Mackenzie41
Picopat
- Katılım
- 11 Ekim 2022
- Mesajlar
- 38
- Çözümler
- 1
Daha fazla
- Cinsiyet
- Erkek
- RAM
- 8 GB PNY 3000 MHZ RAM x Kingston Fury Beast RGB KF432C16BBA/8
- SSD veya HDD modeli
- BR J11 256GB 2.5" 550/520 MB/S SATA 3 SSD
- Ekran kartı
- Rx 480 8gb Sapphire
- Anakart
- ASUS B450M PRİME k
- İşlemci
- Ryzen 3 2200g
Merhaba bilgisayarımı her açtığımda günde 1 kere mavi ekran hatası alıyorum. Bu sorunun nedeni nedir minidumpda karşıma çıkan yazıları aşağıya ekledim.
Microsoft (r) Windows debugger version 10.0.25200.1003 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Windows\Minidump\043023-15109-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (4 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Machine name:
Kernel base = 0xfffff807`6ce00000 psloadedmodulelist = 0xfffff807`6da2a270
Debug session time: Sun apr 30 10:36:34.783 2023 (utc + 3:00)
System uptime: 0 days 0:01:40.465
Loading kernel symbols.
Press CTRL-C (cdb, kd, ntsd) or CTRL-break (WinDbg) to abort symbol loads that take too long.
Run! Sym noisy before. Reload to track down problems loading symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff807'6D1F90F0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffffd903'2E1a2990 = 000000000000000A.
3: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to Access'a pageable (or completely invalid) address at an.
İnterrupt request level (IRQL) that is too high. This is usually.
Caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000630000, Memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield:
Bit 0: Value 0 = read operation, 1 = write operation.
Bit 3: Value 0 = not an execute operation, 1 = execute operation (only on chips which Support this level of status)
Arg4: FffFF8076D05bd4e, address which referenced Memory.
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 2734.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 2744.
Key: Analysis. IO. Other. MB.
Value: 11.
Key: Analysis. IO. Read. MB.
Value: 0
Key: Analysis. IO. Write. MB.
Value: 20.
Key: Analysis. Init. CPU. Msec.
Value: 780.
Key: Analysis. Init. Elapsed. Msec.
Value: 30097.
Key: Analysis. Memory.commitpeak. MB.
Value: 84.
Key: Bugcheck. Code. Dumpheader.
Value: 0xa.
Key: Bugcheck. Code. Register.
Value: 0xa.
Key: Dump. Attributes. Asulong.
Value: 8
Key: Dump. Attributes. Kernelgeneratedtriagedump
Value: 1
Fıle_ın_cab: 043023-15109-01.dmp
Dump_fıle_attrıbutes: 0x8.
Kernel generated triage dump.
Bugcheck_code: A
Bugcheck_p1: 630000.
Bugcheck_p2: 2
Bugcheck_p3: 1
Bugcheck_p4: FffFF8076D05bd4e.
Wrıte_address: FffFF8076DAfb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
0000000000630000.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Trap_frame: FffFD9032E1a2ad0 -- (.trap 0xffffd9032e1a2ad0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 000000000000026C rbx = 0000000000000000 rcx = fffFD9032E1a2CC8.
Rdx = 0000000000630000 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8076D05bd4e rsp = FFFFD9032E1A2C60 rbp = FFFFD9032E1A2D49.
R8 = FFFF938000007000 R9 = 000000000000007C R10 = 0000000000156570.
R11 = FFFFD9032E1A2C60 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
NT! Kxwaitforlockownership+0Xe:
Fffff807'6D05BD4E 48890a mov qword ptr [rdx],rcx DS: 00000000'00630000=?
Resetting default scope.
Stack_text:
Ffffd903'2E1a2988 fffff807'6D20B069: 00000000'0000000A 00000000'00630000 00000000'00000002 00000000'00000001: NT! Kebugcheckex.
Ffffd903'2E1a2990 fffff807'6D207369: Ffff9080'04030800 fffff807'6D03ED0F ffff9380'00007000 00000000'00000001: NT! Kibugcheckdispatch+0x69
Ffffd903'2E1a2ad0 fffff807'6D05BD4E: 00000000'00000001 00000000'00000002 00000000'0015657C fffff807'6da50b40: NT! Kipagefault+0x469
Ffffd903'2E1a2C60 fffff807'6D0C0719: 00000000'00000000 00000000'00000000 ffffd903'2E1a2D49 ffff9080'04030740: NT! Kxwaitforlockownership+0Xe
Ffffd903'2E1a2C90 fffff807'6D0b7073: 00000000'0015657C fffff807'6da50b40 00000000'00000001 ffffd903'0000007C: NT! Miınsertpageınfreeorzeroedlist+0x839
Ffffd903'2E1a2dB0 fffff807'6D088832: Fffff807'6da4F100 fffff807'6D03BD46 00000000'00000080 ffffd903'00000000: NT! Mipfnsharecountıszero+0x5C3
Ffffd903'2E1a2e10 fffff807'6D167AF5: Fffff807'00000000 ffff9080'04030740 00000000'00000000 00000000'00000000: NT! Midecrementsharecount+0x52
Ffffd903'2E1a2E50 fffff807'6D51ADB4: 00000000'00000000 ffffd903'2E1a3329 00000000'00000001 ffff9a06'67bac190: NT! Misharepages+0x10D5
Ffffd903'2E1a3270 fffff807'6D51B427: 00000000'00000000 ffff9080'0C8D9bd0 00000000'00000080 00000000'00000001: NT! Miprocesscrclist+0x604
Ffffd903'2E1a3390 fffff807'6D51A554: 00000000'00000000 00000000'00000000 ffffd903'2E1a35C0 00000000'00000000: NT! Micombineallphysicalmemory+0x4e7
Ffffd903'2E1a34C0 fffff807'6D51A332: 00000000'0000000D 00000028'caeff750 00000000'00000000 00000000'00000002: NT! Micombineıdenticalpages+0x214
Ffffd903'2E1a3730 fffff807'6D450A3E: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Mmcombineıdenticalpages+0x42
Ffffd903'2E1a3770 fffff807'6D20AAB8: Ffff9a06'645DC000 00000000'00000000 ffffd903'2E1a3b80 00000000'00000000: NT! Ntsetsystemınformation+0x140e
Ffffd903'2E1a3b00 00007FFA'D1e305F4: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000028'caeff6D8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`d1e305f4
Symbol_name: NT! Kxwaitforlockownership+e
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.2130
Stack_command: Cxr. Ecxr; KB.
Bucket_ıd_func_offset: E
Faılure_bucket_ıd: Av_nt! Kxwaitforlockownership
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {724B07b1-4226-85FE-F372-16D33B9A3b93}
Followup: Machineowner.
---------
@claus hocam yardımcı olabilir misiniz?
Microsoft (r) Windows debugger version 10.0.25200.1003 AMD64.
Copyright (C) Microsoft Corporation. All rights reserved.
Loading dump file [C:\Windows\Minidump\043023-15109-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (4 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Machine name:
Kernel base = 0xfffff807`6ce00000 psloadedmodulelist = 0xfffff807`6da2a270
Debug session time: Sun apr 30 10:36:34.783 2023 (utc + 3:00)
System uptime: 0 days 0:01:40.465
Loading kernel symbols.
Press CTRL-C (cdb, kd, ntsd) or CTRL-break (WinDbg) to abort symbol loads that take too long.
Run! Sym noisy before. Reload to track down problems loading symbols.
Loading user symbols.
Loading unloaded module list.
For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff807'6D1F90F0 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffffd903'2E1a2990 = 000000000000000A.
3: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to Access'a pageable (or completely invalid) address at an.
İnterrupt request level (IRQL) that is too high. This is usually.
Caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000630000, Memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield:
Bit 0: Value 0 = read operation, 1 = write operation.
Bit 3: Value 0 = not an execute operation, 1 = execute operation (only on chips which Support this level of status)
Arg4: FffFF8076D05bd4e, address which referenced Memory.
Debugging details:
------------------
Key_values_strıng: 1
Key: Analysis. CPU. Msec.
Value: 2734.
Key: Analysis. Debuganalysismanager.
Value: Create.
Key: Analysis. Elapsed. Msec.
Value: 2744.
Key: Analysis. IO. Other. MB.
Value: 11.
Key: Analysis. IO. Read. MB.
Value: 0
Key: Analysis. IO. Write. MB.
Value: 20.
Key: Analysis. Init. CPU. Msec.
Value: 780.
Key: Analysis. Init. Elapsed. Msec.
Value: 30097.
Key: Analysis. Memory.commitpeak. MB.
Value: 84.
Key: Bugcheck. Code. Dumpheader.
Value: 0xa.
Key: Bugcheck. Code. Register.
Value: 0xa.
Key: Dump. Attributes. Asulong.
Value: 8
Key: Dump. Attributes. Kernelgeneratedtriagedump
Value: 1
Fıle_ın_cab: 043023-15109-01.dmp
Dump_fıle_attrıbutes: 0x8.
Kernel generated triage dump.
Bugcheck_code: A
Bugcheck_p1: 630000.
Bugcheck_p2: 2
Bugcheck_p3: 1
Bugcheck_p4: FffFF8076D05bd4e.
Wrıte_address: FffFF8076DAfb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
0000000000630000.
Blackboxbsd: 1 (!blackboxbsd)
Blackboxntfs: 1 (!blackboxntfs)
Blackboxwınlogon: 1
Customer_crash_count: 1
Process_name: svchost.exe
Trap_frame: FffFD9032E1a2ad0 -- (.trap 0xffffd9032e1a2ad0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 000000000000026C rbx = 0000000000000000 rcx = fffFD9032E1a2CC8.
Rdx = 0000000000630000 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8076D05bd4e rsp = FFFFD9032E1A2C60 rbp = FFFFD9032E1A2D49.
R8 = FFFF938000007000 R9 = 000000000000007C R10 = 0000000000156570.
R11 = FFFFD9032E1A2C60 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
NT! Kxwaitforlockownership+0Xe:
Fffff807'6D05BD4E 48890a mov qword ptr [rdx],rcx DS: 00000000'00630000=?
Resetting default scope.
Stack_text:
Ffffd903'2E1a2988 fffff807'6D20B069: 00000000'0000000A 00000000'00630000 00000000'00000002 00000000'00000001: NT! Kebugcheckex.
Ffffd903'2E1a2990 fffff807'6D207369: Ffff9080'04030800 fffff807'6D03ED0F ffff9380'00007000 00000000'00000001: NT! Kibugcheckdispatch+0x69
Ffffd903'2E1a2ad0 fffff807'6D05BD4E: 00000000'00000001 00000000'00000002 00000000'0015657C fffff807'6da50b40: NT! Kipagefault+0x469
Ffffd903'2E1a2C60 fffff807'6D0C0719: 00000000'00000000 00000000'00000000 ffffd903'2E1a2D49 ffff9080'04030740: NT! Kxwaitforlockownership+0Xe
Ffffd903'2E1a2C90 fffff807'6D0b7073: 00000000'0015657C fffff807'6da50b40 00000000'00000001 ffffd903'0000007C: NT! Miınsertpageınfreeorzeroedlist+0x839
Ffffd903'2E1a2dB0 fffff807'6D088832: Fffff807'6da4F100 fffff807'6D03BD46 00000000'00000080 ffffd903'00000000: NT! Mipfnsharecountıszero+0x5C3
Ffffd903'2E1a2e10 fffff807'6D167AF5: Fffff807'00000000 ffff9080'04030740 00000000'00000000 00000000'00000000: NT! Midecrementsharecount+0x52
Ffffd903'2E1a2E50 fffff807'6D51ADB4: 00000000'00000000 ffffd903'2E1a3329 00000000'00000001 ffff9a06'67bac190: NT! Misharepages+0x10D5
Ffffd903'2E1a3270 fffff807'6D51B427: 00000000'00000000 ffff9080'0C8D9bd0 00000000'00000080 00000000'00000001: NT! Miprocesscrclist+0x604
Ffffd903'2E1a3390 fffff807'6D51A554: 00000000'00000000 00000000'00000000 ffffd903'2E1a35C0 00000000'00000000: NT! Micombineallphysicalmemory+0x4e7
Ffffd903'2E1a34C0 fffff807'6D51A332: 00000000'0000000D 00000028'caeff750 00000000'00000000 00000000'00000002: NT! Micombineıdenticalpages+0x214
Ffffd903'2E1a3730 fffff807'6D450A3E: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Mmcombineıdenticalpages+0x42
Ffffd903'2E1a3770 fffff807'6D20AAB8: Ffff9a06'645DC000 00000000'00000000 ffffd903'2E1a3b80 00000000'00000000: NT! Ntsetsystemınformation+0x140e
Ffffd903'2E1a3b00 00007FFA'D1e305F4: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000028'caeff6D8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`d1e305f4
Symbol_name: NT! Kxwaitforlockownership+e
Module_name: NT.
Image_name: ntkrnlmp.exe
Image_versıon: 10.0.19041.2130
Stack_command: Cxr. Ecxr; KB.
Bucket_ıd_func_offset: E
Faılure_bucket_ıd: Av_nt! Kxwaitforlockownership
Osplatform_type: X64.
Osname: Windows 10.
Faılure_ıd_hash: {724B07b1-4226-85FE-F372-16D33B9A3b93}
Followup: Machineowner.
---------
@claus hocam yardımcı olabilir misiniz?
Son düzenleyen: Moderatör: