RX580 sistem ara ara mavi ekran veriyor

İşletim sistemi
Windows 10

asknmemis

Decapat
Katılım
22 Eylül 2022
Mesajlar
31
Daha fazla  
Cinsiyet
Erkek
RAM
XPG D30 16GB 3200 MHZ RAM CL16
SSD veya HDD modeli
KIOXIA 240 GB SSD
Ekran kartı
RX580
Anakart
GİGABYTE B450M S2H V2
İşlemci
RYZEN 3 3100
Genel itibarıyla RAM ile alakalı bir sıkıntı var.

Aşağıdaki rehberi uygulayın ve RAM'lerinizin testten geçip geçmediğini paylaşmayı unutmayın.


Dökümler:
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80722f17350, Address of the instruction which caused the BugCheck
Arg3: ffffac8e528de870, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7427

    Key  : Analysis.Init.CPU.mSec
    Value: 2249

    Key  : Analysis.Init.Elapsed.mSec
    Value: 56248

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092222-6921-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80722f17350

BUGCHECK_P3: ffffac8e528de870

BUGCHECK_P4: 0

CONTEXT:  ffffac8e528de870 -- (.cxr 0xffffac8e528de870)
rax=ffff9c01c2c68a48 rbx=0000000000000000 rcx=ffffac8e528df2b8
rdx=0000000000000000 rsi=0000000000000004 rdi=ffffba0ebbccbbd0
rip=fffff80722f17350 rsp=ffffac8e528df270 rbp=ffffac8e528df329
 r8=ffffba0ebbccbbd0  r9=ffffba0ebd911230 r10=ffffba0ebd911230
r11=0000000000000000 r12=ffffac8e528df590 r13=0000000000000000
r14=000000000000d9db r15=ffff9c01c2c10000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!MiProcessCrcList+0x580:
fffff807`22f17350 488b7610        mov     rsi,qword ptr [rsi+10h] ds:002b:00000000`00000014=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffffac8e`528df270 fffff807`22f17a47     : 00000000`00000000 ffffb080`0cbda7d0 00000000`00000080 00000000`00000001 : nt!MiProcessCrcList+0x580
ffffac8e`528df390 fffff807`22f16b70     : 00000000`00000000 00000000`00000000 ffffac8e`528df5c0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x4e7
ffffac8e`528df4c0 fffff807`22f1694e     : 00000000`0000000d 00000084`5a9ffdf0 00000000`00000000 00000000`00000002 : nt!MiCombineIdenticalPages+0x214
ffffac8e`528df730 fffff807`22e44fbe     : 00000000`00000000 00000000`00000000 ffff8700`7439f180 00000000`00000001 : nt!MmCombineIdenticalPages+0x42
ffffac8e`528df770 fffff807`22c09bf1     : ffffba0e`b7da4080 00000000`00000000 ffffac8e`528dfb80 00000000`00000000 : nt!NtSetSystemInformation+0x140e
ffffac8e`528dfb00 00007ffe`24030274     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000084`5a9ffd78 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`24030274


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffac14152a2070 - win32kbase!hbmCreateDriverSurface+4c
    [ 4c:48 ]
    ffffac14152a2072-ffffac14152a2095  36 bytes - win32kbase!hbmCreateDriverSurface+4e (+0x02)
    [ 45 7f 0f ba f1 0f 89 45:02 49 3b 00 77 09 1b c0 ]
    ffffac14152a2097-ffffac14152a20c2  44 bytes - win32kbase!hbmCreateDriverSurface+73 (+0x25)
    [ 85 c9 74 36 83 e9 01 0f:88 01 85 d2 0f 84 8d 00 ]
    ffffac14152a20c4-ffffac14152a20c7  4 bytes - win32kbase!hbmCreateDriverSurface+a0 (+0x2d)
    [ 83 f9 01 75:8d 4a 58 eb ]
    ffffac14152a20c9-ffffac14152a20d4  12 bytes - win32kbase!hbmCreateDriverSurface+a5 (+0x05)
    [ 41 c1 e9 02 44 89 4d 13:b8 40 00 00 00 8d 48 10 ]
    ffffac14152a20d6-ffffac14152a20f7  34 bytes - win32kbase!hbmCreateDriverSurface+b2 (+0x0d)
    [ 8d 55 0f 89 7c 24 48 4d:85 d2 74 0c f3 0f 11 12 ]
    ffffac14152a20f9-ffffac14152a212e  54 bytes - win32kbase!hbmCreateDriverSurface+d5 (+0x23)
    [ 00 89 7d 0b 48 8d 4d ff:8d 4a 5b eb d3 b8 00 10 ]
    ffffac14152a2130-ffffac14152a216f  64 bytes - win32kbase!hbmCreateDriverSurface+10c (+0x37)
    [ 85 f6 75 65 0f ba 68 70:02 00 00 b9 68 00 00 00 ]
    ffffac14152ad070-ffffac14152ad074  5 bytes - win32kbase!HmgReferenceCheckLock+70 (+0xaf40)
    [ 0f b7 4e 02 44:48 83 ec 28 48 ]
    ffffac14152ad076-ffffac14152ad0bb  70 bytes - win32kbase!HmgReferenceCheckLock+76 (+0x06)
    [ c0 44 8b 8e 08 08 00 00:ca e8 24 7e f9 ff 48 83 ]
    ffffac14152ad0bd-ffffac14152ad16f  179 bytes - win32kbase!HmgReferenceCheckLock+bd (+0x47)
    [ 0f b6 c8 48 8b 00 48 03:83 e8 02 0f 84 db 34 06 ]
    ffffac14152af180-ffffac14152af1e2  99 bytes - win32kbase!NSInstrumentation::CSectionEntry<180224,704>::Initialize+18 (+0x20c3)
    [ 89 43 10 48 85 c0 74 36:48 83 ec 28 8b ca 45 33 ]
    ffffac14152af1ef - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+27 (+0x6f)
    [ 48:44 ]
    ffffac14152af1f1-ffffac14152af21d  45 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+29 (+0x02)
    [ d8 48 85 c0 0f 84 16 19:c9 33 db 48 21 58 20 0f ]
    ffffac14152af21f-ffffac14152af23f  33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+57 (+0x2e)
    [ 00 00 84 c0 0f 84 ef 18:49 8d 48 08 49 3b c8 72 ]
    ffffac14152af241-ffffac14152af261  33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+1 (+0x22)
    [ 89 5c 24 10 57 48 83 ec:3b ca 72 0c 48 8b 05 f4 ]
    ffffac14152af26e-ffffac14152af27c  15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x2d)
    [ 8b c0 48 8d 4c 24 30 48:c5 0f 10 02 f3 0f 7f 44 ]
729 errors : !win32kbase (ffffac14152a2070-ffffac14152af27c)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffac8e528de870 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff800ce58052e0
Arg3: 0000000000004000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3499

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 8732

    Key  : Analysis.Init.CPU.mSec
    Value: 2671

    Key  : Analysis.Init.Elapsed.mSec
    Value: 58332

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : MemoryManagement.PFN
    Value: 4

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  091722-4015-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff800ce58052e0

BUGCHECK_P3: 4000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT: 
ffff9b0a`235dadf8 fffff804`49f2abba     : 00000000`0000001a 00000000`00041792 ffff800c`e58052e0 00000000`00004000 : nt!KeBugCheckEx
ffff9b0a`235dae00 fffff804`49eedc06     : 00000000`00000000 00000000`00000000 00000000`0000020e ffff800c`e58052e0 : nt!MiDeleteVa+0x153a
ffff9b0a`235daf00 fffff804`49eedd1b     : ffff8040`0672c028 ffff8a04`53a04700 ffff9b0a`00000000 ffff9b0a`235db370 : nt!MiWalkPageTablesRecursively+0x776
ffff9b0a`235dafa0 fffff804`49eedd1b     : ffff8040`20033960 ffff8a04`53a04700 ffff9b0a`00000001 ffff9b0a`235db380 : nt!MiWalkPageTablesRecursively+0x88b
ffff9b0a`235db040 fffff804`49eedd1b     : ffff8040`20033000 ffff8a04`53a04700 ffff9b0a`00000002 ffff9b0a`235db390 : nt!MiWalkPageTablesRecursively+0x88b
ffff9b0a`235db0e0 fffff804`49edcbfb     : ffff8040`20100800 ffff8a04`53a04700 00000219`00000003 ffff9b0a`235db3a0 : nt!MiWalkPageTablesRecursively+0x88b
ffff9b0a`235db180 fffff804`49f29451     : ffff9b0a`235db320 ffff8a04`00000000 00000219`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9b0a`235db280 fffff804`49f01670     : 00000000`00000001 ffff9b0a`00000000 ffff8a04`53a04550 ffff8a04`557c2080 : nt!MiDeletePagablePteRange+0x4f1
ffff9b0a`235db590 fffff804`4a29939f     : ffff8a04`557c2080 00000000`00000000 ffff8a04`00000000 ffff8a04`00000000 : nt!MiDeleteVad+0x360
ffff9b0a`235db6a0 fffff804`4a2e4dd3     : ffff8a04`57f163c0 ffff8a04`57f163c0 ffff8a04`57f18c10 ffff8a04`53a04080 : nt!MiCleanVad+0x43
ffff9b0a`235db6d0 fffff804`4a281f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8a04`53a04080 : nt!MmCleanProcessAddressSpace+0x137
ffff9b0a`235db750 fffff804`4a29ea8a     : ffff8a04`53a04080 ffffe60d`2e3657b0 ffff9b0a`235db990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff9b0a`235db7d0 fffff804`4a1f4558     : ffff8a04`c0000005 00000863`00000001 ffff9b0a`235db9e0 000000d4`c706f000 : nt!PspExitThread+0x5f6
ffff9b0a`235db8d0 fffff804`49ee6ca7     : 00000000`40610088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff9b0a`235db910 fffff804`49ff8440     : 000000d4`c7dff4c8 ffff9b0a`235db9c0 ffff9b0a`235dbb80 00000863`00000000 : nt!KiDeliverApc+0x487
ffff9b0a`235db9c0 fffff804`4a00595f     : ffff8a04`557c2080 00000000`00000000 ffff9b0a`235dbb18 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70
ffff9b0a`235dbb00 00007ffe`2304be44     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000d4`c7dff498 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2304be44


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000026de7, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803434136b9, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 23171

    Key  : Analysis.Init.CPU.mSec
    Value: 2593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 59909

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  092222-10171-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: 26de7

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff803434136b9

READ_ADDRESS: fffff80343efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000026de7

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffaa8fcb931310 -- (.trap 0xffffaa8fcb931310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000008080 rbx=0000000000000000 rcx=ffffe30007943040
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803434136b9 rsp=ffffaa8fcb9314a0 rbp=ffffaa8fcb931579
 r8=ffff860ae3163210  r9=0000000000000000 r10=ffffe170b85c2000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiPfPutPagesInTransition+0x2c9:
fffff803`434136b9 498b0f          mov     rcx,qword ptr [r15] ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffaa8f`cb9311c8 fffff803`43609c69     : 00000000`0000000a 00000000`00026de7 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaa8f`cb9311d0 fffff803`43605f69     : 00000000`00206d70 00000000`00206d70 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa8f`cb931310 fffff803`434136b9     : ffff860a`00000000 ffffaa8f`cb931579 00000000`00000000 80000002`86bac963 : nt!KiPageFault+0x469
ffffaa8f`cb9314a0 fffff803`4383a2e3     : ffff860a`e2f992f0 00000000`00000000 ffff860a`00000000 00000000`00000000 : nt!MiPfPutPagesInTransition+0x2c9
ffffaa8f`cb9315e0 fffff803`434d0c97     : ffff860a`df2b0d30 ffffaa8f`cb9317f0 ffff860a`e2f992f0 ffff860a`e5085390 : nt!MmPrefetchForCacheManager+0xb7
ffffaa8f`cb931640 fffff803`435b5930     : ffff860a`00020000 00000000`00000000 00000000`033c0000 ffff860a`d3424080 : nt!CcAsyncReadPrefetch+0x13f
ffffaa8f`cb9316f0 fffff803`434eea75     : ffff860a`d3424080 ffff860a`d3424080 fffff803`435b57a0 ffff860a`d33f9920 : nt!CcAsyncReadWorker+0x190
ffffaa8f`cb931c10 fffff803`435ff3b8     : ffff9681`803e8180 ffff860a`d3424080 fffff803`434eea20 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffaa8f`cb931c60 00000000`00000000     : ffffaa8f`cb932000 ffffaa8f`cb92c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  nt!MiPfPutPagesInTransition+2c9

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.1706

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  2c9

FAILURE_BUCKET_ID:  AV_nt!MiPfPutPagesInTransition

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d4722b20-c317-dab0-0f83-fcc7584d2184}

Followup:     MachineOwner
---------
 
teşekkürler hocam test edicem şimdi

Ramleri test ettim ve bir tanesinde çok fazla hata çıktı. onu söküp diğer ram i test ettim ve onda hata bulmadı. Teşekkürler
 
Son düzenleme:
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…