Latitude 3410 laptopta MEMORY_MANAGEMENT hatası

helgin

Decapat
Katılım
5 Temmuz 2022
Mesajlar
2
Daha fazla  
Cinsiyet
Erkek
Latitude 3410 laptop cihazımda mavi ekran hatası alıyorum.
- Sıfırdan formatladım.
- Güncellemeleri Full yaptım.
Bunlara rağmen mavi ekran hatası devam etmekte Dell destek çözemiyor nasıl yapabilirim acaba arkadaşlar?
Aldığım mavi ekranlar; MEMORY_MANAGEMENT, SYSTEM_SERVICE_EXCEPTION, IRQL ile başlayan bir hata aldım bir de.


Memtest ile ram testi yaptığımda sorun çıkmadı ama dump analizi sonucu ram arızası gösteriyor sanırım ?
Kod:
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffdf8fb21c2348, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80556abfafc, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 3015

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11887

    Key  : Analysis.Init.CPU.mSec
    Value: 3749

    Key  : Analysis.Init.Elapsed.mSec
    Value: 120352

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 97

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  MEMORY.DMP

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffdf8fb21c2348

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80556abfafc

BUGCHECK_P4: 2

READ_ADDRESS:  ffffdf8fb21c2348 Nonpaged pool

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8701c7cd28e0 -- (.trap 0xffff8701c7cd28e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf8fb21c2348 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80556abfafc rsp=ffff8701c7cd2a70 rbp=fffff80556efc2e0
 r8=0000000000000020  r9=0000000000000001 r10=0000000000000000
r11=ffff8701c7cd2a20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!ExpWorkerThread+0x11c:
fffff805`56abfafc 483900          cmp     qword ptr [rax],rax ds:ffffdf8f`b21c2348=????????????????
Resetting default scope

STACK_TEXT: 
ffff8701`c7cd2638 fffff805`56c4e37f     : 00000000`00000050 ffffdf8f`b21c2348 00000000`00000000 ffff8701`c7cd28e0 : nt!KeBugCheckEx
ffff8701`c7cd2640 fffff805`56aa6960     : 00000000`00000001 00000000`00000000 ffff8701`c7cd2960 00000000`00000000 : nt!MiSystemFault+0x1899cf
ffff8701`c7cd2740 fffff805`56c0605e     : ffff8701`c7cd2960 ffffdf8e`9ed10ac8 00000000`00000000 00001f80`00b00063 : nt!MmAccessFault+0x400
ffff8701`c7cd28e0 fffff805`56abfafc     : ffffdf8e`b21c2040 fffff805`56efc2e0 ffffdf8e`9ed4da60 ffffdf8e`00000000 : nt!KiPageFault+0x35e
ffff8701`c7cd2a70 fffff805`56aeea75     : ffffdf8e`b21c2040 00000000`00000080 ffffdf8e`9ecb40c0 000fa4ef`bd9bbfff : nt!ExpWorkerThread+0x11c
ffff8701`c7cd2b10 fffff805`56bff588     : ffff9700`6a100180 ffffdf8e`b21c2040 fffff805`56aeea20 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8701`c7cd2b60 00000000`00000000     : ffff8701`c7cd3000 ffff8701`c7ccc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiSystemFault+1899cf

MODULE_NAME: nt

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1899cf

FAILURE_BUCKET_ID:  AV_R_(null)_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {636dd506-1acb-bac0-a568-0355527c550f}

Followup:     MachineOwner
---------

1: kd> lmvm nt
Browse full module list
start             end                 module name
fffff805`56800000 fffff805`57846000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\FD59498DAA1274665176666507A8AC0E1\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\DF37E68E1046000\ntkrnlmp.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        DF37E68E (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A68215
    ImageSize:        01046000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:
 
Son düzenleme:

Bu konuyu görüntüleyen kullanıcılar

Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…