R5 3500 sistemde mavi ekran hatası

İşletim sistemi
Windows 10
Katılım
4 Kasım 2021
Mesajlar
3
Daha fazla  
Cinsiyet
Erkek
RAM
GeIL Evospear 8x2 16 GB 3200 MHz RAM
SSD veya HDD modeli
SSD Kingston A2000 500 GB M.2 - HDD 1 TB WD Blue
Ekran kartı
Zotac RTX 2060 6 GB
Anakart
Gigabyte B450M S2H 3600 MHz
İşlemci
Ryzen 5 3500
Arkadaşlar sürekli mavi ekran hatası alıyorum oyun oynarken hiç olmuyor. Genelde ya bos duruken ya da internette film vs izlerken oluyor.

 
SSD'nizi HDTune yazılımı ile "quick scan" kapalı olacak şekilde test edip sonuçları paylaşabilir misiniz?


Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8025520c842, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2249

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11139

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2424

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  120721-8515-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: 1

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8025520c842

WORKER_ROUTINE:
+0
00000000`00000001 ??              ???

WORK_ITEM:  fffff8025520c842

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffd28e9dfaa530 -- (.trap 0xffffd28e9dfaa530)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=00000000000000e4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025520c842 rsp=ffffd28e9dfaa6c0 rbp=0000000000000000
 r8=00000001000004d8  r9=ffffa800acdd5180 r10=ffff980b8aa380c0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiSwapThread+0x542:
fffff802`5520c842 488901          mov     qword ptr [rcx],rax ds:00000000`00000001=????????????????
Resetting default scope

STACK_TEXT: 
ffffd28e`9dfaa3e8 fffff802`55409269     : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd28e`9dfaa3f0 fffff802`55405569     : ffffa800`acdd5180 fffff802`553fe4b2 000f8067`b4bbbdff 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffd28e`9dfaa530 fffff802`5520c842     : ffffa800`00000000 00000000`00000000 ffffb988`a4f6e798 fffff802`559b1149 : nt!KiPageFault+0x469
ffffd28e`9dfaa6c0 fffff802`5520bd2f     : ffffb988`00000003 fffff802`00000001 00000000`00000001 ffff980b`00000000 : nt!KiSwapThread+0x542
ffffd28e`9dfaa770 fffff802`5520f663     : ffff980b`00000000 ffff980b`00000000 00000000`00000000 00000000`00000001 : nt!KiCommitThreadWait+0x14f
ffffd28e`9dfaa810 fffff802`5520f098     : ffff980b`8d48dbc0 00000000`00000001 ffff980b`92a56bf0 fffff802`00000000 : nt!KeRemoveQueueEx+0x263
ffffd28e`9dfaa8b0 fffff802`556d709d     : 00000000`00000000 00000000`00000000 ffffa800`acdd5180 fffff802`55286ada : nt!IoRemoveIoCompletion+0x98
ffffd28e`9dfaa9e0 fffff802`55408cb8     : ffff980b`8d45d080 000000e4`fa3fef28 ffffd28e`9dfaaaa8 000023d4`00090e68 : nt!NtRemoveIoCompletion+0x13d
ffffd28e`9dfaaa90 00007ffb`c490ce94     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000e4`fa3fef08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`c490ce94


SYMBOL_NAME:  nt!KiPageFault+469

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  469

FAILURE_BUCKET_ID:  AV_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}

Followup:     MachineOwner

Kod:
Unloaded modules:
fffff802`649d0000 fffff802`649df000   hiber_storpo
fffff802`649e0000 fffff802`64a0d000   hiber_stornv
fffff802`64a10000 fffff802`64a2e000   hiber_dumpfv
fffff802`64970000 fffff802`6497f000   hiber_storpo
fffff802`64980000 fffff802`649ad000   hiber_stornv
fffff802`649b0000 fffff802`649ce000   hiber_dumpfv
fffff802`64910000 fffff802`6491f000   hiber_storpo
fffff802`64920000 fffff802`6494d000   hiber_stornv
fffff802`64950000 fffff802`6496e000   hiber_dumpfv
fffff802`62030000 fffff802`6203f000   dump_storpor
fffff802`62070000 fffff802`6209d000   dump_stornvm
fffff802`620c0000 fffff802`620de000   dump_dumpfve
fffff802`64cb0000 fffff802`64ccc000   dam.sys
fffff802`58a00000 fffff802`58a11000   WdBoot.sys
fffff802`59af0000 fffff802`59b01000   hwpolicy.sys
 
Yaptım hocam. Memtest ile bellek testi de yaptım.
 

Dosya Ekleri

  • dsfsf.PNG
    dsfsf.PNG
    2,4 MB · Görüntüleme: 15

Geri
Yukarı