Neler Yeni

sürekli mavi erkan vermesi

Ahmetca

80+
Katılım
15 Ağustos 2020
Mesajlar
23
Dahası  
Reaksiyon skoru
8
İsim
Ahmet can gümüş
Eski ramleri çıkarın. Yeni RAM leri takıp Memtest x86 ve Windows Memory Diagnostic yapmayı deneyin.
dediklerinizin 2sini de 2 kere yaptım. sonuç aynı. sorun bulmuyor.islemcim ryzen 3 1300x. uymuyor olabilir mi?
 

Trieetz

80+ Bronze
Katılım
17 Ağustos 2020
Mesajlar
899
Dahası  
Reaksiyon skoru
1,052
İsim
Trieetz
dediklerinizin 2sini de 2 kere yaptım. sonuç aynı. sorun bulmuyor.
HDD Tune üzerinden HDD sağlığına bak. Ayrıca aynı program ile Error Scan yapıp bizlerle paylaş.


Ayrıyeten bu siteden OCCT sisteme kurup ekran kartı sıcaklıklarına ve işlemci sıcaklıklarına göz gezdir Lightshot Ekran görüntüsü alma programı ile bizlerle resim paylaş.

 

Ahmetca

80+
Katılım
15 Ağustos 2020
Mesajlar
23
Dahası  
Reaksiyon skoru
8
İsim
Ahmet can gümüş
HDD Tune üzerinden HDD sağlığına bak. Ayrıca aynı program ile Error Scan yapıp bizlerle paylaş.


Ayrıyeten bu siteden OCCT sisteme kurup ekran kartı sıcaklıklarına ve işlemci sıcaklıklarına göz gezdir Lightshot Ekran görüntüsü alma programı ile bizlerle resim paylaş.

bilgisayar başında değilim şuan. ama bütün parçalar yeni servisten geldi. bad sector vs yok pc gecince dediğiniz program ile size resim ileteceğim
 

Trieetz

80+ Bronze
Katılım
17 Ağustos 2020
Mesajlar
899
Dahası  
Reaksiyon skoru
1,052
İsim
Trieetz
bilgisayar başında değilim şuan. ama bütün parçalar yeni servisten geldi. bad sector vs yok PC gecince dediğiniz program ile size resim ileteceğim
Bekleyeceğim sonuçları.
 

Ahmetca

80+
Katılım
15 Ağustos 2020
Mesajlar
23
Dahası  
Reaksiyon skoru
8
İsim
Ahmet can gümüş

Ekler

  • Adsız.png
    Adsız.png
    140.9 KB · Hit: 23

Ahmetca

80+
Katılım
15 Ağustos 2020
Mesajlar
23
Dahası  
Reaksiyon skoru
8
İsim
Ahmet can gümüş
arkadaşlar selam. mavi ekran hatası aldım. fakat minidump u nasıl paylaşacağımı bilmiyorum. yardım edebilir misiniz?
Mesaj otomatik birleştirildi:

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\PC\Desktop\minidump\090120-4437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`14e00000 PsLoadedModuleList = 0xfffff806`15a2a2f0
Debug session time: Tue Sep 1 14:34:59.450 2020 (UTC + 3:00)
System Uptime: 0 days 0:00:44.114
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`151ddf40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff806`1b2ae340=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8061aa2be71, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4405

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JDQG48F

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 49563

Key : Analysis.Memory.CommitPeak.Mb
Value: 97

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: 38

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8061aa2be71

READ_ADDRESS: fffff80615afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80615a0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80615a0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000038

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff8061b2ae480 -- (.trap 0xfffff8061b2ae480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8061b2ae6b8 rbx=0000000000000000 rcx=fffff8061b2ae768
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061aa2be71 rsp=fffff8061b2ae610 rbp=0000000000000000
r8=000000000000000d r9=0000000000000023 r10=0000000002038005
r11=000000000d000007 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
USBXHCI!Bulk_ProcessTransferEventWithED1+0x1088d:
fffff806`1aa2be71 488b7b38 mov rdi,qword ptr [rbx+38h] ds:00000000`00000038=????????????????
Resetting default scope

STACK_TEXT:
fffff806`1b2ae338 fffff806`151efe29 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`1b2ae340 fffff806`151ec129 : ffff9908`c1ff0af0 ffff9908`c1ff0c00 fffff806`1b2ae560 ffff9908`c1fd7280 : nt!KiBugCheckDispatch+0x69
fffff806`1b2ae480 fffff806`1aa2be71 : ffff9908`c1cc1190 ffff9908`c1c7d460 fffff806`1b2ae789 fffff806`1aa164a3 : nt!KiPageFault+0x469
fffff806`1b2ae610 fffff806`1aa4ee74 : 00000000`00000004 fffff806`1b2ae750 00000000`00000000 00000000`00000780 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1088d
fffff806`1b2ae6c0 fffff806`1aa30d33 : 00000000`00000780 000066f7`3e39d3b8 ffff9908`bff5a6e0 00000000`000000ff : USBXHCI!TR_TransferEventHandler+0x34
fffff806`1b2ae6f0 fffff806`1aa15d7c : 00000000`00000002 00000000`00000000 000066f7`3e3cc2f8 fffff806`1b2aeb34 : USBXHCI!Interrupter_DeferredWorkProcessor+0x1afa3
fffff806`1b2ae7f0 fffff806`183b38f6 : fffff806`1b2aeb60 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`1b2ae820 fffff806`1503a6be : fffff806`11a86240 00000000`00000000 fffff806`1b2aeb20 ffff9908`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffff806`1b2ae860 fffff806`150399a4 : 00000000`00000000 fffff806`150eba25 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`1b2ae9d0 fffff806`151e1aae : 00000000`00000000 fffff806`11a83180 fffff806`15b26600 ffff9908`c314d080 : nt!KiRetireDpcList+0x1f4
fffff806`1b2aec60 00000000`00000000 : fffff806`1b2af000 fffff806`1b2a9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: USBXHCI!Bulk_ProcessTransferEventWithED1+1088d

MODULE_NAME: USBXHCI

IMAGE_NAME: USBXHCI.SYS

IMAGE_VERSION: 10.0.19041.423

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1088d

FAILURE_BUCKET_ID: AV_USBXHCI!Bulk_ProcessTransferEventWithED1

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {60dae131-aea2-fded-563d-90816ec5e27a}

Followup: MachineOwner
 
Son düzenleme:

Trieetz

80+ Bronze
Katılım
17 Ağustos 2020
Mesajlar
899
Dahası  
Reaksiyon skoru
1,052
İsim
Trieetz
arkadaşlar selam. mavi ekran hatası aldım. fakat minidump u nasıl paylaşacağımı bilmiyorum. yardım edebilir misiniz?
Mesaj otomatik birleştirildi:

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\PC\Desktop\minidump\090120-4437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`14e00000 PsLoadedModuleList = 0xfffff806`15a2a2f0
Debug session time: Tue Sep 1 14:34:59.450 2020 (UTC + 3:00)
System Uptime: 0 days 0:00:44.114
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`151ddf40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff806`1b2ae340=000000000000000a
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8061aa2be71, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4405

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JDQG48F

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 49563

Key : Analysis.Memory.CommitPeak.Mb
Value: 97

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: d1

BUGCHECK_P1: 38

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8061aa2be71

READ_ADDRESS: fffff80615afa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80615a0f2f0: Unable to get Flags value from nt!KdVersionBlock
fffff80615a0f2f0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000038

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff8061b2ae480 -- (.trap 0xfffff8061b2ae480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8061b2ae6b8 rbx=0000000000000000 rcx=fffff8061b2ae768
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061aa2be71 rsp=fffff8061b2ae610 rbp=0000000000000000
r8=000000000000000d r9=0000000000000023 r10=0000000002038005
r11=000000000d000007 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
USBXHCI!Bulk_ProcessTransferEventWithED1+0x1088d:
fffff806`1aa2be71 488b7b38 mov rdi,qword ptr [rbx+38h] ds:00000000`00000038=????????????????
Resetting default scope

STACK_TEXT:
fffff806`1b2ae338 fffff806`151efe29 : 00000000`0000000a 00000000`00000038 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff806`1b2ae340 fffff806`151ec129 : ffff9908`c1ff0af0 ffff9908`c1ff0c00 fffff806`1b2ae560 ffff9908`c1fd7280 : nt!KiBugCheckDispatch+0x69
fffff806`1b2ae480 fffff806`1aa2be71 : ffff9908`c1cc1190 ffff9908`c1c7d460 fffff806`1b2ae789 fffff806`1aa164a3 : nt!KiPageFault+0x469
fffff806`1b2ae610 fffff806`1aa4ee74 : 00000000`00000004 fffff806`1b2ae750 00000000`00000000 00000000`00000780 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1088d
fffff806`1b2ae6c0 fffff806`1aa30d33 : 00000000`00000780 000066f7`3e39d3b8 ffff9908`bff5a6e0 00000000`000000ff : USBXHCI!TR_TransferEventHandler+0x34
fffff806`1b2ae6f0 fffff806`1aa15d7c : 00000000`00000002 00000000`00000000 000066f7`3e3cc2f8 fffff806`1b2aeb34 : USBXHCI!Interrupter_DeferredWorkProcessor+0x1afa3
fffff806`1b2ae7f0 fffff806`183b38f6 : fffff806`1b2aeb60 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff806`1b2ae820 fffff806`1503a6be : fffff806`11a86240 00000000`00000000 fffff806`1b2aeb20 ffff9908`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
fffff806`1b2ae860 fffff806`150399a4 : 00000000`00000000 fffff806`150eba25 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff806`1b2ae9d0 fffff806`151e1aae : 00000000`00000000 fffff806`11a83180 fffff806`15b26600 ffff9908`c314d080 : nt!KiRetireDpcList+0x1f4
fffff806`1b2aec60 00000000`00000000 : fffff806`1b2af000 fffff806`1b2a9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME: USBXHCI!Bulk_ProcessTransferEventWithED1+1088d

MODULE_NAME: USBXHCI

IMAGE_NAME: USBXHCI.SYS

IMAGE_VERSION: 10.0.19041.423

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1088d

FAILURE_BUCKET_ID: AV_USBXHCI!Bulk_ProcessTransferEventWithED1

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {60dae131-aea2-fded-563d-90816ec5e27a}

Followup: MachineOwner
Bu rehberi inceleyin.

 
Top Bottom