SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff801caf2cbf0, The address that the exception occurred at
Arg3: ffffd00dbb4dc9f8, Exception Record Address
Arg4: ffffd00dbb4dc230, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 2640
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 26782
Key : Analysis.Init.CPU.mSec
Value: 624
Key : Analysis.Init.Elapsed.mSec
Value: 5110
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 121521-7921-01.dmp
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff801caf2cbf0
BUGCHECK_P3: ffffd00dbb4dc9f8
BUGCHECK_P4: ffffd00dbb4dc230
EXCEPTION_RECORD: ffffd00dbb4dc9f8 -- (.exr 0xffffd00dbb4dc9f8)
ExceptionAddress: fffff801caf2cbf0 (smrtkrnl64+0x000000000035cbf0)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd00dbb4dc230 -- (.cxr 0xffffd00dbb4dc230)
rax=0000000000000078 rbx=ffffd00dbb4dce38 rcx=0000000000032d2e
rdx=00000000c738c303 rsi=0000000000000000 rdi=16073c2ffeaf605c
rip=fffff801caf2cbf0 rsp=ffffd00dbb4dcc30 rbp=00000001402d9035
r8=00000001402d9035 r9=fffff801caca6658 r10=fffff801caea9035
r11=fffff801caf2cbad r12=5541544157565340 r13=0000000000000000
r14=fffff801cabf88d0 r15=fffff801cabf8818
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
smrtkrnl64+0x35cbf0:
fffff801`caf2cbf0 0fbae03d bt eax,3Dh
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80176cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
MISALIGNED_IP:
smrtkrnl64+35cbf0
fffff801`caf2cbf0 0fbae03d bt eax,3Dh
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffd00d`bb4dcc30 00000000`00040207 : 00000000`00000000 00000000`00000000 fffff5e8`06dda6e0 00000000`00040282 : smrtkrnl64+0x35cbf0
ffffd00d`bb4dcc38 00000000`00000000 : 00000000`00000000 fffff5e8`06dda6e0 00000000`00040282 00000000`00000000 : 0x40207
SYMBOL_NAME: smrtkrnl64+35cbf0
MODULE_NAME: hardware
IMAGE_NAME: hardware
STACK_COMMAND: .cxr 0xffffd00dbb4dc230 ; kb
FAILURE_BUCKET_ID: IP_MISALIGNED_smrtkrnl64.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bae813ea-fe19-a695-b464-dde7821679ef}
Followup: MachineOwner
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804ca1371a8, The address that the exception occurred at
Arg3: ffffaf84d02759f8, Exception Record Address
Arg4: ffffaf84d0275230, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20483
Key : Analysis.Init.CPU.mSec
Value: 780
Key : Analysis.Init.Elapsed.mSec
Value: 6320
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122021-8156-01.dmp
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804ca1371a8
BUGCHECK_P3: ffffaf84d02759f8
BUGCHECK_P4: ffffaf84d0275230
EXCEPTION_RECORD: ffffaf84d02759f8 -- (.exr 0xffffaf84d02759f8)
ExceptionAddress: fffff804ca1371a8 (smrtkrnl64+0x00000000002e71a8)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000001402d970c
Attempt to read from address 00000001402d970c
CONTEXT: ffffaf84d0275230 -- (.cxr 0xffffaf84d0275230)
rax=fffffffffff3d20a rbx=0337b71165c16a2a rcx=00000001402d970c
rdx=0000000000000050 rsi=fffff804c9fba45e rdi=ffffaf84d0275e48
rip=fffff804ca1371a8 rsp=ffffaf84d0275c30 rbp=00000000b157ffff
r8=ffffaf84d0275ef0 r9=ffffdc57c26813a8 r10=fffff804ca137169
r11=ffffaf84d0275d70 r12=5541544157565340 r13=0000000000000000
r14=fffff804c9e788d0 r15=fffff804c9e78818
iopl=0 ov up ei pl nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050a07
smrtkrnl64+0x2e71a8:
fffff804`ca1371a8 4833d9 xor rbx,rcx
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80477cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
00000001402d970c
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000001402d970c
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffaf84`d0275c30 ffffdc57`c26813a8 : 00000000`00040282 ffffaf84`d0275f10 00000000`00000000 00000000`00000000 : smrtkrnl64+0x2e71a8
ffffaf84`d0275c38 00000000`00040282 : ffffaf84`d0275f10 00000000`00000000 00000000`00000000 00000000`00040286 : 0xffffdc57`c26813a8
ffffaf84`d0275c40 ffffaf84`d0275f10 : 00000000`00000000 00000000`00000000 00000000`00040286 00000000`00000000 : 0x40282
ffffaf84`d0275c48 00000000`00000000 : 00000000`00000000 00000000`00040286 00000000`00000000 ffffdc6e`371b8000 : 0xffffaf84`d0275f10
SYMBOL_NAME: smrtkrnl64+2e71a8
MODULE_NAME: smrtkrnl64
IMAGE_NAME: smrtkrnl64.sys
STACK_COMMAND: .cxr 0xffffaf84d0275230 ; kb
BUCKET_ID_FUNC_OFFSET: 2e71a8
FAILURE_BUCKET_ID: AV_smrtkrnl64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {83b44957-ac45-96b2-7db7-1b789c878ce0}
Followup: MachineOwner
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb105f96d5b60, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffb105f96d5ab8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5014
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 54923
Key : Analysis.Init.CPU.mSec
Value: 734
Key : Analysis.Init.Elapsed.mSec
Value: 9326
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122421-8265-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb105f96d5b60
BUGCHECK_P3: ffffb105f96d5ab8
BUGCHECK_P4: 0
TRAP_FRAME: ffffb105f96d5b60 -- (.trap 0xffffb105f96d5b60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff900f6dc0d398 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff900f62f0c400 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80242940476 rsp=ffffb105f96d5cf0 rbp=ffffb105f96d5e59
r8=0000000000000000 r9=0000000000000001 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe cy
nvlddmkm+0x7f0476:
fffff802`42940476 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb105f96d5ab8 -- (.exr 0xffffb105f96d5ab8)
ExceptionAddress: fffff80242940476 (nvlddmkm+0x00000000007f0476)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steamwebhelper.exe
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb105`f96d5838 fffff802`34009069 : 00000000`00000139 00000000`00000003 ffffb105`f96d5b60 ffffb105`f96d5ab8 : nt!KeBugCheckEx
ffffb105`f96d5840 fffff802`34009490 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb105`f96d5980 fffff802`34007823 : 00000000`00000000 ffffb105`00000000 00000000`00000001 ffffb105`f96d5df0 : nt!KiFastFailDispatch+0xd0
ffffb105`f96d5b60 fffff802`42940476 : ffff900f`62f0c300 ffffb105`f96d5e00 ffff900f`62f0c300 fffff802`42ee4116 : nt!KiRaiseSecurityCheckFailure+0x323
ffffb105`f96d5cf0 ffff900f`62f0c300 : ffffb105`f96d5e00 ffff900f`62f0c300 fffff802`42ee4116 00000000`00000000 : nvlddmkm+0x7f0476
ffffb105`f96d5cf8 ffffb105`f96d5e00 : ffff900f`62f0c300 fffff802`42ee4116 00000000`00000000 ffff900f`62f0c318 : 0xffff900f`62f0c300
ffffb105`f96d5d00 ffff900f`62f0c300 : fffff802`42ee4116 00000000`00000000 ffff900f`62f0c318 ffffb105`00000000 : 0xffffb105`f96d5e00
ffffb105`f96d5d08 fffff802`42ee4116 : 00000000`00000000 ffff900f`62f0c318 ffffb105`00000000 ffff900f`6dc0d300 : 0xffff900f`62f0c300
ffffb105`f96d5d10 00000000`00000000 : ffff900f`62f0c318 ffffb105`00000000 ffff900f`6dc0d300 ffff900f`62f0c301 : nvlddmkm+0xd94116
SYMBOL_NAME: nvlddmkm+7f0476
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 7f0476
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {313b10a2-72d5-e118-5040-eef20d8afced}
Followup: MachineOwner
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80646088c36, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2812
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8699
Key : Analysis.Init.CPU.mSec
Value: 562
Key : Analysis.Init.Elapsed.mSec
Value: 2876
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122521-7000-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80646088c36
WRITE_ADDRESS: fffff80646afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: BlackDesert64.bin
TRAP_FRAME: ffff850239e48810 -- (.trap 0xffff850239e48810)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffb5819dc80180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80646088c36 rsp=ffff850239e489a0 rbp=ffffb5819dc80180
r8=0000000000000000 r9=0000000000000000 r10=0000fffff8064600
r11=ffffa28747702c80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x46:
fffff806`46088c36 f1 ???
Resetting default scope
MISALIGNED_IP:
nt!KiTryUnwaitThread+46
fffff806`46088c36 f1 ???
STACK_TEXT:
ffff8502`39e486c8 fffff806`46209069 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff8502`39e486d0 fffff806`46205369 : 00000000`00000000 fffff806`4600c800 ffffb581`00000001 00000000`ffffff00 : nt!KiBugCheckDispatch+0x69
ffff8502`39e48810 fffff806`46088c36 : 00000000`00000000 fffff806`463f5f01 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
ffff8502`39e489a0 fffff806`46086c6b : ffffd384`8e280960 00000000`00000000 ffffb581`9dc80180 00000000`00000000 : nt!KiTryUnwaitThread+0x46
ffff8502`39e48a00 fffff806`4647330d : 00000000`00000001 ffff8502`39e48b80 ffffd384`8d7c2080 ffffd384`8599e1c0 : nt!KeSetEvent+0x19b
ffff8502`39e48a90 fffff806`46208ab8 : ffffd384`8d7c2080 ffffd384`8e282460 00000000`00000000 ffffd384`00000000 : nt!NtSetEvent+0xbd
ffff8502`39e48b00 00007ffc`0582cf34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`e81cee18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0582cf34
SYMBOL_NAME: nt!KiTryUnwaitThread+46
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.1415
STACK_COMMAND: .cxr; .ecxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
Dediklerinizin hepsini tek tek yapabilirim. Fakat RAM testi yapmayı bir kere denedim önceden 4-5 saat olmuştu hala bitmemişti o kadar uzun sürecekse onu yapmayabilirim. Yanlış bir şeyler mi yaptım bilmiyorum test ederken.Donanım arızası görünüyor bu raporda da. Disklerinizi ve belleklerinizi bir test eder misiniz tedbir amaçlı. HDTune ile "health" sekmesinin görüntüsünü atın. "Quick Scan" kapalı olacak şekilde de "Error Scan" testi yapın sonucu bildirin. Memtest ile de RAM'lerinizi bir test edin.
HDTune : HD Tune Pro
Memtest : Memtest86 ile Bozuk RAM Testi
Artı olarak ses sürücünüzü, chipset sürücünüzü de güncelleyelim.
Ses : https://dlcdnets.asus.com/pub/ASUS/mb/01AUDIO/DRV_Audio_RTK_TF_TSD_W10_64_V6089551_20200827R.zip
Chipset : https://dlcdnets.asus.com/pub/ASUS/...AMD_AM4_SZ-TSD_W11_64_V31022706_20211116R.zip
BIOS'unuza da güncelleme gelmiş. Onu da yapalım isterseniz.
BIOS : PRIME B350-PLUS - Destek
Kod:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80646088c36, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2812 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 8699 Key : Analysis.Init.CPU.mSec Value: 562 Key : Analysis.Init.Elapsed.mSec Value: 2876 Key : Analysis.Memory.CommitPeak.Mb Value: 73 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 122521-7000-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff80646088c36 WRITE_ADDRESS: fffff80646afb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: BlackDesert64.bin TRAP_FRAME: ffff850239e48810 -- (.trap 0xffff850239e48810) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=ffffb5819dc80180 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80646088c36 rsp=ffff850239e489a0 rbp=ffffb5819dc80180 r8=0000000000000000 r9=0000000000000000 r10=0000fffff8064600 r11=ffffa28747702c80 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KiTryUnwaitThread+0x46: fffff806`46088c36 f1 ??? Resetting default scope MISALIGNED_IP: nt!KiTryUnwaitThread+46 fffff806`46088c36 f1 ??? STACK_TEXT: ffff8502`39e486c8 fffff806`46209069 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffff8502`39e486d0 fffff806`46205369 : 00000000`00000000 fffff806`4600c800 ffffb581`00000001 00000000`ffffff00 : nt!KiBugCheckDispatch+0x69 ffff8502`39e48810 fffff806`46088c36 : 00000000`00000000 fffff806`463f5f01 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469 ffff8502`39e489a0 fffff806`46086c6b : ffffd384`8e280960 00000000`00000000 ffffb581`9dc80180 00000000`00000000 : nt!KiTryUnwaitThread+0x46 ffff8502`39e48a00 fffff806`4647330d : 00000000`00000001 ffff8502`39e48b80 ffffd384`8d7c2080 ffffd384`8599e1c0 : nt!KeSetEvent+0x19b ffff8502`39e48a90 fffff806`46208ab8 : ffffd384`8d7c2080 ffffd384`8e282460 00000000`00000000 ffffd384`00000000 : nt!NtSetEvent+0xbd ffff8502`39e48b00 00007ffc`0582cf34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`e81cee18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0582cf34 SYMBOL_NAME: nt!KiTryUnwaitThread+46 IMAGE_NAME: hardware IMAGE_VERSION: 10.0.19041.1415 STACK_COMMAND: .cxr; .ecxr ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner
Evet biraz uzun sürüyor o test. Ama garanti sonuç alabilmek için beklemek gerekiyor maalesef. Güncellemelerin hepsini bir yapın bakalım ona göre hareket edelim bence. Raporlardan kesin bir yargıya varamıyorum şu an için.Fakat RAM testi yapmayı bir kere denedim önceden 4-5 saat olmuştu hala bitmemişti o kadar uzun sürecekse onu yapmayabilirim. Yanlış bir şeyler mi yaptım bilmiyorum test ederken.
Evet gerçekten anlayabiliyorum. Ben de sevmiyorum o kadar uzun süreler beklemeyi ama işte...Geriye Memtest kaldı ama bunu yapasım ciddi anlamda yok uzun sürdüğü için.