caloripher
Decapat
- Katılım
- 2 Mayıs 2019
- Mesajlar
- 6
- Çözümler
- 1
Arkadaşlar merhabalar,
Laptopumu aldığımdan beri (5 yıl) çeşitli aralıklarda bu mavi ekran hatasını alıyorum. Sürekli cihazıma ihtiyaç duyduğumdan teknik servise v.s. bırakamadım. Şu an SSD v.s. aldıktan sonra laptopum yeniden canlanınca, işlerimi de burada yapmaya başladım ama iyiden iyiye mavi ekran sorunu keyif kaçırmaya başladı.
Ve bende saplantı oldu Driver ile alakalı da olsa donanım ile alakalı da olsa bu işi çözeceğim. Bu arada hiçbir şekilde teknolojiden anlamasam da burada o kadar çok okudum ve bilgi aldım ki, bugcheckler, memtestler v.s. herşeyi yaptım.
Hatta bugcheck okuma üzerine de uğraştım ama yok o ciddi anlamda ayrı bir uzmanlık.
Yardımlarınız için gerçekten minnettar olacağım. Şimdiden çok teşekkür ediyorum.
Ürün
Sistem Detayları Aşağıdaki gibi
Mavi Ekran Hatası:
MEMTEST SONUÇLARI
Summary
System Information
Result summary
MINIDUMP DOSYASI (İNDİRİLEBİLİR)
Detaylı DumpCheck Analizi Raporu:
Laptopumu aldığımdan beri (5 yıl) çeşitli aralıklarda bu mavi ekran hatasını alıyorum. Sürekli cihazıma ihtiyaç duyduğumdan teknik servise v.s. bırakamadım. Şu an SSD v.s. aldıktan sonra laptopum yeniden canlanınca, işlerimi de burada yapmaya başladım ama iyiden iyiye mavi ekran sorunu keyif kaçırmaya başladı.
Ve bende saplantı oldu Driver ile alakalı da olsa donanım ile alakalı da olsa bu işi çözeceğim. Bu arada hiçbir şekilde teknolojiden anlamasam da burada o kadar çok okudum ve bilgi aldım ki, bugcheckler, memtestler v.s. herşeyi yaptım.
Hatta bugcheck okuma üzerine de uğraştım ama yok o ciddi anlamda ayrı bir uzmanlık.
Yardımlarınız için gerçekten minnettar olacağım. Şimdiden çok teşekkür ediyorum.
- Günlük mavi ekran sıklığı : 2 kere ortalama
- Memtest (Yapıldı)
- Detaylı Driver Güncellemeleri (Yapıldı) (BIOS hariç, maaleesef windows üzerinden yeni bios driver ile yapmaya kalktığımda bilgisayarım dondu etti aç kapa yapmak zorunda kaldım, çok kötü sıkıntı yaşayacaktım ama bir şekilde kurtardım, şimdi USB ile de açılış üzerinden güncelleme yapmak çok korkutuyor beni.)
- Malware test v.s. (Yapıldı)
Ürün
- ACER ASPIRE V3 - 772G
- Intel Core i7-4702MQ 2.2GHz
- NVIDIA GeForce GTX 760M
- 32 GB DDR3L MEMORY
- GOT Build-In HDD and Samsung 1 TB SSD
Sistem Detayları Aşağıdaki gibi
Mavi Ekran Hatası:
MEMTEST SONUÇLARI
Summary
Report Date | 2019-05-02 10:36:29 |
Generated by | MemTest86 V8.1 Free (64-bit) |
Result | PASS |
EFI Specifications | 2.31 |
System | |
Manufacturer | Acer |
Product Name | Aspire V3-772G |
Version | V1.13 |
Serial Number | NXM8UEY002351083087200 |
BIOS | |
Vendor | Insyde Corp. |
Version | V1.13 |
Release Date | 10/11/2013 |
Baseboard | |
Manufacturer | Acer |
Product Name | VA70_HW |
Version | Type2 - Board Version |
Serial Number | NBM8S11001351042E67200 |
CPU Type | Intel Core i7-4702MQ @ 2.20GHz |
CPU Clock | 2195 MHz [Turbo: 2893.3 MHz] |
# Logical Processors | 8 |
L1 Cache | 4 x 64K (121152 MB/s) |
L2 Cache | 4 x 256K (34083 MB/s) |
L3 Cache | 6144K (25690 MB/s) |
Memory | 32652M (15146 MB/s) |
DIMM Slot #0 | 8GB DDR3 PC3-12800 |
Kingston / ACR16D3LS1KFG/8G / EC3AAA56 | |
11-11-11-28 / 1600 MHz / 1.5V, 1.35V | |
DIMM Slot #1 | 8GB DDR3 PC3-12800 |
Kingston / ACR16D3LS1KFG/8G / E93A0757 | |
11-11-11-28 / 1600 MHz / 1.5V, 1.35V | |
DIMM Slot #2 | 8GB DDR3 PC3-12800 |
Kingston / ACR16D3LS1KFG/8G / ED3AA756 | |
11-11-11-28 / 1600 MHz / 1.5V, 1.35V | |
DIMM Slot #3 | 8GB DDR3 PC3-12800 |
Kingston / ACR16D3LS1KFG/8G / E73A9F56 | |
11-11-11-28 / 1600 MHz / 1.5V, 1.35V |
Test Start Time | 2019-05-01 23:05:11 |
Elapsed Time | 9:03:37 |
Memory Range Tested | 0x0 - 85F600000 (34294MB) |
CPU Selection Mode | Parallel (All CPUs) |
ECC Polling | Enabled |
# Tests Passed | 48/48 (100%) |
Test | # Tests Passed | Errors |
Test 0 [Address test, walking ones, 1 CPU] | 4/4 (100%) | 0 |
Test 1 [Address test, own address, 1 CPU] | 4/4 (100%) | 0 |
Test 2 [Address test, own address] | 4/4 (100%) | 0 |
Test 3 [Moving inversions, ones & zeroes] | 4/4 (100%) | 0 |
Test 4 [Moving inversions, 8-bit pattern] | 4/4 (100%) | 0 |
Test 5 [Moving inversions, random pattern] | 4/4 (100%) | 0 |
Test 6 [Block move, 64-byte blocks] | 4/4 (100%) | 0 |
Test 7 [Moving inversions, 32-bit pattern] | 4/4 (100%) | 0 |
Test 8 [Random number sequence] | 4/4 (100%) | 0 |
Test 9 [Modulo 20, ones & zeros] | 4/4 (100%) | 0 |
Test 10 [Bit fade test, 2 patterns, 1 CPU] | 4/4 (100%) | 0 |
Test 13 [Hammer test] | 4/4 (100%) | 0 |
MINIDUMP DOSYASI (İNDİRİLEBİLİR)
Detaylı DumpCheck Analizi Raporu:
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\temp*Symbol information
Symbol search path is: SRV*c:\temp*Symbol information
Executable search path is:
Windows 10 Kernel Version 17134 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 17134.1.amd64fre.rs4_release.180410-1804
Machine Name:
Kernel base = 0xfffff804`01209000 PsLoadedModuleList = 0xfffff804`015b62b0
Debug session time: Thu May 2 14:19:35.893 2019 (UTC + 3:00)
System Uptime: 0 days 3:41:43.910
Loading Kernel Symbols
.....................................Page 2001899f6 too large to be in the dump file.
Page 200187bf5 too large to be in the dump file.
..........................
....................Page 2000983ca too large to be in the dump file.
............................................
............................................................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000408855, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8040124da6a, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_MANUFACTURER: Acer
SYSTEM_PRODUCT_NAME: Aspire V3-772G
SYSTEM_SKU: Aspire V3-772G_0781_1.13
SYSTEM_VERSION: V1.13
BIOS_VENDOR: Insyde Corp.
BIOS_VERSION: V1.13
BIOS_DATE: 10/11/2013
BASEBOARD_MANUFACTURER: Acer
BASEBOARD_PRODUCT: VA70_HW
BASEBOARD_VERSION: Type2 - Board Version
DUMP_TYPE: 1
BUGCHECK_P1: 408855
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8040124da6a
READ_ADDRESS: 0000000000408855
CURRENT_IRQL: 0
FAULTING_IP:
nt!PpmUpdatePerformanceFeedback+da
fffff804`0124da6a f6055588400021 test byte ptr [nt!PerfGlobalGroupMask+0x6 (fffff804`016562c6)],21h
CPU_COUNT: 8
CPU_MHZ: 893
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3c
CPU_STEPPING: 3
CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 24'00000000 (cache) 24'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXPNP: 1 (!blackboxpnp)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-B7CC09T
ANALYSIS_SESSION_TIME: 05-02-2019 14:38:25.0886
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff898df466f4e0 -- (.trap 0xffff898df466f4e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffa6819777def0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040124da6a rsp=ffff898df466f670 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000001 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmUpdatePerformanceFeedback+0xda:
fffff804`0124da6a f6055588400021 test byte ptr [nt!PerfGlobalGroupMask+0x6 (fffff804`016562c6)],21h ds:fffff804`016562c6=00
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff804013c3c69 to fffff804013b30a0
STACK_TEXT:
ffff898d`f466f398 fffff804`013c3c69 : 00000000`0000000a 00000000`00408855 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffff898d`f466f3a0 fffff804`013c08e5 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa681`9777dec8 : nt!KiBugCheckDispatch+0x69
ffff898d`f466f4e0 fffff804`0124da6a : 00000173`ce12511d fffff804`0124e4d2 000001a3`17c48728 0000001e`f9bf7d6c : nt!KiPageFault+0x425
ffff898d`f466f670 fffff804`0124ce27 : 00000000`00000000 00000000`00000000 ffffa681`9777dec8 00000006`a3be8713 : nt!PpmUpdatePerformanceFeedback+0xda
ffff898d`f466f720 fffff804`0124c265 : 00000000`00000003 00000000`00000002 00000000`00000000 01d500d8`ec8d861c : nt!PpmIdleExecuteTransition+0xa37
ffff898d`f466fb00 fffff804`013b67ac : ffffffff`00000000 ffffa681`97778180 ffffa681`97788200 ffff9180`cb0f4080 : nt!PoIdle+0x345
ffff898d`f466fc60 00000000`00000000 : ffff898d`f4670000 ffff898d`f466a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
THREAD_SHA1_HASH_MOD_FUNC: 7293b8a719eade9bf044bb08185d8d546f0cf608
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e89703eb7edf405287b613e78a584cb829287b59
THREAD_SHA1_HASH_MOD: 30a3e915496deaace47137d5b90c3ecc03746bf6
FOLLOWUP_IP:
nt!PpmUpdatePerformanceFeedback+da
fffff804`0124da6a f6055588400021 test byte ptr [nt!PerfGlobalGroupMask+0x6 (fffff804`016562c6)],21h
FAULT_INSTR_CODE: 885505f6
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmUpdatePerformanceFeedback+da
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5ca31432
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: da
FAILURE_BUCKET_ID: AV_nt!PpmUpdatePerformanceFeedback
BUCKET_ID: AV_nt!PpmUpdatePerformanceFeedback
PRIMARY_PROBLEM_CLASS: AV_nt!PpmUpdatePerformanceFeedback
TARGET_TIME: 2019-05-02T11:19:35.000Z
OSBUILD: 17134
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2019-04-02 10:50:10
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 80d
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!ppmupdateperformancefeedback
FAILURE_ID_HASH: {2cff52de-5a3f-765a-d6a1-cf4ebe07fdc5}
Followup: MachineOwner
---------
6: kd> !blackboxbsd
Stream size mismatch (expected = 168, read = 136)
6: kd> !blackboxpnp
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132012562917551863
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : SW\{96E080C7-143C-11D1-B40F-00A0C9223196}\{3C0D501A-140B-11D1-B40F-00A0C9223196}
VetoString :
6: kd> .trap 0xffff898df466f4e0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffa6819777def0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040124da6a rsp=ffff898df466f670 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000001 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!PpmUpdatePerformanceFeedback+0xda:
fffff804`0124da6a f6055588400021 test byte ptr [nt!PerfGlobalGroupMask+0x6 (fffff804`016562c6)],21h ds:fffff804`016562c6=00
6: kd> lmvm nt
Browse full module list
start end module name
fffff804`01209000 fffff804`01b5b000 nt (pdb symbols) c:\temp\ntkrnlmp.pdb\C76519BFA4E546A89109C76B141069311\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Timestamp: Tue Apr 2 00:50:10 2019 (5CA31432)
CheckSum: 008AF836
ImageSize: 00952000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: