Windows 7 Mavi ekran sorunu

MyBela1

Femtopat
Katılım
21 Eylül 2020
Mesajlar
31
Merhaba arkadaşlar, benim bilgisayarım aniden kapanmıştı ve Gigabyte UEFI dualbios ekranında kalıyordu. Bilgisayarcı BIOS ve hard disk bozulmuş dedi ve BIOS attı ve depolama birimi alıp kullanabilirsin dedi. Bende bir SSD aldım ve içine format attım Windows 7 ve mavi ekran vermeye başladı zamanlaması hiç belli olmuyordu tekrardan temiz bir format attım ve sonra sürücüleri güncel kurdum(anakartın sitesinden) ama yine de mavi ekran hatası veriyor ve her seferinde mavi ekranda farklı bir şey yazıyor. Bazen de ekran donuyor ve çınlamaya benzer ses geliyor kulaklıktan ve kapanmıyor.
Genelde hata kodu olarak: Blue Screen 1055 Gibi şeyler yazıyor.
Yardımcı olursanız sevinirim şimdiden teşekkürler.
 
Son düzenleyen: Moderatör:
Norton anti-virüs kullanıyorsanız kaldırın. Avast içinde kaldırın. Memtest86 ile bellek testi yapınız. DDU ile ekran kartı sürücüsünü kaldırıp güncelini yükleyin.
Kod:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb1100
GetUlongFromAddress: unable to read from fffff80002eb11c8
 0000000000000000 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP:
+31d6ac749c9359
00000000`00000000 ??              ???

PROCESS_NAME:  System

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xD1

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  fffff88002fff9b0 -- (.trap 0xfffff88002fff9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800856d8a0 rbx=0000000000000000 rcx=fffffa800856d880
rdx=fffffa800856d880 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff88002fffb48 rbp=fffffa8006350060
 r8=fffffa800856d8a0  r9=0000000000000000 r10=fffffa8006350290
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000000`00000000 ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002c749a9 to fffff80002c75400

FAILED_INSTRUCTION_ADDRESS:
+31d6ac749c9359
00000000`00000000 ??              ???

STACK_TEXT:
fffff880`02fffb48 fffff880`0106f443 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
fffff880`02fffb50 fffff800`02c8007c : fffff880`02fd7180 00000000`00000000 fffffa80`06350128 fffffa80`076f1410 : storport!RaidpAdapterDpcRoutine+0x53
fffff880`02fffb90 fffff800`02c6d10a : fffff880`02fd7180 fffff880`02fe1fc0 00000000`00000000 fffff880`0106f3f0 : nt!KiRetireDpcList+0x1bc
fffff880`02fffc40 00000000`00000000 : fffff880`03000000 fffff880`02ffa000 fffff880`02fffc00 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  .trap 0xfffff88002fff9b0 ; kb

FOLLOWUP_IP:
storport!RaidpAdapterDpcRoutine+53
fffff880`0106f443 ff442448        inc     dword ptr [rsp+48h]

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  storport!RaidpAdapterDpcRoutine+53

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storport

IMAGE_NAME:  storport.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  52f04432

IMAGE_VERSION:  6.1.7601.18386

FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_storport!RaidpAdapterDpcRoutine+53

BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_storport!RaidpAdapterDpcRoutine+53

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xd1_code_av_null_ip_storport!raidpadapterdpcroutine+53

FAILURE_ID_HASH:  {a590f9c6-dcc2-12ec-1154-7d8586f4421c}

Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002c4783e, Address of the instruction which caused the bugcheck
Arg3: fffff8800b734ff0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!KiSignalSynchronizationObject+4e
fffff800`02c4783e 488908          mov     qword ptr [rax],rcx

CONTEXT:  fffff8800b734ff0 -- (.cxr 0xfffff8800b734ff0;r)
rax=f48a2455cc5dda95 rbx=fffffa8007e456c8 rcx=fbce390f00000000
rdx=0000000000000001 rsi=fffffa8007e456c0 rdi=fbce390f00000000
rip=fffff80002c4783e rsp=fffff8800b7359c0 rbp=fffffa80090f7200
 r8=0000000000000000  r9=0000000000000002 r10=0000000000000148
r11=0000000000000000 r12=fffffa80090f7338 r13=fffff88002f00180
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!KiSignalSynchronizationObject+0x4e:
fffff800`02c4783e 488908          mov     qword ptr [rax],rcx ds:002b:f48a2455`cc5dda95=????????????????
Last set context:
rax=f48a2455cc5dda95 rbx=fffffa8007e456c8 rcx=fbce390f00000000
rdx=0000000000000001 rsi=fffffa8007e456c0 rdi=fbce390f00000000
rip=fffff80002c4783e rsp=fffff8800b7359c0 rbp=fffffa80090f7200
 r8=0000000000000000  r9=0000000000000002 r10=0000000000000148
r11=0000000000000000 r12=fffffa80090f7338 r13=fffff88002f00180
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!KiSignalSynchronizationObject+0x4e:
fffff800`02c4783e 488908          mov     qword ptr [rax],rcx ds:002b:f48a2455`cc5dda95=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  audiodg.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002c4783e

STACK_TEXT:
fffff880`0b7359c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSignalSynchronizationObject+0x4e


FOLLOWUP_IP:
nt!KiSignalSynchronizationObject+4e
fffff800`02c4783e 488908          mov     qword ptr [rax],rcx

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!KiSignalSynchronizationObject+4e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

STACK_COMMAND:  .cxr 0xfffff8800b734ff0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!KiSignalSynchronizationObject+4e

BUCKET_ID:  X64_0x3B_nt!KiSignalSynchronizationObject+4e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_nt!kisignalsynchronizationobject+4e

FAILURE_ID_HASH:  {f522fa69-6690-af1c-4b0f-cd4c2b72fc66}

Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa80090e84e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88003e6b8bc, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000002, Optional internal context dependent data.

Debugging Details:
------------------


FAULTING_IP:
atikmpag+e8bc
fffff880`03e6b8bc 4883ec28        sub     rsp,28h

DEFAULT_BUCKET_ID:  GRAPHICS_DRIVER_TDR_FAULT

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x116

PROCESS_NAME:  System

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT:
fffff880`025a0888 fffff880`03f383f0 : 00000000`00000116 fffffa80`090e84e0 fffff880`03e6b8bc 00000000`00000000 : nt!KeBugCheckEx
fffff880`025a0890 fffff880`03f380fa : fffff880`03e6b8bc fffffa80`090e84e0 00000000`00000000 fffffa80`070ca010 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`025a08d0 fffff880`12555fef : fffffa80`090e84e0 00000000`00000000 00000000`00000000 fffffa80`070ca010 : dxgkrnl!TdrIsRecoveryRequired+0x1a2
fffff880`025a0900 fffff880`1257fdc9 : 00000000`ffffffff 00000000`00037b69 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`025a09e0 fffff880`1257e50f : 00000000`00000102 00000000`00000000 00000000`00037b69 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`025a0a10 fffff880`12551306 : ffffffff`ff676980 fffffa80`070ca010 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`025a0ab0 fffff880`1257e0ce : 00000000`00000000 fffffa80`070fdc70 00000000`00000080 fffffa80`070ca010 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`025a0bc0 fffff800`02f4e2e8 : 00000000`fffffc32 fffff880`02f00180 00000000`00000001 fffffa80`070cb060 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`025a0c00 fffff800`02ca8ec6 : fffff880`02f00180 fffffa80`070cb060 fffff880`02f0f140 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`025a0c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  .bugcheck ; kb

FOLLOWUP_IP:
atikmpag+e8bc
fffff880`03e6b8bc 4883ec28        sub     rsp,28h

SYMBOL_NAME:  atikmpag+e8bc

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmpag

IMAGE_NAME:  atikmpag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  56254b0c

FAILURE_BUCKET_ID:  X64_0x116_IMAGE_atikmpag.sys

BUCKET_ID:  X64_0x116_IMAGE_atikmpag.sys

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x116_image_atikmpag.sys

FAILURE_ID_HASH:  {83e844bc-fe68-2042-4230-7f5d3e90b48a}

Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800030bc26f, Address of the instruction which caused the bugcheck
Arg3: fffff880027e4ee0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
nt!AlpcpReceiveMessagePort+7df
fffff800`030bc26f f0480fba6ff800  lock bts qword ptr [rdi-8],0

CONTEXT:  fffff880027e4ee0 -- (.cxr 0xfffff880027e4ee0;r)
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80070f9a20
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000060000000
rip=fffff800030bc26f rsp=fffff880027e58b0 rbp=fffffa8005e7d738
 r8=fffffa80070f8518  r9=0000000000000000 r10=fffffffffffffffd
r11=fffff88002f00180 r12=0000000000000001 r13=fffffa8005e7d690
r14=0000000000010000 r15=fffffa80070f9a20
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!AlpcpReceiveMessagePort+0x7df:
fffff800`030bc26f f0480fba6ff800  lock bts qword ptr [rdi-8],0 ds:002b:00000000`5ffffff8=????????????????
Last set context:
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80070f9a20
rdx=00000000000007ff rsi=0000000000000000 rdi=0000000060000000
rip=fffff800030bc26f rsp=fffff880027e58b0 rbp=fffffa8005e7d738
 r8=fffffa80070f8518  r9=0000000000000000 r10=fffffffffffffffd
r11=fffff88002f00180 r12=0000000000000001 r13=fffffa8005e7d690
r14=0000000000010000 r15=fffffa80070f9a20
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!AlpcpReceiveMessagePort+0x7df:
fffff800`030bc26f f0480fba6ff800  lock bts qword ptr [rdi-8],0 ds:002b:00000000`5ffffff8=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800030bc26f

STACK_TEXT:
fffff880`027e58b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpReceiveMessagePort+0x7df


FOLLOWUP_IP:
nt!AlpcpReceiveMessagePort+7df
fffff800`030bc26f f0480fba6ff800  lock bts qword ptr [rdi-8],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!AlpcpReceiveMessagePort+7df

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

STACK_COMMAND:  .cxr 0xfffff880027e4ee0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!AlpcpReceiveMessagePort+7df

BUCKET_ID:  X64_0x3B_nt!AlpcpReceiveMessagePort+7df

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_nt!alpcpreceivemessageport+7df

FAILURE_ID_HASH:  {388f6e13-cc41-b567-5337-115bed90215a}

Followup: MachineOwner
---------
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: 0000000001180000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff80002e61f58

BUGCHECK_STR:  0x19_22

POOL_ADDRESS:  0000000001180000 Nonpaged pool

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

LAST_CONTROL_TRANSFER:  from fffff80002cfe286 to fffff80002ce4ea0

STACK_TEXT:
fffff880`0834f7d8 fffff800`02cfe286 : 00000000`00000019 00000000`00000022 00000000`01180000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0834f7e0 fffff800`02e2b12a : 00000000`00000000 fffff880`0834f930 fffff880`0834f8b0 fffff800`00000001 : nt! ?? ::FNODOBFM::`string'+0x6986
fffff880`0834f870 fffff800`02c8086e : fffffa80`054f29e0 fffff800`0308673e fffffa80`089a1060 fffff880`00000000 : nt!ExFreePoolWithTag+0x46a
fffff880`0834f920 fffff800`02f4d431 : 00000000`000000d0 00000000`04cce9a0 fffff880`0834fb60 fffff880`009aa180 : nt!IopAllocateIrpPrivate+0x2ce
fffff880`0834f980 fffff800`02cf2f53 : 000007fe`f0ab3022 00000000`00000000 00000000`00000000 00000000`08c76db0 : nt!NtWriteFile+0x561
fffff880`0834fa70 00000000`77d2982a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04cce928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77d2982a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+6986
fffff800`02cfe286 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+6986

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

FAILURE_BUCKET_ID:  X64_0x19_22_nt!_??_::FNODOBFM::_string_+6986

BUCKET_ID:  X64_0x19_22_nt!_??_::FNODOBFM::_string_+6986

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x19_22_nt!_??_::fnodobfm::_string_+6986

FAILURE_ID_HASH:  {f0a01a77-6364-2e29-0739-90c8f7e80e46}

Followup: MachineOwner
---------

3: kd> lmvm nt
start             end                 module name
fffff800`02c51000 fffff800`0322e000   nt         (pdb symbols)          C:\Program Files\Windows Kits\8.1\Debuggers\x86\sym\ntkrnlmp.pdb\57489119968749168D61EA066CAE95891\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\Program Files\Windows Kits\8.1\Debuggers\x86\sym\ntoskrnl.exe\5E0EAD5E5dd000\ntoskrnl.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Timestamp:        Fri Jan 03 02:56:30 2020 (5E0EAD5E)
    CheckSum:         00551102
    ImageSize:        005DD000
    File version:     6.1.7601.24545
    Product version:  6.1.7601.24545
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft® Windows® Operating System
    InternalName:     ntkrnlmp.exe
    OriginalFilename: ntkrnlmp.exe
    ProductVersion:   6.1.7601.24545
    FileVersion:      6.1.7601.24545 (win7sp1_ldr_escrow.200102-1707)
    FileDescription:  NT Kernel & System
    LegalCopyright:   © Microsoft Corporation. All rights reserved.

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffff67488a7, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002c3b278, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002e9d100
GetUlongFromAddress: unable to read from fffff80002e9d1c8
 fffffffff67488a7

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiTryUnwaitThread+28
fffff800`02c3b278 f0480fba6b4000  lock bts qword ptr [rbx+40h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF880009FDFB0

TRAP_FRAME:  fffff880009f6210 -- (.trap 0xfffff880009f6210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=fffff880009aa180
rdx=fffff88002f03308 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002c3b278 rsp=fffff880009f63a0 rbp=0000000100f03388
 r8=0000000000000100  r9=0000000000000000 r10=000000000000002d
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiTryUnwaitThread+0x28:
fffff800`02c3b278 f0480fba6b4000  lock bts qword ptr [rbx+40h],0 ds:00000000`00000040=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ca22e9 to fffff80002c93ea0

STACK_TEXT:
fffff880`009f60c8 fffff800`02ca22e9 : 00000000`0000000a ffffffff`f67488a7 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`009f60d0 fffff800`02ca00ce : 00000000`00000001 ffffffff`f67488a7 00000000`00000000 ffffffff`f6748867 : nt!KiBugCheckDispatch+0x69
fffff880`009f6210 fffff800`02c3b278 : 00000000`00000000 fffffa80`06080040 fffff880`009f6450 fffff880`11007fa6 : nt!KiPageFault+0x44e
fffff880`009f63a0 fffff800`02cafcc0 : fffff880`02f03310 00000001`00f03388 f2c89abf`e9fa573f fffff880`02f03308 : nt!KiTryUnwaitThread+0x28
fffff880`009f6400 fffff800`02c3d73d : fffff880`02f03308 00000000`00000000 00000000`00000000 00000000`00000102 : nt! ?? ::FNODOBFM::`string'+0x93c0
fffff880`009f6480 fffff800`02cd1d8f : 00000019`f6772088 fffff880`009f6b18 00000000`000ae82d fffff880`009ad328 : nt!KiProcessExpiredTimerList+0x6d
fffff880`009f6af0 fffff800`02c40d77 : 0000000a`1fc3fcff fffffa80`000ae82d fffffa80`06ce6b10 00000000`0000002d : nt! ?? ::FNODOBFM::`string'+0x2b48f
fffff880`009f6b90 fffff800`02c9742a : fffff880`009aa180 fffff880`009b9140 00000000`00000000 fffff880`00000000 : nt!KiRetireDpcList+0x277
fffff880`009f6c40 00000000`00000000 : fffff880`009f7000 fffff880`009f1000 fffff880`009f6c00 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiTryUnwaitThread+28
fffff800`02c3b278 f0480fba6b4000  lock bts qword ptr [rbx+40h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiTryUnwaitThread+28

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

FAILURE_BUCKET_ID:  X64_0xA_nt!KiTryUnwaitThread+28

BUCKET_ID:  X64_0xA_nt!KiTryUnwaitThread+28

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_nt!kitryunwaitthread+28

FAILURE_ID_HASH:  {cecbbd09-2ba5-2c63-ed01-7de0d0228c2e}

Followup: MachineOwner
---------
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 000000000000109b, (reserved)
Arg3: 0000000000166f30, Memory contents of the pool block
Arg4: fffffa8005fba350, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff80002e5df58

POOL_ADDRESS:  fffffa8005fba350 Nonpaged pool

BUGCHECK_STR:  0xc2_7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF80004036FB0

LAST_CONTROL_TRANSFER:  from fffff80002e28a01 to fffff80002ce0ea0

STACK_TEXT:
fffff800`04030758 fffff800`02e28a01 : 00000000`000000c2 00000000`00000007 00000000`0000109b 00000000`00166f30 : nt!KeBugCheckEx
fffff800`04030760 fffff800`02c80e3b : 00000000`00004000 00000000`00000000 fffffa80`05d79040 fffffa80`06c918b0 : nt!ExFreePool+0xca9
fffff800`04030810 fffff880`019a8bce : 00000000`00000000 00000000`00000001 fffffa80`05b784a0 00000000`00000000 : nt!IopfCompleteRequest+0xafb
fffff800`04030900 fffff800`02c80681 : 00000000`00000000 fffff880`01049133 00000000`00000000 fffff800`00000000 : CLASSPNP!TransferPktComplete+0x1ce
fffff800`04030980 fffff880`0103d6c8 : fffff880`03763010 fffffa80`05b69a01 fffffa80`05f97d80 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff800`04030a70 fffff880`0103d443 : 00000000`00000000 fffff800`000000eb fffffa80`054bd9b0 fffffa80`05b6c060 : storport!RaidUnitCompleteRequest+0x208
fffff800`04030b50 fffff800`02c8dcbc : fffff800`02e31180 fffff800`00000000 fffffa80`05b6c128 400000c2`400000c1 : storport!RaidpAdapterDpcRoutine+0x53
fffff800`04030b90 fffff800`02ce442a : fffff800`02e31180 fffff800`02e411c0 00000000`00000000 fffff880`0103d3f0 : nt!KiRetireDpcList+0x1bc
fffff800`04030c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP:
CLASSPNP!TransferPktComplete+1ce
fffff880`019a8bce 837c243002      cmp     dword ptr [rsp+30h],2

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  CLASSPNP!TransferPktComplete+1ce

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: CLASSPNP

IMAGE_NAME:  CLASSPNP.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7929b

IMAGE_VERSION:  6.1.7601.17514

FAILURE_BUCKET_ID:  X64_0xc2_7_CLASSPNP!TransferPktComplete+1ce

BUCKET_ID:  X64_0xc2_7_CLASSPNP!TransferPktComplete+1ce

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xc2_7_classpnp!transferpktcomplete+1ce

FAILURE_ID_HASH:  {154ce2a8-e17c-3821-f47a-a148fecc605f}

Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, An illegal page fault occurred while holding working set synchronization.
    Parameter 2 contains the referenced virtual address.
Arg2: 0000000000000001
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap

BUGCHECK_STR:  0x1a_41287

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  PUBGLite-Win64

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  fffff8800b0b7670 -- (.trap 0xfffff8800b0b7670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8008ff1b00 rbx=0000000000000000 rcx=fffffa8008ff1b00
rdx=03700000b8178867 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dd1f71 rsp=fffff8800b0b7800 rbp=fffff8800b0b7880
 r8=0000000000000001  r9=0000000000000003 r10=ffff080000000000
r11=fffff6fb7da00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!MmAccessFault+0x28e1:
fffff800`02dd1f71 498b10          mov     rdx,qword ptr [r8] ds:00000000`00000001=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002dd1d8e to fffff80002cf7ea0

STACK_TEXT:
fffff880`0b0b7518 fffff800`02dd1d8e : 00000000`0000001a 00000000`00041287 00000000`00000001 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b0b7520 fffff800`02d03fdc : 00000000`00000000 00000000`00000001 00000000`00000000 ffffffff`ffffffff : nt!MmAccessFault+0x26fe
fffff880`0b0b7670 fffff800`02dd1f71 : 00000000`00000000 00000000`00000000 00000000`00000f82 fffff880`1119ab63 : nt!KiPageFault+0x35c
fffff880`0b0b7800 00000000`00000000 : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x28e1


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!KiPageFault+35c
fffff800`02d03fdc 85c0            test    eax,eax

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiPageFault+35c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  5e0ead5e

IMAGE_VERSION:  6.1.7601.24545

FAILURE_BUCKET_ID:  X64_0x1a_41287_nt!KiPageFault+35c

BUCKET_ID:  X64_0x1a_41287_nt!KiPageFault+35c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x1a_41287_nt!kipagefault+35c

FAILURE_ID_HASH:  {c5591826-9ede-a651-60da-f7938eb78e5c}

Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000016a6ff
Arg3: 0000000000000005
Arg4: 0000000000000000

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'tunnel' and 'cdrom.sys' overlap

BUGCHECK_STR:  0x4E_9a

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  fffff880031c4660 -- (.trap 0xfffff880031c4660)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000003122a0bd rbx=0000000000000000 rcx=0000000080663004
rdx=000000009e3e071a rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000d81f06 rsp=fffff880031c47f0 rbp=0000000079308fc3
 r8=000000001ed83f16  r9=00000000867fb477 r10=00000000496d23a3
r11=00000000bf1802ba r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
CI!SHATransform+0x236:
fffff880`00d81f06 8b7334          mov     esi,dword ptr [rbx+34h] ds:00000000`00000034=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ce60ff to fffff80002ca0ea0

STACK_TEXT:
fffff880`031c47f0 fffff880`00d82f3c : fffff880`031c49d8 fffffa80`5e60ca05 00000000`448502d5 fffff800`738f3d11 : CI!SHATransform+0x236
fffff880`031c4880 fffff880`00d3fc04 : 00000000`00000021 00000000`00000036 00000000`00000000 00000000`00000000 : CI!A_SHAUpdate+0xcc
fffff880`031c48c0 fffff880`00d36d37 : 00000000`00000c00 00000000`00000000 00000000`00000000 fffff880`031c493c : CI!HashpHashBytes+0x40
fffff880`031c48f0 fffff880`00d364a2 : 00000000`00000000 00000000`014ff000 00000000`014ff000 00000000`00000000 : CI!CipImageGetImageHash+0x33f
fffff880`031c4ac0 fffff880`00d35181 : 00000000`00000001 00000000`00000000 00000000`014ff000 fffff880`031c4db8 : CI!CipValidateFileHash+0x1ce
fffff880`031c4c20 fffff800`02f5328c : fffffa80`05f6a370 00000000`000fffff fffffa80`05f63160 00000000`00000000 : CI!CiValidateImageHeader+0x215
fffff880`031c4d10 fffff800`03087e33 : 00000000`00000000 00000000`01000000 fffffa80`05f6a370 00000000`00000000 : nt!SeValidateImageHeader+0x58
fffff880`031c4d50 fffff800`030c861d : fffffa80`05f63160 fffffa80`05f6a370 00000000`00000001 fffffa80`000014ff : nt!MiValidateImageHeader+0x233
fffff880`031c4e20 fffff800`02eee0c1 : fffff880`031c5080 00000000`00000010 fffff880`031c5338 fffff880`00000001 : nt!MmCreateSection+0x92d
fffff880`031c5030 fffff800`02caef53 : fffffa80`054ce040 fffff880`031c52d8 fffff880`031c50c8 00000000`00000000 : nt!NtCreateSection+0x171
fffff880`031c50b0 fffff800`02ca46c0 : fffff800`030404b6 00000000`00000000 00000000`00810000 00000000`00000002 : nt!KiSystemServiceCopyEnd+0x13
fffff880`031c52b8 fffff800`030404b6 : 00000000`00000000 00000000`00810000 00000000`00000002 00000000`00000010 : nt!KiServiceLinkage
fffff880`031c52c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmCheckSystemImage+0x96


STACK_COMMAND:  .trap 0xfffff880031c4660 ; kb

FOLLOWUP_IP:
CI!SHATransform+236
fffff880`00d81f06 8b7334          mov     esi,dword ptr [rbx+34h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  CI!SHATransform+236

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: CI

IMAGE_NAME:  CI.dll

DEBUG_FLR_IMAGE_TIMESTAMP:  5d79bf4f

IMAGE_VERSION:  6.1.7601.24523

FAILURE_BUCKET_ID:  X64_0x4E_9a_CI!SHATransform+236

BUCKET_ID:  X64_0x4E_9a_CI!SHATransform+236

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x4e_9a_ci!shatransform+236

FAILURE_ID_HASH:  {bda0fe0e-cafe-9302-6677-d23a2ba0e5b4}

Followup: MachineOwner
---------
VIDEO_SCHEDULER_INTERNAL_ERROR (119)
The video scheduler has detected that fatal violation has occurred. This resulted
in a condition that video scheduler can no longer progress. Any other values after
parameter 1 must be individually examined according to the subtype.
Arguments:
Arg1: 0000000007000000, The subtype of the bugcheck:
Arg2: fffffa80070f0010
Arg3: fffffa8008e0c330
Arg4: fffffa800969f8e0

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x119

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF88002F38FB0

LAST_CONTROL_TRANSFER:  from fffff880015d222f to fffff80002cf2ea0

STACK_TEXT:
fffff880`02f31588 fffff880`015d222f : 00000000`00000119 00000000`07000000 fffffa80`070f0010 fffffa80`08e0c330 : nt!KeBugCheckEx
fffff880`02f31590 fffff880`043123f0 : fffffa80`08c49bf0 00000000`00000000 00000000`00000000 fffffa80`08d2fb80 : watchdog!WdLogEvent5+0x11b
fffff880`02f315e0 fffff880`04312452 : fffffa80`000037bf fffffa80`08e0c390 00000000`00000000 fffffa80`070f0010 : dxgmms1!VidSchiCheckConditionDeviceCommand+0x8c
fffff880`02f31610 fffff880`0430e3a0 : fffffa80`090101b0 fffffa80`08e0c330 fffffa80`070c0000 fffffa80`070c0000 : dxgmms1!VidSchiCheckPendingDeviceCommand+0x3e
fffff880`02f31650 fffff880`0430d81a : fffffa80`00000001 fffffa80`00000000 00000000`00000002 00000000`00000000 : dxgmms1!VidSchiProcessCompletedQueuePacketInternal+0x438
fffff880`02f31710 fffff880`0430ce3c : 00000000`00000000 fffffa80`070f0010 00000000`00000000 00000000`0000000c : dxgmms1!VidSchiProcessDpcCompletedPacket+0x3b6
fffff880`02f317b0 fffff880`0430cc88 : 00000000`00000000 fffffa80`070f0010 fffff880`02f0f140 fffff880`02f31980 : dxgmms1!VidSchDdiNotifyDpcWorker+0x198
fffff880`02f31800 fffff880`042121cf : fffffa80`0607c040 fffff880`110f0c3b fffff880`02f12000 00000000`00000022 : dxgmms1!VidSchDdiNotifyDpc+0x94
fffff880`02f31850 fffff880`110c461f : fffffa80`06fb8000 fffffa80`06fb8000 fffff880`02f31980 00000000`00000000 : dxgkrnl!DxgNotifyDpcCB+0x77
fffff880`02f31880 fffffa80`06fb8000 : fffffa80`06fb8000 fffff880`02f31980 00000000`00000000 fffffa80`06fbd000 : atikmdag+0x5761f
fffff880`02f31888 fffffa80`06fb8000 : fffff880`02f31980 00000000`00000000 fffffa80`06fbd000 fffff880`110d1b90 : 0xfffffa80`06fb8000
fffff880`02f31890 fffff880`02f31980 : 00000000`00000000 fffffa80`06fbd000 fffff880`110d1b90 00000000`00000000 : 0xfffffa80`06fb8000
fffff880`02f31898 00000000`00000000 : fffffa80`06fbd000 fffff880`110d1b90 00000000`00000000 fffffa80`06fbe3d0 : 0xfffff880`02f31980


STACK_COMMAND:  kb

FOLLOWUP_IP:
dxgmms1!VidSchiCheckConditionDeviceCommand+8c
fffff880`043123f0 c744243040c8ffff mov     dword ptr [rsp+30h],0FFFFC840h

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  dxgmms1!VidSchiCheckConditionDeviceCommand+8c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5d5222c1

IMAGE_VERSION:  6.1.7601.24513

FAILURE_BUCKET_ID:  X64_0x119_7000000_UNKNOWN_dxgmms1!VidSchiCheckConditionDeviceCommand+8c

BUCKET_ID:  X64_0x119_7000000_UNKNOWN_dxgmms1!VidSchiCheckConditionDeviceCommand+8c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x119_7000000_unknown_dxgmms1!vidschicheckconditiondevicecommand+8c

FAILURE_ID_HASH:  {a2d2bd75-84cf-a9ca-bf78-046a90c4b771}

Followup: MachineOwner
---------
 
Son düzenleme:
Norton anti-virüs kullanıyorsanız kaldırın. Avast içinde kaldırın. Memtest86 ile bellek testi yapınız. DDU ile ekran kartı sürücüsünü kaldırıp güncelini yükleyin.
Ekran kartını Anakartın sitesinden güncelledim.
Norton kullanıyorum sadece.
Memtest86 testini yapmayı bilmiyorum onun yerine Windows'un testini yapmıştım Hata görünmüyordu ama Windows başlayınca bilgi ekranıda gelmiyor.
 
Memtest ile yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Ekran kartı sürücüsünü kaldırmayı da atımıştınız tekrar atarmısınız ve o kod ne anlamadım da.
 

Geri
Yukarı