Sistem 4-5 kez mavi ekran hatası verdi

Yüklediğiniz mavi ekranlar aylar öncesinden. Güncel olanları bulup gönderir misiniz?

msedge_IcGFNuNUEj.png
 
@PLAYDAAY

* Son yüklediğiniz beş dökümden ikisi eski, biri bozuk, diğerleri güncel ve sağlamdı.

* BIOS güncelleyebilirsiniz, eski kalmış.

Rich (BB code):
BiosVersion = 0814
BiosReleaseDate = 01/18/2023
SystemManufacturer = ASUS
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = ProArt Z790-CREATOR WIFI
BaseBoardVersion = Rev 1.xx

Sürücü sayfası: ProArt Z790-CREATOR WIFI
Son sürüm BIOS: BIOS 0904

* Windows'u da güncelleyin, eski kalmış.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffff9c9e5d8f6284, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80334633a65, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1656

    Key  : Analysis.Elapsed.mSec
    Value: 2577

    Key  : Analysis.IO.Other.Mb
    Value: 1

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 1

    Key  : Analysis.Init.CPU.mSec
    Value: 234

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9371

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 146

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa

    Key  : Failure.Bucket
    Value: AV_partmgr!PmIoCompletion

    Key  : Failure.Hash
    Value: {382cf087-492f-8f42-342c-dcbe46ce80ca}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: ffff9c9e5d8f6284

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80334633a65

FILE_IN_CAB:  052823-7359-01.dmp

READ_ADDRESS: fffff803350fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffff9c9e5d8f6284

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  atkexComSvc.exe

DPC_STACK_BASE:  FFFF9A8139A47FB0

TRAP_FRAME:  ffff9a8139a47130 -- (.trap 0xffff9a8139a47130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff9c9e5d8f6284
rdx=ffff9c89a42f5000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80334633a65 rsp=ffff9a8139a472c8 rbp=0000000000000001
 r8=00000000a5cb000f  r9=0000000000000000 r10=fffff80334765240
r11=ffff9c89a5d7b1ec r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!EtwTraceSiloKernelEvent+0x69:
fffff803`34633a65 48c1e81d        shr     rax,1Dh
Resetting default scope

STACK_TEXT:
ffff9a81`39a46fe8 fffff803`3480fd29     : 00000000`0000000a ffff9c9e`5d8f6284 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9a81`39a46ff0 fffff803`3480b8e3     : 00000000`00000002 fffff803`3461a106 ffffc181`00000000 ffff9c89`bc0b1080 : nt!KiBugCheckDispatch+0x69
ffff9a81`39a47130 fffff803`34633a65     : 00000000`00000100 00000000`00000000 ffff9c89`a42f5000 00000001`ffffffff : nt!KiPageFault+0x463
ffff9a81`39a472c8 ffff9c89`bd1d0080     : fffff803`347b7d7a 00000000`00000000 ffff9c89`b990c010 ffff9a81`39a47399 : nt!EtwTraceSiloKernelEvent+0x69
ffff9a81`39a47328 fffff803`347b7d7a     : 00000000`00000000 ffff9c89`b990c010 ffff9a81`39a47399 00000000`00000000 : 0xffff9c89`bd1d0080
ffff9a81`39a47330 fffff803`38ef12ba     : 00000000`055464da ffff9c89`b990c248 00000000`055464da 00000000`00000ad7 : nt!EtwpTraceIo+0x18a
ffff9a81`39a47400 fffff803`34692735     : 00000000`00000001 00000000`056b3036 00000000`00000000 ffff9c89`a98c9a90 : partmgr!PmIoCompletion+0x2aa
ffff9a81`39a47470 fffff803`34692577     : ffff9c89`b990c010 ffff9c89`b990c201 ffff9c89`b990c010 ffff9c89`b0722040 : nt!IopfCompleteRequest+0x1a5
ffff9a81`39a47550 fffff803`39dc66e3     : 00000000`00000000 ffff9a81`39a47669 ffff9c89`b126e880 ffff9c89`b126e880 : nt!IofCompleteRequest+0x17
ffff9a81`39a47580 fffff803`34692735     : 00000000`00000000 00000000`00000000 00020000`00000202 ffffffff`ffffffff : CLASSPNP!TransferPktComplete+0x5e3
ffff9a81`39a47790 fffff803`34692577     : ffff9c89`b052fcf0 ffff9c89`a99f3101 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x1a5
ffff9a81`39a47870 fffff803`390d9051     : ffff9c89`b12739b0 ffff9c89`b02ce340 00000000`00000000 ffff9c89`a98db580 : nt!IofCompleteRequest+0x17
ffff9a81`39a478a0 fffff803`390d89c5     : ffff9c89`b02ce020 ffff9c89`a99f41a0 ffff9a81`39a47a70 ffff9c89`b1273a00 : storport!RaidCompleteRequestEx+0x91
ffff9a81`39a47970 fffff803`390ec2cc     : ffff9a81`39a47b70 00000000`00000000 fffff780`00000320 ffff9c89`b02ce020 : storport!RaidUnitCompleteRequest+0x1005
ffff9a81`39a47b10 fffff803`3468b57e     : ffff9a81`39a47e80 ffff9c89`a42f5000 ffff9a81`39a40400 ffff9a81`00000002 : storport!RaidpAdapterRedirectDpcRoutine+0x8c
ffff9a81`39a47bb0 fffff803`3468a864     : e00f9213`000e3413 0003131a`600c700d 00000000`00000000 00000000`0000016c : nt!KiExecuteAllDpcs+0x30e
ffff9a81`39a47d20 fffff803`34804195     : 0010641c`060b060a ffffc181`ab7dd180 ffffc181`ad402b40 00000000`749eec90 : nt!KiRetireDpcList+0x1f4
ffff9a81`39a47fb0 fffff803`34803f80     : 00000000`0099f8d8 fffff803`346f5f5a 00000000`0099f8dc 00000000`00000008 : nt!KxRetireDpcList+0x5
ffff9a81`3c13fa00 fffff803`34803705     : 00000000`749eec90 fffff803`347fdd01 00000000`00000002 00000000`00000000 : nt!KiDispatchInterruptContinue
ffff9a81`3c13fa30 fffff803`347fdd01     : 00000000`00000002 00000000`00000000 ffff9a81`00000000 ffff9c89`bc96d170 : nt!KiDpcInterruptBypass+0x25
ffff9a81`3c13fa40 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME:  partmgr!PmIoCompletion+2aa

MODULE_NAME: partmgr

IMAGE_NAME:  partmgr.sys

IMAGE_VERSION:  10.0.19041.2728

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  2aa

FAILURE_BUCKET_ID:  AV_partmgr!PmIoCompletion

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {382cf087-492f-8f42-342c-dcbe46ce80ca}

Followup:     MachineOwner
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000d3, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8062148347f, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2062

    Key  : Analysis.Elapsed.mSec
    Value: 7618

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7959

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 142

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xa

    Key  : Failure.Bucket
    Value: IP_MISALIGNED_GenuineIntel.sys

    Key  : Failure.Hash
    Value: {e930d917-b247-3f7f-23cb-88a0c9f1b274}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  a

BUGCHECK_P1: 0

BUGCHECK_P2: ff

BUGCHECK_P3: d3

BUGCHECK_P4: fffff8062148347f

FILE_IN_CAB:  052423-7046-01.dmp

WRITE_ADDRESS: fffff80621efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc4021d44f4a0 -- (.trap 0xffffc4021d44f4a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=c8f5b06747fe0000
rdx=00000000000ee9a5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062148347f rsp=ffffc4021d44f630 rbp=0000000000000000
 r8=00000000000ee9a5  r9=0000000000000000 r10=fffff80621500210
r11=ffffc4021d44f5c8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x178f:
fffff806`2148347f bc24880000      mov     esp,8824h
Resetting default scope

MISALIGNED_IP:
nt!PpmIdleExecuteTransition+178f
fffff806`2148347f bc24880000      mov     esp,8824h

STACK_TEXT:
ffffc402`1d44f358 fffff806`2160fd29     : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`000000d3 : nt!KeBugCheckEx
ffffc402`1d44f360 fffff806`2160b8e3     : 00000000`ad230000 00000000`00000000 00000000`00000000 fffff806`239d3a7b : nt!KiBugCheckDispatch+0x69
ffffc402`1d44f4a0 fffff806`2148347f     : 000029a5`dbc618fb 00000000`00000001 00000000`00000000 00000023`8e123e39 : nt!KiPageFault+0x463
ffffc402`1d44f630 fffff806`21481b74     : 00000000`00000000 00001f80`004d000b 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x178f
ffffc402`1d44fa30 fffff806`21600554     : ffffffff`00000000 ffffde80`c34ab840 ffffb008`1ae2a080 00000000`000002a8 : nt!PoIdle+0x374
ffffc402`1d44fba0 00000000`00000000     : ffffc402`1d450000 ffffc402`1d449000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54


SYMBOL_NAME:  nt!PpmIdleExecuteTransition+178f

IMAGE_VERSION:  10.0.19041.2965

STACK_COMMAND:  .cxr; .ecxr ; kb

MODULE_NAME: GenuineIntel

IMAGE_NAME:  GenuineIntel.sys

FAILURE_BUCKET_ID:  IP_MISALIGNED_GenuineIntel.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e930d917-b247-3f7f-23cb-88a0c9f1b274}

Followup:     MachineOwner
---------
 
Bilgisayarın parçalarında bir problem yoksa ve sorun programlama ile alakalı ise çok güzel. Bir şeylerin ciddi arızası olabilecegini düşünüp korkmuştum. En kısa sürede güncellemeleri yapacam. İlgilendiginiz için teşekkür ederim.
 

Technopat Haberler

Yeni konular

Geri
Yukarı