helgin
Decapat
- Katılım
- 5 Temmuz 2022
- Mesajlar
- 2
Daha fazla
- Cinsiyet
- Erkek
Latitude 3410 laptop cihazımda mavi ekran hatası alıyorum.
- Sıfırdan formatladım.
- Güncellemeleri Full yaptım.
Bunlara rağmen mavi ekran hatası devam etmekte Dell destek çözemiyor nasıl yapabilirim acaba arkadaşlar?
Aldığım mavi ekranlar; MEMORY_MANAGEMENT, SYSTEM_SERVICE_EXCEPTION, IRQL ile başlayan bir hata aldım bir de.
drive.google.com
Memtest ile ram testi yaptığımda sorun çıkmadı ama dump analizi sonucu ram arızası gösteriyor sanırım ?
- Sıfırdan formatladım.
- Güncellemeleri Full yaptım.
Bunlara rağmen mavi ekran hatası devam etmekte Dell destek çözemiyor nasıl yapabilirim acaba arkadaşlar?
Aldığım mavi ekranlar; MEMORY_MANAGEMENT, SYSTEM_SERVICE_EXCEPTION, IRQL ile başlayan bir hata aldım bir de.
MEMORY.DMP
drive.google.com
Memtest ile ram testi yaptığımda sorun çıkmadı ama dump analizi sonucu ram arızası gösteriyor sanırım ?
Kod:
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffdf8fb21c2348, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80556abfafc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 3015
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11887
Key : Analysis.Init.CPU.mSec
Value: 3749
Key : Analysis.Init.Elapsed.mSec
Value: 120352
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.KiBugCheckData
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffdf8fb21c2348
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80556abfafc
BUGCHECK_P4: 2
READ_ADDRESS: ffffdf8fb21c2348 Nonpaged pool
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8701c7cd28e0 -- (.trap 0xffff8701c7cd28e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffdf8fb21c2348 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80556abfafc rsp=ffff8701c7cd2a70 rbp=fffff80556efc2e0
r8=0000000000000020 r9=0000000000000001 r10=0000000000000000
r11=ffff8701c7cd2a20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExpWorkerThread+0x11c:
fffff805`56abfafc 483900 cmp qword ptr [rax],rax ds:ffffdf8f`b21c2348=????????????????
Resetting default scope
STACK_TEXT:
ffff8701`c7cd2638 fffff805`56c4e37f : 00000000`00000050 ffffdf8f`b21c2348 00000000`00000000 ffff8701`c7cd28e0 : nt!KeBugCheckEx
ffff8701`c7cd2640 fffff805`56aa6960 : 00000000`00000001 00000000`00000000 ffff8701`c7cd2960 00000000`00000000 : nt!MiSystemFault+0x1899cf
ffff8701`c7cd2740 fffff805`56c0605e : ffff8701`c7cd2960 ffffdf8e`9ed10ac8 00000000`00000000 00001f80`00b00063 : nt!MmAccessFault+0x400
ffff8701`c7cd28e0 fffff805`56abfafc : ffffdf8e`b21c2040 fffff805`56efc2e0 ffffdf8e`9ed4da60 ffffdf8e`00000000 : nt!KiPageFault+0x35e
ffff8701`c7cd2a70 fffff805`56aeea75 : ffffdf8e`b21c2040 00000000`00000080 ffffdf8e`9ecb40c0 000fa4ef`bd9bbfff : nt!ExpWorkerThread+0x11c
ffff8701`c7cd2b10 fffff805`56bff588 : ffff9700`6a100180 ffffdf8e`b21c2040 fffff805`56aeea20 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8701`c7cd2b60 00000000`00000000 : ffff8701`c7cd3000 ffff8701`c7ccc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiSystemFault+1899cf
MODULE_NAME: nt
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1899cf
FAILURE_BUCKET_ID: AV_R_(null)_nt!MiSystemFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {636dd506-1acb-bac0-a568-0355527c550f}
Followup: MachineOwner
---------
1: kd> lmvm nt
Browse full module list
start end module name
fffff805`56800000 fffff805`57846000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\FD59498DAA1274665176666507A8AC0E1\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\DF37E68E1046000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: DF37E68E (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A68215
ImageSize: 01046000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Son düzenleme: