R5 3600 sistemde mavi ekran hataları

İşletim sistemi
Windows 10

MMockingJayy

Centipat
Katılım
15 Kasım 2020
Mesajlar
10
Yer
İstanbul
Daha fazla  
Cinsiyet
Erkek
Meslek
Teknisyen
Arkadaşlar selam. Yaklaşık 1 ay önceki Windows 10 (KB5000802) güncellemesinden sonra bilgisayarım mavi ekran almaktan açılamaz hale gelmişti ve maalesef format atmak zorunda kalmıştım. Sıfırdan kurulum biter bitmez bilgisayar açıldığı gibi sıfır işletim sistemiyle de mavi ekran almıştım. Ekran kartı, anakartın BIOS'u gibi donanım güncellemelerini yaptım fakat ara ara hala mavi ekran hatası almaktayım.
Yardımlarınızı bekliyorum. Minidump dosyasını sizlerle paylaşıyorum. Minidump.rar
 
Son düzenleyen: Moderatör:
Realtek ses sürücüsünü güncelleyin.
Diskte muhtemelen arıza var. Pool Corruption yazısı açıkçası destekliyor bu ihtimali.
HD Tune ile "Error Scan" yapın, ama "Quick Scan" yapın.
Teşekkürler deniyorum şimdi.
Realtek ses sürücüsünü güncelleyin.
Diskte muhtemelen arıza var. Pool Corruption yazısı açıkçası destekliyor bu ihtimali.
HD Tune ile "Error Scan" yapın, ama "Quick Scan" yapın.
Ses sürücüsünü güncelledim, HD Tune ile "Error Scan" yaptım hem "Quick Scan" hem de normal scan yaptım. Biraz önce yine hata aldım. Minidump dosyasını paylaşıyorum. Minidump_24.04.2021.rar
Hata hala devam ediyor. Güncel minidump dosyasını paylaşıyorum, yardımlarınızı bekliyorum.
@Recep Baltaş yardımlarınızı rica ediyorum. Bu sabah da PFN_LIST_CORRUPT hatası aldım. Minidump dosyasını paylaşıyorum.
 
Son düzenleme:
Sistem Özellikleri:

  • Ryzen 5 3600
  • MSI B450M-A Pro MAX
  • GSKILL RipjawsV 2x8GB 3200Mhz DDR4 CL 16 Ram
  • MSI GeForce GTX 1660Ti Ventus XS 6GB
  • Sandisk SSD Plus 480 GB
  • WD Blue 1TB Hard Disk

Sistemim yaklaşık 2 aydır mavi ekran hataları veriyor. Daha önce de bir konu açmıştım fakat pek yardımcı olunmadı ve hata almaya devam ediyorum. Genellikle bilgisayar ilk açıldığında ilk 2-3 dakika içinde alıyorum. Minidump dosyalarını paylaşıyorum.

 
Ses sürücünü, ekran kartı sürücünü güncelle.
Apple yazılımlarını kaldır.
Disk ve RAM taraması istiyorum, ikisinde de arıza var.

HD Tune ile "Error Scan" yap ama "Quick Scan" kapalı olsun.
Health yani sağlık kısmının ve S.M.A.R.T verilerini paylaş.

MemTest ise RAM bellek için. Rehberini ekledim.
 
Ses sürücünü, ekran kartı sürücünü güncelle.
Apple yazılımlarını kaldır.
Disk ve RAM taraması istiyorum, ikisinde de arıza var.

HD Tune ile "Error Scan" yap ama "Quick Scan" kapalı olsun.
Health yani sağlık kısmının ve S.M.A.R.T verilerini paylaş.

MemTest ise RAM bellek için. Rehberini ekledim.
@KojiroHyuga04 Sürücülerim güncel, disklerimde ve ramlerimde herhangi bir hata yok.
HD Tune hem "normal scan" hem de "quick scan" yaptım hata bulmadı. MemTest86 ile RAMleri de teste soktum 3-4 saatin sonunda onlarda da hata bulmadı.
yardımlarınızı bekliyorum @Recep Baltaş @Enes3078
Sorun hala devam etmekte. Güncel minidump dosyasını paylaşıyorum.

 
Son düzenleme:
1) BIOS'unuzu 7C52v3D sürümüne yükseltin.


2) Aşağıdaki ağ sürücüsünü indirip kurun.


Sonrasında sonuçları paylaşırsanız sevinirim. Kolay gelsin. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000fff, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8053a91b67e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8608

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 30225

Key : Analysis.Init.CPU.mSec
Value: 1171

Key : Analysis.Init.Elapsed.mSec
Value: 5318

Key : Analysis.Memory.CommitPeak.Mb
Value: 90

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 042922-14703-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: fff

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8053a91b67e

WRITE_ADDRESS: fffff8053b0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000fff

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

TRAP_FRAME: ffffb10edb01b5d0 -- (.trap 0xffffb10edb01b5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff805388dd180
rdx=fffff8053a400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053a91b67e rsp=ffffb10edb01b760 rbp=ffffb10edb01b7a8
r8=ffffb10edb01b820 r9=fffff805388dd180 r10=0000000000000fff
r11=ffffb10edb01b730 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSendHeteroRescheduleIntRequestHelper+0x34e:
fffff805`3a91b67e 498937 mov qword ptr [r15],rsi ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffb10e`db01b488 fffff805`3a809869 : 00000000`0000000a 00000000`00000fff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb10e`db01b490 fffff805`3a805b69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb10e`db01b5d0 fffff805`3a91b67e : 00000000`00000000 ffff8d8f`8a826080 00000000`00000000 00000000`00000c00 : nt!KiPageFault+0x469
ffffb10e`db01b760 fffff805`3a91b2e4 : 00000000`0000000b 00000000`00000fff ffffb10e`db01b820 fffff805`388dd180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x34e
ffffb10e`db01b7f0 fffff805`3a81a470 : fffff805`ffffffff 00000000`00000000 ffff9e0b`00000000 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffb10e`db01b820 fffff805`3a60bd2f : ffff8d8f`00000000 00000001`0000000b ffffb10e`db01b9e0 00000000`00000000 : nt!KiSwapThread+0x20e170
ffffb10e`db01b8d0 fffff805`3a60b5d3 : ffffc081`00000090 fffff805`00000000 000f8067`b4bbbd01 ffff8d8f`8aec81c0 : nt!KiCommitThreadWait+0x14f
ffffb10e`db01b970 fffff805`3a9f8951 : ffff8d8f`8aae15e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffb10e`db01ba60 fffff805`3a9f89fa : ffff8d8f`8aec8080 00000047`246ff718 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffb10e`db01bac0 fffff805`3a8092b8 : 00000230`ee4b7f50 00000000`0000000e ffffb10e`db01bb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffb10e`db01bb00 00007ff9`54e2cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000047`246ff6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`54e2cdf4


SYMBOL_NAME: nt!KiSendHeteroRescheduleIntRequestHelper+34e

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1645

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 34e

FAILURE_BUCKET_ID: AV_nt!KiSendHeteroRescheduleIntRequestHelper

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {b807f91c-7695-f3c2-28ae-134d847fcb2e}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending
code and original DPC routine.
Arguments:
Arg1: fffff80642127a00, Original thread which is the cause of the failure
Arg2: ffffc10aba2d0640, New thread
Arg3: 0000000000000000, Stack address of the original thread
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6452

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 23467

Key : Analysis.Init.CPU.mSec
Value: 1031

Key : Analysis.Init.Elapsed.mSec
Value: 9059

Key : Analysis.Memory.CommitPeak.Mb
Value: 81

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 042822-13781-01.dmp

BUGCHECK_CODE: b8

BUGCHECK_P1: fffff80642127a00

BUGCHECK_P2: ffffc10aba2d0640

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_THREAD: fffff80642127a00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

STACK_TEXT:
fffff806`45871590 fffff806`416872e5 : ffffc10a`b1feb1f0 fffff806`42127a00 fffff806`54321bb0 00000000`00000000 : nt!KiSwapContext+0x76
fffff806`458716d0 fffff806`41685437 : 00000000`00000000 00000000`00000000 ffffc10a`b1feb080 00000000`00000000 : nt!KiExitDispatcher+0x295
fffff806`45871740 fffff806`41684ed7 : 00000000`00000000 fffff806`3d856102 ffffc10a`00000000 ffffc10a`b2a6b080 : nt!IopfCompleteRequest+0x547
fffff806`45871830 fffff806`5093a1b9 : 00000000`00000000 ffffc10a`b50514e0 00000000`00000000 fffff806`3d856180 : nt!IofCompleteRequest+0x17
fffff806`45871860 fffff806`5093adee : 00000000`00000002 ffffc10a`b1e70b20 fffff806`3d856180 fffff806`45871b10 : afd+0x5a1b9
fffff806`458718b0 fffff806`41681702 : ffffc10a`b1e70b60 fffff806`3d856180 fffff806`3d856180 00000000`00000002 : afd+0x5adee
fffff806`458718e0 fffff806`41699add : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00351cfd : nt!KiProcessExpiredTimerList+0x172
fffff806`458719d0 fffff806`417fb40e : 00000000`00000000 fffff806`3d856180 fffff806`42127a00 ffffc10a`b4494080 : nt!KiRetireDpcList+0x5dd
fffff806`45871c60 00000000`00000000 : fffff806`45872000 fffff806`4586c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: afd+5a1b9

MODULE_NAME: afd

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.1645

STACK_COMMAND: .process /r /p 0xfffff80642124a00; .thread 0xfffff80642127a00 ; kb

BUCKET_ID_FUNC_OFFSET: 5a1b9

FAILURE_BUCKET_ID: 0xB8_afd!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {d21a8df2-5ebc-d989-f7e8-4ac32e8539ce}

Followup: MachineOwner
---------[/CODE]
 
1) BIOS'unuzu 7C52v3D sürümüne yükseltin.


2) aşağıdaki ağ sürücüsünü indirip kurun.


Sonrasında sonuçları paylaşırsanız sevinirim. Kolay gelsin. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000fff, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8053a91b67e, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8608.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 30225.

Key : Analysis.Init.CPU.mSec
Value: 1171.

Key : Analysis.Init.Elapsed.mSec
Value: 5318.

Key : Analysis.Memory.CommitPeak.Mb
Value: 90.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 042922-14703-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: fff.

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8053a91b67e.

WRITE_ADDRESS: fffff8053b0fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
0000000000000fff.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

TRAP_FRAME: ffffb10edb01b5d0 -- (.trap 0xffffb10edb01b5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff805388dd180
rdx=fffff8053a400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053a91b67e rsp=ffffb10edb01b760 rbp=ffffb10edb01b7a8
r8=ffffb10edb01b820 r9=fffff805388dd180 r10=0000000000000fff
r11=ffffb10edb01b730 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!KiSendHeteroRescheduleIntRequestHelper+0x34e:
fffff805`3a91b67e 498937 mov qword ptr [r15],rsi ds:00000000`00000000=????????????????
Resetting default scope.

STACK_TEXT:
ffffb10e`db01b488 fffff805`3a809869 : 00000000`0000000a 00000000`00000fff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb10e`db01b490 fffff805`3a805b69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb10e`db01b5d0 fffff805`3a91b67e : 00000000`00000000 ffff8d8f`8a826080 00000000`00000000 00000000`00000c00 : nt!KiPageFault+0x469
ffffb10e`db01b760 fffff805`3a91b2e4 : 00000000`0000000b 00000000`00000fff ffffb10e`db01b820 fffff805`388dd180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x34e
ffffb10e`db01b7f0 fffff805`3a81a470 : fffff805`ffffffff 00000000`00000000 ffff9e0b`00000000 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffb10e`db01b820 fffff805`3a60bd2f : ffff8d8f`00000000 00000001`0000000b ffffb10e`db01b9e0 00000000`00000000 : nt!KiSwapThread+0x20e170
ffffb10e`db01b8d0 fffff805`3a60b5d3 : ffffc081`00000090 fffff805`00000000 000f8067`b4bbbd01 ffff8d8f`8aec81c0 : nt!KiCommitThreadWait+0x14f
ffffb10e`db01b970 fffff805`3a9f8951 : ffff8d8f`8aae15e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffb10e`db01ba60 fffff805`3a9f89fa : ffff8d8f`8aec8080 00000047`246ff718 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffb10e`db01bac0 fffff805`3a8092b8 : 00000230`ee4b7f50 00000000`0000000e ffffb10e`db01bb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffb10e`db01bb00 00007ff9`54e2cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000047`246ff6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`54e2cdf4

SYMBOL_NAME: nt!KiSendHeteroRescheduleIntRequestHelper+34e

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1645

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 34e.

FAILURE_BUCKET_ID: AV_nt!KiSendHeteroRescheduleIntRequestHelper

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b807f91c-7695-f3c2-28ae-134d847fcb2e}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending.
code and original DPC routine.
Arguments:
Arg1: fffff80642127a00, Original thread which is the cause of the failure.
Arg2: ffffc10aba2d0640, New thread.
Arg3: 0000000000000000, Stack address of the original thread.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6452.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 23467.

Key : Analysis.Init.CPU.mSec
Value: 1031.

Key : Analysis.Init.Elapsed.mSec
Value: 9059.

Key : Analysis.Memory.CommitPeak.Mb
Value: 81.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 042822-13781-01.dmp

BUGCHECK_CODE: b8.

BUGCHECK_P1: fffff80642127a00.

BUGCHECK_P2: ffffc10aba2d0640.

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_THREAD: fffff80642127a00.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

STACK_TEXT:
fffff806`45871590 fffff806`416872e5 : ffffc10a`b1feb1f0 fffff806`42127a00 fffff806`54321bb0 00000000`00000000 : nt!KiSwapContext+0x76
fffff806`458716d0 fffff806`41685437 : 00000000`00000000 00000000`00000000 ffffc10a`b1feb080 00000000`00000000 : nt!KiExitDispatcher+0x295
fffff806`45871740 fffff806`41684ed7 : 00000000`00000000 fffff806`3d856102 ffffc10a`00000000 ffffc10a`b2a6b080 : nt!IopfCompleteRequest+0x547
fffff806`45871830 fffff806`5093a1b9 : 00000000`00000000 ffffc10a`b50514e0 00000000`00000000 fffff806`3d856180 : nt!IofCompleteRequest+0x17
fffff806`45871860 fffff806`5093adee : 00000000`00000002 ffffc10a`b1e70b20 fffff806`3d856180 fffff806`45871b10 : afd+0x5a1b9
fffff806`458718b0 fffff806`41681702 : ffffc10a`b1e70b60 fffff806`3d856180 fffff806`3d856180 00000000`00000002 : afd+0x5adee
fffff806`458718e0 fffff806`41699add : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00351cfd : nt!KiProcessExpiredTimerList+0x172
fffff806`458719d0 fffff806`417fb40e : 00000000`00000000 fffff806`3d856180 fffff806`42127a00 ffffc10a`b4494080 : nt!KiRetireDpcList+0x5dd
fffff806`45871c60 00000000`00000000 : fffff806`45872000 fffff806`4586c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: afd+5a1b9

MODULE_NAME: afd.

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.1645

STACK_COMMAND: .process /r /p 0xfffff80642124a00; .thread 0xfffff80642127a00 ; kb.

BUCKET_ID_FUNC_OFFSET: 5a1b9.

FAILURE_BUCKET_ID: 0xB8_afd!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d21a8df2-5ebc-d989-f7e8-4ac32e8539ce}

Followup: MachineOwner.
---------[/CODE]

BIOS'u söylediğiniz üzere güncelledim.
Attığınız LAN driverı Windows 7 içindi ben onun Windows 10 64 Bit için olanının indirip kurdum.

1) BIOS'unuzu 7C52v3D sürümüne yükseltin.


2) aşağıdaki ağ sürücüsünü indirip kurun.


Sonrasında sonuçları paylaşırsanız sevinirim. Kolay gelsin. :)

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000fff, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8053a91b67e, address which referenced memory.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 8608.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 30225.

Key : Analysis.Init.CPU.mSec
Value: 1171.

Key : Analysis.Init.Elapsed.mSec
Value: 5318.

Key : Analysis.Memory.CommitPeak.Mb
Value: 90.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 042922-14703-01.dmp

BUGCHECK_CODE: a

BUGCHECK_P1: fff.

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8053a91b67e.

WRITE_ADDRESS: fffff8053b0fb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
0000000000000fff.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: NVIDIA Share.exe

TRAP_FRAME: ffffb10edb01b5d0 -- (.trap 0xffffb10edb01b5d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff805388dd180
rdx=fffff8053a400000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053a91b67e rsp=ffffb10edb01b760 rbp=ffffb10edb01b7a8
r8=ffffb10edb01b820 r9=fffff805388dd180 r10=0000000000000fff
r11=ffffb10edb01b730 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
nt!KiSendHeteroRescheduleIntRequestHelper+0x34e:
fffff805`3a91b67e 498937 mov qword ptr [r15],rsi ds:00000000`00000000=????????????????
Resetting default scope.

STACK_TEXT:
ffffb10e`db01b488 fffff805`3a809869 : 00000000`0000000a 00000000`00000fff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb10e`db01b490 fffff805`3a805b69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb10e`db01b5d0 fffff805`3a91b67e : 00000000`00000000 ffff8d8f`8a826080 00000000`00000000 00000000`00000c00 : nt!KiPageFault+0x469
ffffb10e`db01b760 fffff805`3a91b2e4 : 00000000`0000000b 00000000`00000fff ffffb10e`db01b820 fffff805`388dd180 : nt!KiSendHeteroRescheduleIntRequestHelper+0x34e
ffffb10e`db01b7f0 fffff805`3a81a470 : fffff805`ffffffff 00000000`00000000 ffff9e0b`00000000 00000000`00000000 : nt!KiSendHeteroRescheduleIntRequest+0x74
ffffb10e`db01b820 fffff805`3a60bd2f : ffff8d8f`00000000 00000001`0000000b ffffb10e`db01b9e0 00000000`00000000 : nt!KiSwapThread+0x20e170
ffffb10e`db01b8d0 fffff805`3a60b5d3 : ffffc081`00000090 fffff805`00000000 000f8067`b4bbbd01 ffff8d8f`8aec81c0 : nt!KiCommitThreadWait+0x14f
ffffb10e`db01b970 fffff805`3a9f8951 : ffff8d8f`8aae15e0 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
ffffb10e`db01ba60 fffff805`3a9f89fa : ffff8d8f`8aec8080 00000047`246ff718 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
ffffb10e`db01bac0 fffff805`3a8092b8 : 00000230`ee4b7f50 00000000`0000000e ffffb10e`db01bb18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffb10e`db01bb00 00007ff9`54e2cdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000047`246ff6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`54e2cdf4

SYMBOL_NAME: nt!KiSendHeteroRescheduleIntRequestHelper+34e

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1645

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 34e.

FAILURE_BUCKET_ID: AV_nt!KiSendHeteroRescheduleIntRequestHelper

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {b807f91c-7695-f3c2-28ae-134d847fcb2e}

Followup: MachineOwner.
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending.
code and original DPC routine.
Arguments:
Arg1: fffff80642127a00, Original thread which is the cause of the failure.
Arg2: ffffc10aba2d0640, New thread.
Arg3: 0000000000000000, Stack address of the original thread.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 6452.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 23467.

Key : Analysis.Init.CPU.mSec
Value: 1031.

Key : Analysis.Init.Elapsed.mSec
Value: 9059.

Key : Analysis.Memory.CommitPeak.Mb
Value: 81.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 042822-13781-01.dmp

BUGCHECK_CODE: b8.

BUGCHECK_P1: fffff80642127a00.

BUGCHECK_P2: ffffc10aba2d0640.

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_THREAD: fffff80642127a00.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

STACK_TEXT:
fffff806`45871590 fffff806`416872e5 : ffffc10a`b1feb1f0 fffff806`42127a00 fffff806`54321bb0 00000000`00000000 : nt!KiSwapContext+0x76
fffff806`458716d0 fffff806`41685437 : 00000000`00000000 00000000`00000000 ffffc10a`b1feb080 00000000`00000000 : nt!KiExitDispatcher+0x295
fffff806`45871740 fffff806`41684ed7 : 00000000`00000000 fffff806`3d856102 ffffc10a`00000000 ffffc10a`b2a6b080 : nt!IopfCompleteRequest+0x547
fffff806`45871830 fffff806`5093a1b9 : 00000000`00000000 ffffc10a`b50514e0 00000000`00000000 fffff806`3d856180 : nt!IofCompleteRequest+0x17
fffff806`45871860 fffff806`5093adee : 00000000`00000002 ffffc10a`b1e70b20 fffff806`3d856180 fffff806`45871b10 : afd+0x5a1b9
fffff806`458718b0 fffff806`41681702 : ffffc10a`b1e70b60 fffff806`3d856180 fffff806`3d856180 00000000`00000002 : afd+0x5adee
fffff806`458718e0 fffff806`41699add : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00351cfd : nt!KiProcessExpiredTimerList+0x172
fffff806`458719d0 fffff806`417fb40e : 00000000`00000000 fffff806`3d856180 fffff806`42127a00 ffffc10a`b4494080 : nt!KiRetireDpcList+0x5dd
fffff806`45871c60 00000000`00000000 : fffff806`45872000 fffff806`4586c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: afd+5a1b9

MODULE_NAME: afd.

IMAGE_NAME: afd.sys

IMAGE_VERSION: 10.0.19041.1645

STACK_COMMAND: .process /r /p 0xfffff80642124a00; .thread 0xfffff80642127a00 ; kb.

BUCKET_ID_FUNC_OFFSET: 5a1b9.

FAILURE_BUCKET_ID: 0xB8_afd!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {d21a8df2-5ebc-d989-f7e8-4ac32e8539ce}

Followup: MachineOwner.
---------[/CODE]

Yine mavi ekran hatası aldım. Minidump dosyasını paylaşıyorum.

Tekrardan bir hata daha aldım.

 
Son düzenleyen: Moderatör:
Son düzenleme:

Yeni konular

Geri
Yukarı