R5 3600 Memory management mavi ekran hatası

Aykut59

Centipat
Katılım
11 Haziran 2020
Mesajlar
14
Merhaba arkadaslar yaklaşık 2 aydır mavi ekran hatasını çözmeye çalışıyorum. Forumda 3.konu açısım ayni hata için lütfen biride benim minidump dosyami inceleyebilir mi 111.zip sistemim Ryzen 5 3600 MSI B450 Tomahawk Max 4×4 G.Skill ripjavs 2400 MHz RAM. Surekli format atiyorum ama bir çözüm bulamadim SSD test ettim bir sorun yok RAM'leri Memtest ile test ettim 6 saat sürdü bir sorun yok ama sorun nerede onu da bulamiyorum bilgisayarcilara gittim onlarda bulamıyor.
 
Chipset sürücülerinizi güncelleyip BattlEye programını kaldırır mısınız?

Ayrıca BIOS güncel değilse güncelleyin.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8007c6d58d8, Address of the instruction which caused the bugcheck
Arg3: ffff9a0785e6ec20, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8007c6d58d8

BUGCHECK_P3: ffff9a0785e6ec20

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!HvpGetCellPaged+68
fffff800`7c6d58d8 488b4808        mov     rcx,qword ptr [rax+8]

CONTEXT:  ffff9a0785e6ec20 -- (.cxr 0xffff9a0785e6ec20)
rax=0000000000001fc8 rbx=ffff9a0785e6f6b0 rcx=00000000000003f9
rdx=0000000036353253 rsi=0000022859d71019 rdi=ffffe584b6197000
rip=fffff8007c6d58d8 rsp=ffff9a0785e6f628 rbp=ffff9a0785e6f730
 r8=ffffe584c7073000  r9=00000000000001b1 r10=0000000000000253
r11=0000000000000253 r12=000002285aac2308 r13=ffffe584b6197000
r14=ffff9a0785e6f8d0 r15=0000000000000003
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050206
nt!HvpGetCellPaged+0x68:
fffff800`7c6d58d8 488b4808        mov     rcx,qword ptr [rax+8] ds:002b:00000000`00001fd0=????????????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Registry

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-24-2020 17:41:50.0967

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8007c5eff34 to fffff8007c6d58d8

STACK_TEXT: 
ffff9a07`85e6f628 fffff800`7c5eff34 : 00000000`00000008 00000000`00000004 00000228`59d71019 00000000`00000000 : nt!HvpGetCellPaged+0x68
ffff9a07`85e6f630 fffff800`7c5f2b5a : ffffe584`00000008 00000000`00000000 00000000`00000000 00000000`00000001 : nt!CmQueryValueKey+0x284
ffff9a07`85e6f790 fffff800`7c3ef378 : 00000021`4387baa8 00000021`4387bc90 00000000`00000000 00000160`9038bb00 : nt!NtQueryValueKey+0x5ba
ffff9a07`85e6fa90 00007ffd`572ab074 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000021`4387b818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`572ab074


THREAD_SHA1_HASH_MOD_FUNC:  6b8556ecc2ddf11e2bca65c60503995573994d4e

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d6b7555da60dfd499ca1293a99f337564c9c3b29

THREAD_SHA1_HASH_MOD:  d084f7dfa548ce4e51810e4fd5914176ebc66791

FOLLOWUP_IP:
nt!HvpGetCellPaged+68
fffff800`7c6d58d8 488b4808        mov     rcx,qword ptr [rax+8]

FAULT_INSTR_CODE:  8488b48

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!HvpGetCellPaged+68

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .cxr 0xffff9a0785e6ec20 ; kb

BUCKET_ID_FUNC_OFFSET:  68

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!HvpGetCellPaged

BUCKET_ID:  0x3B_c0000005_nt!HvpGetCellPaged

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!HvpGetCellPaged

TARGET_TIME:  2020-06-24T03:02:42.000Z

OSBUILD:  19041

OSSERVICEPACK:  264

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  2c61

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!hvpgetcellpaged

FAILURE_ID_HASH:  {32f4db97-5bc1-37be-caf3-746cdc554a0b}

Followup:     MachineOwner
---------
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff950003bc07f0
Arg3: 0000000000000033
Arg4: 0000000000000034

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

DUMP_TYPE:  2

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff950003bc07f0

BUGCHECK_P3: 33

BUGCHECK_P4: 34

BUGCHECK_STR:  0x1a_41790

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  Discord.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-24-2020 17:41:25.0226

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8070c64640c to fffff8070c5dda20

STACK_TEXT: 
fffff907`db5c3b18 fffff807`0c64640c : 00000000`0000001a 00000000`00041790 ffff9500`03bc07f0 00000000`00000033 : nt!KeBugCheckEx
fffff907`db5c3b20 fffff807`0c4c1568 : 00000000`00000006 00000000`00000000 fffff907`db5c4210 fffff907`db5c4160 : nt!MiDeletePteRun+0x19b62c
fffff907`db5c3d50 fffff807`0c411bde : ffffad86`c34ee700 fffff680`00022000 00000000`00004000 00000000`00000003 : nt!MiDeleteVaTail+0x78
fffff907`db5c3d80 fffff807`0c411cf0 : 00000000`00000000 ffffad86`c34ee700 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x50e
fffff907`db5c3e10 fffff807`0c411cf0 : 00000000`00000000 ffffad86`c34ee700 fffff6fb`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
fffff907`db5c3ea0 fffff807`0c411cf0 : fffff907`db5c4160 ffffad86`c34ee700 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
fffff907`db5c3f30 fffff807`0c40e5fb : 00000000`00000001 ffffad86`c34ee700 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
fffff907`db5c3fc0 fffff807`0c4c22d1 : fffff907`db5c4160 ffffad86`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff907`db5c40c0 fffff807`0c4a787f : 00000000`00000000 00000000`00000060 ffffad86`c34ee7c0 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
fffff907`db5c4540 fffff807`0c7ea999 : ffffad86`c34ee080 00000000`00000000 ffffad86`00000000 ffffad86`00000001 : nt!MiDeleteVad+0x41f
fffff907`db5c4670 fffff807`0c866a00 : ffffad86`c8bf7ba0 ffffad86`c34eed20 ffffad86`cae92080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff907`db5c46a0 fffff807`0c8678b3 : ffffad86`c28ac730 ffffad86`c28ac730 ffffad86`cae92080 ffffad86`c34ee080 : nt!MiCleanVad+0x30
fffff907`db5c46d0 fffff807`0c8b9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffad86`c34ee080 : nt!MmCleanProcessAddressSpace+0x137
fffff907`db5c4750 fffff807`0c7e8c32 : ffffad86`c34ee080 ffffdb82`06a6a060 fffff907`db5c4990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffff907`db5c47d0 fffff807`0c8f4c98 : ffffad86`40000015 00000000`00000001 fffff907`db5c49e0 00000000`09a5b000 : nt!PspExitThread+0x5f6
fffff907`db5c48d0 fffff807`0c42a4e7 : 00000000`40fa0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff907`db5c4910 fffff807`0c5e1fc0 : 00000000`00000000 fffff907`db5c49c0 fffff907`db5c4b80 00000000`00000000 : nt!KiDeliverApc+0x487
fffff907`db5c49c0 fffff807`0c5ef41f : 00000000`0c048a50 00000000`00000000 fffff907`db5c4b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
fffff907`db5c4b00 00000000`76f11cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0d99f1d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f11cfc


THREAD_SHA1_HASH_MOD_FUNC:  cf5c972d8494816023066845de37f86a3bfa7253

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  733988f97a045167ee8ca3ff31e97e4378d0a84a

THREAD_SHA1_HASH_MOD:  a9ca63faa9e43cc61ef524ad38163e6a9ae5c358

FOLLOWUP_IP:
nt!MiDeletePteRun+19b62c
fffff807`0c64640c cc              int     3

FAULT_INSTR_CODE:  5f7cccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiDeletePteRun+19b62c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.19041.264

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  19b62c

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

BUCKET_ID:  0x1a_41790_nt!MiDeletePteRun

PRIMARY_PROBLEM_CLASS:  0x1a_41790_nt!MiDeletePteRun

TARGET_TIME:  2020-06-24T13:53:54.000Z

OSBUILD:  19041

OSSERVICEPACK:  264

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  199e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41790_nt!mideletepterun

FAILURE_ID_HASH:  {27ce5d5a-97b1-faf0-183f-c86809269d56}

Followup:     MachineOwner
---------
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8500b6044018
Arg3: 0000000000400000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

DUMP_TYPE:  2

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff8500b6044018

BUGCHECK_P3: 400000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BUGCHECK_STR:  0x1a_41792

CPU_COUNT: c

CPU_MHZ: e10

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  StartMenuExperienceHost.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-JC78BRD

ANALYSIS_SESSION_TIME:  06-24-2020 17:41:39.0132

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

STACK_TEXT: 
ffffd002`b5467fb8 fffff801`4465418e : 00000000`0000001a 00000000`00041792 ffff8500`b6044018 00000000`00400000 : nt!KeBugCheckEx
ffffd002`b5467fc0 fffff801`444119d1 : 00000000`00000003 ffff8500`b6044000 ffffd002`b5468490 00000000`00000003 : nt!MiDeleteVa+0x191e6e
ffffd002`b54680b0 fffff801`44411cf0 : 00000000`00000000 ffffbc01`6e84f8c0 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffffd002`b5468140 fffff801`44411cf0 : 00000000`00000000 ffffbc01`6e84f8c0 ffff8542`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffffd002`b54681d0 fffff801`44411cf0 : ffffd002`b5468490 ffffbc01`6e84f8c0 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffffd002`b5468260 fffff801`4440e5fb : ffffbc01`6e84f8c0 ffffbc01`6e84f8c0 fffffa80`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffffd002`b54682f0 fffff801`444c22d1 : ffffd002`b5468490 ffffbc01`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffd002`b54683f0 fffff801`444a787f : 00000000`00000000 00000000`00000060 ffffbc01`6e84f980 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
ffffd002`b5468870 fffff801`447ea999 : ffffbc01`6e84f240 00000000`00000000 00000000`00000000 00000000`00000001 : nt!MiDeleteVad+0x41f
ffffd002`b54689a0 fffff801`447ea772 : ffffbc01`6e68ed60 00000000`00000000 ffffbc01`6e84f240 00000000`00000000 : nt!MiUnmapVad+0x49
ffffd002`b54689d0 fffff801`447ea5e9 : ffff2cbb`f194fa96 0000004d`e6cfe330 0000016c`060acb40 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffd002`b5468ab0 fffff801`445ef378 : ffffbc01`6e8cc080 0000016c`08740000 ffffbc01`6e8cc080 ffffbc01`6e84f240 : nt!NtUnmapViewOfSectionEx+0x99
ffffd002`b5468b00 00007ffa`cc9ce704 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000004d`e6cfec38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`cc9ce704


THREAD_SHA1_HASH_MOD_FUNC:  cd17d96308226c0911d4c2e72141f4a08060b33a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  e067196d96ec0749215dc47a11f30d419d88e32c

THREAD_SHA1_HASH_MOD:  fe34192f63d13620a8987d294372ee74d699cfee

SYMBOL_NAME:  ONE_BIT

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2020-06-24T09:18:28.000Z

OSBUILD:  19041

OSSERVICEPACK:  264

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  1b1c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
BIOS güncel. Chipset sürücülerini kuruyorum hemen ama daha önceden kurdugumda da sorun devam etmisti bu formatta onun icin kurmamistim.
"Memory management" bellek hatası oluyor genellikle, Memtest ile bellekleri test edin.

Bellekleri Memtest ile test ettim 6 saat surdu bir sorun gözükmedi.
Dediklerinizi uyguladim ama sorun devam ediyor.😔
Eski islemci ve anakartimi takinca sorun yok acaba yeni aldigim anakart veya islemcimi bozuk bunu nasil anlariz?
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı