Ryzen 5 1600 sistemde mavi ekran hatası

İşletim sistemi
Windows 10

dervistprk

Kilopat
Katılım
3 Temmuz 2018
Mesajlar
29
Çözümler
1
Ryzen 5 1600.
RX 580 8 GB.
MSI B350M PRO-VD Plus.
16 GB 3000 MHz RAM.
Windows 10 Pro 20H2 64 Bit.

Minidump:

Merhabalar PUBG oynarken "win32kfull.sys" hata mesajlı bir BSoD yedim. Sistem özelliklerini ve minidump dosyasının Google Drive linkini paylaştım. Yardımlarınızı bekliyorum.
Ryzen 5 1600.
RX 580 8 GB.
MSI B350M PRO-VD Plus.
16 GB 3000 MHz RAM.
Windows 10 Pro 20H2 64 Bit.

Minidump:

Merhabalar PUBG oynarken "win32kfull.sys" hata mesajlı bir BSoD yedim. Sistem özelliklerini ve minidump dosyasının Google Drive linkini paylaştım. Yardımlarınızı bekliyorum.
@Recep Baltaş @Ali Güngör
 
Son düzenleme:
DDU ile ekran kartı sürücüsünü kaldırıp yeniden kurun.

Beta sürüm BİOS kullanıyorsunuz. 7B38v2E sürümüne geçin.

Aşağıdaki rehberi uygulayın.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-14968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`19600000 PsLoadedModuleList = 0xfffff804`1a22a2b0
Debug session time: Sun Jan 10 20:33:27.135 2021 (UTC + 3:00)
System Uptime: 0 days 5:47:14.812
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`199f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa501`20275730=0000000000000050
11: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9b2848a4d528, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff910d7dd7c180, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10281

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff9b2848a4d528

BUGCHECK_P2: 0

BUGCHECK_P3: ffff910d7dd7c180

BUGCHECK_P4: 2

READ_ADDRESS: fffff8041a2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8041a20f330: Unable to get Flags value from nt!KdVersionBlock
fffff8041a20f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff9b2848a4d528

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TslGame.exe

TRAP_FRAME:  ffffa501202759d0 -- (.trap 0xffffa501202759d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=0000000000000008
rdx=ffff912840e01040 rsi=0000000000000000 rdi=0000000000000000
rip=ffff910d7dd7c180 rsp=ffffa50120275b60 rbp=000000000000800b
 r8=ffff808658fcdd90  r9=0000000000000000 r10=fffff804198fbf50
r11=ffffa50120275ac0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kfull!xxxWindowEvent+0x4b0:
ffff910d`7dd7c180 8b4f28          mov     ecx,dword ptr [rdi+28h] ds:00000000`00000028=????????
Resetting default scope

STACK_TEXT: 
ffffa501`20275728 fffff804`19a1e8bb     : 00000000`00000050 ffff9b28`48a4d528 00000000`00000000 ffffa501`202759d0 : nt!KeBugCheckEx
ffffa501`20275730 fffff804`1980c960     : ffff9128`43b83690 00000000`00000000 ffffa501`20275a50 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffa501`20275830 fffff804`19a0395e     : fffff804`1cd1ab00 ffff910d`7dd3467b 00000000`00000000 ffff8086`52a48420 : nt!MmAccessFault+0x400
ffffa501`202759d0 ffff910d`7dd7c180     : ffff910d`7dc5b6f8 ffff9128`43b83690 00000000`00000000 ffff910d`7dd92101 : nt!KiPageFault+0x35e
ffffa501`20275b60 ffff910d`7dd96a6f     : ffff910d`00000001 00000000`00000000 00000000`fffffff7 00000000`00000000 : win32kfull!xxxWindowEvent+0x4b0
ffffa501`20275c70 ffff910d`7dd3b1f1     : ffff9128`43b83690 ffffa501`202769d8 00000000`00000000 ffff9128`00000000 : win32kfull!xxxScanSysQueue+0x383f
ffffa501`202764b0 ffff910d`7dd3a298     : ffffa501`202769d8 00000000`00000001 00000000`00000000 ffffa501`20276aa8 : win32kfull!xxxRealInternalGetMessage+0xef1
ffffa501`20276980 ffff910d`7e5b71ad     : 00000000`00000000 0000008f`13ece9e8 ffffa501`20276aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
ffffa501`20276a40 fffff804`19a071b8     : 00000000`c000001c ffff910d`7dd38359 00000000`0000007f 00000000`00000000 : win32k!NtUserPeekMessage+0x29
ffffa501`20276a90 00007ffb`46f41064     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008f`13ece9c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`46f41064


SYMBOL_NAME:  win32kfull!xxxWindowEvent+4b0

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b0

FAILURE_BUCKET_ID:  AV_R_INVALID_win32kfull!xxxWindowEvent

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4ad8a222-fa92-fcb3-c31c-bba90c359597}

Followup:     MachineOwner
---------
 
DDU ile ekran kartı sürücüsünü kaldırıp yeniden kurun.

Beta sürüm BİOS kullanıyorsunuz. 7B38v2E sürümüne geçin.

Aşağıdaki rehberi uygulayın.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Downloads\Compressed\011021-14968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`19600000 PsLoadedModuleList = 0xfffff804`1a22a2b0
Debug session time: Sun Jan 10 20:33:27.135 2021 (UTC + 3:00)
System Uptime: 0 days 5:47:14.812
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`199f5780 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa501`20275730=0000000000000050
11: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9b2848a4d528, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffff910d7dd7c180, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 10281

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 87

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff9b2848a4d528

BUGCHECK_P2: 0

BUGCHECK_P3: ffff910d7dd7c180

BUGCHECK_P4: 2

READ_ADDRESS: fffff8041a2fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8041a20f330: Unable to get Flags value from nt!KdVersionBlock
fffff8041a20f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff9b2848a4d528

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  TslGame.exe

TRAP_FRAME:  ffffa501202759d0 -- (.trap 0xffffa501202759d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000040 rbx=0000000000000000 rcx=0000000000000008
rdx=ffff912840e01040 rsi=0000000000000000 rdi=0000000000000000
rip=ffff910d7dd7c180 rsp=ffffa50120275b60 rbp=000000000000800b
r8=ffff808658fcdd90  r9=0000000000000000 r10=fffff804198fbf50
r11=ffffa50120275ac0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kfull!xxxWindowEvent+0x4b0:
ffff910d`7dd7c180 8b4f28          mov     ecx,dword ptr [rdi+28h] ds:00000000`00000028=????????
Resetting default scope

STACK_TEXT:
ffffa501`20275728 fffff804`19a1e8bb     : 00000000`00000050 ffff9b28`48a4d528 00000000`00000000 ffffa501`202759d0 : nt!KeBugCheckEx
ffffa501`20275730 fffff804`1980c960     : ffff9128`43b83690 00000000`00000000 ffffa501`20275a50 00000000`00000000 : nt!MiSystemFault+0x1f40ab
ffffa501`20275830 fffff804`19a0395e     : fffff804`1cd1ab00 ffff910d`7dd3467b 00000000`00000000 ffff8086`52a48420 : nt!MmAccessFault+0x400
ffffa501`202759d0 ffff910d`7dd7c180     : ffff910d`7dc5b6f8 ffff9128`43b83690 00000000`00000000 ffff910d`7dd92101 : nt!KiPageFault+0x35e
ffffa501`20275b60 ffff910d`7dd96a6f     : ffff910d`00000001 00000000`00000000 00000000`fffffff7 00000000`00000000 : win32kfull!xxxWindowEvent+0x4b0
ffffa501`20275c70 ffff910d`7dd3b1f1     : ffff9128`43b83690 ffffa501`202769d8 00000000`00000000 ffff9128`00000000 : win32kfull!xxxScanSysQueue+0x383f
ffffa501`202764b0 ffff910d`7dd3a298     : ffffa501`202769d8 00000000`00000001 00000000`00000000 ffffa501`20276aa8 : win32kfull!xxxRealInternalGetMessage+0xef1
ffffa501`20276980 ffff910d`7e5b71ad     : 00000000`00000000 0000008f`13ece9e8 ffffa501`20276aa8 00000000`00000000 : win32kfull!NtUserPeekMessage+0x158
ffffa501`20276a40 fffff804`19a071b8     : 00000000`c000001c ffff910d`7dd38359 00000000`0000007f 00000000`00000000 : win32k!NtUserPeekMessage+0x29
ffffa501`20276a90 00007ffb`46f41064     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008f`13ece9c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`46f41064


SYMBOL_NAME:  win32kfull!xxxWindowEvent+4b0

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

IMAGE_VERSION:  10.0.19041.662

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  4b0

FAILURE_BUCKET_ID:  AV_R_INVALID_win32kfull!xxxWindowEvent

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {4ad8a222-fa92-fcb3-c31c-bba90c359597}

Followup:     MachineOwner
---------
Tamamdır uygulayacağım teşekkür ederim.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Yeni mesajlar

Geri
Yukarı