R7 240 sistemde mavi ekran hatası

İşletim sistemi
Windows 10

Müslümhan

Hectopat
Katılım
31 Ocak 2022
Mesajlar
11
Daha fazla  
Cinsiyet
Erkek
RAM
Smart pc3l-12800U 8x8 16gb ram
SSD veya HDD modeli
Seagate Barracuda 1TB 3.5" 7200RPM 64MB Cache Sata
Ekran kartı
Seagate Barracuda 1TB 3.5" 7200RPM 64MB Cache Sata
Anakart
GA-H61MA-D3V
İşlemci
Intel® Core™ i5-3330 İşlemci 6M Önbellek, 3.20 GHz
Sistem özellikleri: R7 240 ekran kartı, i5 3330 işlemci, 8x8 1600MHz RAM, 1TB 7200RPM hard disk. Günde 1-2 kere mavi ekran hatası alıyorum PC format attım yine alınca tek çare buraya yazdım.

 
Son düzenleyen: Moderatör:
Selamlar, Memtest 86 testi yapıp sonucu bizimle paylaşırsanız sevinirim.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffffd7a60a009338
Arg3: 800000035eb4a867
Arg4: ffffd7a62a009338

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9342

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 16498

Key : Analysis.Init.CPU.mSec
Value: 890

Key : Analysis.Init.Elapsed.mSec
Value: 2869

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 013122-36875-01.dmp

BUGCHECK_CODE: 1a

BUGCHECK_P1: 403

BUGCHECK_P2: ffffd7a60a009338

BUGCHECK_P3: 800000035eb4a867

BUGCHECK_P4: ffffd7a62a009338

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffffee0a`02b2bc78 fffff802`2a441589 : 00000000`0000001a 00000000`00000403 ffffd7a6`0a009338 80000003`5eb4a867 : nt!KeBugCheckEx
ffffee0a`02b2bc80 fffff802`2a441d3e : 00000000`00000000 ffffee0a`02b2c3c0 ffffd7a6`0a009568 ffffee0a`02b2c310 : nt!MiDeletePteRun+0x17b9
ffffee0a`02b2be90 fffff802`2a53944d : 00000000`00000000 00000000`00000001 ffffee0a`02b2c310 ffffee0a`02b2c360 : nt!MiDeleteVaTail+0x6e
ffffee0a`02b2bec0 fffff802`2a49e251 : 00000000`00000004 00000000`00000001 00000000`00000cef ffffd7a6`0a009560 : nt!MiYieldPageTableWalk+0x31
ffffee0a`02b2bef0 fffff802`2a49e52b : ffffd7eb`00000000 ffffc782`b8fc8700 ffffee0a`00000000 ffffee0a`02b2c360 : nt!MiWalkPageTablesRecursively+0x5b1
ffffee0a`02b2bf90 fffff802`2a49e52b : ffffd7eb`f5e98280 ffffc782`b8fc8700 ffffee0a`00000001 ffffee0a`02b2c370 : nt!MiWalkPageTablesRecursively+0x88b
ffffee0a`02b2c030 fffff802`2a49e52b : ffffd7eb`f5e98000 ffffc782`b8fc8700 ffffee0a`00000002 ffffee0a`02b2c380 : nt!MiWalkPageTablesRecursively+0x88b
ffffee0a`02b2c0d0 fffff802`2a404f4b : 00000000`00000000 ffffc782`b8fc8700 ffffc782`00000003 ffffee0a`02b2c390 : nt!MiWalkPageTablesRecursively+0x88b
ffffee0a`02b2c170 fffff802`2a442961 : ffffee0a`02b2c310 ffffc782`00000000 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffee0a`02b2c270 fffff802`2a412aa0 : 00000000`00000001 ffffee0a`00000000 ffffc782`b8fc8550 ffffc782`abd61080 : nt!MiDeletePagablePteRange+0x4f1
ffffee0a`02b2c580 fffff802`2a8007f3 : ffffc782`abd61080 00000000`00000000 ffffc782`00000000 ffffc782`00000000 : nt!MiDeleteVad+0x360
ffffee0a`02b2c690 fffff802`2a7feaaf : ffffc782`bb98b130 ffffc782`bb98b130 ffffc782`b9a0d800 ffffc782`b8fc8080 : nt!MiCleanVad+0x43
ffffee0a`02b2c6c0 fffff802`2a85c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc782`b8fc8080 : nt!MmCleanProcessAddressSpace+0x137
ffffee0a`02b2c740 fffff802`2a8b0ab6 : ffffc782`b8fc8080 ffff840b`16aac0a0 ffffee0a`02b2c990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffee0a`02b2c7d0 fffff802`2a8f53c8 : ffffc782`c0000005 00000000`00000001 ffffee0a`02b2c9e0 00000092`e51a6000 : nt!PspExitThread+0x5f6
ffffee0a`02b2c8d0 fffff802`2a40ef67 : 00000000`40e80088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffee0a`02b2c910 fffff802`2a5fb750 : 00000092`eb1ffa18 ffffee0a`02b2c9c0 ffffee0a`02b2cb80 00000002`00000000 : nt!KiDeliverApc+0x487
ffffee0a`02b2c9c0 fffff802`2a608c5f : ffffc782`abd61080 ffffc782`b5d64080 ffffee0a`02b2cb18 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70
ffffee0a`02b2cb00 00007ff8`cdcecdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000092`eb1ff9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`cdcecdf4


SYMBOL_NAME: nt!MiDeletePteRun+17b9

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1288

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 17b9

FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup: MachineOwner
---------[/CODE]
 

Yaptım sorun yok diyor test ama bir daha yaparım sonuç görmek isterseniz.
 
Son düzenleme:
Sorun yoksa dert etmeyin, o zaman sanal belleğinizi kapatın. Fizikselde de sanal olanda da sorun var gibiydi o yüzden Memtest'i sordum. Sizden ricam sanal belleği kapatıp yeniden açın. Her kapattıktan sonra ve açtıktan sonra sistemi yeniden başlatmayı unutmayın. Gerekli rehber aşağıda mevcut.

 

Şu anda kapattım. Geri açınca otomatik mi yapmalıyım yoksa özel bir ayar mı yapmalıyım?
 
Otomatik olarak ayarlayın bakalım. 3 gün boyunca da test edersiniz ve sonucu bizimle paylaşırsınız artık.
 
Otomatik olarak ayarlayın bakalım. 3 gün boyunca da test edersiniz ve sonucu bizimle paylaşırsınız artık.

Tamamdır sağ olun yaptım deneyeceğim.
Bir de Memtest86 sonuçları belki ben anlamamışımdır siz yine bakarsınız:



 
Son düzenleyen: Moderatör:
Tamamdır, sorun yokmuş. Artık siz de sonucu 3 gün sonra bildirirsiniz.
 
Son düzenleme:
Tekrardan selamlar, hızlı bir şekilde geri dönemediğim için kusuruma bakmayın. Şimdi, sizden önümüzdeki süreçte birkaç şey isteyeceğim. Öncelikle HD Tune 5.75 indirin ve sistemdeki disklerinizin Health sekmesinin ekran alıntısını bizimle paylaşın. Ek olarak sisteme bağlı USB aygıtları sayar mısınız? USB kulaklığınız ya da mikrofonunuz var mı? Bu detayları belirtirseniz sevinirim. Ona göre diğer adımlara geçiş yaparız, bilginize.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe26003000018, Virtual address for the attempted write.
Arg2: 8a00000000100021, PTE contents.
Arg3: ffffcc8e812f37f0, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 10265

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 16092

Key : Analysis.Init.CPU.mSec
Value: 874

Key : Analysis.Init.Elapsed.mSec
Value: 2739

Key : Analysis.Memory.CommitPeak.Mb
Value: 75

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 020222-39921-01.dmp

BUGCHECK_CODE: be

BUGCHECK_P1: ffffe26003000018

BUGCHECK_P2: 8a00000000100021

BUGCHECK_P3: ffffcc8e812f37f0

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

TRAP_FRAME: ffffcc8e812f37f0 -- (.trap 0xffffcc8e812f37f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe26003000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031303acee rsp=ffffcc8e812f3980 rbp=ffffcc8e812f3a01
r8=0000000200100000 r9=ffffa500e6ac0c08 r10=0000000fffffffff
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiDeletePteList+0x35e:
fffff803`1303acee f0490fba6e183f lock bts qword ptr [r14+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope

STACK_TEXT:
ffffcc8e`812f35f8 fffff803`132756ee : 00000000`000000be ffffe260`03000018 8a000000`00100021 ffffcc8e`812f37f0 : nt!KeBugCheckEx
ffffcc8e`812f3600 fffff803`1309f5bf : 8a000000`00100021 00000000`00000003 ffffcc8e`812f3870 00000000`00000000 : nt!MiRaisedIrqlFault+0x1423d2
ffffcc8e`812f3650 fffff803`1320545e : 00000000`00000002 00000000`80000002 ffffcc8e`812f3890 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffcc8e`812f37f0 fffff803`1303acee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffcc8e`812f3980 fffff803`130b0c1e : ffffcc8e`812f3c30 ffffd208`8b73b180 00000000`00000000 ffffcc8e`812f4670 : nt!MiDeletePteList+0x35e
ffffcc8e`812f3a60 fffff803`133fa1ed : ffffd208`8bf092c0 ffffd208`8b344378 00000000`00000001 00000000`00000000 : nt!MiDecommitPages+0x121e
ffffcc8e`812f4630 fffff803`133f9853 : 00000000`00000000 00000000`00000000 ffffcc8e`812f47b0 ffffd208`8b344350 : nt!MiDecommitRegion+0x7d
ffffcc8e`812f46b0 fffff803`133f9145 : 00000000`00000000 fffff803`132091cc ffffd208`8bf092c0 ffffcc8e`812f4860 : nt!MmFreeVirtualMemory+0x6d3
ffffcc8e`812f4800 fffff803`132091f1 : ffffd208`8bf092c0 00000000`00000000 ffffcc8e`812f4938 00000000`00000008 : nt!NtFreeVirtualMemory+0x95
ffffcc8e`812f4860 fffff803`131fb140 : fffff803`25410e9c ffffd208`8bbe8b20 ffffd208`8bbe8520 00000000`00000200 : nt!KiSystemServiceExitPico+0x2bc
ffffcc8e`812f49f8 fffff803`25410e9c : ffffd208`8bbe8b20 ffffd208`8bbe8520 00000000`00000200 fffff803`25413707 : nt!KiServiceLinkage
ffffcc8e`812f4a00 fffff803`2541434a : 00000000`00071000 ffffaa00`b6c10148 ffffaa00`c0603ba0 ffffd208`8bbe8520 : dxgmms2!VIDMM_RECYCLE_RANGE:ebouncedDecommit+0x160
ffffcc8e`812f4a50 fffff803`254143f6 : fffff803`00000000 ffffd208`8bbe8520 00000000`00000000 fffff803`13b25440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR:rocessDebounceList+0x12a
ffffcc8e`812f4ac0 fffff803`25414211 : fffff803`13b25440 ffffd208`8800d920 00000000`00000000 00000000`00000200 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
ffffcc8e`812f4b40 fffff803`130b8655 : ffffd208`8bf092c0 fffff803`1fa02fa0 ffffd208`7d6a0500 00000000`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
ffffcc8e`812f4b70 fffff803`13155995 : ffffd208`8bf092c0 00000000`00000080 ffffd208`7d674040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffcc8e`812f4c10 fffff803`131fe938 : ffff9280`a3358180 ffffd208`8bf092c0 fffff803`13155940 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffcc8e`812f4c60 00000000`00000000 : ffffcc8e`812f5000 ffffcc8e`812ef000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_RANGE:ebouncedDecommit+160

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 160

FAILURE_BUCKET_ID: 0xBE_dxgmms2!VIDMM_RECYCLE_RANGE:ebouncedDecommit

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8a6104d4-555c-91ca-b987-7bc7f0d3a50c}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132882582373273719
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : USB\VID_0C76&PID_161F\6&944c330&0&2
VetoString :
[/CODE]
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…