Çözüldü R3 3100 sistemde mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 11

tamerakyol

Femtopat
Katılım
17 Mayıs 2023
Mesajlar
7
Daha fazla  
Cinsiyet
Erkek
RAM
XPG, 3000MHz,8x2 16gb
SSD veya HDD modeli
ADATA su750 512GB ssd
Ekran kartı
ASUS TUF GAMİNG GTX 1650 SUPER
Anakart
ASUS PRIME A320M-F
İşlemci
AMD ryzen3 3100
Bilgisayarımı yeni aldım, ilk başlarda gayet güzel çalışıyordu, sonrasında mavi ekran vermeye başladı.
ntoskrnl.exe hatası veriyor ne yapmam lazım.
 
Çözüm
BIOS güncelleyin.


Rehber bilmiyorsanız;

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Tüm sürücüleri işletim sisteminize uygun olarak güncelleyin.


CPU Z yazılımı tamamen silin sorununuz çözülmeli.

Kod:
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000009b3823f818, memory referenced
Arg2: 000000000000000f, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80339a27897, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for cpuz150_x64.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4765

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8716

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 405

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5174

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  051623-25500-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

BUGCHECK_CODE:  a

BUGCHECK_P1: 9b3823f818

BUGCHECK_P2: f

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80339a27897

WRITE_ADDRESS: fffff8033a31c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000009b3823f818

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Corsair.Servic

TRAP_FRAME:  fffff38ba2658f30 -- (.trap 0xfffff38ba2658f30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000001d rbx=0000000000000000 rcx=fffff79840227000
rdx=0000009b3823f818 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80339a27897 rsp=fffff38ba26590c8 rbp=fffff79840227000
 r8=0000000000000060  r9=0000000000000060 r10=0000fffff80339a2
r11=ffffb8fed0e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
nt!HalpPciReadMmConfigUlong+0x7:
fffff803`39a27897 8902            mov     dword ptr [rdx],eax ds:0000009b`3823f818=ffffffff
Resetting default scope

STACK_TEXT:
fffff38b`a2658de8 fffff803`39a40fa9     : 00000000`0000000a 0000009b`3823f818 00000000`0000000f 00000000`00000001 : nt!KeBugCheckEx
fffff38b`a2658df0 fffff803`39a3c634     : 00000000`00000000 00000000`00000001 fffff38b`a2659119 fffff803`39a34df6 : nt!KiBugCheckDispatch+0x69
fffff38b`a2658f30 fffff803`39a27897     : fffff803`3995f14e ffff9408`6b5bf240 ffff9408`657de430 ffffdd38`202ff516 : nt!KiPageFault+0x474
fffff38b`a26590c8 fffff803`3995f14e     : ffff9408`6b5bf240 ffff9408`657de430 ffffdd38`202ff516 fffff803`3984139e : nt!HalpPciReadMmConfigUlong+0x7
fffff38b`a26590d0 fffff803`3995efa2     : 00000000`00000000 00000000`00000004 00000000`00000060 00000000`00000000 : nt!HalpPCIPerformConfigAccess+0x5a
fffff38b`a2659100 fffff803`3995ee15     : 00000000`00000000 00000000`00000004 0000009b`3823f818 00000000`00000000 : nt!HalpPciAccessMmConfigSpace+0x82
fffff38b`a2659140 fffff803`399c1d7a     : 00000000`00000000 00000000`00000000 0000009b`3823f818 00000000`00000004 : nt!HalpPCIConfig+0xc5
fffff38b`a26591c0 fffff803`399c1cd7     : 00000000`00000000 00000000`00000004 00000000`00000000 00000000`00000040 : nt!HalpReadPCIConfig+0x56
fffff38b`a2659210 fffff803`399c1bf1     : ffff9408`6dff4080 000f807f`b4bbbdff ffffc901`ab0d1180 fffff803`39a35027 : nt!HalpGetPCIData+0xd3
fffff38b`a26592e0 fffff803`91dc4455     : 00000000`00000000 00000000`00000001 fffff38b`a2659509 fffff803`39a34df6 : nt!HalGetBusDataByOffset+0x41
fffff38b`a2659320 00000000`00000000     : 00000000`00000001 fffff38b`a2659509 fffff803`39a34df6 fffff803`00000060 : cpuz150_x64+0x4455


SYMBOL_NAME:  cpuz150_x64+4455

MODULE_NAME: cpuz150_x64

IMAGE_NAME:  cpuz150_x64.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  4455

FAILURE_BUCKET_ID:  AV_cpuz150_x64!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {613679c3-25a8-ff59-4c4a-b7463c7dcc5a}

Followup:     MachineOwner
---------

Yeni konular

Geri
Yukarı