceptionDispatchOnExceptionStackContinue fffff804`7aa6fbb0 fffff804`76c004e9 : ffffe30d`e8c75b20 fffff804`87c7a0e8 00000000`00000003 00000000`00000000 : nt!KiExceptionDispatch+0x125 fffff804`7aa6fd90 fffff804`874afbaa : fffff804`87c79cf8 ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 : nt!KiInvalidOpcodeFault+0x329 fffff804`7aa6ff28 fffff804`87c79cf8 : ffffe30d`e8c46000 fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 : nvlddmkm+0xfbaa fffff804`7aa6ff30 ffffe30d`e8c46000 : fffff804`87cb4338 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f : nvlddmkm+0x7d9cf8 fffff804`7aa6ff38 fffff804`87cb4338 : 00000000`00000001 ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 : 0xffffe30d`e8c46000 fffff804`7aa6ff40 00000000`00000001 : ffffe30d`e8c75b20 ffffaba0`48dd044f 00000000`00000000 00000000`00000004 : nvlddmkm+0x814338 fffff804`7aa6ff48 ffffe30d`e8c75b20 : ffffaba0`48dd044f 00000000`00000000 00000000`00000004 fffff804`87c8052c : 0x1 fffff804`7aa6ff50 ffffaba0`48dd044f : 00000000`00000000 00000000`00000004 fffff804`87c8052c 00000000`00000007 : 0xffffe30d`e8c75b20 fffff804`7aa6ff58 00000000`00000000 : 00000000`00000004 fffff804`87c8052c 00000000`00000007 fffff804`7aa70070 : 0xffffaba0`48dd044f SYMBOL_NAME: nvlddmkm+fbaa MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: fbaa FAILURE_BUCKET_ID: 0x1E_c000001d_STACKPTR_ERROR_BAD_IP_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {b1419c26-9117-4912-480f-77f62d207e93} Followup: MachineOwner --------- UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: ffffd680673c6e70 Arg3: 0000000063f5ba10 Arg4: fffff80205088acc Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 8046 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 14042 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7f BUGCHECK_P1: 8 BUGCHECK_P2: ffffd680673c6e70 BUGCHECK_P3: 63f5ba10 BUGCHECK_P4: fffff80205088acc TRAP_FRAME: ffffd680673c6e70 -- (.trap 0xffffd680673c6e70) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffb50fe67b1000 rdx=ffffb50fe67b1000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80205088acc rsp=0000000063f5ba10 rbp=0000000000000000 r8=0000000000000000 r9=0000000000000001 r10=0000000000000001 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!EtwpWaitForBufferReferenceCount+0x14: fffff802`05088acc 5b pop rbx Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System BAD_STACK_POINTER: 0000000063f5ba10 STACK_TEXT: ffffd680`673c6d28 fffff802`04e05e69 : 00000000`0000007f 00000000`00000008 ffffd680`673c6e70 00000000`63f5ba10 : nt!KeBugCheckEx ffffd680`673c6d30 fffff802`04e00c83 : 00009abf`fffffe21 ccccffff`fde0e9c0 49dc8b4c`cccccccc 49186b89`49105b89 : nt!KiBugCheckDispatch+0x69 ffffd680`673c6e70 fffff802`05088acc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0x2c3 00000000`63f5ba10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!EtwpWaitForBufferReferenceCount+0x14 SYMBOL_NAME: nt!KiDoubleFaultAbort+2c3 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2c3 FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_nt!KiDoubleFaultAbort OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c5b9990d-856b-1bb5-7662-4621e5941c84} Followup: MachineOwner --------- SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80265ecb98e, Address of the instruction which caused the bugcheck Arg3: fffff6029c5f65b0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 11296 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 12948 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80265ecb98e BUGCHECK_P3: fffff6029c5f65b0 BUGCHECK_P4: 0 CONTEXT: fffff6029c5f65b0 -- (.cxr 0xfffff6029c5f65b0) rax=0000000000000f30 rbx=2175f3dacb5196d7 rcx=fffff5ffc00034f8 rdx=0000000000000020 rsi=fffff59244767dd0 rdi=fffff59244767dc0 rip=fffff80265ecb98e rsp=fffff6029c5f6fb0 rbp=fffff6029c5f7b80 r8=0000000000000030 r9=fffff5ffc0001000 r10=0000000000000020 r11=00000000000000ff r12=000000000000002b r13=00000000000000a9 r14=0000000000000020 r15=0000000079737355 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!ExFreeHeapPool+0x21e: fffff802`65ecb98e 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:2175f3da`cb5196ff=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: League of Legends.exe STACK_TEXT: fffff602`9c5f6fb0 fffff802`665b2019 : 00000000`00000001 00000000`00000001 fffff5cd`39df37b0 01000000`00100000 : nt!ExFreeHeapPool+0x21e fffff602`9c5f7090 fffff5cd`39df3802 : 00000000`00000000 fffff592`44cf1010 00000000`00021cff ffffbd85`24351080 : nt!ExFreePool+0x9 fffff602`9c5f70c0 fffff5cd`39245697 : 00000000`00000000 fffff592`44767dd0 fffff592`44767dd0 fffff592`44cf1010 : win32kfull!Win32FreePoolImpl+0x52 fffff602`9c5f70f0 fffff5cd`39d67b58 : 00000000`00000000 fffff592`44cf1010 00000000`00000000 00000000`00001cff : win32kbase!Win32FreePool+0x37 fffff602`9c5f7120 fffff5cd`39556fcf : fffff602`9c5f7aa8 00000000`00000000 fffff602`ffffffff 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x508 fffff602`9c5f7a50 fffff802`660058b8 : fffff592`44cf1010 fffff5cd`39df14a3 00000000`71da7a70 ffffbd85`24351080 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f fffff602`9c5f7a90 00007fff`a3239014 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`14d2e2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a3239014 SYMBOL_NAME: nt!ExFreePool+9 IMAGE_NAME: Pool_Corruption IMAGE_VERSION: 10.0.19041.508 MODULE_NAME: Pool_Corruption STACK_COMMAND: .cxr 0xfffff6029c5f65b0 ; kb BUCKET_ID_FUNC_OFFSET: 9 FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064} Followup: Pool_corruption ---------
Belleklerinizin modeli nedir? Kit halinde mi aldınız yoksa sonradan mı ekleme yaptınız?
Tek tek yaptığınızda sorun çıkmaması ilginç. Bellekleri garantiye gönderin, değişim/iade isteyin.
Evet çözüldü bir problem kalmadı.Sorun çözüldü, değil mi?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.