Son kullanma tarihi geçmiş, bayatlamış bir tarayıcı kullanıyorsanız, Mercedes kullanmak yerine tosbağaya binmek gibi... Web sitelerini düzgün görüntüleyemiyorsanız eh, bi' zahmet tarayıcınızı güncelleyiniz. Modern Web standartlarını karşılayan bir tarayıcı alternatifine göz atın.
Sürekli Google üzerinden video izlerken (YouTube'da) veya film falan izlerken (Chrome üzerinden yine) mavi ekran hatası alıyorum.
(Minidump Dosyası linki) işlemci ve anakartı servise gönderdim bir şey çıkmadı.
Maalesef mavi ekran almam çok sayıda azaldı ama hala alıyorum haftada 3 bazen hiç, bu konuyu açtığım zamanlarda 15 20'şer dakikada 1 hata alıyordum Google'dan YouTube'dan video vs izleyemiyordum.
Sistemi DDR5'e geçirme kararı verdim zaten anakart ve işlemci kaynaklı bir problem olduğunu düşünüyordum ve bu yükseltme sonrası mavi ekran sorunun ortadan kalktı bu tarz sorunu olan bir arkadaş varsa (oyun açıkken mavi ekran yemeyip PC boştayken ya da basit işler için kullanılırken sürekli mavi ekran yiyorsa) bu 2 parçadan birinden şüphelenebilirler.
Bende de aynı şey daha dün oldu ama başka bir şekilde. Ekrandaki görüntü vs. bozuldu. Ama virüs değildi GPU'yu 3 saat durmadan 100% çalıştıracak bir uygulama çalıştırdığım için muhtemelen yüksek ısıdan veya o programdaki hata.
Belki de eğer fazla ısındıysa zarar görmüş olabilir. Dediğimiz gibi emojinin altında yazanı bize aktarabilirseniz veya direk mavi ekranı aktarabilirseniz daha kolay yardımcı oluruz. Şu an bir sürü ihtimal var.
Arkadaşlar Öncelikle Teşekkürler Yardımlarınız İçin teşekkür ederim öncelikle Sistemi 0 Topladım Yani Herhangi Bir Upgrade yapmadım bir tek sonradan SSD aldım fakat SSD almadan önce de hata veriyordu performanstan yana sıkıntım yok tek kötü yanı dediğim gibi Chrome üzerindeyken alıyorum %99 oyun oynarken veya performans testlerindeyken bir sıkıntı yok (işletim sistemi kurarken de vermişti önceden ondan 7 8 kere baştan kurarak yapmayı denedim şuanki kullandığımda vermeden kurdum)
(Bir de ek olarak HDD'den kaynaklı düşünebilirsiniz HDD takılı değilken sadece SSD takılıyken de hata alıyordum yani depolama birimleri ayrı ayrı takılıyken de aynı anda takılıyken de mavi ekran alıyorum)
Hata Kodları; / IRQL_NOT_LESS_OR_EQUAL / KMODE_EXCEPTION_NOT_HANDLED / IRQL_NOT_LESS_OR_EQUAL en son aldığım hatada kod bildirilmiyor (BlueScreenView üzerinden)
Arkadaşlar şimdi WinDbg Preview diye bir program ile kontrol ediyorum tahminlerimde RAM veya ekran kartı vardı WinDbg Preview'den 1 dump dosyasına baktım ondaki hatayada bu 2 parçadan 1'i neden oluyormuş yarın diğer 4 dosyaya bakacağım ona göre karar verip parçayı servise göndereceğim
Arkadaşlar sorun ekran kartında olduğunu düşünüyorum şimdi hatırladım Memtest86 programı ile birkaçsaatlik test ettim ve sorun olmamıştı herhangi bir hata vermemişti yine de diğer dump dosyalarını WinDbg Preview ile kontrol edeceğim.
Arkadaşlar RAM'leri Windows aracılığıyla tekrar test ettim sorun çıkmadı. Yakın zamanda ekran kartını servise göndereceğim ona göre sizlere bildiririm düzelip düzelmediğini. Yardımlarınızdan dolayı teşekkür ederim.
Yakın zamanda işlemci ve başka önemli bir parçayı değiştirdiysen Driver uyuşmazlığından da olabiliyor. Mavi ekran çıktığında genelde üzgün emojisinin altında ne olduğu yazar. Bir dahakine oraya bakıp buraya yazarsan daha kolay çözüm buluruz.
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...
www.technopat.net
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe80963ad4460, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000009e, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031a6cbd9c, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7171
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe80963ad4460
BUGCHECK_P2: ff
BUGCHECK_P3: 9e
BUGCHECK_P4: fffff8031a6cbd9c
READ_ADDRESS: fffff8031b0fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe80963ad4460
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8a8241629960 -- (.trap 0xffff8a8241629960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
Resetting default scope
STACK_TEXT:
ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PoIdle+fc
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fc
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PoIdle
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e4da1044-dba7-2394-a0c7-af0e27cae716}
Followup: MachineOwner
---------
1: kd> .bugcheck
Bugcheck code 0000000A
Arguments ffffe809`63ad4460 00000000`000000ff 00000000`0000009e fffff803`1a6cbd9c
1: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
03 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> kv
# Child-SP RetAddr : Args to Child : Call Site
00 ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469 (TrapFrame @ ffff8a82`41629960)
03 ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> .trap ffff8a82`41629960
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80330accb61, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 000000000000031c, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9514
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80330accb61
BUGCHECK_P3: 1
BUGCHECK_P4: 31c
WRITE_ADDRESS: fffff803314fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000031c
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 000000000000031c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8033666b590 -- (.trap 0xfffff8033666b590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330b84ee0 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80330accb61 rsp=fffff8033666b720 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=00000000ffffffff
r11=ffff917e69c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!PpmIdleExecuteTransition+0x9d1:
fffff803`30accb61 899e1c030000 mov dword ptr [rsi+31Ch],ebx ds:00000000`0000031c=????????
Resetting default scope
STACK_TEXT:
fffff803`3666a558 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
fffff803`3666a560 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff803`3666a5a0 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
fffff803`3666a5d0 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
fffff803`3666acf0 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
fffff803`3666b3b0 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
fffff803`3666b590 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
fffff803`3666b720 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
fffff803`3666baf0 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
fffff803`3666bc60 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdleExecuteTransition+9d1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9d1
FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!PpmIdleExecuteTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {33165129-5eba-df70-5004-10486d097d7a}
Followup: MachineOwner
---------
0: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
01 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
02 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
03 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
04 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
05 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
06 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
07 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
08 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
09 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff9f8625e57080, The address of the thread.
Arg2: ffffce8e811b3b80, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4717
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffff9f8625e57080
BUGCHECK_P2: ffffce8e811b3b80
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
STACK_TEXT:
ffffc68b`b986f558 fffff807`1f425a7b : 00000000`00000192 ffff9f86`25e57080 ffffce8e`811b3b80 00000000`00000000 : nt!KeBugCheckEx
ffffc68b`b986f560 fffff807`1f7f35e2 : 00000000`00000000 ffff9f86`25b24230 ffffce8e`00000000 ffff9f86`25b24230 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffc68b`b986f5a0 fffff807`1f81350d : ffff9f86`1b010340 ffff9f86`1b012900 ffff9f86`1b015d80 00000000`00000080 : nt!ObpCreateHandle+0x3f2
ffffc68b`b986f790 fffff807`1f812741 : 00000000`00000001 ffffc68b`b986fb80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x13d
ffffc68b`b986fa20 fffff807`1f5ef478 : ffff9f86`25e57080 000000b6`c2dff978 ffffc68b`b986faa8 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffc68b`b986fa90 00007ffb`b5eeb694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`c2dff958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b5eeb694
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+14b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14b
FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80676436c74, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6228
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80676436c74
READ_ADDRESS: fffff80676efa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000001
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80679c6b6a0 -- (.trap 0xfffff80679c6b6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676436c74 rsp=fffff80679c6b830 rbp=0000000000000001
r8=0000000000000102 r9=0000000000000000 r10=fffff80671b27ac0
r11=0000000f8dcdabea r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTimerWaitTest+0x1c4:
fffff806`76436c74 4d8b36 mov r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff806`79c6b558 fffff806`765ef929 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`79c6b560 fffff806`765ebc29 : fffff806`79c6b6b8 00000000`00000018 fffff806`76551a00 fffff806`84d41101 : nt!KiBugCheckDispatch+0x69
fffff806`79c6b6a0 fffff806`76436c74 : ffffc80a`b2b0c408 00000000`00000000 ffffc80a`b2b0c4d0 00000000`00000000 : nt!KiPageFault+0x469
fffff806`79c6b830 fffff806`7643683c : ffffc80a`b2b0c400 00000000`00000000 fffff806`79c6bb18 00000000`00000000 : nt!KiTimerWaitTest+0x1c4
fffff806`79c6b8e0 fffff806`7643a169 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003e38b : nt!KiProcessExpiredTimerList+0xdc
fffff806`79c6b9d0 fffff806`765e158e : 00000000`00000000 fffff806`71b24180 fffff806`76f26600 ffffc80a`b6a22080 : nt!KiRetireDpcList+0x9d9
fffff806`79c6bc60 00000000`00000000 : fffff806`79c6c000 fffff806`79c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+1c4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c4
FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}
Followup: MachineOwner
---------
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...
www.technopat.net
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe80963ad4460, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000009e, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031a6cbd9c, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3608
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7171
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe80963ad4460
BUGCHECK_P2: ff
BUGCHECK_P3: 9e
BUGCHECK_P4: fffff8031a6cbd9c
READ_ADDRESS: fffff8031b0fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe80963ad4460
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8a8241629960 -- (.trap 0xffff8a8241629960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
Resetting default scope
STACK_TEXT:
ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PoIdle+fc
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fc
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PoIdle
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e4da1044-dba7-2394-a0c7-af0e27cae716}
Followup: MachineOwner
---------
1: kd> .bugcheck
Bugcheck code 0000000A
Arguments ffffe809`63ad4460 00000000`000000ff 00000000`0000009e fffff803`1a6cbd9c
1: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469
03 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> kv
# Child-SP RetAddr : Args to Child : Call Site
00 ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx
01 ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69
02 ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469 (TrapFrame @ ffff8a82`41629960)
03 ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc
04 ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
1: kd> .trap ffff8a82`41629960
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na pe nc
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80330accb61, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 000000000000031c, Parameter 1 of the exception
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6202
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9514
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80330accb61
BUGCHECK_P3: 1
BUGCHECK_P4: 31c
WRITE_ADDRESS: fffff803314fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
000000000000031c
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 000000000000031c
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff8033666b590 -- (.trap 0xfffff8033666b590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330b84ee0 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80330accb61 rsp=fffff8033666b720 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=00000000ffffffff
r11=ffff917e69c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!PpmIdleExecuteTransition+0x9d1:
fffff803`30accb61 899e1c030000 mov dword ptr [rsi+31Ch],ebx ds:00000000`0000031c=????????
Resetting default scope
STACK_TEXT:
fffff803`3666a558 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
fffff803`3666a560 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
fffff803`3666a5a0 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
fffff803`3666a5d0 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
fffff803`3666acf0 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
fffff803`3666b3b0 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
fffff803`3666b590 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
fffff803`3666b720 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
fffff803`3666baf0 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
fffff803`3666bc60 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PpmIdleExecuteTransition+9d1
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9d1
FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!PpmIdleExecuteTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {33165129-5eba-df70-5004-10486d097d7a}
Followup: MachineOwner
---------
0: kd> kb
# RetAddr : Args to Child : Call Site
00 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx
01 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22
02 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12
03 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297
04 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186
05 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c
06 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443
07 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1
08 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374
09 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
above.
Arguments:
Arg1: ffff9f8625e57080, The address of the thread.
Arg2: ffffce8e811b3b80, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4717
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 192
BUGCHECK_P1: ffff9f8625e57080
BUGCHECK_P2: ffffce8e811b3b80
BUGCHECK_P3: 0
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
STACK_TEXT:
ffffc68b`b986f558 fffff807`1f425a7b : 00000000`00000192 ffff9f86`25e57080 ffffce8e`811b3b80 00000000`00000000 : nt!KeBugCheckEx
ffffc68b`b986f560 fffff807`1f7f35e2 : 00000000`00000000 ffff9f86`25b24230 ffffce8e`00000000 ffff9f86`25b24230 : nt!ExAcquirePushLockExclusiveEx+0x14b
ffffc68b`b986f5a0 fffff807`1f81350d : ffff9f86`1b010340 ffff9f86`1b012900 ffff9f86`1b015d80 00000000`00000080 : nt!ObpCreateHandle+0x3f2
ffffc68b`b986f790 fffff807`1f812741 : 00000000`00000001 ffffc68b`b986fb80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x13d
ffffc68b`b986fa20 fffff807`1f5ef478 : ffff9f86`25e57080 000000b6`c2dff978 ffffc68b`b986faa8 00000000`00000000 : nt!NtCreateEvent+0xe1
ffffc68b`b986fa90 00007ffb`b5eeb694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000b6`c2dff958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b5eeb694
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+14b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.388
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14b
FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80676436c74, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6228
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 1
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80676436c74
READ_ADDRESS: fffff80676efa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000001
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff80679c6b6a0 -- (.trap 0xfffff80679c6b6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676436c74 rsp=fffff80679c6b830 rbp=0000000000000001
r8=0000000000000102 r9=0000000000000000 r10=fffff80671b27ac0
r11=0000000f8dcdabea r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiTimerWaitTest+0x1c4:
fffff806`76436c74 4d8b36 mov r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff806`79c6b558 fffff806`765ef929 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`79c6b560 fffff806`765ebc29 : fffff806`79c6b6b8 00000000`00000018 fffff806`76551a00 fffff806`84d41101 : nt!KiBugCheckDispatch+0x69
fffff806`79c6b6a0 fffff806`76436c74 : ffffc80a`b2b0c408 00000000`00000000 ffffc80a`b2b0c4d0 00000000`00000000 : nt!KiPageFault+0x469
fffff806`79c6b830 fffff806`7643683c : ffffc80a`b2b0c400 00000000`00000000 fffff806`79c6bb18 00000000`00000000 : nt!KiTimerWaitTest+0x1c4
fffff806`79c6b8e0 fffff806`7643a169 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003e38b : nt!KiProcessExpiredTimerList+0xdc
fffff806`79c6b9d0 fffff806`765e158e : 00000000`00000000 fffff806`71b24180 fffff806`76f26600 ffffc80a`b6a22080 : nt!KiRetireDpcList+0x9d9
fffff806`79c6bc60 00000000`00000000 : fffff806`79c6c000 fffff806`79c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!KiTimerWaitTest+1c4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.329
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1c4
FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}
Followup: MachineOwner
---------
[/QUOTE]
(Öncelikle her kelimenin baş harfini büyük yazmam alışkanlık olmuş bende her şeyde böyle yazıyorum o yüzden kusura bakmayın dikkat edeceğim)
Anakart modelim MSI B450 Tomahawk
BIOS sürüm / 7C02V1E
XMP Kapalı benim şüphelendiğim RAM ile ekran kartıydı ve haklı çıktım Windbg Preview (sizin en son videonuz aracılığıyla öğrendiğim program) üzerinden kontrol edince, RAM'leri Windows'un bellek tanılama testini yaptım (birkaç ay önceden de yapmıştım)
Sorun çıkmadı yine Memtest 86 testi yapmıştım (birkaç ay önce, en kapsamlı test ile birkaç saat test edildi) ondanda bir hata sonucu almamıştım bundan dolayı ekran kartımdan şüpheleniyorum
Ayrıca konumu görüp yardım etmenize ayrı bir mutlu oldum çok teşekkür ederim
Şimdi eve geldim bellek tanılama sonuçlarını atayım bide telefonda bulursam birkaç ay önce yaptığım memtest 86 test sonucunu bulayım
Bellek tanılama sonucu
Günlük Adı: System
Kaynak: Microsoft-Windows-MemoryDiagnostics-Results
Tarih: 24.07.2020 13:29:17
Olay Kimliği: 1101
Görev Kategorisi:Yok
Düzey: Bilgi
Anahtar sözcükler:
Kullanıcı: SYSTEM
Bilgisayar: DESKTOP-RP9LE0O
Açıklama:
Günlük Adı: System
Kaynak: Microsoft-Windows-MemoryDiagnostics-Results
Tarih: 24.07.2020 13:29:17
Olay Kimliği: 1101
Görev Kategorisi:Yok
Düzey: Bilgi
Anahtar sözcükler:
Kullanıcı: SYSTEM
Bilgisayar: DESKTOP-RP9LE0O
Açıklama:
The Windows Memory Diagnostic tested the computer's memory and detected no errors
Olay Xml'si:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
<System>
<Provider Name="Microsoft-Windows-MemoryDiagnostics-Results" Guid="{5f92bc59-248f-4111-86a9-e393e12c6139}" />
<EventID>1101</EventID>
<Version>0</Version>
<Level>4</Level>
<Task>0</Task>
<Opcode>0</Opcode>
<Keywords>0x8000000000000000</Keywords>
<TimeCreated SystemTime="2020-07-24T10:29:17.0673302Z" />
<EventRecordID>3581</EventRecordID>
<Correlation />
<Execution ProcessID="7220" ThreadID="7224" />
<Channel>System</Channel>
<Computer>DESKTOP-RP9LE0O</Computer>
<Security UserID="S-1-5-18" />
</System>
<UserData>
<Results xmlns="http://manifests.microsoft.com/win/2005/08/windows/Reliability/Postboot/Events">
<LaunchType>Manual</LaunchType>
<CompletionType>Pass</CompletionType>
<MemorySize>16333</MemorySize>
<TestType>10</TestType>
<TestDuration>1903</TestDuration>
<TestCount>12</TestCount>
<NumPagesTested>4156536</NumPagesTested>
<NumPagesUnTested>1731</NumPagesUnTested>
<NumBadPages>0</NumBadPages>
<T1NumBadPages>0</T1NumBadPages>
<T2NumBadPages>0</T2NumBadPages>
<T3NumBadPages>0</T3NumBadPages>
<T4NumBadPages>0</T4NumBadPages>
<T5NumBadPages>0</T5NumBadPages>
<T6NumBadPages>0</T6NumBadPages>
<T7NumBadPages>0</T7NumBadPages>
<T8NumBadPages>0</T8NumBadPages>
<T9NumBadPages>0</T9NumBadPages>
<T10NumBadPages>0</T10NumBadPages>
<T11NumBadPages>0</T11NumBadPages>
<T12NumBadPages>0</T12NumBadPages>
<T13NumBadPages>0</T13NumBadPages>
<T14NumBadPages>0</T14NumBadPages>
<T15NumBadPages>0</T15NumBadPages>
<T16NumBadPages>0</T16NumBadPages>
</Results>
</UserData>
</Event>
-----------------------------------
Memtest86 elimde bulunan screenshot
(bu testi yaptığım zamanlarda xmp açık olabilir)(bilgisayarı toplam 6 7 kere format atmam gerekti çünkü windows kurarkende hata veriyordu zor bela hata vermeden 1 kez kurdum win 10 pro ondan sonrada tekrar home kurdum bu test pro versiyonundayken olabilir)(yaklaşık 2- 3 kere memtest86 testi yapmıştım en kapsamlısı bu olmak üzere diğerlerindede bundada bir hata görmedim)
Yeni daha fazla hatanın neden olduğu kaynağı bulmak için youtubede zaman geçiriyorum ve memory_management hatası aldım preview sonuçları
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`40600000 PsLoadedModuleList = 0xfffff806`4122a310
Debug session time: Sat Jul 25 15:03:01.235 2020 (UTC + 3:00)
System Uptime: 0 days 1:20:18.942
Loading Kernel Symbols
...............................................................
....Page 385364 not present in the dump file. Type ".hh dbgerr004" for details
............................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000bc`93c75018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`409ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff9f04`2d9f5960=000000000000001a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 0000028931e77000
Arg3: 000000000000000f
Arg4: ffff9f042d9f5b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O
Followup: MachineOwner
---------
Sorunun neyden kaynaklandığını hala anlayabilmiş değilim yardımlarınızı bekliyorum
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`23000000 PsLoadedModuleList = 0xfffff803`23c2a310
Debug session time: Sat Jul 25 16:25:57.428 2020 (UTC + 3:00)
System Uptime: 0 days 1:22:28.078
Loading Kernel Symbols
...............................................................
.....Page 13dc4e not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
...............................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`233ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8804`44c29350=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff803232cd92e, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80333c2bd22, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2687
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffff880444c29490 -- (.trap 0xffff880444c29490)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000085ded25366 rbx=0000000000000000 rcx=0000008511100e78
rdx=0000008c0b11ad1b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80333c2bd22 rsp=ffff880444c29620 rbp=ffff880444c29650
r8=0000000000000000 r9=00000000000000e8 r10=ffffa88253598578
r11=ffffa88253598578 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac po nc
amdppm+0xbd22:
fffff803`33c2bd22 488906 mov qword ptr [rsi],rax ds:00000000`00000000=????????????????
Resetting default scope
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\072520-9578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`29800000 PsLoadedModuleList = 0xfffff805`2a42a310
Debug session time: Sat Jul 25 16:34:44.317 2020 (UTC + 3:00)
System Uptime: 0 days 0:08:17.968
Loading Kernel Symbols
...............................................................
................................................................
..............................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`29bddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd484`7d140770=0000000000000139
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001e, Type of memory safety violation
Arg2: ffffd4847d140a90, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd4847d1409e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2843
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O
TRAP_FRAME: ffffd4847d140a90 -- (.trap 0xffffd4847d140a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=000000000000001e
rdx=fffff8052a4fcc80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80529c629d3 rsp=ffffd4847d140c20 rbp=ffffd680912d5180
r8=0000000000000000 r9=ffffd4847d140fb0 r10=0000000000000000
r11=000000000000001a r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeQueryValuesThread+0x17e703:
fffff805`29c629d3 cd29 int 29h
Resetting default scope
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
Xmp yi açacağım sırada fark ettim ram 2 kere hata vermiş normaldede böyle problemler olabilir mi?
Bunlar bugün yaşadığım mavi ekran hataları minidumps
hepsine preview baktım
bide xmp yi açmamın üstüne mavi ekran hataları kat kat hızlandı normalde 2 saatlik bir videoda 2 kere veriyorken bu yazıyı yazmamın daha 2 cümlesinde hata verdi hep kernel ile ilgili hatalar veriyor yardımlarınızı bekliyorum yoksa aldığım günden beri kafayı yiyeceğim minidumpson
buda üsteki yazıyı yazarken aldığım hata belki bir ipucu kaynağı olur diğe
linkleri bulamayanlara kapalı parantezle belirteyim
(minidumps)
( minidumpson )
Xmp yi açtıktan sonra ciddi bir şekilde mavi ekran hataları arttı normalde pc direk hata verirken şimdi donuyor ve uzun bir süre bekletiyor bende mecburen düğmeden kapatıyorum
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...
www.technopat.net
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe80963ad4460, memory referenced.
Arg2: 00000000000000ff, IRQL.
Arg3: 000000000000009e, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8031a6cbd9c, address which referenced memory.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys.
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 3608.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 7171.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: a.
BUGCHECK_P1: ffffe80963ad4460.
BUGCHECK_P2: ff.
BUGCHECK_P3: 9e.
BUGCHECK_P4: fffff8031a6cbd9c.
READ_ADDRESS: fffff8031b0fa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock.
fffff8031b00f2a8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
ffffe80963ad4460.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: System.
TRAP_FRAME: ffff8a8241629960 -- (.trap 0xffff8a8241629960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000.
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0.
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010.
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di ng nz na pe nc.
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
Resetting default scope.
STACK_TEXT:
ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx.
ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69.
ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469.
ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc.
ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
SYMBOL_NAME: nt!PoIdle+fc.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.329.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: fc.
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PoIdle.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {e4da1044-dba7-2394-a0c7-af0e27cae716}
Followup: MachineOwner.
---------
1: kd> .bugcheck.
Bugcheck code 0000000A.
Arguments ffffe809`63ad4460 00000000`000000ff 00000000`0000009e fffff803`1a6cbd9c.
1: kd> kb.
# RetAddr : Args to Child : Call Site.
00 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx.
01 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69.
02 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469.
03 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc.
04 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
1: kd> kv.
# Child-SP RetAddr : Args to Child : Call Site.
00 ffff8a82`41629818 fffff803`1a7ef929 : 00000000`0000000a ffffe809`63ad4460 00000000`000000ff 00000000`0000009e : nt!KeBugCheckEx.
01 ffff8a82`41629820 fffff803`1a7ebc29 : ffffe70f`63304010 ffffffff`ffffffff ffffffff`f75e7aa7 ffffe70f`633041f8 : nt!KiBugCheckDispatch+0x69.
02 ffff8a82`41629960 fffff803`1a6cbd9c : 00000000`00000000 00001fa0`009e0080 00000000`06320000 00000000`00000004 : nt!KiPageFault+0x469 (TrapFrame @ ffff8a82`41629960)
03 ffff8a82`41629af0 fffff803`1a7e1544 : ffffffff`00000000 ffffd700`4d9ed340 ffffe70f`7e210080 00000000`000004ec : nt!PoIdle+0xfc.
04 ffff8a82`41629c60 00000000`00000000 : ffff8a82`4162a000 ffff8a82`41624000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
1: kd> .trap ffff8a82`41629960.
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000040002000 rbx=0000000000000000 rcx=0000000000000000.
rdx=fffff8031b01ed00 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8031a6cbd9c rsp=ffff8a8241629af0 rbp=ffff8a8241629bf0.
r8=0000000000002715 r9=ffffe80963ad4438 r10=ffffe70f63304010.
r11=ffffc6fb9ec00000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up di ng nz na pe nc.
nt!PoIdle+0xfc:
fffff803`1a6cbd9c 4d014128 add qword ptr [r9+28h],r8 ds:ffffe809`63ad4460=????????????????
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints.
the driver/function that caused the problem. Always note this address.
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled.
Arg2: fffff80330accb61, The address that the exception occurred at.
Arg3: 0000000000000001, Parameter 0 of the exception.
Arg4: 000000000000031c, Parameter 1 of the exception.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys.
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 6202.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 9514.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 1e.
BUGCHECK_P1: ffffffffc0000005.
BUGCHECK_P2: fffff80330accb61.
BUGCHECK_P3: 1.
BUGCHECK_P4: 31c.
WRITE_ADDRESS: fffff803314fa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock.
fffff8033140f2a8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
000000000000031c.
EXCEPTION_PARAMETER1: 0000000000000001.
EXCEPTION_PARAMETER2: 000000000000031c.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: System.
TRAP_FRAME: fffff8033666b590 -- (.trap 0xfffff8033666b590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80330b84ee0 rbx=0000000000000000 rcx=0000000000000001.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80330accb61 rsp=fffff8033666b720 rbp=0000000000000000.
r8=0000000000000000 r9=0000000000000001 r10=00000000ffffffff.
r11=ffff917e69c00000 r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!PpmIdleExecuteTransition+0x9d1:
fffff803`30accb61 899e1c030000 mov dword ptr [rsi+31Ch],ebx ds:00000000`0000031c=????????
Resetting default scope.
STACK_TEXT:
fffff803`3666a558 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx.
fffff803`3666a560 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22.
fffff803`3666a5a0 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12.
fffff803`3666a5d0 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297.
fffff803`3666acf0 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186.
fffff803`3666b3b0 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c.
fffff803`3666b590 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443.
fffff803`3666b720 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1.
fffff803`3666baf0 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374.
fffff803`3666bc60 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
SYMBOL_NAME: nt!PpmIdleExecuteTransition+9d1.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.329.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 9d1.
FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!PpmIdleExecuteTransition.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {33165129-5eba-df70-5004-10486d097d7a}
Followup: MachineOwner.
---------
0: kd> kb.
# RetAddr : Args to Child : Call Site.
00 fffff803`30d00c3e : 00000000`0000001e ffffffff`c0000005 fffff803`30accb61 00000000`00000001 : nt!KeBugCheckEx.
01 fffff803`30be68e2 : fffff803`30d00c1c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HvlpVtlCallExceptionHandler+0x22.
02 fffff803`30a32fb7 : fffff803`3666ab10 00000000`00000000 fffff803`3666bc60 fffff803`30be1544 : nt!RtlpExecuteHandlerForException+0x12.
03 fffff803`30a7b226 : fffff803`3666b4e8 fffff803`3666b220 fffff803`3666b4e8 fffff803`2e567180 : nt!RtlDispatchException+0x297.
04 fffff803`30befa6c : fffff803`3666b610 00000000`00001000 fffff803`3666b590 ffff8000`00000000 : nt!KiDispatchException+0x186.
05 fffff803`30bebc03 : 00000000`00000000 00000000`00000000 464a36ec`a5279b69 e58e5ccf`bce59db2 : nt!KiExceptionDispatch+0x12c.
06 fffff803`30accb61 : 00005548`a8ace8e4 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x443.
07 fffff803`30acc014 : 00000000`00000000 00000000`00000000 00000048`063200e6 00000000`00000004 : nt!PpmIdleExecuteTransition+0x9d1.
08 fffff803`30be1544 : 00000000`00000000 fffff803`31526600 ffffb281`708c8080 00000000`0000021c : nt!PoIdle+0x374.
09 00000000`00000000 : fffff803`3666c000 fffff803`36666000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54.
KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or.
above.
Arguments:
Arg1: ffff9f8625e57080, The address of the thread.
Arg2: ffffce8e811b3b80, The lock address.
Arg3: 0000000000000000, The IRQL at which the lock was acquired.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 3234.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 4717.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 76.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: 192.
BUGCHECK_P1: ffff9f8625e57080.
BUGCHECK_P2: ffffce8e811b3b80.
BUGCHECK_P3: 0.
BUGCHECK_P4: 0.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: nvcontainer.exe.
STACK_TEXT:
ffffc68b`b986f558 fffff807`1f425a7b : 00000000`00000192 ffff9f86`25e57080 ffffce8e`811b3b80 00000000`00000000 : nt!KeBugCheckEx.
ffffc68b`b986f560 fffff807`1f7f35e2 : 00000000`00000000 ffff9f86`25b24230 ffffce8e`00000000 ffff9f86`25b24230 : nt!ExAcquirePushLockExclusiveEx+0x14b.
ffffc68b`b986f5a0 fffff807`1f81350d : ffff9f86`1b010340 ffff9f86`1b012900 ffff9f86`1b015d80 00000000`00000080 : nt!ObpCreateHandle+0x3f2.
ffffc68b`b986f790 fffff807`1f812741 : 00000000`00000001 ffffc68b`b986fb80 00000000`00000001 00000000`00000001 : nt!ObInsertObjectEx+0x13d.
ffffc68b`b986fa20 fffff807`1f5ef478 : ffff9f86`25e57080 000000b6`c2dff978 ffffc68b`b986faa8 00000000`00000000 : nt!NtCreateEvent+0xe1.
ffffc68b`b986fa90 00007ffb`b5eeb694 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
000000b6`c2dff958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b5eeb694.
SYMBOL_NAME: nt!ExAcquirePushLockExclusiveEx+14b.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.388.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 14b.
FAILURE_BUCKET_ID: 0x192_nt!ExAcquirePushLockExclusiveEx.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {70f07b19-205c-f6b9-7ad5-00ec20680212}
Followup: MachineOwner.
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation.
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80676436c74, address which referenced memory.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys.
KEY_VALUES_STRING: 1.
Key : Analysis.CPU.mSec.
Value: 3624.
Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-1IBQR0U.
Key : Analysis.DebugData.
Value: CreateObject.
Key : Analysis.DebugModel.
Value: CreateObject.
Key : Analysis.Elapsed.mSec.
Value: 6228.
Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.
Key : Analysis.System.
Value: CreateObject.
Key : WER.OS.Branch.
Value: vb_release.
Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.
Key : WER.OS.Version.
Value: 10.0.19041.1.
ADDITIONAL_XML: 1.
OS_BUILD_LAYERS: 1.
BUGCHECK_CODE: a.
BUGCHECK_P1: 1.
BUGCHECK_P2: 2.
BUGCHECK_P3: 0.
BUGCHECK_P4: fffff80676436c74.
READ_ADDRESS: fffff80676efa388: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock.
fffff80676e0f2a8: Unable to get Flags value from nt!KdVersionBlock.
unable to get nt!MmSpecialPagesInUse.
0000000000000001.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1.
CUSTOMER_CRASH_COUNT: 1.
PROCESS_NAME: System.
TRAP_FRAME: fffff80679c6b6a0 -- (.trap 0xfffff80679c6b6a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002.
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff80676436c74 rsp=fffff80679c6b830 rbp=0000000000000001.
r8=0000000000000102 r9=0000000000000000 r10=fffff80671b27ac0.
r11=0000000f8dcdabea r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei pl zr na po nc.
nt!KiTimerWaitTest+0x1c4:
fffff806`76436c74 4d8b36 mov r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope.
STACK_TEXT:
fffff806`79c6b558 fffff806`765ef929 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx.
fffff806`79c6b560 fffff806`765ebc29 : fffff806`79c6b6b8 00000000`00000018 fffff806`76551a00 fffff806`84d41101 : nt!KiBugCheckDispatch+0x69.
fffff806`79c6b6a0 fffff806`76436c74 : ffffc80a`b2b0c408 00000000`00000000 ffffc80a`b2b0c4d0 00000000`00000000 : nt!KiPageFault+0x469.
fffff806`79c6b830 fffff806`7643683c : ffffc80a`b2b0c400 00000000`00000000 fffff806`79c6bb18 00000000`00000000 : nt!KiTimerWaitTest+0x1c4.
fffff806`79c6b8e0 fffff806`7643a169 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`0003e38b : nt!KiProcessExpiredTimerList+0xdc.
fffff806`79c6b9d0 fffff806`765e158e : 00000000`00000000 fffff806`71b24180 fffff806`76f26600 ffffc80a`b6a22080 : nt!KiRetireDpcList+0x9d9.
fffff806`79c6bc60 00000000`00000000 : fffff806`79c6c000 fffff806`79c66000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e.
SYMBOL_NAME: nt!KiTimerWaitTest+1c4.
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe.
IMAGE_VERSION: 10.0.19041.329.
STACK_COMMAND: .thread ; .cxr ; kb.
BUCKET_ID_FUNC_OFFSET: 1c4.
FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest.
OS_VERSION: 10.0.19041.1.
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}
Followup: MachineOwner.
---------
KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE hatası aldım
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`36200000 PsLoadedModuleList = 0xfffff802`36e2a310
Debug session time: Mon Jul 27 16:10:38.123 2020 (UTC + 3:00)
System Uptime: 0 days 0:38:27.757
Loading Kernel Symbols
...............................................................
................................................................
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000070`b32d8018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`365ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff40d`c54985e0=0000000000000162
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE (162)
A lock tracked by AutoBoost was released by a thread that did not own the lock.
This is typically caused when some thread releases a lock on behalf of another
thread (which is not legal with AutoBoost tracking enabled) or when some thread
tries to release a lock it no longer owns.
Arguments:
Arg1: ffffb4086f2240c0, The address of the thread
Arg2: ffffa3807a87c100, The lock address
Arg3: 00000000ffffffff, The session ID of the thread
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-RP9LE0O
Followup: MachineOwner
---------
dumpdosyaları @Recep Baltaş ATTEMPTED_WRITE_TO_READONLY_MEMORY en son bu hata ile karşılaştım ve
(nvlddmkm.sys , nvlddmkm.sys+12d550) hatası , amdppm.sys hatası ve ntoskrnl.exe hata ayrıntılarını görmüş olmaktayım ben sorunun ekran kartımdan kaynaklandığını düşünüyorum sizin kadar anlamadığım için yinede size sormak istiyorum sizce hata belleklerden mi ekran kartından mı kaynaklanıyor
ATTEMPTED_WRITE_TO_READONLY_MEMORY bu hatadan öncede DRIVER_IRQL_NOT_LESS_OR_EQUAL hatası aldım zaten dump dosyalarını paylaştım inceleyebilirsiniz bende windbg preview dosyaları okumuyor önceden okuyor idi ama şimdi afk bir şekilde bekliyor.
ramler memtest 86 ile test edildi bellek tanılamayla test edildi sorun çıkmadı zaten son test etmemden sonra resimleri paylaşmıştım