i5-12400F RTX3060 Dual sistemde 3 ayrı mavi ekran hatası

The_rain_master

Hectopat
Katılım
11 Haziran 2022
Mesajlar
1.300
Çözümler
6
Arkadaşlar 3 ayrı mavi ekran hatası aldım.
minidump

Donanım:
ASUS RTX 3060 Dual.
i5 12400F.
ASUS Prime B660.
Kingston Fury Beast 16 GB (2x8GB) 3200MHz DDR4.
WD Blue SN570 500GB.

Yardımcı olabilir misiniz?
 
RAM'lerin hakkı rahmetine kavuşmuş görünüyor;

Memtest86 ile RAM testi yapın.


Kod:
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffe1680e8
Arg3: 0000000000200000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2124

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4073

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 296

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10511

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : MemoryManagement.PFN
    Value: 200


FILE_IN_CAB:  042323-5046-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff81bffe1680e8

BUGCHECK_P3: 200000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  F1_22.exe

STACK_TEXT: 
ffff840d`4e2feea8 fffff801`4bd00197     : 00000000`0000001a 00000000`00041792 ffff81bf`fe1680e8 00000000`00200000 : nt!KeBugCheckEx
ffff840d`4e2feeb0 fffff801`4bcefb3d     : 00000000`00000000 ffff840d`4e2ff3b0 ffff6536`79227ab3 00000000`00000000 : nt!MiDeleteVa+0x1597
ffff840d`4e2fefb0 fffff801`4bcef93d     : ffff81bf`00000000 00000000`00000000 00000000`00000000 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0xb2d
ffff840d`4e2ff040 fffff801`4bcef93d     : ffff81c0`00000000 00000000`00000000 00000000`00000001 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff0d0 fffff801`4bcef93d     : ffff81c0`00000000 00000000`00000000 00000000`00000002 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff160 fffff801`4bd12a01     : 00000000`00000000 00000000`00000000 00000000`00000003 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff1f0 fffff801`4bcfe9e7     : ffff840d`4e2ff3b0 ffff81c0`00000001 00000000`00000002 ffff81c0`00000000 : nt!MiWalkPageTables+0x371
ffff840d`4e2ff2f0 fffff801`4bc57ff2     : 00000000`00000000 fffff801`4bc581bd ffff840d`4e2ff6b8 ffffd00a`82a28080 : nt!MiDeletePagablePteRange+0x747
ffff840d`4e2ff620 fffff801`4c0c17f8     : 00000000`00000000 ffff840d`00000001 ffffd00a`82aed080 ffff840d`4e2ff6f0 : nt!MiDeleteVirtualAddresses+0x52
ffff840d`4e2ff670 fffff801`4c12b871     : ffffd00a`82aed080 ffffd00a`82b16760 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
ffff840d`4e2ff730 fffff801`4c12b213     : ffffd00a`82b16760 00000000`00000000 ffffd00a`82a28080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff840d`4e2ff760 fffff801`4c12ad8d     : ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`82aed080 : nt!MiCleanVad+0x2f
ffff840d`4e2ff790 fffff801`4c1a590d     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd00a`82aed080 : nt!MmCleanProcessAddressSpace+0x10d
ffff840d`4e2ff810 fffff801`4c093c54     : ffffd00a`82aed080 ffffab06`8ff49770 ffffd00a`82aed080 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffff840d`4e2ff8a0 fffff801`4c1aa952     : 00000000`c000004b ffffd00a`82aed001 ffffd00a`82a280f4 00000000`00214000 : nt!PspExitThread+0x63c
ffff840d`4e2ff9a0 fffff801`4be3e0e5     : ffffd00a`00003200 ffffd00a`82a28080 ffffd00a`82aed080 ffffd00a`82aed080 : nt!NtTerminateProcess+0xf2
ffff840d`4e2ffa20 00007ffc`43caf1d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`12f5daf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`43caf1d4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
RAM'lerin hakkı rahmetine kavuşmuş görünüyor;

Memtest86 ile RAM testi yapın.


Kod:
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffe1680e8
Arg3: 0000000000200000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2124

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4073

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 296

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10511

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : MemoryManagement.PFN
    Value: 200


FILE_IN_CAB:  042323-5046-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff81bffe1680e8

BUGCHECK_P3: 200000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  F1_22.exe

STACK_TEXT:
ffff840d`4e2feea8 fffff801`4bd00197     : 00000000`0000001a 00000000`00041792 ffff81bf`fe1680e8 00000000`00200000 : nt!KeBugCheckEx
ffff840d`4e2feeb0 fffff801`4bcefb3d     : 00000000`00000000 ffff840d`4e2ff3b0 ffff6536`79227ab3 00000000`00000000 : nt!MiDeleteVa+0x1597
ffff840d`4e2fefb0 fffff801`4bcef93d     : ffff81bf`00000000 00000000`00000000 00000000`00000000 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0xb2d
ffff840d`4e2ff040 fffff801`4bcef93d     : ffff81c0`00000000 00000000`00000000 00000000`00000001 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff0d0 fffff801`4bcef93d     : ffff81c0`00000000 00000000`00000000 00000000`00000002 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff160 fffff801`4bd12a01     : 00000000`00000000 00000000`00000000 00000000`00000003 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff1f0 fffff801`4bcfe9e7     : ffff840d`4e2ff3b0 ffff81c0`00000001 00000000`00000002 ffff81c0`00000000 : nt!MiWalkPageTables+0x371
ffff840d`4e2ff2f0 fffff801`4bc57ff2     : 00000000`00000000 fffff801`4bc581bd ffff840d`4e2ff6b8 ffffd00a`82a28080 : nt!MiDeletePagablePteRange+0x747
ffff840d`4e2ff620 fffff801`4c0c17f8     : 00000000`00000000 ffff840d`00000001 ffffd00a`82aed080 ffff840d`4e2ff6f0 : nt!MiDeleteVirtualAddresses+0x52
ffff840d`4e2ff670 fffff801`4c12b871     : ffffd00a`82aed080 ffffd00a`82b16760 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
ffff840d`4e2ff730 fffff801`4c12b213     : ffffd00a`82b16760 00000000`00000000 ffffd00a`82a28080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff840d`4e2ff760 fffff801`4c12ad8d     : ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`82aed080 : nt!MiCleanVad+0x2f
ffff840d`4e2ff790 fffff801`4c1a590d     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd00a`82aed080 : nt!MmCleanProcessAddressSpace+0x10d
ffff840d`4e2ff810 fffff801`4c093c54     : ffffd00a`82aed080 ffffab06`8ff49770 ffffd00a`82aed080 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffff840d`4e2ff8a0 fffff801`4c1aa952     : 00000000`c000004b ffffd00a`82aed001 ffffd00a`82a280f4 00000000`00214000 : nt!PspExitThread+0x63c
ffff840d`4e2ff9a0 fffff801`4be3e0e5     : ffffd00a`00003200 ffffd00a`82a28080 ffffd00a`82aed080 ffffd00a`82aed080 : nt!NtTerminateProcess+0xf2
ffff840d`4e2ffa20 00007ffc`43caf1d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`12f5daf8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`43caf1d4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
Yaptım hocam hiçbir hata çıkmadı bütün testler başarılı

Ve RAM'ler yeni komple PC yeni
 

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı