Ryzen 7 3700X sistemde MEMORY_MANAGEMENT hatası

Torik61

Kilopat
Katılım
26 Eylül 2016
Mesajlar
450
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Merhaba, yaklaşık 3 aydır Windows'ta ve uygulamalarda(Opera, oyunlar vs.) Çökme yaşıyorum. Windows içinde olanlar genellikle "MEMORY_MANAGEMENT" ya da "IRQL_NOT_LESS_OR_EQUAL" oluyor. Opera'da olan da "sayfa çöktü" şeklinde oluyor. Sürücülerimin oldukça temiz olmasına(bilgisayarda hiç parça değişikliği yapmadım, ilk günkü konfigürasyonda duruyor.) Rağmen onlardan şüphelenip temiz Windows kurulumu yaptım. Şu anda 21H1 19043.1348 kullanıyorum. Sürücüler de temiz kurulum yaptığım için doğal olarak güncel. Zaten AMD chipset sürücüsünü ve GeForce Experience aracılığıyla 496.76 Game Ready Driver'ı kurdum sadece. Şu anda bellek kaynaklı bir problem gibi duruyor. Sizin tahmininiz, tavsiyeniz nedir? Cihazı İtopya'dan aldım, İtopya'ya mı yoksa G.Skill'e mi ulaşmalıyım? Memtest86 yapmalı mıyım?

Sistemim: anakart: MSI B450-A Pro Max işlemci: AMD Ryzen 7 3700X 8 çekirdek 16 izlek işlemci soğutucu: AMD Wraith Prism ekran kartı: MSI RTX 2070 Super Ventus GP OC RAM: G.Skill 32 GB (2x16 GB) Ripjaws V 3600MHz CL18 SSD: Kioxia Exceria 500GB NVMe M.2 HDD: Seagate Barracuda 2TB kasa: Corsair 4000D airflow siyah kasa fanları: 2X Corsair 120mm airguide, 1X Arctic bionix P120 120mm PSU: Cooler Master MWE white 650W işletim sistemi: Windows 10 Single Language 19043 monitör: Samsung LC27HG70 2K 144Hz HDR.

Buyurun bu da minidump dosyam.
 
BIOS'unuza yeni güncellemeler mevcut. BIOS güncellemesi yapın.

Yapmanızı isteyeceğim 2 adet test var. Lütfen bunları tamamlayıp sonuçları bizlerle paylaşın.

1-HDTune yazılımı ile "quick scan" kapalı olacak şekilde bir disk taraması gerçekleştirmeniz.
2- Memtest yazılımı ile RAM'lerinizi test etmeniz.

Linkler :

HDTune : HD Tune Pro
Memtest : Memtest86 USB'den Çalışan RAM Test Programı

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc4c35a2015f0
Arg3: 0000000000008000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2765

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 13533

    Key  : Analysis.Init.CPU.mSec
    Value: 593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2431

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 73

    Key  : MemoryManagement.PFN
    Value: 8

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  112721-6296-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffc4c35a2015f0

BUGCHECK_P3: 8000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  steamwebhelper

STACK_TEXT: 
ffffae85`d2867c78 fffff807`200440ca     : 00000000`0000001a 00000000`00041792 ffffc4c3`5a2015f0 00000000`00008000 : nt!KeBugCheckEx
ffffae85`d2867c80 fffff807`2009e416     : 00000000`00000000 00000000`00000000 00000000`0000000a ffffc4c3`5a2015f0 : nt!MiDeleteVa+0x153a
ffffae85`d2867d80 fffff807`2009e52b     : ffffc4e2`61ad1008 ffff8c09`2ffc2700 ffffae85`00000000 ffffae85`d28681f0 : nt!MiWalkPageTablesRecursively+0x776
ffffae85`d2867e20 fffff807`2009e52b     : ffffc4e2`7130d688 ffff8c09`2ffc2700 ffffae85`00000001 ffffae85`d2868200 : nt!MiWalkPageTablesRecursively+0x88b
ffffae85`d2867ec0 fffff807`2009e52b     : ffffc4e2`7130d000 ffff8c09`2ffc2700 ffffae85`00000002 ffffae85`d2868210 : nt!MiWalkPageTablesRecursively+0x88b
ffffae85`d2867f60 fffff807`20004f4b     : ffff8c09`200f9901 ffff8c09`2ffc2700 01d7e3c3`00000003 ffffae85`d2868220 : nt!MiWalkPageTablesRecursively+0x88b
ffffae85`d2868000 fffff807`20042961     : ffffae85`d28681a0 ffff8c09`00000001 ffffb200`00000002 fffff807`00000000 : nt!MiWalkPageTables+0x36b
ffffae85`d2868100 fffff807`2041d464     : 00000000`00000000 00000000`00000000 00000000`00000103 00000000`00000000 : nt!MiDeletePagablePteRange+0x4f1
ffffae85`d2868410 fffff807`2006b6f4     : ffff8c09`2ffc2080 00000000`073255b0 00000000`00000002 fffff807`00000000 : nt!MiDeleteVadBitmap+0x8c
ffffae85`d28684a0 fffff807`2041d2e0     : ffff8c09`2ffc2080 ffff8c09`2ffc27c0 ffff8c09`2ffc2700 ffff8c09`2b218400 : nt!MiDeleteFinalPageTables+0xc8
ffffae85`d2868560 fffff807`2041a74f     : ffff8c09`2ffc2080 ffffae85`d2868620 ffff8c09`2b218400 ffff8c09`2ffc24c8 : nt!MmDeleteProcessAddressSpace+0x64
ffffae85`d28685b0 fffff807`20473440     : ffff8c09`2ffc2050 ffff8c09`2ffc2050 00000000`00000000 ffff8c09`200c0640 : nt!PspProcessDelete+0x13f
ffffae85`d2868640 fffff807`20008357     : 00000000`00000000 00000000`00000000 ffffae85`d28687c9 ffff8c09`2ffc2080 : nt!ObpRemoveObjectRoutine+0x80
ffffae85`d28686a0 fffff807`203f3b79     : ffff8c09`2ffc2050 00000000`00000000 00000000`00000000 ffff8c09`2b1ea080 : nt!ObfDereferenceObjectWithTag+0xc7
ffffae85`d28686e0 fffff807`2045c855     : 00000002`00000043 fffff807`2d71347c 00000000`00000103 00000000`00000000 : nt!ObCloseHandleTableEntry+0x6c9
ffffae85`d2868820 fffff807`2045e6ad     : ffff8c09`2b218400 ffff8c09`2b218400 ffffffff`ffffff01 ffff8c09`2b1ea4d8 : nt!ExSweepHandleTable+0xd5
ffffae85`d28688d0 fffff807`2045c5a0     : ffffffff`ffffffff ffff8c09`2b1ea080 ffffae85`d2868920 fffff807`204203ac : nt!ObKillProcess+0x35
ffffae85`d2868900 fffff807`204b0c26     : ffff8c09`2b1ea080 ffffc681`2b841060 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x204
ffffae85`d2868990 fffff807`204b418e     : ffff8c09`00000000 00000000`00000001 00000000`00000000 00000000`00450000 : nt!PspExitThread+0x5f6
ffffae85`d2868a90 fffff807`20208cb8     : ffff8c09`2b1ea080 ffff8c09`2b218400 ffffae85`d2868b80 ffff8c09`2b49a900 : nt!NtTerminateProcess+0xde
ffffae85`d2868b00 00000000`77581cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0031e988 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77581cfc


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
 

Geri
Yukarı