SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff804c680e3c6, The address that the exception occurred at
Arg3: ffffdb05c58e6588, Exception Record Address
Arg4: ffffdb05c58e5dc0, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullClassPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 4499
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25759
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff804c680e3c6
BUGCHECK_P3: ffffdb05c58e6588
BUGCHECK_P4: ffffdb05c58e5dc0
EXCEPTION_RECORD: ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588)
ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000048
Attempt to read from address 0000000000000048
CONTEXT: ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0)
rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070
rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28
rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed
r8=fffff804c680e386 r9=ffffdb05c58e69d8 r10=0000000000000048
r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005
r14=0000000000000001 r15=0000000000000009
iopl=0 ov up ei pl nz ac po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a16
BEDaisy+0x2de3c6:
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000048
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000048
MISALIGNED_IP:
BEDaisy+2de3c6
fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx]
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffdb05`c58e67c0 00000000`00000004 : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6
ffffdb05`c58e67c8 00000000`00000005 : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4
ffffdb05`c58e67d0 ffffc80a`14b1fce0 : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5
ffffdb05`c58e67d8 00000000`00000000 : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0
SYMBOL_NAME: BEDaisy+2de3c6
IMAGE_NAME: hardware
STACK_COMMAND: .cxr 0xffffdb05c58e5dc0 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e}
Followup: MachineOwner
---------
5: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3800
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor
Update Status = REG_DWORD 3
VendorIdentifier = REG_SZ AuthenticAMD
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80754d25016, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4843
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8578
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80754d25016
READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: fffff407e94df030 -- (.trap 0xfffff407e94df030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!HalpInterruptSendIpi+0x46:
fffff807`54d25016 0000 add byte ptr [rax],al ds:537af407`eb4d49b8=??
Resetting default scope
MISALIGNED_IP:
nt!HalpInterruptSendIpi+46
fffff807`54d25016 0000 add byte ptr [rax],al
STACK_TEXT:
fffff407`e94deee8 fffff807`54e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff407`e94deef0 fffff807`54e03469 : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69
fffff407`e94df030 fffff807`54d25016 : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469
fffff407`e94df1c0 00000000`00000000 : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46
SYMBOL_NAME: nt!HalpInterruptSendIpi+46
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff8023cfbd5bc, The address that the exception occurred at
Arg3: ffffd1017ec534b8, Exception Record Address
Arg4: ffff9000731a9920, Context Record Address
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7452
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10075
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc000001d
BUGCHECK_P2: fffff8023cfbd5bc
BUGCHECK_P3: ffffd1017ec534b8
BUGCHECK_P4: ffff9000731a9920
EXCEPTION_RECORD: ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8)
ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: ffff9000731a9920 -- (.cxr 0xffff9000731a9920)
rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0
rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0
rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0
r8=000000000000005c r9=0000000000000002 r10=fffff8023a330eb0
r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8
r14=ffffa58a1658b020 r15=0000000000000002
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
ndis!ndisNsiGetAllInterfaceInformation+0xe3c:
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld .
EXCEPTION_CODE_STR: c000001d
EXCEPTION_STR: 0xc000001d
BAD_STACK_POINTER: ffff9000731a90e8
FAILED_INSTRUCTION_ADDRESS:
ndis!ndisNsiGetAllInterfaceInformation+e3c
fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h]
STACK_TEXT:
ffffd101`7ec536f0 fffff802`3d1359da : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c
ffffd101`7ec53820 fffff802`3d13ec9d : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a
ffffd101`7ec53990 fffff802`3d13ea71 : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d
ffffd101`7ec54760 fffff802`838f3afc : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11
ffffd101`7ec54790 fffff802`83928737 : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc
ffffd101`7ec547c0 fffff802`838f38fd : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3
ffffd101`7ec54a80 fffff802`3a21aa33 : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d
ffffd101`7ec54b00 fffff802`3a3034b5 : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93
ffffd101`7ec54b70 fffff802`3a2a29a5 : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffd101`7ec54c10 fffff802`3a3fc868 : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd101`7ec54c60 00000000`00000000 : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: NETIO!NsiGetAllParametersEx+24a
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
IMAGE_VERSION: 10.0.19041.610
STACK_COMMAND: .cxr 0xffff9000731a9920 ; kb
BUCKET_ID_FUNC_OFFSET: 24a
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c092daa6-3bf4-0dbc-0db7-7576bdae5a66}
Followup: MachineOwner
---------
- BattlEye'yi kaldırın.
- Ağ sürücülerinizi güncelleyin.
- Işlemciye yaptığınız OC'yi kaldırın.
- Memtest86 yaparsanız iyi olur.
Kod:SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard. coded breakpoint or assertion was hit, but this system was booted. /NODEBUG. This is not supposed to happen as developers should never have. hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the. system is booted /DEBUG. This will let us see why this breakpoint is. happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: fffff804c680e3c6, The address that the exception occurred at. Arg3: ffffdb05c58e6588, Exception Record Address. Arg4: ffffdb05c58e5dc0, Context Record Address. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : AV.Dereference. Value: NullClassPtr. Key : AV.Fault. Value: Read. Key : Analysis.CPU.mSec. Value: 4499. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 25759. Key : Analysis.Memory.CommitPeak.Mb. Value: 83. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 7e. BUGCHECK_P1: ffffffffc0000005. BUGCHECK_P2: fffff804c680e3c6. BUGCHECK_P3: ffffdb05c58e6588. BUGCHECK_P4: ffffdb05c58e5dc0. EXCEPTION_RECORD: ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588) ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000. NumberParameters: 2. Parameter[0]: 0000000000000000. Parameter[1]: 0000000000000048. Attempt to read from address 0000000000000048. CONTEXT: ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0) rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070. rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28. rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed. r8=fffff804c680e386 r9=ffffdb05c58e69d8 r10=0000000000000048. r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005. r14=0000000000000001 r15=0000000000000009. iopl=0 ov up ei pl nz ac po nc. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a16. BEDaisy+0x2de3c6: fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=???????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock. fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. 0000000000000048. ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005. EXCEPTION_PARAMETER1: 0000000000000000. EXCEPTION_PARAMETER2: 0000000000000048. MISALIGNED_IP: BEDaisy+2de3c6. fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] EXCEPTION_STR: 0xc0000005. STACK_TEXT: ffffdb05`c58e67c0 00000000`00000004 : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6. ffffdb05`c58e67c8 00000000`00000005 : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4. ffffdb05`c58e67d0 ffffc80a`14b1fce0 : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5. ffffdb05`c58e67d8 00000000`00000000 : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0. SYMBOL_NAME: BEDaisy+2de3c6. IMAGE_NAME: hardware. STACK_COMMAND: .cxr 0xffffdb05c58e5dc0 ; kb. MODULE_NAME: hardware. FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e} Followup: MachineOwner. --------- 5: kd> !sysinfo cpuinfo. [CPU Information] ~MHz = REG_DWORD 3800. Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0. Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0. Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1. ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor Update Status = REG_DWORD 3. VendorIdentifier = REG_SZ AuthenticAMD. IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80754d25016, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 4843. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 8578. Key : Analysis.Memory.CommitPeak.Mb. Value: 75. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: a. BUGCHECK_P1: 0. BUGCHECK_P2: 2. BUGCHECK_P3: 0. BUGCHECK_P4: fffff80754d25016. READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock. fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. 0000000000000000. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: opera.exe. TRAP_FRAME: fffff407e94df030 -- (.trap 0xfffff407e94df030) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl nz na po nc. nt!HalpInterruptSendIpi+0x46: fffff807`54d25016 0000 add byte ptr [rax],al ds:537af407`eb4d49b8=?? Resetting default scope. MISALIGNED_IP: nt!HalpInterruptSendIpi+46. fffff807`54d25016 0000 add byte ptr [rax],al. STACK_TEXT: fffff407`e94deee8 fffff807`54e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx. fffff407`e94deef0 fffff807`54e03469 : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69. fffff407`e94df030 fffff807`54d25016 : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469. fffff407`e94df1c0 00000000`00000000 : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46. SYMBOL_NAME: nt!HalpInterruptSendIpi+46. IMAGE_NAME: hardware. IMAGE_VERSION: 10.0.19041.630. STACK_COMMAND: .thread ; .cxr ; kb. MODULE_NAME: hardware. FAILURE_BUCKET_ID: IP_MISALIGNED. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner. --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard. coded breakpoint or assertion was hit, but this system was booted. /NODEBUG. This is not supposed to happen as developers should never have. hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the. system is booted /DEBUG. This will let us see why this breakpoint is. happening. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled. Arg2: fffff8023cfbd5bc, The address that the exception occurred at. Arg3: ffffd1017ec534b8, Exception Record Address. Arg4: ffff9000731a9920, Context Record Address. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 7452. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 10075. Key : Analysis.Memory.CommitPeak.Mb. Value: 92. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 7e. BUGCHECK_P1: ffffffffc000001d. BUGCHECK_P2: fffff8023cfbd5bc. BUGCHECK_P3: ffffd1017ec534b8. BUGCHECK_P4: ffff9000731a9920. EXCEPTION_RECORD: ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8) ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000. NumberParameters: 0. CONTEXT: ffff9000731a9920 -- (.cxr 0xffff9000731a9920) rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0. rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0. rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0. r8=000000000000005c r9=0000000000000002 r10=fffff8023a330eb0. r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8. r14=ffffa58a1658b020 r15=0000000000000002. iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246. ndis!ndisNsiGetAllInterfaceInformation+0xe3c: fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308. Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld . EXCEPTION_CODE_STR: c000001d. EXCEPTION_STR: 0xc000001d. BAD_STACK_POINTER: ffff9000731a90e8. FAILED_INSTRUCTION_ADDRESS: ndis!ndisNsiGetAllInterfaceInformation+e3c. fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] STACK_TEXT: ffffd101`7ec536f0 fffff802`3d1359da : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c. ffffd101`7ec53820 fffff802`3d13ec9d : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a. ffffd101`7ec53990 fffff802`3d13ea71 : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d. ffffd101`7ec54760 fffff802`838f3afc : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11. ffffd101`7ec54790 fffff802`83928737 : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc. ffffd101`7ec547c0 fffff802`838f38fd : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3. ffffd101`7ec54a80 fffff802`3a21aa33 : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d. ffffd101`7ec54b00 fffff802`3a3034b5 : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93. ffffd101`7ec54b70 fffff802`3a2a29a5 : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105. ffffd101`7ec54c10 fffff802`3a3fc868 : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55. ffffd101`7ec54c60 00000000`00000000 : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28. SYMBOL_NAME: NETIO!NsiGetAllParametersEx+24a. MODULE_NAME: NETIO. IMAGE_NAME: NETIO.SYS. IMAGE_VERSION: 10.0.19041.610. STACK_COMMAND: .cxr 0xffff9000731a9920 ; kb. BUCKET_ID_FUNC_OFFSET: 24a. FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c092daa6-3bf4-0dbc-0db7-7576bdae5a66} Followup: MachineOwner. ---------
OCCT sırasında mavi ekran GPU sorununa da işaret edebilir. O da ihtimaller arasında ama şimdilik bunları yapın.
LAN driverlarınıda yeni yükledim zaten.
- Battleye'yi kaldırın.
- Ağ sürücülerinizi güncelleyin.
- İşlemciye yaptığınız OC'yi kaldırın.
- MemTest86 yaparsanız iyi olur.
Kod:SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff804c680e3c6, The address that the exception occurred at Arg3: ffffdb05c58e6588, Exception Record Address Arg4: ffffdb05c58e5dc0, Context Record Address Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : AV.Dereference Value: NullClassPtr Key : AV.Fault Value: Read Key : Analysis.CPU.mSec Value: 4499 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 25759 Key : Analysis.Memory.CommitPeak.Mb Value: 83 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff804c680e3c6 BUGCHECK_P3: ffffdb05c58e6588 BUGCHECK_P4: ffffdb05c58e5dc0 EXCEPTION_RECORD: ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588) ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000000048 Attempt to read from address 0000000000000048 CONTEXT: ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0) rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070 rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28 rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed r8=fffff804c680e386 r9=ffffdb05c58e69d8 r10=0000000000000048 r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005 r14=0000000000000001 r15=0000000000000009 iopl=0 ov up ei pl nz ac po nc cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a16 BEDaisy+0x2de3c6: fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=???????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000048 ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005 EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000000048 MISALIGNED_IP: BEDaisy+2de3c6 fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] EXCEPTION_STR: 0xc0000005 STACK_TEXT: ffffdb05`c58e67c0 00000000`00000004 : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6 ffffdb05`c58e67c8 00000000`00000005 : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4 ffffdb05`c58e67d0 ffffc80a`14b1fce0 : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5 ffffdb05`c58e67d8 00000000`00000000 : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0 SYMBOL_NAME: BEDaisy+2de3c6 IMAGE_NAME: hardware STACK_COMMAND: .cxr 0xffffdb05c58e5dc0 ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e} Followup: MachineOwner --------- 5: kd> !sysinfo cpuinfo [CPU Information] ~MHz = REG_DWORD 3800 Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0 Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1 ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor Update Status = REG_DWORD 3 VendorIdentifier = REG_SZ AuthenticAMD IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80754d25016, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4843 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 8578 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: a BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80754d25016 READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe TRAP_FRAME: fffff407e94df030 -- (.trap 0xfffff407e94df030) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006 r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!HalpInterruptSendIpi+0x46: fffff807`54d25016 0000 add byte ptr [rax],al ds:537af407`eb4d49b8=?? Resetting default scope MISALIGNED_IP: nt!HalpInterruptSendIpi+46 fffff807`54d25016 0000 add byte ptr [rax],al STACK_TEXT: fffff407`e94deee8 fffff807`54e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff407`e94deef0 fffff807`54e03469 : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69 fffff407`e94df030 fffff807`54d25016 : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469 fffff407`e94df1c0 00000000`00000000 : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46 SYMBOL_NAME: nt!HalpInterruptSendIpi+46 IMAGE_NAME: hardware IMAGE_VERSION: 10.0.19041.630 STACK_COMMAND: .thread ; .cxr ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled Arg2: fffff8023cfbd5bc, The address that the exception occurred at Arg3: ffffd1017ec534b8, Exception Record Address Arg4: ffff9000731a9920, Context Record Address Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7452 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-62N06FT Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 10075 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 7e BUGCHECK_P1: ffffffffc000001d BUGCHECK_P2: fffff8023cfbd5bc BUGCHECK_P3: ffffd1017ec534b8 BUGCHECK_P4: ffff9000731a9920 EXCEPTION_RECORD: ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8) ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000 NumberParameters: 0 CONTEXT: ffff9000731a9920 -- (.cxr 0xffff9000731a9920) rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0 rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0 rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0 r8=000000000000005c r9=0000000000000002 r10=fffff8023a330eb0 r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8 r14=ffffa58a1658b020 r15=0000000000000002 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 ndis!ndisNsiGetAllInterfaceInformation+0xe3c: fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308 Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld . EXCEPTION_CODE_STR: c000001d EXCEPTION_STR: 0xc000001d BAD_STACK_POINTER: ffff9000731a90e8 FAILED_INSTRUCTION_ADDRESS: ndis!ndisNsiGetAllInterfaceInformation+e3c fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] STACK_TEXT: ffffd101`7ec536f0 fffff802`3d1359da : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c ffffd101`7ec53820 fffff802`3d13ec9d : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a ffffd101`7ec53990 fffff802`3d13ea71 : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d ffffd101`7ec54760 fffff802`838f3afc : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11 ffffd101`7ec54790 fffff802`83928737 : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc ffffd101`7ec547c0 fffff802`838f38fd : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3 ffffd101`7ec54a80 fffff802`3a21aa33 : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d ffffd101`7ec54b00 fffff802`3a3034b5 : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93 ffffd101`7ec54b70 fffff802`3a2a29a5 : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105 ffffd101`7ec54c10 fffff802`3a3fc868 : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffd101`7ec54c60 00000000`00000000 : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: NETIO!NsiGetAllParametersEx+24a MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS IMAGE_VERSION: 10.0.19041.610 STACK_COMMAND: .cxr 0xffff9000731a9920 ; kb BUCKET_ID_FUNC_OFFSET: 24a FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {c092daa6-3bf4-0dbc-0db7-7576bdae5a66} Followup: MachineOwner ---------
OCCT sırasında mavi ekran GPU sorununa da işaret edebilir. O da ihtimaller arasında ama şimdilik bunları yapın.
- BattlEye'yi kaldırın.
- Ağ sürücülerinizi güncelleyin.
- Işlemciye yaptığınız OC'yi kaldırın.
- Memtest86 yaparsanız iyi olur.
Kod:SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard. coded breakpoint or assertion was hit, but this system was booted. /NODEBUG. This is not supposed to happen as developers should never have. hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the. system is booted /DEBUG. This will let us see why this breakpoint is. happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled. Arg2: fffff804c680e3c6, The address that the exception occurred at. Arg3: ffffdb05c58e6588, Exception Record Address. Arg4: ffffdb05c58e5dc0, Context Record Address. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : AV.Dereference. Value: NullClassPtr. Key : AV.Fault. Value: Read. Key : Analysis.CPU.mSec. Value: 4499. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 25759. Key : Analysis.Memory.CommitPeak.Mb. Value: 83. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 7e. BUGCHECK_P1: ffffffffc0000005. BUGCHECK_P2: fffff804c680e3c6. BUGCHECK_P3: ffffdb05c58e6588. BUGCHECK_P4: ffffdb05c58e5dc0. EXCEPTION_RECORD: ffffdb05c58e6588 -- (.exr 0xffffdb05c58e6588) ExceptionAddress: fffff804c680e3c6 (BEDaisy+0x00000000002de3c6) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000. NumberParameters: 2. Parameter[0]: 0000000000000000. Parameter[1]: 0000000000000048. Attempt to read from address 0000000000000048. CONTEXT: ffffdb05c58e5dc0 -- (.cxr 0xffffdb05c58e5dc0) rax=ffffdb05c58e6900 rbx=0000000000022708 rcx=0000000000014070. rdx=0000000140004c97 rsi=0000000000000090 rdi=fffff804c654ad28. rip=fffff804c680e3c6 rsp=ffffdb05c58e67c0 rbp=000000000008d2ed. r8=fffff804c680e386 r9=ffffdb05c58e69d8 r10=0000000000000048. r11=0000000000000f06 r12=0000000000000000 r13=0000000000000005. r14=0000000000000001 r15=0000000000000009. iopl=0 ov up ei pl nz ac po nc. cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050a16. BEDaisy+0x2de3c6: fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] ss:ffffdb07`058eb457=???????? Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. READ_ADDRESS: fffff80476afb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock. fffff80476a0f340: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. 0000000000000048. ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s. EXCEPTION_CODE_STR: c0000005. EXCEPTION_PARAMETER1: 0000000000000000. EXCEPTION_PARAMETER2: 0000000000000048. MISALIGNED_IP: BEDaisy+2de3c6. fffff804`c680e3c6 8b0c14 mov ecx,dword ptr [rsp+rdx] EXCEPTION_STR: 0xc0000005. STACK_TEXT: ffffdb05`c58e67c0 00000000`00000004 : 00000000`00000005 ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 : BEDaisy+0x2de3c6. ffffdb05`c58e67c8 00000000`00000005 : ffffc80a`14b1fce0 00000000`00000000 fffff804`c6534c01 00000000`00000001 : 0x4. ffffdb05`c58e67d0 ffffc80a`14b1fce0 : 00000000`00000000 fffff804`c6534c01 00000000`00000001 00000000`00040282 : 0x5. ffffdb05`c58e67d8 00000000`00000000 : fffff804`c6534c01 00000000`00000001 00000000`00040282 00000000`00000004 : 0xffffc80a`14b1fce0. SYMBOL_NAME: BEDaisy+2de3c6. IMAGE_NAME: hardware. STACK_COMMAND: .cxr 0xffffdb05c58e5dc0 ; kb. MODULE_NAME: hardware. FAILURE_BUCKET_ID: IP_MISALIGNED_BEDaisy.sys. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {0d6989f4-a5e2-2225-1046-259fcb6d205e} Followup: MachineOwner. --------- 5: kd> !sysinfo cpuinfo. [CPU Information] ~MHz = REG_DWORD 3800. Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0. Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0. Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1. ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor Update Status = REG_DWORD 3. VendorIdentifier = REG_SZ AuthenticAMD. IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an. interrupt request level (IRQL) that is too high. This is usually. caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced. Arg2: 0000000000000002, IRQL. Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation. bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80754d25016, address which referenced memory. Debugging Details: ------------------ KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 4843. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 8578. Key : Analysis.Memory.CommitPeak.Mb. Value: 75. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: a. BUGCHECK_P1: 0. BUGCHECK_P2: 2. BUGCHECK_P3: 0. BUGCHECK_P4: fffff80754d25016. READ_ADDRESS: fffff807556fb390: Unable to get MiVisibleState. Unable to get NonPagedPoolStart. Unable to get NonPagedPoolEnd. Unable to get PagedPoolStart. Unable to get PagedPoolEnd. fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock. fffff8075560f340: Unable to get Flags value from nt!KdVersionBlock. unable to get nt!MmSpecialPagesInUse. 0000000000000000. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: opera.exe. TRAP_FRAME: fffff407e94df030 -- (.trap 0xfffff407e94df030) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=537af407eb4d49b8 rbx=0000000000000000 rcx=fffff407e94df4b8. rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000. rip=fffff80754d25016 rsp=fffff407e94df1c0 rbp=0000000000000006. r8=0000000000000000 r9=0000000000000000 r10=0000000000000000. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000. r14=0000000000000000 r15=0000000000000000. iopl=0 nv up ei pl nz na po nc. nt!HalpInterruptSendIpi+0x46: fffff807`54d25016 0000 add byte ptr [rax],al ds:537af407`eb4d49b8=?? Resetting default scope. MISALIGNED_IP: nt!HalpInterruptSendIpi+46. fffff807`54d25016 0000 add byte ptr [rax],al. STACK_TEXT: fffff407`e94deee8 fffff807`54e07169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx. fffff407`e94deef0 fffff807`54e03469 : fffff407`e94df8d0 fffff407`e94df6ec 00000000`00000001 fffff407`e94df3c0 : nt!KiBugCheckDispatch+0x69. fffff407`e94df030 fffff807`54d25016 : fffff407`e94df4b8 00000000`000f0000 fffff407`e94df230 00000000`00000000 : nt!KiPageFault+0x469. fffff407`e94df1c0 00000000`00000000 : ffffa60d`c2dc2080 00000000`00000000 00000000`00000000 00000000`00000001 : nt!HalpInterruptSendIpi+0x46. SYMBOL_NAME: nt!HalpInterruptSendIpi+46. IMAGE_NAME: hardware. IMAGE_VERSION: 10.0.19041.630. STACK_COMMAND: .thread ; .cxr ; kb. MODULE_NAME: hardware. FAILURE_BUCKET_ID: IP_MISALIGNED. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner. --------- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints. the driver/function that caused the problem. Always note this address. as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard. coded breakpoint or assertion was hit, but this system was booted. /NODEBUG. This is not supposed to happen as developers should never have. hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the. system is booted /DEBUG. This will let us see why this breakpoint is. happening. Arguments: Arg1: ffffffffc000001d, The exception code that was not handled. Arg2: fffff8023cfbd5bc, The address that the exception occurred at. Arg3: ffffd1017ec534b8, Exception Record Address. Arg4: ffff9000731a9920, Context Record Address. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys. KEY_VALUES_STRING: 1. Key : Analysis.CPU.mSec. Value: 7452. Key : Analysis.DebugAnalysisProvider.CPP. Value: Create: 8007007e on DESKTOP-62N06FT. Key : Analysis.DebugData. Value: CreateObject. Key : Analysis.DebugModel. Value: CreateObject. Key : Analysis.Elapsed.mSec. Value: 10075. Key : Analysis.Memory.CommitPeak.Mb. Value: 92. Key : Analysis.System. Value: CreateObject. Key : WER.OS.Branch. Value: vb_release. Key : WER.OS.Timestamp. Value: 2019-12-06T14:06:00Z. Key : WER.OS.Version. Value: 10.0.19041.1. ADDITIONAL_XML: 1. OS_BUILD_LAYERS: 1. BUGCHECK_CODE: 7e. BUGCHECK_P1: ffffffffc000001d. BUGCHECK_P2: fffff8023cfbd5bc. BUGCHECK_P3: ffffd1017ec534b8. BUGCHECK_P4: ffff9000731a9920. EXCEPTION_RECORD: ffffd1017ec534b8 -- (.exr 0xffffd1017ec534b8) ExceptionAddress: fffff8023cfbd5bc (ndis!ndisNsiGetAllInterfaceInformation+0x0000000000000e3c) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000. NumberParameters: 0. CONTEXT: ffff9000731a9920 -- (.cxr 0xffff9000731a9920) rax=000000000000005c rbx=ffffa58a1658c1a0 rcx=ffffa58a110fa2e0. rdx=ffffa58a163a8e58 rsi=0000000000000000 rdi=ffffa58a110c11a0. rip=fffff8023cfbd5bc rsp=ffffd1017ec536f0 rbp=ffffd1017ec537f0. r8=000000000000005c r9=0000000000000002 r10=fffff8023a330eb0. r11=ffffa58a15ee4a30 r12=0000000000000001 r13=ffffa58a1658b1a8. r14=ffffa58a1658b020 r15=0000000000000002. iopl=0 nv up ei pl zr na po nc. cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246. ndis!ndisNsiGetAllInterfaceInformation+0xe3c: fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] ds:002b:ffffa58a`110fa2f0=ffffa58a110fa308. Resetting default scope. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1. CUSTOMER_CRASH_COUNT: 1. PROCESS_NAME: System. ERROR_CODE: (NTSTATUS) 0xc000001d - { ZEL DURUM} Ge ersiz Y nerge Ge ersiz bir y nerge y r t lmeye al ld . EXCEPTION_CODE_STR: c000001d. EXCEPTION_STR: 0xc000001d. BAD_STACK_POINTER: ffff9000731a90e8. FAILED_INSTRUCTION_ADDRESS: ndis!ndisNsiGetAllInterfaceInformation+e3c. fffff802`3cfbd5bc 488b4910 mov rcx,qword ptr [rcx+10h] STACK_TEXT: ffffd101`7ec536f0 fffff802`3d1359da : ffffa58a`18f0c020 00000000`00000000 ffffd101`7ec53a00 ffffd101`7ec53ab0 : ndis!ndisNsiGetAllInterfaceInformation+0xe3c. ffffd101`7ec53820 fffff802`3d13ec9d : ffffa58a`19108a20 00000000`00000444 ffffa58a`13b75401 ffffd101`7ec53ab0 : NETIO!NsiGetAllParametersEx+0x24a. ffffd101`7ec53990 fffff802`3d13ea71 : 00000000`00000558 ffffd101`7ec548c0 00000000`00000002 00000000`00000000 : NETIO!InternalGetIfEntry2Ex+0x21d. ffffd101`7ec54760 fffff802`838f3afc : 00000000`00000007 00000000`00000002 ffffa58a`0c010100 fffff802`3a2c7262 : NETIO!GetIfEntry2+0x11. ffffd101`7ec54790 fffff802`83928737 : 00000000`00000007 00000000`00000000 c0011020`063000a6 00000000`00000400 : srvnet!SrvNetSkipAddress+0xcc. ffffd101`7ec547c0 fffff802`838f38fd : 00000000`00000000 00000000`00000000 ffffa58a`0b696040 00000000`00000000 : srvnet!SrvNetBuildNetname+0xc3. ffffd101`7ec54a80 fffff802`3a21aa33 : ffffa58a`18eb4d20 ffffa58a`166eda70 ffffa58a`166eda70 ffffa58a`166bc040 : srvnet!SrvNetUpdateNetNameWorkerRoutine+0x8d. ffffd101`7ec54b00 fffff802`3a3034b5 : ffffa58a`0e794080 ffffa58a`0e794080 fffff802`3a21a9a0 ffffa58a`00000000 : nt!IopProcessWorkItem+0x93. ffffd101`7ec54b70 fffff802`3a2a29a5 : ffffa58a`0e794080 00000000`00000080 ffffa58a`0b696040 000f8067`b4bbbdff : nt!ExpWorkerThread+0x105. ffffd101`7ec54c10 fffff802`3a3fc868 : ffff9000`73243180 ffffa58a`0e794080 fffff802`3a2a2950 00000000`00000000 : nt!PspSystemThreadStartup+0x55. ffffd101`7ec54c60 00000000`00000000 : ffffd101`7ec55000 ffffd101`7ec4f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28. SYMBOL_NAME: NETIO!NsiGetAllParametersEx+24a. MODULE_NAME: NETIO. IMAGE_NAME: NETIO.SYS. IMAGE_VERSION: 10.0.19041.610. STACK_COMMAND: .cxr 0xffff9000731a9920 ; kb. BUCKET_ID_FUNC_OFFSET: 24a. FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_BAD_IP_NETIO!NsiGetAllParametersEx. OS_VERSION: 10.0.19041.1. BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c092daa6-3bf4-0dbc-0db7-7576bdae5a66} Followup: MachineOwner. ---------
OCCT sırasında mavi ekran GPU sorununa da işaret edebilir. O da ihtimaller arasında ama şimdilik bunları yapın.
İşlemciniz 3800 MHz'de çalışıyor gibi görünüyor, oysaki AMD'nin sitesinde işlemcinizin "Boost" frekansı 3,7 GHz olarak görünüyor.İşlemciye herhangi bir OC işlemi yapmadım, nasıl kaldırabilirim?
5: kd> !sysinfo cpuinfo
[CPU Information]
~MHz = REG_DWORD 3800
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ AMD64 Family 23 Model 1 Stepping 1
ProcessorNameString = REG_SZ AMD Ryzen 5 1500X Quad-Core Processor
Update Status = REG_DWORD 3
VendorIdentifier = REG_SZ AuthenticAMD
XMP açık mı yaptınız, kapalı mı? Açık yaptıysanız kapatarak, kapalı yaptıysanız açarak yeniden deneyebilirsiniz.MemTest86 yaptım ve sorun çıkmadı. RAM'ler de yeni zaten.