Çözüldü Windows 10 giriş yapıldıktan sonra mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

s1trix

Hectopat
Katılım
6 Haziran 2019
Mesajlar
311
Makaleler
3
Çözümler
7
RAM
4 GB
SSD veya HDD modeli
WD500LPVX-22V0TT0
Ekran kartı
Nvidia Geforce GT 630M
Anakart
Pegatron A15W8
İşlemci
Intel i5 3210M
Sorunum şu: Sistemi açıp şifreyi girdikten sonra doğrudan mavi ekran hatası alıyorum. Sistemi güvenli modda falan başlatmaya çalıştığımda bazen mavi ekran veriyor, bazen vermiyor. Windows 7 dahil tüm Windows sürümlerini denedim (8-10-11) ancak yine de aynı hatayı vermeye devam etti. Sisteme Linux kurmaya da çalıştım ancak kurduğum dağıtımlarda sürekli bir performans düşüşü vardı. Minidump dosyalarını aşağıya bıraktım. Yardımcı olacaklara şimdiden teşekkürler.

 
Son düzenleyen: Moderatör:
Çözüm
Dosya sistemi ile alakalı bir sorun görünüyor bu raporda da. NTFS düzeni ile ilgili.


Yukarıdaki yöntemi bir deneyin. Artı olarak Windows Update üzerinden tüm güncellemeleri aldığınızdan emin olun.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80178e88ef1, Address of the instruction which caused the BugCheck
Arg3: ffff9901b542f3b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4764

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 21830

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9723

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  yeni 24.12.2021.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80178e88ef1

BUGCHECK_P3: ffff9901b542f3b0

BUGCHECK_P4: 0

CONTEXT:  ffff9901b542f3b0 -- (.cxr 0xffff9901b542f3b0)
rax=0000000000000050 rbx=ffffd80106bee180 rcx=00000000000000c3
rdx=0000000000000000 rsi=ffff9901b54303c0 rdi=ffff878b1075b2c0
rip=fffff80178e88ef1 rsp=ffff9901b542fdb0 rbp=0000000000000008
 r8=00000000300474c3  r9=ffffd80106bef4f0 r10=0000000000000000
r11=ffff9901b542fed8 r12=0000000000000c30 r13=ffffd80106bef4f0
r14=ffffffffffffffff r15=ffff878b10d609f8
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
Ntfs!NtfsFindPrefixHashEntry+0x231:
fffff801`78e88ef1 410fb78670020000 movzx   eax,word ptr [r14+270h] ds:002b:00000000`0000026f=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


PROCESS_NAME:  conhost.exe

STACK_TEXT: 
ffff9901`b542fdb0 fffff801`78e89b7c     : ffffd801`103f8a28 ffffd801`06bef4f0 ffff878b`0c9b57c0 0000000b`00000001 : Ntfs!NtfsFindPrefixHashEntry+0x231
ffff9901`b542fee0 fffff801`78e8ac20     : ffffd801`103f8a28 ffffd801`0e771010 00000000`00000001 ffff9901`b5430180 : Ntfs!NtfsFindStartingNode+0x25c
ffff9901`b542ffd0 fffff801`78e8715b     : ffffd801`0e771010 ffff9901`b54303c0 ffffd801`0e771010 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
ffff9901`b54302b0 fffff801`76e52f55     : ffffd801`06bee030 ffffd801`0e771010 ffff9901`b5430600 ffffd801`1063f4e0 : Ntfs!NtfsFsdCreate+0x1db
ffff9901`b5430530 fffff801`72b96ccf     : ffffd801`1063f500 ffff9901`b5430620 ffff9901`b5430629 fffff801`72b95b37 : nt!IofCallDriver+0x55
ffff9901`b5430570 fffff801`72bcbbd4     : ffff9901`b5430620 ffffd801`1063f538 ffffd801`06b6ed60 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9901`b54305e0 fffff801`76e52f55     : ffffd801`1063f400 ffffd801`06c14970 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffff9901`b5430690 fffff801`76e54544     : 00000000`00000000 ffffd801`0e771010 ffffd801`06b61bc0 ffffd801`06b6ed60 : nt!IofCallDriver+0x55
ffff9901`b54306d0 fffff801`771ff03d     : ffff9901`b5430990 ffffd801`06c14970 ffffd801`1063f578 ffff9901`00000001 : nt!IoCallDriverWithTracing+0x34
ffff9901`b5430720 fffff801`77227a0e     : ffffd801`06c14970 00000000`00000000 ffffd801`0fd858a0 ffffd801`0fd85801 : nt!IopParseDevice+0x117d
ffff9901`b5430890 fffff801`771eb30a     : ffffd801`0fd85800 ffff9901`b5430af8 00000000`00000840 ffffd801`060faa60 : nt!ObpLookupObjectName+0x3fe
ffff9901`b5430a60 fffff801`7726e185     : ffff878b`00000000 00000081`7327e328 000001ac`5e20a5a8 00000081`7327e2f8 : nt!ObOpenObjectByNameEx+0x1fa
ffff9901`b5430b90 fffff801`770077b8     : ffffd801`1082e000 000001ac`5efb7df8 ffffd801`1082e080 00000000`00000000 : nt!NtQueryAttributesFile+0x1c5
ffff9901`b5430e40 00007fff`5c40d4c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000081`7327e298 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`5c40d4c4


SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+231

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .cxr 0xffff9901b542f3b0 ; kb

BUCKET_ID_FUNC_OFFSET:  231

FAILURE_BUCKET_ID:  0x3B_c0000005_Ntfs!NtfsFindPrefixHashEntry

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fd51bba6-3a1c-9f2a-cb88-7eed4d844386}

Followup:     MachineOwner
Dosyalarınızı inceledim. Sanıyorum ki sorununuz çok yüksek ihtimal ile RAM'lerinizde. Öncelikle basit bir çözüm deneyelim. Eğer X.M.P. ayarı mevcutsa onu bir kapatıp deneyin. Eğer yoksa RAM'lerinize Memtest yazılımı ile test yapmanızı ve sonuçları bizlerle paylaşmanızı rica edicem.

Memtest : Memtest86 ile Bozuk RAM Testi

Kod:
CACHE_MANAGER (34)
    See the comment for FAT_FILE_SYSTEM (0x23)
Arguments:
Arg1: 0000000000051384
Arg2: ffffcb099e7aa0e8
Arg3: ffffcb099e7a9920
Arg4: fffff8041404ee6b

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 4937

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 29931

    Key  : Analysis.Init.CPU.mSec
    Value: 843

    Key  : Analysis.Init.Elapsed.mSec
    Value: 48449

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  122121-31750-01.dmp

BUGCHECK_CODE:  34

BUGCHECK_P1: 51384

BUGCHECK_P2: ffffcb099e7aa0e8

BUGCHECK_P3: ffffcb099e7a9920

BUGCHECK_P4: fffff8041404ee6b

EXCEPTION_RECORD:  ffffcb099e7aa0e8 -- (.exr 0xffffcb099e7aa0e8)
ExceptionAddress: fffff8041404ee6b (nt!RtlRbRemoveNode+0x000000000000039b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffcb099e7a9920 -- (.cxr 0xffffcb099e7a9920)
rax=9002000c020c0200 rbx=ffffa78e84e00290 rcx=ffffa78e8e2e8888
rdx=ffffa78e8ed0d888 rsi=0000000000000000 rdi=9002000c020c0200
rip=fffff8041404ee6b rsp=ffffcb099e7aa328 rbp=000000000000008a
 r8=ffffa78e8ec60888  r9=ffffa78e8ec60888 r10=0000000000000000
r11=ffffa78e8ed0b888 r12=0000000000000000 r13=ffffa78e8ed02000
r14=0000000000000000 r15=ffffa78e8ed0d880
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!RtlRbRemoveNode+0x39b:
fffff804`1404ee6b 488b07          mov     rax,qword ptr [rdi] ds:002b:9002000c`020c0200=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff80414afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
ffffcb09`9e7aa328 fffff804`1404e890     : 00000000`0000008a ffffa78e`8ed0dfe0 00000000`00000000 ffffa78e`8ed0d880 : nt!RtlRbRemoveNode+0x39b
ffffcb09`9e7aa340 fffff804`1404e2d8     : ffffa78e`84e00280 ffffa78e`8ed02000 ffffa78e`84e00280 ffffcb09`9e7aa448 : nt!RtlpHpVsChunkCoalesce+0xb0
ffffcb09`9e7aa3a0 fffff804`1404cc64     : ffffcb09`00000000 00000000`00000000 00000000`00000000 fffff804`00000000 : nt!RtlpHpVsContextFree+0x188
ffffcb09`9e7aa440 fffff804`147b1019     : ffffd085`00000890 ffffa78e`8d63d010 ffffa78e`8d63d010 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffcb09`9e7aa520 fffff804`1408387f     : 00000000`00000100 00000000`00000000 ffffe280`013c0f50 ffffe280`013c0f50 : nt!ExFreePool+0x9
ffffcb09`9e7aa550 fffff804`140b96f6     : ffffd085`14eb3650 ffffcb09`9e7aa678 00000000`00000011 00000000`00000000 : nt!MiDeleteSubsectionPages+0x63f
ffffcb09`9e7aa610 fffff804`1443e396     : 00000000`000c8081 00000000`00000000 fffff804`14a50c80 00000000`000c8081 : nt!MiDeleteSegmentPages+0x56
ffffcb09`9e7aa670 fffff804`140a3aca     : 00000000`00000001 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiSegmentDelete+0x92
ffffcb09`9e7aa6c0 fffff804`140a38b2     : 00000000`00000000 00000000`00000000 ffffffff`ffffffff 00000000`00000000 : nt!MiCheckControlArea+0x1fa
ffffcb09`9e7aa740 fffff804`14434223     : ffffd085`14eb35d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDereferenceControlAreaBySection+0x2a
ffffcb09`9e7aa770 fffff804`143fb300     : ffffa78e`8e9383b0 ffffffff`ffffffff 00000000`00000000 ffffd085`0b2fb220 : nt!MiSectionDelete+0x83
ffffcb09`9e7aa7a0 fffff804`14061277     : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffffa78e`8e9383e0 : nt!ObpRemoveObjectRoutine+0x80
ffffcb09`9e7aa800 fffff804`1406119e     : 00000000`00000000 ffffcb09`9e7aa920 ffffd085`0b346a60 00000000`00000001 : nt!ObfDereferenceObjectWithTag+0xc7
ffffcb09`9e7aa840 fffff804`14033891     : 00000000`00000000 00000000`00000000 ffffffff`ffffffff ffffcb09`9e7aa920 : nt!HalPutDmaAdapter+0xe
ffffcb09`9e7aa870 fffff804`1402d1c9     : 00000000`00000000 ffffcb09`9e7aa939 ffffd085`152b6690 ffffd085`14b16da0 : nt!CcDeleteSharedCacheMap+0x165
ffffcb09`9e7aa8c0 fffff804`14032775     : ffffd085`1524c5d0 00000000`00000000 ffffd085`0b346a00 ffffd085`00000000 : nt!CcWriteBehindInternal+0x389
ffffcb09`9e7aa9a0 fffff804`140345a1     : ffffd085`12e75040 ffffd085`0b2c11f0 ffffd085`1524c5d0 ffffd085`1674a601 : nt!CcWriteBehind+0x91
ffffcb09`9e7aaa90 fffff804`14025975     : ffffd085`12e75040 ffffd085`0b26f7e0 ffffd085`0b2c11f0 00000000`00000000 : nt!CcCachemapUninitWorkerThread+0xf1
ffffcb09`9e7aab70 fffff804`14117e85     : ffffd085`12e75040 00000000`00000080 ffffd085`0b287040 00078405`bd9bbfff : nt!ExpWorkerThread+0x105
ffffcb09`9e7aac10 fffff804`141fd498     : ffffba80`598e4180 ffffd085`12e75040 fffff804`14117e30 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffffcb09`9e7aac60 00000000`00000000     : ffffcb09`9e7ab000 ffffcb09`9e7a5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.928

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffcb099e7a9920 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x34_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bef2d914-8af1-1fb2-0b41-3dfb43df10c9}

Followup:     Pool_corruption

Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff80476036020, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for NETIO.SYS

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5187

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 29492

    Key  : Analysis.Init.CPU.mSec
    Value: 890

    Key  : Analysis.Init.Elapsed.mSec
    Value: 45002

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  122221-27765-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80476036020

WRITE_ADDRESS: fffff80478cfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dasHost.exe

TRAP_FRAME:  fffff30bdbb5bdf0 -- (.trap 0xfffff30bdbb5bdf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00003f11f3ce5595
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80476036020 rsp=fffff30bdbb5bf88 rbp=fffff30bdbb5c090
 r8=ffffce86b88f61f0  r9=0000000000000000 r10=fffff804782daa90
r11=ffff72fa89000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
WdNisDrv!_security_check_cookie:
fffff804`76036020 0000            add     byte ptr [rax],al ds:00000000`00000000=??
Resetting default scope

STACK_TEXT: 
fffff30b`dbb5bca8 fffff804`78407d69     : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff30b`dbb5bcb0 fffff804`78404069     : ffffce86`b8a619b0 fffff30b`dbb5cd14 fffff30b`dbb5d018 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff30b`dbb5bdf0 fffff804`76036020     : fffff804`76033aab ffffce86`b8d87208 fffff30b`dbb5c090 00000000`000010ec : nt!KiPageFault+0x469
fffff30b`dbb5bf88 fffff804`76033aab     : ffffce86`b8d87208 fffff30b`dbb5c090 00000000`000010ec 00000000`00000000 : WdNisDrv!_security_check_cookie
fffff30b`dbb5bf90 fffff804`760331b9     : ffffce86`b05dab90 00000000`00000000 00000000`00000000 00000000`00000000 : WdNisDrv!wfp_callout<implementation::wfp_callout,implementation::spin_lock,implementation::event,implementation::avl_table,stream_handler<implementation::stream_handler<implementation::irp,implementation::queue,implementation::csqueue,implementation::spin_lock,10000> >,running_processes<implementation::running_processes,implementation::avl_table,implementation::spin_lock,atomic_shared_ptr<excluded_paths,implementation::spin_lock>::accessor_t> >::flow_established_classify_+0x57b
fffff30b`dbb5c370 fffff804`7b9eca50     : ffffce86`b05dab90 ffffce86`b97a4d08 00000000`00000078 00000000`00000000 : WdNisDrv!wfp_callout<implementation::wfp_callout,implementation::spin_lock,implementation::event,implementation::avl_table,stream_handler<implementation::stream_handler<implementation::irp,implementation::queue,implementation::csqueue,implementation::spin_lock,10000> >,running_processes<implementation::running_processes,implementation::avl_table,implementation::spin_lock,atomic_shared_ptr<excluded_paths,implementation::spin_lock>::accessor_t> >::flow_established_classify+0x19
fffff30b`dbb5c3a0 ffffce86`b05dab90     : ffffce86`b97a4d08 00000000`00000078 00000000`00000000 ffffce86`b8cc4d00 : NETIO+0xca50
fffff30b`dbb5c3a8 ffffce86`b97a4d08     : 00000000`00000078 00000000`00000000 ffffce86`b8cc4d00 00000000`00000000 : 0xffffce86`b05dab90
fffff30b`dbb5c3b0 00000000`00000078     : 00000000`00000000 ffffce86`b8cc4d00 00000000`00000000 fffff30b`dbb5c600 : 0xffffce86`b97a4d08
fffff30b`dbb5c3b8 00000000`00000000     : ffffce86`b8cc4d00 00000000`00000000 fffff30b`dbb5c600 00000000`00000000 : 0x78


CHKIMG_EXTENSION: !chkimg -lo 50 -d !WdNisDrv
    fffff80476036000-fffff8047603601a  27 bytes - WdNisDrv!WdmlibRtlInitUnicodeStringEx+38
    [ 33 c0 66 44 89 41 02 48:20 00 00 20 00 00 00 40 ]
    fffff80476036020-fffff80476036024  5 bytes - WdNisDrv!_security_check_cookie (+0x20)
    [ 48 3b 0d 59 30:00 00 00 80 00 ]
    fffff80476036027-fffff8047603603c  22 bytes - WdNisDrv!_security_check_cookie+7 (+0x07)
    [ 75 10 48 c1 c1 10 66 f7:00 01 00 00 14 80 00 00 ]
    fffff8047603603e-fffff80476036041  4 bytes - WdNisDrv!_security_check_cookie+1e (+0x17)
    [ cc cc b9 02:00 00 40 00 ]
    fffff80476036043-fffff80476036050  14 bytes - WdNisDrv!_report_gsfailure+3 (+0x05)
    [ 00 00 cd 29 cc cc cc cc:20 48 00 00 01 00 00 00 ]
    fffff80476036052-fffff8047603606f  30 bytes - WdNisDrv!guard_check_icall_nop+2 (+0x0f)
    [ 00 cc cc cc cc cc cc cc:10 01 00 01 00 01 00 00 ]
    fffff80476036073-fffff80476036074  2 bytes - WdNisDrv!_GSHandlerCheck+13 (+0x21)
    [ b8 01:80 22 ]
    fffff80476036078-fffff80476036085  14 bytes - WdNisDrv!_GSHandlerCheck+18 (+0x05)
    [ 48 83 c4 28 c3 cc cc cc:00 00 00 00 01 00 02 00 ]
    fffff80476036087-fffff80476036099  19 bytes - WdNisDrv!_GSHandlerCheckCommon+7 (+0x0f)
    [ 4c 8b c9 44 8b d8 4c 8b:00 00 00 00 00 00 00 00 ]
    fffff8047603609b-fffff804760360ea  80 bytes - WdNisDrv!_GSHandlerCheckCommon+1b (+0x14)
    [ 08 4d 63 50 04 f7 d8 4c:00 04 00 00 40 00 00 00 ]
    fffff804760360ef - WdNisDrv!_GSHandlerCheckCommon+6f (+0x54)
    [ 00:10 ]
    fffff804760360f5-fffff80476036109  21 bytes - WdNisDrv!guard_dispatch_icall_nop+5 (+0x06)
    [ cc cc cc cc cc cc cc cc:00 01 10 03 00 00 00 03 ]
    fffff8047603610c-fffff8047603613a  47 bytes - WdNisDrv!memcpy+c (+0x17)
    [ 49 83 f8 4f 73 58 4d 8b:00 00 00 00 00 40 00 00 ]
    fffff8047603613c-fffff8047603613e  3 bytes - WdNisDrv!memcpy+3c (+0x30)
    [ 00 00 00:02 80 80 ]
    fffff80476036140-fffff8047603615b  28 bytes - WdNisDrv!memcpy+40 (+0x04)
    [ 8a 04 11 48 ff c1 49 ff:00 00 00 00 00 00 06 00 ]
    fffff8047603615d - WdNisDrv!memcpy+5d (+0x1d)
    [ 00:20 ]
    fffff8047603615f-fffff80476036191  51 bytes - WdNisDrv!memcpy+5f (+0x02)
    [ 00 90 90 90 90 90 90 90:40 00 20 00 00 00 00 00 ]
    fffff80476036193 - WdNisDrv!memcpy+93 (+0x34)
    [ 20:80 ]
    fffff80476036196-fffff8047603619a  5 bytes - WdNisDrv!memcpy+96 (+0x03)
    [ 0f 87 76 00 00:00 00 00 02 c0 ]
    fffff8047603619c-fffff804760361cc  49 bytes - WdNisDrv!memcpy+9c (+0x06)
    [ 49 83 e0 1f f3 0f 6f 04:00 00 00 01 00 00 00 00 ]
    fffff804760361ce - WdNisDrv!memcpy+ce (+0x32)
    [ 00:02 ]
    fffff804760361d2-fffff804760361db  10 bytes - WdNisDrv!memcpy+d2 (+0x04)
    [ 66 66 66 66 66 66 0f 1f:40 00 04 00 00 00 00 00 ]
    fffff804760361e0-fffff804760361fa  27 bytes - WdNisDrv!memcpy+e0 (+0x0e)
    [ f6 c1 0f 74 a3 8a 04 11:20 20 20 00 02 00 00 00 ]
    fffff80476036200-fffff80476036214  21 bytes - WdNisDrv!memcpy+100 (+0x20)
    [ 90 90 90 90 90 90 90 90:00 00 00 10 00 00 24 80 ]
    fffff80476036216 - WdNisDrv!memcpy+116 (+0x16)
    [ 02:00 ]
    fffff80476036218-fffff8047603621c  5 bytes - WdNisDrv!memcpy+118 (+0x02)
    [ 00 72 81 b8 04:80 00 00 01 00 ]
    fffff8047603621f-fffff8047603622c  14 bytes - WdNisDrv!memcpy+11f (+0x07)
    [ 00 0f 18 04 11 0f 18 44:18 00 02 00 00 20 00 01 ]
    fffff80476036230-fffff80476036236  7 bytes - WdNisDrv!memcpy+130 (+0x11)
    [ ff c8 75 ec 48 81 e9:00 00 00 00 00 00 00 ]
    fffff80476036238-fffff80476036239  2 bytes - WdNisDrv!memcpy+138 (+0x08)
    [ 02 00:00 02 ]
    fffff8047603623b-fffff8047603623c  2 bytes - WdNisDrv!memcpy+13b (+0x03)
    [ b8 08:00 00 ]
    fffff80476036240-fffff80476036277  56 bytes - WdNisDrv!memcpy+140 (+0x05)
    [ f3 0f 6f 04 11 f3 0f 6f:00 00 80 00 00 40 02 00 ]
    fffff80476036279-fffff8047603627b  3 bytes - WdNisDrv!memcpy+179 (+0x39)
    [ 49 81 f8:00 00 00 ]
    fffff8047603627d-fffff8047603629b  31 bytes - WdNisDrv!memcpy+17d (+0x04)
    [ 02 00 00 73 99 f0 80 0c:00 10 40 00 00 10 20 00 ]
    fffff8047603629e - WdNisDrv!memcpy+19e (+0x21)
    [ 00:04 ]
    fffff804760362a0-fffff804760362da  59 bytes - WdNisDrv!memcpy+1a0 (+0x02)
    [ 90 90 90 90 90 90 90 90:40 00 08 00 00 00 00 00 ]
    fffff804760362dc - WdNisDrv!memcpy+1dc (+0x3c)
    [ 00:02 ]
    fffff804760362e0-fffff8047603631d  62 bytes - WdNisDrv!memcpy+1e0 (+0x04)
    [ 8a 44 11 ff 48 ff c9 49:00 00 10 00 40 80 00 42 ]
    fffff8047603631f-fffff80476036331  19 bytes - WdNisDrv!memcpy+21f (+0x3f)
    [ f0 f3 0f 7f 40 f0 48 03:00 02 40 00 02 00 60 00 ]
    fffff80476036333 - WdNisDrv!memcpy+233 (+0x14)
    [ 20:00 ]
    fffff80476036336-fffff80476036338  3 bytes - WdNisDrv!memcpy+236 (+0x03)
    [ 0f 87 76:00 00 40 ]
    fffff8047603633c-fffff8047603636c  49 bytes - WdNisDrv!memcpy+23c (+0x06)
    [ 49 83 e0 1f f3 0f 6f 44:00 00 00 00 00 00 00 00 ]
    fffff80476036371-fffff8047603637a  10 bytes - WdNisDrv!memcpy+271 (+0x35)
    [ 00 66 66 66 66 66 66 0f:40 00 00 00 40 00 00 04 ]
    fffff80476036380-fffff8047603639a  27 bytes - WdNisDrv!memcpy+280 (+0x0f)
    [ f6 c1 0f 74 a3 48 ff c9:00 00 01 00 00 01 00 00 ]
    fffff8047603639c-fffff8047603639d  2 bytes - WdNisDrv!memcpy+29c (+0x1c)
    [ 00 00:20 01 ]
    fffff804760363a0-fffff804760363b4  21 bytes - WdNisDrv!memcpy+2a0 (+0x04)
    [ 90 90 90 90 90 90 90 90:00 60 08 00 42 44 00 00 ]
    fffff804760363b6-fffff804760363bc  7 bytes - WdNisDrv!memcpy+2b6 (+0x16)
    [ fe ff ff 77 81 b8 04:00 02 00 08 04 02 00 ]
    fffff804760363bf-fffff804760363c3  5 bytes - WdNisDrv!memcpy+2bf (+0x09)
    [ 00 48 81 e9 80:04 00 00 00 00 ]
    fffff804760363c5 - WdNisDrv!memcpy+2c5 (+0x06)
    [ 00:10 ]
    fffff804760363c7-fffff804760363d6  16 bytes - WdNisDrv!memcpy+2c7 (+0x02)
    [ 0f 18 04 11 0f 18 44 11:00 00 00 00 00 08 00 00 ]
    fffff804760363d8 - WdNisDrv!memcpy+2d8 (+0x11)
    [ 02:00 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
1199 errors : !WdNisDrv (fffff80476036000-fffff80476036528)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
 
Hmm.. Sonuca göre yaptığım tespit yanlış olmuş oluyor. "memory_corruption" ibaresi beni bu duruma itmişti. Dilerseniz bir de diskinize test yapalım. Sorunu bulacağız adım adım. Sizden isteğim. HDTune yazılımı ile öncelikle bana "health" sekmesinin görselini paylaşın ve akabinde "quick scan" kapalı olacak şekilde "error scan" testi yapın disklerinize. Geri dönüşünüzü bekliyorum. Umuyorum ki bu sorunun sebebini ve çözümünü bulacağız.
 
MfbdGPE03L.png

HDTunePro_Q2HXJxmjb8.png

Buyrun hocam.
 
Sonuçlar gayet güzel bu bir bakıma sevindirici bir şey. Başka bir diskiniz var mı peki? Ekstradan kullandığınız harici veya dahili olarak. Bir de güncel bir minidump dosyası oluştu mu hiç ?
 
Sonuçlar gayet güzel bu bir bakıma sevindirici bir şey. Başka bir diskiniz var mı peki? Ekstradan kullandığınız harici veya dahili olarak. Bir de güncel bir minidump dosyası oluştu mu hiç ?
Başka bir diskim yok hocam. Harici olarak flash belleklerim var onlarda da veri saklıyorum zaten sürekli bilgisayara takmıyorum. Bir adet'te yeni dump dosyası var onu da aşağıya bıraktım.
 
Dosya sistemi ile alakalı bir sorun görünüyor bu raporda da. NTFS düzeni ile ilgili.


Yukarıdaki yöntemi bir deneyin. Artı olarak Windows Update üzerinden tüm güncellemeleri aldığınızdan emin olun.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80178e88ef1, Address of the instruction which caused the BugCheck
Arg3: ffff9901b542f3b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4764

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 21830

    Key  : Analysis.Init.CPU.mSec
    Value: 780

    Key  : Analysis.Init.Elapsed.mSec
    Value: 9723

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  yeni 24.12.2021.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80178e88ef1

BUGCHECK_P3: ffff9901b542f3b0

BUGCHECK_P4: 0

CONTEXT:  ffff9901b542f3b0 -- (.cxr 0xffff9901b542f3b0)
rax=0000000000000050 rbx=ffffd80106bee180 rcx=00000000000000c3
rdx=0000000000000000 rsi=ffff9901b54303c0 rdi=ffff878b1075b2c0
rip=fffff80178e88ef1 rsp=ffff9901b542fdb0 rbp=0000000000000008
 r8=00000000300474c3  r9=ffffd80106bef4f0 r10=0000000000000000
r11=ffff9901b542fed8 r12=0000000000000c30 r13=ffffd80106bef4f0
r14=ffffffffffffffff r15=ffff878b10d609f8
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
Ntfs!NtfsFindPrefixHashEntry+0x231:
fffff801`78e88ef1 410fb78670020000 movzx   eax,word ptr [r14+270h] ds:002b:00000000`0000026f=????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


PROCESS_NAME:  conhost.exe

STACK_TEXT: 
ffff9901`b542fdb0 fffff801`78e89b7c     : ffffd801`103f8a28 ffffd801`06bef4f0 ffff878b`0c9b57c0 0000000b`00000001 : Ntfs!NtfsFindPrefixHashEntry+0x231
ffff9901`b542fee0 fffff801`78e8ac20     : ffffd801`103f8a28 ffffd801`0e771010 00000000`00000001 ffff9901`b5430180 : Ntfs!NtfsFindStartingNode+0x25c
ffff9901`b542ffd0 fffff801`78e8715b     : ffffd801`0e771010 ffff9901`b54303c0 ffffd801`0e771010 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
ffff9901`b54302b0 fffff801`76e52f55     : ffffd801`06bee030 ffffd801`0e771010 ffff9901`b5430600 ffffd801`1063f4e0 : Ntfs!NtfsFsdCreate+0x1db
ffff9901`b5430530 fffff801`72b96ccf     : ffffd801`1063f500 ffff9901`b5430620 ffff9901`b5430629 fffff801`72b95b37 : nt!IofCallDriver+0x55
ffff9901`b5430570 fffff801`72bcbbd4     : ffff9901`b5430620 ffffd801`1063f538 ffffd801`06b6ed60 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9901`b54305e0 fffff801`76e52f55     : ffffd801`1063f400 ffffd801`06c14970 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffff9901`b5430690 fffff801`76e54544     : 00000000`00000000 ffffd801`0e771010 ffffd801`06b61bc0 ffffd801`06b6ed60 : nt!IofCallDriver+0x55
ffff9901`b54306d0 fffff801`771ff03d     : ffff9901`b5430990 ffffd801`06c14970 ffffd801`1063f578 ffff9901`00000001 : nt!IoCallDriverWithTracing+0x34
ffff9901`b5430720 fffff801`77227a0e     : ffffd801`06c14970 00000000`00000000 ffffd801`0fd858a0 ffffd801`0fd85801 : nt!IopParseDevice+0x117d
ffff9901`b5430890 fffff801`771eb30a     : ffffd801`0fd85800 ffff9901`b5430af8 00000000`00000840 ffffd801`060faa60 : nt!ObpLookupObjectName+0x3fe
ffff9901`b5430a60 fffff801`7726e185     : ffff878b`00000000 00000081`7327e328 000001ac`5e20a5a8 00000081`7327e2f8 : nt!ObOpenObjectByNameEx+0x1fa
ffff9901`b5430b90 fffff801`770077b8     : ffffd801`1082e000 000001ac`5efb7df8 ffffd801`1082e080 00000000`00000000 : nt!NtQueryAttributesFile+0x1c5
ffff9901`b5430e40 00007fff`5c40d4c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000081`7327e298 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`5c40d4c4


SYMBOL_NAME:  Ntfs!NtfsFindPrefixHashEntry+231

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

IMAGE_VERSION:  10.0.19041.928

STACK_COMMAND:  .cxr 0xffff9901b542f3b0 ; kb

BUCKET_ID_FUNC_OFFSET:  231

FAILURE_BUCKET_ID:  0x3B_c0000005_Ntfs!NtfsFindPrefixHashEntry

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fd51bba6-3a1c-9f2a-cb88-7eed4d844386}

Followup:     MachineOwner
 
Çözüm
Dosya sistemi ile alakalı bir sorun görünüyor bu raporda da. NTFS düzeni ile ilgili.


Yukarıdaki yöntemi bir deneyin. Artı olarak Windows Update üzerinden tüm güncellemeleri aldığınızdan emin olun.
Hocam söylediklerinizi güvenli modda denedim. Zira normal olarak başlatamıyorum zaten. Neyse yukarıdakileri denedikten sonra sistemi normal modda yeniden başlattım ve bir mavi ekran hatası daha aldım onun da dump dosyası aşağıda. Ayrıca vakit ayırıp yardımcı olmaya çalıştığınız için de teşekkürler.
 

Yeni konular

Geri
Yukarı