Son kullanma tarihi geçmiş, bayatlamış bir tarayıcı kullanıyorsanız, Mercedes kullanmak yerine tosbağaya binmek gibi... Web sitelerini düzgün görüntüleyemiyorsanız eh, bi' zahmet tarayıcınızı güncelleyiniz. Modern Web standartlarını karşılayan bir tarayıcı alternatifine göz atın.
Merhaba
Öncelikle forumda yeniyim.
Bilgisayar bazen takılıp kalıyor, sonrasında düzeliyor. Bir 5-6 saniyelik takılma yaşıyor(takılma donma olarak değil aşırı kasma anlamında takılma diyorum)
3-4 defada mavi ekran yedim rastgele bir şekilde kasmayla bağlantısı var mı bilmiyorum.
Daha yeni format atmıştım yüklemediğim driver olabilir veya hatalı driver.
Minidump dosyasına bakarsanız sevinirim.
Kolay gelsin iyi akşamlar.
AMD Socket AM5: Supports AMD Ryzen™ 7000 Series Processors Q-Flash Plus: Update BIOS Without Installing the CPU, Memory and Graphics Card Smart Fan 6: Features Multiple Temperature Sensors, Hybrid Fan Headers with FAN STOP Dual Channel DDR5: 4*SMD DIMMs with AMD EXPO™ & Intel® XMP Memory Module...
www.gigabyte.com.tr
Dökümler:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffc8887b8fc48, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff801586df76e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for EasyAntiCheat.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 8000
Key : Analysis.Elapsed.mSec
Value: 13249
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 718
Key : Analysis.Init.Elapsed.mSec
Value: 3445
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_EasyAntiCheat!unknown_function
Key : Failure.Hash
Value: {de037a2f-1007-fb78-fc0b-814c5461dfd3}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffc8887b8fc48
BUGCHECK_P2: 0
BUGCHECK_P3: fffff801586df76e
BUGCHECK_P4: 2
FILE_IN_CAB: 052823-6765-01.dmp
READ_ADDRESS: fffff80158afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffffc8887b8fc48
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: services.exe
TRAP_FRAME: ffffee8b0f1d5c50 -- (.trap 0xffffee8b0f1d5c50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00fffffc8887b8fc rbx=0000000000000000 rcx=00000000000000fc
rdx=fffffc8887b8fc60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801586df76e rsp=ffffee8b0f1d5de8 rbp=ffffd683ce414040
r8=0000000000000000 r9=fffffc8887b8fc30 r10=000000000003b438
r11=ffffee8b0f1d5e30 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nt!ObpCaptureHandleInformation+0x8e:
fffff801`586df76e 410fb64118 movzx eax,byte ptr [r9+18h] ds:fffffc88`87b8fc48=??
Resetting default scope
STACK_TEXT:
ffffee8b`0f1d59a8 fffff801`5824ac53 : 00000000`00000050 fffffc88`87b8fc48 00000000`00000000 ffffee8b`0f1d5c50 : nt!KeBugCheckEx
ffffee8b`0f1d59b0 fffff801`5806e7b0 : ffffee8b`0f1d5b30 00000000`00000000 ffffee8b`0f1d5cd0 00000000`00000000 : nt!MiSystemFault+0x1b2273
ffffee8b`0f1d5ab0 fffff801`5820b7d8 : ffffd683`00000000 00001f80`00000000 ad888d0b`fe80ffff ffffd683`ce414040 : nt!MmAccessFault+0x400
ffffee8b`0f1d5c50 fffff801`586df76e : fffff801`5874f591 00000000`00001804 00000000`00000000 ffffad88`00000000 : nt!KiPageFault+0x358
ffffee8b`0f1d5de8 fffff801`5874f591 : 00000000`00001804 00000000`00000000 ffffad88`00000000 fffff801`58086632 : nt!ObpCaptureHandleInformation+0x8e
ffffee8b`0f1d5df0 fffff801`586df665 : fffff801`586df6e0 ffffd683`ce414058 ffffad88`00100000 ffffee8b`0f1d5f30 : nt!ExpSnapShotHandleTables+0x131
ffffee8b`0f1d5e80 fffff801`5874cc11 : ffffee8b`0f1d5f30 00000000`0003b438 00000000`00100000 00000000`00000000 : nt!ObGetHandleInformation+0x39
ffffee8b`0f1d5ec0 fffff801`5840918f : ffffad88`8e1b0010 00000000`00000000 ffff8580`de731010 ffffad88`a28d86e0 : nt!ExpGetHandleInformation+0x5d
ffffee8b`0f1d5f00 fffff801`58407f17 : 00000000`00000000 00000000`00000080 00000000`00000000 00000000`00000000 : nt!ExpQuerySystemInformation+0x112f
ffffee8b`0f1d6240 fffff801`5820f4f8 : 00000000`00100000 fffff801`580127d0 ffffad88`8e1b0000 00000000`33314d43 : nt!NtQuerySystemInformation+0x37
ffffee8b`0f1d6280 fffff801`58200880 : fffff804`686468ad ffffad88`8e1b0010 00000000`01000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
ffffee8b`0f1d6418 fffff804`686468ad : ffffad88`8e1b0010 00000000`01000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
ffffee8b`0f1d6420 ffffad88`8e1b0010 : 00000000`01000000 00000000`00000000 00000000`00000000 fffff801`587b7010 : EasyAntiCheat+0x468ad
ffffee8b`0f1d6428 00000000`01000000 : 00000000`00000000 00000000`00000000 fffff801`587b7010 fffff801`581f8830 : 0xffffad88`8e1b0010
ffffee8b`0f1d6430 00000000`00000000 : 00000000`00000000 fffff801`587b7010 fffff801`581f8830 ffffad88`9d3f2080 : 0x1000000
SYMBOL_NAME: EasyAntiCheat+468ad
MODULE_NAME: EasyAntiCheat
IMAGE_NAME: EasyAntiCheat.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 468ad
FAILURE_BUCKET_ID: AV_R_(null)_EasyAntiCheat!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {de037a2f-1007-fb78-fc0b-814c5461dfd3}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80666c0f657, Address of the instruction which caused the BugCheck
Arg3: ffffbb81540a7920, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4765
Key : Analysis.Elapsed.mSec
Value: 10442
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 858
Key : Analysis.Init.Elapsed.mSec
Value: 3270
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Failure.Bucket
Value: AV_nt!KiSystemServiceExit
Key : Failure.Hash
Value: {e3c619b5-09ee-208f-54b1-3554eb6fa478}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80666c0f657
BUGCHECK_P3: ffffbb81540a7920
BUGCHECK_P4: 0
FILE_IN_CAB: 052623-7671-01.dmp
CONTEXT: ffffbb81540a7920 -- (.cxr 0xffffbb81540a7920)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff910fc35e0080
rdx=000000007457624f rsi=0000001e603ff3d8 rdi=00000000000004d8
rip=fffff80666c0f657 rsp=ffff8085e6867480 rbp=ffff8085e6867500
r8=0000000000000000 r9=0000000000000087 r10=0000000000000000
r11=ffff910fc35e0080 r12=0000000000000000 r13=0000000000000000
r14=00000000000004d8 r15=00000000ffffffff
iopl=0 nv up di pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050046
nt!KiSystemServiceExit+0x157:
fffff806`66c0f657 0fae55ac ldmxcsr dword ptr [rbp-54h] ss:0018:ffff8085`e68674ac=0b001fa0
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AMDRSServ.exe
STACK_TEXT:
ffff8085`e6867480 00007ffb`c640d0e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x157
0000001e`603ff3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`c640d0e4
SYMBOL_NAME: nt!KiSystemServiceExit+157
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr 0xffffbb81540a7920 ; kb
BUCKET_ID_FUNC_OFFSET: 157
FAILURE_BUCKET_ID: AV_nt!KiSystemServiceExit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3c619b5-09ee-208f-54b1-3554eb6fa478}
Followup: MachineOwner
---------
* Daha önce böyle bir bugcheck görmedim açıkçası. Forumda konuları açılmış ancak net bir çözüme rastlanılamamış. Neyin sebebiyet verdiğini bilmediğimiz için genel çözümler uygulayacağız, adım adım takip edin ve hepsinin sonucunu paylaşın lütfen. BIOS ve RAM'den şüpheleniyorum bu arada. Özellikle XMP ile çalıştırıyorsanız.
* BIOS hala güncel değil. En azından ihtimallerden birini elemiş olursunuz.
* Anakartınızın BIOS sayfasında RAM ve genel performans ile alakalı stabilite güncellemeleri geldiği yazıyor. Kullandığınız AM5 platformu yeni bir platform, bu yüzden kalite ve stabilite güncellemeleri alıyor hâlâ. BIOS güncellemeleri bu sebeple kritik.
AMD Socket AM5: Supports AMD Ryzen™ 7000 Series Processors Q-Flash Plus: Update BIOS Without Installing the CPU, Memory and Graphics Card Smart Fan 6: Features Multiple Temperature Sensors, Hybrid Fan Headers with FAN STOP Dual Channel DDR5: 4*SMD DIMMs with AMD EXPO™ & Intel® XMP Memory Module...