R5 3600 Sistem Mavi Ekran Hatası

AltayAkb

Centipat
Katılım
27 Temmuz 2019
Mesajlar
9
Merhabalar, çok fazla mavi ekran yemekteyim. Çözümünü bir türlü bulamadım Memtest yaptım sorun çıkmadı. Windows 10'un bellek tanılama ile baktım bir sorun çıkmadı. Tek RAM ile denedim, slotları değişerek denedim, hatta yeni RAM aldım öyle denedim, BIOS güncelledim, defalarca format attım ama bir türlü sonuç değişmedi. Acaba yardımcı olabilir misiniz?
Minidump

Sistem:
AMD Ryzen 5 3600.
Sapphire RX580.
8x2 Kingston HyperX Fury 3200MHz DDR4.
MSI B450M GAMING Plus.
Thermaltake Smart 600W 80+
 
Son düzenleyen: Moderatör:
  • XMP ayarı açıksa kapatın ve BIOS'u sıfırlayın. Ardından MemTest86 ile belleklerde tarama yapın. Windows Bellek Tanılama'dan daha kapsamlı bir tarama yapıyor.
  • HD Tune ile sürücülerde "Error Scan" yapın. "Quick Scan" kapalı olsun. HDD Sentinel yazılımından da tüm sürücülerin ekran görüntüsünü paylaşın.
  • EasyAntiCheat'i kaldırın.
  • Beta BIOS kullanıyorsunuz gibi görünüyor. Eski sürüme geri dönme imkânınız var mı, bilmiyorum.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8067b9fb6f8, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8083

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 18

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8067b9fb6f8

WRITE_ADDRESS: fffff8067c2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8067c20f340: Unable to get Flags value from nt!KdVersionBlock
fffff8067c20f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000018

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  fffff80681e6ba90 -- (.trap 0xfffff80681e6ba90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8067b9fb6f8 rsp=fffff80681e6bc20 rbp=000f8067b4bbbdff
r8=0000000000000028  r9=0000086fa0e0f801 r10=0000000000000048
r11=fffff80681e6bc30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!SwapContext+0xf8:
fffff806`7b9fb6f8 0fae5918        stmxcsr dword ptr [rcx+18h] ds:00000000`00000018=????????
Resetting default scope

BAD_STACK_POINTER:  fffff80681e6b948

STACK_TEXT:
fffff806`81e6b948 fffff806`7ba06569     : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff806`81e6b950 fffff806`7ba02869     : fffff806`7b9f0690 fffff806`7b87460a 00000000`00000001 fffff806`7b600000 : nt!KiBugCheckDispatch+0x69
fffff806`81e6ba90 fffff806`7b9fb6f8     : fffff806`79f43180 00000000`001a6550 fffff806`81e60000 ffff9384`11e87040 : nt!KiPageFault+0x469
fffff806`81e6bc20 fffff806`7b9f81e6     : 00000000`00000000 fffff806`79f43180 fffff806`7c327600 ffff9384`1d28b080 : nt!SwapContext+0xf8
fffff806`81e6bc60 00000000`00000000     : fffff806`81e6c000 fffff806`81e66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x176


SYMBOL_NAME:  nt!SwapContext+f8

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  f8

FAILURE_BUCKET_ID:  AV_STACKPTR_ERROR_nt!SwapContext

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a673eb48-d3c6-1b05-1d3c-a271b7506fbf}

Followup:     MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000005, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80045ee2c29, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5983

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 6041

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 5

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80045ee2c29

READ_ADDRESS: fffff800468fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004680f340: Unable to get Flags value from nt!KdVersionBlock
fffff8004680f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000005

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

TRAP_FRAME:  fffff3027674f380 -- (.trap 0xfffff3027674f380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe28edca07218 rbx=0000000000000000 rcx=ffffe28edca07218
rdx=ffffe28edc8a5388 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80045ee2c29 rsp=fffff3027674f510 rbp=0000000000000000
r8=ffffe28edca07218  r9=fffff3027674f750 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeRemoveQueueEx+0x89:
fffff800`45ee2c29 41396a04        cmp     dword ptr [r10+4],ebp ds:00000000`00000005=????????
Resetting default scope

STACK_TEXT:
fffff302`7674f238 fffff800`46006569     : 00000000`0000000a 00000000`00000005 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff302`7674f240 fffff800`46002869     : 00000001`ffffffff fffffff6`0000000d 00000000`00000006 00000008`00000002 : nt!KiBugCheckDispatch+0x69
fffff302`7674f380 fffff800`45ee2c29     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffff302`7674f510 fffff800`45ee2838     : ffffe28e`dca07200 00000000`00000000 ffffe28e`dc86a080 ffffcf81`00000001 : nt!KeRemoveQueueEx+0x89
fffff302`7674f5b0 fffff800`462f17ae     : 0000000a`7674f704 00000000`00000000 ffffcf81`493d2180 00000000`00000000 : nt!IoRemoveIoCompletion+0x98
fffff302`7674f6e0 fffff800`46005fb8     : fffff302`7674fa48 ffffe28e`d7984080 fffff302`7674f910 fffff302`7674f838 : nt!NtRemoveIoCompletionEx+0xfe
fffff302`7674f820 fffff800`45ff8400     : ffff9839`3efc5d2c 00000000`032c50e0 ffff984f`850ec190 ffff984f`850ec010 : nt!KiSystemServiceCopyEnd+0x28
fffff302`7674fa28 ffff9839`3efc5d2c     : 00000000`032c50e0 ffff984f`850ec190 ffff984f`850ec010 00000000`00000a44 : nt!KiServiceLinkage
fffff302`7674fa30 ffff9839`3f6f63ed     : ffffe28e`00000000 00000000`00000000 00000000`00000020 00000000`00000000 : win32kfull!NtUserGetQueueStatusReadonly+0x17c
fffff302`7674fad0 fffff800`46005fb8     : ffffe28e`d7984080 ffffe28e`dc9b2e60 00000000`00000000 fffff302`7674fb80 : win32k!NtUserGetQueueStatusReadonly+0x15
fffff302`7674fb00 00007ff9`251c96a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0544f6b8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`251c96a4


SYMBOL_NAME:  win32kfull!NtUserGetQueueStatusReadonly+17c

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  17c

FAILURE_BUCKET_ID:  AV_win32kfull!NtUserGetQueueStatusReadonly

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {28c827f6-0270-ec3e-9988-fba419b7deef}

Followup:     MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80139b2a0de, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8019

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80139b2a0de

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8013a4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8013a40f340: Unable to get Flags value from nt!KdVersionBlock
fffff8013a40f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

EXCEPTION_PARAMETER2:  ffffffffffffffff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  384c100f18384410 -- (.trap 0x384c100f18384410)
Unable to read trap frame at 384c100f`18384410

BAD_STACK_POINTER:  ffffce016acbe158

STACK_TEXT:
ffffce01`6acbe158 fffff801`39cf465e     : 00000000`0000001e ffffffff`c0000005 fffff801`39b2a0de 00000000`00000000 : nt!KeBugCheckEx
ffffce01`6acbe160 fffff801`39bfd462     : fffff801`39cf463c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
ffffce01`6acbe1a0 fffff801`39a52d97     : ffffce01`6acbe710 00000000`00000000 fffff405`b8c37c60 fffff801`39bf80c4 : nt!RtlpExecuteHandlerForException+0x12
ffffce01`6acbe1d0 fffff801`39a519a6     : fffff405`b8c373f8 ffffce01`6acbee20 fffff405`b8c373f8 fffff780`00000008 : nt!RtlDispatchException+0x297
ffffce01`6acbe8f0 fffff801`39bf5432     : 58c16b49`000d6402 0f000000`01e745c7 384c100f`18384410 110f0838`54100f28 : nt!KiDispatchException+0x186
ffffce01`6acbefb0 fffff801`39bf5400     : fffff801`39c066a5 00000000`00000000 00000000`00000001 ffffde08`436fc710 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff405`b8c372b8 fffff801`39c066a5     : 00000000`00000000 00000000`00000001 ffffde08`436fc710 00000000`1ef33dea : nt!KiExceptionDispatchOnExceptionStackContinue
fffff405`b8c372c0 fffff801`39c023e0     : 00000000`00000000 fffff405`b8c37500 00000000`00000103 00000000`00000000 : nt!KiExceptionDispatch+0x125
fffff405`b8c374a0 fffff801`39b2a0de     : 00000000`00000000 fffff801`3ec096af ffffde08`3d3f6240 fffff801`4d2519c7 : nt!KiGeneralProtectionFault+0x320
fffff405`b8c37630 fffff801`39b29d20     : 00000000`00000000 00000000`00000000 00000000`00000cfd 00000000`00000000 : nt!KiCheckForTimerExpiration+0xe
fffff405`b8c376c0 fffff801`39b29397     : 00000000`00000045 0000003c`a99b418f 00000000`00000000 ffffde08`3f0d9010 : nt!KeAccumulateTicks+0x30
fffff405`b8c37720 fffff801`39b28884     : 00000000`00000000 00001f80`00a5003b 00000000`001b8012 00000000`00000002 : nt!PpmIdleExecuteTransition+0x997
fffff405`b8c37af0 fffff801`39bf80c4     : ffffffff`00000000 ffffce01`6aca9340 ffffde08`3d8083c0 00000000`0000070e : nt!PoIdle+0x374
fffff405`b8c37c60 00000000`00000000     : fffff405`b8c38000 fffff405`b8c32000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!KiCheckForTimerExpiration+e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e

FAILURE_BUCKET_ID:  0x1E_c0000005_R_STACKPTR_ERROR_nt!KiCheckForTimerExpiration

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {63d4c396-b01c-cff5-417a-ee278b71911a}

Followup:     MachineOwner
---------
 
Memtest86 ile önceden bir test yapmıştım sorun çıkmamıştı. HD tune ve sentinel in fotoğrafını yolladım. EasyAntiCheat'i kaldırdım. BIOS'a bakacağım.
 

Dosya Ekleri

  • değerler.png
    değerler.png
    48,5 KB · Görüntüleme: 31

Geri
Yukarı