Faulty Hardware Corrupted Page Hatası

Elektromer

Decapat
Katılım
8 Nisan 2020
Mesajlar
1
Merhaba,
Linkini verdiğim yerde minidump dosyası bulunmaktadır.
2-3 günde bir başlıkta verdiğim hata kodunu vererek mavi ekran çıkıyor.
Yardımcı olabilirseniz çok sevinirim.
Şimdiden çok teşekkür ederim.

minidump-20200914.zip

Klasörün adresi burada...

Bilgisayarımın özellikleri görseldedir...
 

Dosya Ekleri

  • Dx1.png
    Dx1.png
    14,8 KB · Görüntüleme: 74
  • Dx2.png
    Dx2.png
    11,9 KB · Görüntüleme: 70
  • Windows.png
    Windows.png
    18,8 KB · Görüntüleme: 73
Son düzenleyen: Moderatör:
Bellekleriniz ben arızalıyım diye bağırıyor. Test edin:


Kod:
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 0000000000000329, physical page number
Arg3: 000001a6c87361c0, zero
Arg4: ffffd401e67b7000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8787

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x329

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0xf67c3e5e

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x161c0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0xcec18

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0xffffffffffffffff

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x3d68a

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 329

BUGCHECK_P3: 1a6c87361c0

BUGCHECK_P4: ffffd401e67b7000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT: 
ffffbb03`597722f8 fffff800`49f23bab     : 00000000`0000012b ffffffff`c00002c4 00000000`00000329 000001a6`c87361c0 : nt!KeBugCheckEx
ffffbb03`59772300 fffff800`49e63054     : 00000000`00000200 00000000`c00002c4 ffffd401`e67b7000 00000000`00000002 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
ffffbb03`59772350 fffff800`49d5ff54     : 00000000`00000004 ffffbb03`59772560 00000000`00000000 00000000`0000037f : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1030e0
ffffbb03`59772430 fffff800`49d5fdd2     : 00000000`00000001 00000000`000161c0 ffffab0f`000161c0 ffffab0f`00001000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
ffffbb03`59772480 fffff800`49d5fbfb     : 00000000`ffffffff ffffab0f`8b3e3000 ffffbb03`59772560 ffffab0f`968ced10 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
ffffbb03`59772520 fffff800`49d5fa41     : ffffab0f`8b3e3000 00000000`00000000 00000000`00000001 ffffab0f`89847788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
ffffbb03`597725d0 fffff800`49d5f951     : ffffab0f`89846000 ffffab0f`968ced10 ffffab0f`8b3e3000 ffffab0f`898479b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffffbb03`59772650 fffff800`49c69e28     : ffffab0f`8bce26c0 ffffab0f`89846000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffffbb03`59772680 fffff800`49d62eb1     : fffff800`49d5f930 ffffbb03`59772730 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffffbb03`597726f0 fffff800`49d4b9c1     : ffffbb03`597727f0 fffff800`4a18db78 ffffab0f`89846000 ffffbb03`59772940 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcd
ffffbb03`597727c0 fffff800`49d4b5a7     : 00000000`0000000c ffffab0f`89846000 ffffbb03`59772870 ffffab0f`968ced10 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a5
ffffbb03`59772810 fffff800`49d621c3     : 00000000`0000000c ffffab0f`968ced10 00000000`00000001 00000000`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
ffffbb03`597728a0 fffff800`49d6389f     : ffffab0f`00000001 ffffab0f`9541f8e0 00000000`00000000 ffffab0f`89846000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffffbb03`59772910 fffff800`49c8e0ab     : ffffab0f`987c55c0 00000000`00000001 ffffab0f`987c5680 fffff800`49c74ef6 : nt!SmPageRead+0x33
ffffbb03`59772960 fffff800`49c8d7a9     : 00000000`00000002 ffffbb03`597729f0 ffffbb03`59772b58 ffffe5f2`c3e7fcf8 : nt!MiIssueHardFaultIo+0x117
ffffbb03`597729b0 fffff800`49c72fab     : 00000000`c0033333 00000000`00000001 00000f9f`f3e81022 000042a2`23f90000 : nt!MiIssueHardFault+0x489
ffffbb03`59772a60 fffff800`49dcf520     : ffffab0f`8bce26c0 00000026`9f9fde60 00000000`00000000 ffffab0f`8d944060 : nt!MmAccessFault+0x40b
ffffbb03`59772c00 00007ff9`9dd34824     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000026`9f9fe8d0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`9dd34824


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80049c69e8a-fffff80049c69e8f  6 bytes - nt!KeExpandKernelStackAndCalloutInternal+da
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049c74f8a-fffff80049c74f8f  6 bytes - nt!MiUnlockWorkingSetShared+fa (+0xb100)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049c8d87a-fffff80049c8d87f  6 bytes - nt!MiIssueHardFault+55a (+0x188f0)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049c8e0d2-fffff80049c8e0d7  6 bytes - nt!MiIssueHardFaultIo+13e (+0x858)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049c8e0fe-fffff80049c8e103  6 bytes - nt!CcReferenceSharedCacheMapFileObject+26 (+0x2c)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049c8e15a-fffff80049c8e15f  6 bytes - nt!CcSlowReferenceSharedCacheMapFileObject+56 (+0x5c)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049c8e19a-fffff80049c8e19f  6 bytes - nt!ObFastReferenceObjectLocked+3a (+0x40)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d38f4a-fffff80049d38f4f  6 bytes - nt!MmChargeResources+86 (+0xaadb0)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d38f8e-fffff80049d38f93  6 bytes - nt!MmReleaseResourceCharge+3e (+0x44)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d48cbe-fffff80049d48cc3  6 bytes - nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxWorkItemComplete+196 (+0xfd30)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d4baae-fffff80049d4bab3  6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+292 (+0x2df0)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5f98a-fffff80049d5f98f  6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+5a (+0x13edc)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5f9b6-fffff80049d5f9bb  6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadComplete+26 (+0x2c)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5fad2-fffff80049d5fad7  6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+116 (+0x11c)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5fb2a-fffff80049d5fb2f  6 bytes - nt!ST_STORE<SM_TRAITS>::StDmLazyWorkItemQueue+52 (+0x58)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5fc46-fffff80049d5fc4b  6 bytes - nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+116 (+0x11c)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5fe6e-fffff80049d5fe73  6 bytes - nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+222 (+0x228)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5feae-fffff80049d5feb3  6 bytes - nt!SmSetThreadSystemPagePriority+3a (+0x40)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d5ff6e-fffff80049d5ff73  6 bytes - nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+ba (+0xc0)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d62286-fffff80049d6228b  6 bytes - nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+22a (+0x2318)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d62f3a-fffff80049d62f3f  6 bytes - nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+156 (+0xcb4)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d62fae-fffff80049d62fb0  3 bytes - nt!ST_STORE<SM_TRAITS>::StDmCombineTargetCompare+6e (+0x74)
    [ cc cc cc:4c 87 00 ]
    fffff80049d638aa-fffff80049d638af  6 bytes - nt!SmPageRead+3e (+0x8fc)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d638fa-fffff80049d638ff  6 bytes - nt!RtlpMakeXpressCallback+4a (+0x50)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d7527a-fffff80049d7527f  6 bytes - nt!EmpCheckErrataList+a (+0x11980)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049d752b6-fffff80049d752bb  6 bytes - nt!IoAllocateErrorLogEntry+36 (+0x3c)
    [ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
    fffff80049dc14ba-fffff80049dc14bb  2 bytes - nt!ZwWaitLowEventPair+2a (+0x4c204)
    [ 84 00:4c 87 ]
    fffff80049dc14bd-fffff80049dc14bf  3 bytes - nt!ZwWaitLowEventPair+2d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc14da-fffff80049dc14db  2 bytes - nt!KiBugCheckReturn+16 (+0x1d)
    [ 84 00:4c 87 ]
    fffff80049dc14dd-fffff80049dc14df  3 bytes - nt!KiBugCheckReturn+19 (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc160a-fffff80049dc160b  2 bytes - nt!KeBugCheckEx+12a (+0x12d)
    [ 84 00:4c 87 ]
    fffff80049dc160d-fffff80049dc160f  3 bytes - nt!KeBugCheckEx+12d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc170a-fffff80049dc170b  2 bytes - nt!KeContextToKframes+fa (+0xfd)
    [ 84 00:4c 87 ]
    fffff80049dc170d-fffff80049dc170f  3 bytes - nt!KeContextToKframes+fd (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc175a-fffff80049dc175b  2 bytes - nt!KiSaveInitialProcessorControlState+4a (+0x4d)
    [ 84 00:4c 87 ]
    fffff80049dc175d-fffff80049dc175f  3 bytes - nt!KiSaveInitialProcessorControlState+4d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc182a-fffff80049dc182f  6 bytes - nt!KiRestoreProcessorControlState+ca (+0xcd)
    [ 66 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
    fffff80049dc19aa-fffff80049dc19ab  2 bytes - nt!KiSaveProcessorControlState+17a (+0x180)
    [ 84 00:4c 87 ]
    fffff80049dc19ad-fffff80049dc19af  3 bytes - nt!KiSaveProcessorControlState+17d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc1a2a-fffff80049dc1a2f  6 bytes - nt!KiRestoreDebugRegisterState+7a (+0x7d)
    [ cc 0f 1f 44 00 00:4c 87 00 98 c3 90 ]
    fffff80049dc1bba-fffff80049dc1bbb  2 bytes - nt!KiSaveDebugRegisterState+18a (+0x190)
    [ 84 00:4c 87 ]
    fffff80049dc1bbd-fffff80049dc1bbf  3 bytes - nt!KiSaveDebugRegisterState+18d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc1bca-fffff80049dc1bcf  6 bytes - nt!KeGetCurrentStackPointer+a (+0x0d)
    [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
    fffff80049dc1bda-fffff80049dc1bdb  2 bytes - nt!KeResetLegacyFloatingPointState+a (+0x10)
    [ 1f 80:4c 87 ]
    fffff80049dc1bdd-fffff80049dc1bdf  3 bytes - nt!KeResetLegacyFloatingPointState+d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc1bea-fffff80049dc1bef  6 bytes - nt!KeSaveLegacyFloatingPointControlWord+a (+0x0d)
    [ cc cc 0f 1f 40 00:4c 87 00 98 c3 90 ]
    fffff80049dc1c0a-fffff80049dc1c0b  2 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1a (+0x20)
    [ 84 00:4c 87 ]
    fffff80049dc1c0d-fffff80049dc1c0f  3 bytes - nt!KeRestoreLegacyFloatingPointControlWord+1d (+0x03)
    [ 00 00 00:98 c3 90 ]
    fffff80049dc1eda-fffff80049dc1edb  2 bytes - nt!NtContinue+2ca (+0x2cd)
    [ 84 00:4c 87 ]
    fffff80049dc1edd-fffff80049dc1edf  3 bytes - nt!NtContinue+2cd (+0x03)
    [ 00 00 00:98 c3 90 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
263 errors : !nt (fffff80049c69e8a-fffff80049f247f7)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a39fc3dbb4d2b72f, Reserved
Arg2: 0000000000000000, Reserved
Arg3: d3d448fc4b873134, Failure type dependent information
Arg4: 0000000000000101, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3983

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10495

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  109

BUGCHECK_P1: a39fc3dbb4d2b72f

BUGCHECK_P2: 0

BUGCHECK_P3: d3d448fc4b873134

BUGCHECK_P4: 101

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffbb02`1a4daf98 00000000`00000000     : 00000000`00000109 a39fc3db`b4d2b72f 00000000`00000000 d3d448fc`4b873134 : nt!KeBugCheckEx


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 000000000000031b, physical page number
Arg3: 000001ee8ddb64c0, zero
Arg4: ffff8680994a0000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3311

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10927

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x31b

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0xe8d394ea

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x164c0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0xb6d04

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0xffffffffffffffff

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x148eb1

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 31b

BUGCHECK_P3: 1ee8ddb64c0

BUGCHECK_P4: ffff8680994a0000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT: 
fffffd8f`4f1d22f8 fffff803`56d23bab     : 00000000`0000012b ffffffff`c00002c4 00000000`0000031b 000001ee`8ddb64c0 : nt!KeBugCheckEx
fffffd8f`4f1d2300 fffff803`56c63054     : 00000000`00000200 00000000`c00002c4 ffff8680`994a0000 00000000`00000002 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0xfb
fffffd8f`4f1d2350 fffff803`56b5ff54     : 00000000`00000004 fffffd8f`4f1d2560 00000000`00000000 00000000`00002c60 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1030e0
fffffd8f`4f1d2430 fffff803`56b5fdd2     : 00000000`00000001 00000000`000164c0 ffffaf8c`000164c0 ffffaf8c`00003000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa0
fffffd8f`4f1d2480 fffff803`56b5fbfb     : ffffaf8c`ffffffff ffffaf8c`79164000 fffffd8f`4f1d2560 ffffaf8c`86613190 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x186
fffffd8f`4f1d2520 fffff803`56b5fa41     : ffffaf8c`79164000 00000000`00000000 00000000`00000001 ffffaf8c`769c4788 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xcb
fffffd8f`4f1d25d0 fffff803`56b5f951     : ffffaf8c`769c3000 ffffaf8c`86613190 ffffaf8c`79164000 ffffaf8c`769c49b0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
fffffd8f`4f1d2650 fffff803`56a69e28     : ffffaf8c`7671f080 ffffaf8c`769c3000 00000000`00000000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
fffffd8f`4f1d2680 fffff803`56b62eb1     : fffff803`56b5f930 fffffd8f`4f1d2730 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffffd8f`4f1d26f0 fffff803`56b4b9c1     : fffffd8f`4f1d27f0 fffff803`56f8db78 ffffaf8c`769c3000 fffffd8f`4f1d2940 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xcd
fffffd8f`4f1d27c0 fffff803`56b4b5a7     : 00000000`0000000c ffffaf8c`769c3000 fffffd8f`4f1d2870 ffffaf8c`86613190 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1a5
fffffd8f`4f1d2810 fffff803`56b621c3     : 00000000`0000000c ffffaf8c`86613190 00000000`00000003 00000000`00000003 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xbf
fffffd8f`4f1d28a0 fffff803`56b6389f     : ffffaf8c`00000003 ffffaf8c`863dcb50 00000000`00000000 ffffaf8c`769c3000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
fffffd8f`4f1d2910 fffff803`56a8e0ab     : ffffaf8c`75f35580 00000000`00000001 ffffaf8c`75f35640 fffff803`56a74ef6 : nt!SmPageRead+0x33
fffffd8f`4f1d2960 fffff803`56a8d7a9     : 00000000`00000002 fffffd8f`4f1d29f0 fffffd8f`4f1d2b58 fffff57a`80537148 : nt!MiIssueHardFaultIo+0x117
fffffd8f`4f1d29b0 fffff803`56a72fab     : 00000000`c0033333 00000000`00000001 0000014d`c52989b0 00000000`00000004 : nt!MiIssueHardFault+0x489
fffffd8f`4f1d2a60 fffff803`56bcf520     : ffffaf8c`7671f080 00000000`00000000 00000000`0000001a ffffaf8c`75f41c60 : nt!MmAccessFault+0x40b
fffffd8f`4f1d2c00 00007ff6`f2af8690     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
0000004b`551ff2b0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff6`f2af8690


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+fb

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.592

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  fb

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------


CRITICAL_STRUCTURE_CORRUPTION (109)
This bugcheck is generated when the kernel detects that critical kernel code or
data have been corrupted. There are generally three causes for a corruption:
1) A driver has inadvertently or deliberately modified critical kernel code
 or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx
2) A developer attempted to set a normal kernel breakpoint using a kernel
 debugger that was not attached when the system was booted. Normal breakpoints,
 "bp", can only be set if the debugger is attached at boot time. Hardware
 breakpoints, "ba", can be set at any time.
3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data.
Arguments:
Arg1: a3a00859f3c9b967, Reserved
Arg2: b3b714e0464cf224, Reserved
Arg3: ffffc9016202cce3, Failure type dependent information
Arg4: 000000000000002a, Type of corrupted region, can be
    0   : A generic data region
    1   : Modification of a function or .pdata
    2   : A processor IDT
    3   : A processor GDT
    4   : Type 1 process list corruption
    5   : Type 2 process list corruption
    6   : Debug routine modification
    7   : Critical MSR modification
    8   : Object type
    9   : A processor IVT
    a   : Modification of a system service function
    b   : A generic session data region
    c   : Modification of a session function or .pdata
    d   : Modification of an import table
    e   : Modification of a session import table
    f   : Ps Win32 callout modification
    10  : Debug switch routine modification
    11  : IRP allocator modification
    12  : Driver call dispatcher modification
    13  : IRP completion dispatcher modification
    14  : IRP deallocator modification
    15  : A processor control register
    16  : Critical floating point control register modification
    17  : Local APIC modification
    18  : Kernel notification callout modification
    19  : Loaded module list modification
    1a  : Type 3 process list corruption
    1b  : Type 4 process list corruption
    1c  : Driver object corruption
    1d  : Executive callback object modification
    1e  : Modification of module padding
    1f  : Modification of a protected process
    20  : A generic data region
    21  : A page hash mismatch
    22  : A session page hash mismatch
    23  : Load config directory modification
    24  : Inverted function table modification
    25  : Session configuration modification
    26  : An extended processor control register
    27  : Type 1 pool corruption
    28  : Type 2 pool corruption
    29  : Type 3 pool corruption
    2a  : Type 4 pool corruption
    2b  : Modification of a function or .pdata
    2c  : Image integrity corruption
    2d  : Processor misconfiguration
    2e  : Type 5 process list corruption
    2f  : Process shadow corruption
    30  : Retpoline code page corruption
    101 : General pool corruption
    102 : Modification of win32k.sys

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4405

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8535

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  109

BUGCHECK_P1: a3a00859f3c9b967

BUGCHECK_P2: b3b714e0464cf224

BUGCHECK_P3: ffffc9016202cce3

BUGCHECK_P4: 2a

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

DPC_STACK_BASE:  FFFFF80440C6EFB0

STACK_TEXT: 
fffff804`40c6eb28 00000000`00000000     : 00000000`00000109 a3a00859`f3c9b967 b3b714e0`464cf224 ffffc901`6202cce3 : nt!KeBugCheckEx


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff73f47e982f0
Arg3: 0080000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3140

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7150

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff73f47e982f0

BUGCHECK_P3: 80000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffff9d05`7ce60cd8 fffff801`2d0252ee     : 00000000`0000001a 00000000`00041792 fffff73f`47e982f0 00800000`00000000 : nt!KeBugCheckEx
ffff9d05`7ce60ce0 fffff801`2ceac9e7     : 00000000`00000000 fffff73f`47e982f0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x176b0e
ffff9d05`7ce60df0 fffff801`2ceacea1     : ffff9d05`7ce61240 fffff77b`9fa3f4c0 00000000`00000000 0a000000`cec5d867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff9d05`7ce60eb0 fffff801`2ceacea1     : ffff9d05`7ce61240 fffff77b`bdcfd1f8 00000000`00000000 0a000000`bb3de867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9d05`7ce60f70 fffff801`2ceacea1     : ffff9d05`7ce61240 fffff77b`bddee7e8 fffff77b`00000000 0a000001`6235c867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9d05`7ce61030 fffff801`2ceac62c     : ffff9d05`7ce61240 fffff77b`bddeef70 ffff9d05`00000000 ffff9d05`7ce611b9 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9d05`7ce610f0 fffff801`2ceaaa98     : ffff9d05`7ce61240 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff9d05`7ce611f0 fffff801`2ceb8bf0     : ffffffff`ffffffff ffffca8b`27d423f8 ffff9d05`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff9d05`7ce61590 fffff801`2d3c7a5d     : ffffca8b`25cbc080 ffffca8b`25cbc080 ffffca8b`2c30d520 ffffca8b`27d423f0 : nt!MiDeleteVad+0x860
ffff9d05`7ce61750 fffff801`2d3d9e14     : ffffca8b`2c30d520 ffffca8b`27da7470 ffffca8b`25cbc080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9d05`7ce61780 fffff801`2d3d98cf     : ffffca8b`2c302bc0 ffffca8b`2c302bc0 ffffca8b`27d42080 fffff801`2d26a400 : nt!MiCleanVad+0x30
ffff9d05`7ce617b0 fffff801`2d438771     : ffffffff`00000000 ffffffff`ffffffff ffff9d05`7ce61a01 ffffca8b`27d42080 : nt!MmCleanProcessAddressSpace+0x137
ffff9d05`7ce61830 fffff801`2d45e6d3     : ffffca8b`27d42080 ffffda8a`0004d060 ffff9d05`7ce61a59 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffff9d05`7ce618b0 fffff801`2d4cd143     : 00000000`00000000 ffffb480`42be7101 0000008b`2a7e2000 00000000`00000000 : nt!PspExitThread+0x60b
ffff9d05`7ce619c0 fffff801`2ce3e551     : ffffca8b`25cbc080 ffff9d05`00000000 ffffca8b`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffff9d05`7ce61a00 fffff801`2cfc5a60     : 0000008b`2c7f0001 ffff9d05`7ce61ac0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffff9d05`7ce61ac0 fffff801`2cfd2dbf     : ffffca8b`25cbc080 0000008b`2c7ff3f8 ffff9d05`7ce61c18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff9d05`7ce61c00 00007ffa`7a47c144     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000008b`2c7ff3c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`7a47c144


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı