FAULTY_HARDWARE_CORRUPTED_PAGE mavi ekran hatası

berkesst

Kilopat
Katılım
28 Kasım 2015
Mesajlar
248
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Oyunlarda başlıkta yazdığım hatayı veya page fault in nonpaged area gibi mavi ekran hataları alıyorum. Günde 1 kere veya 2 günde bir sürekli alıyorum. Oyunlarda aldığımda bir cızırtı sesi ve mavi ekran çıkıyor. Memtest ile test yaptım herhangi bir sorun yok buyurun mini dump dosyası:

 
Son düzenleyen: Moderatör:
Bellek testini hangi yazılımla yaptınız? Bütün dökümleri inceledim. Belleklerinizi arızalı olduğunu düşünüyorum. Bellekleri değiştirin.

Kod:
FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 00000000000006a6, physical page number
Arg3: 00000180c9465990, zero
Arg4: ffffc480ed5bb000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2531

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-8G3PQ7K

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8270

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x6a6

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0x48966e29

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x15990

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x599b4

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0x1d11b3

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x1ac5d7

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 6a6

BUGCHECK_P3: 180c9465990

BUGCHECK_P4: ffffc480ed5bb000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT: 
ffff9304`a08fb208 fffff806`701a4bb2     : 00000000`0000012b ffffffff`c00002c4 00000000`000006a6 00000180`c9465990 : nt!KeBugCheckEx
ffff9304`a08fb210 fffff806`7002b76f     : 00000000`00000001 00000000`c00002c4 ffffc480`ed5bb000 00000000`000ed99f : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffff9304`a08fb270 fffff806`6fe70bc5     : 00000000`00000004 fffff806`6fe7072e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1bab87
ffff9304`a08fb330 fffff806`6fe70494     : 00000000`00000001 00000000`00015990 00000000`00000000 ffffad8f`00009000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff9304`a08fb380 fffff806`6fe71090     : fffff806`ffffffff ffffad8f`e0329000 ffff9304`a08fb460 ffffad8f`df8e8490 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff9304`a08fb420 fffff806`6fe71301     : ffffc480`ec6ed730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff9304`a08fb4d0 fffff806`6fe713c1     : ffffad8f`dbc1e000 ffffad8f`df8e8490 ffffad8f`e0329000 ffffad8f`dbc1f9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff9304`a08fb550 fffff806`6fe37218     : ffffad8f`dcef6040 ffffad8f`dbc1e000 00000000`00000000 ffffad8f`d8a1b8a0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff9304`a08fb580 fffff806`6ff0e223     : fffff806`6fe713a0 ffff9304`a08fb620 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9304`a08fb5f0 fffff806`6fe63008     : ffff9304`a08fb6f0 00000000`31526d73 00000000`000003ff fffff806`709229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff9304`a08fb6c0 fffff806`6fe62a3c     : 00000000`0000000c 00000000`000003ff ffff9304`a08fb770 fffff806`709229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff9304`a08fb710 fffff806`6ff0cb1f     : 00000000`0000000c 00000000`00000009 ffffad8f`df8e8490 ffffad8f`d8a1b8a0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff9304`a08fb7a0 fffff806`6ff4ae5f     : ffffad8f`00000009 ffffad8f`d8a1b960 00000000`00000000 ffffad8f`dbc1e000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff9304`a08fb810 fffff806`6fe95ea4     : ffffad8f`d8a1b850 ffffad8f`dd4a7740 ffff9304`a08fba58 fffff806`6fe9429c : nt!SmPageRead+0x33
ffff9304`a08fb860 fffff806`6fe940f8     : 00000000`00000002 ffff9304`a08fb8f0 00000000`00000000 ffffad8f`d8a1b850 : nt!MiIssueHardFaultIo+0x10c
ffff9304`a08fb8b0 fffff806`6fe12d68     : 00000000`c0033333 00000000`00000001 00000229`d303c478 00000000`00000000 : nt!MiIssueHardFault+0x3e8
ffff9304`a08fb960 fffff806`6ffebc1e     : ffffad8f`dcef6040 00000000`00000001 00000229`d2ff0000 ffff9304`a08fbb80 : nt!MmAccessFault+0x468
ffff9304`a08fbb00 00007ffe`d0d34c29     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000ab`d32ff8d0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`d0d34c29


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+10a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10a

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc7bffed87088
Arg3: 0000000008000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2234

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-8G3PQ7K

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 2232

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffc7bffed87088

BUGCHECK_P3: 8000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffffb709`520cef58 fffff807`28a54286     : 00000000`0000001a 00000000`00041792 ffffc7bf`fed87088 00000000`08000000 : nt!KeBugCheckEx
ffffb709`520cef60 fffff807`288c217f     : ffff9609`76f1f700 00007ffd`b0e10000 ffffc7bf`00000002 ffffb709`520cf150 : nt!MiDeleteVa+0x191f46
ffffb709`520cf050 fffff807`288a789f     : 00000000`00000000 00000000`00000060 ffff9609`76f1f7c0 00000000`00000000 : nt!MiDeletePagablePteRange+0x31f
ffffb709`520cf4d0 fffff807`28beab99     : ffff9609`76f1f080 00000000`00000000 ffff9609`00000000 ffff9609`00000001 : nt!MiDeleteVad+0x41f
ffffb709`520cf600 fffff807`28c66dc0     : ffff9609`76d64d40 ffff9609`6cf04a10 ffff9609`761f1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb709`520cf630 fffff807`28c67c73     : ffff9609`76d64ca0 ffff9609`76d64ca0 ffff9609`76d64d40 ffff9609`76f1f080 : nt!MiCleanVad+0x30
ffffb709`520cf660 fffff807`28cba247     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9609`76f1f080 : nt!MmCleanProcessAddressSpace+0x137
ffffb709`520cf6e0 fffff807`28be8e32     : ffff9609`76f1f080 ffffcf06`81a30090 ffffb709`520cf920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffb709`520cf760 fffff807`28cf5298     : 00000000`000000ff 00000000`00000101 00000000`00000000 000000c2`8d2fb000 : nt!PspExitThread+0x5f6
ffffb709`520cf860 fffff807`2882a507     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffb709`520cf8a0 fffff807`289e2100     : 00000000`00000001 ffffb709`520cf950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffb709`520cf950 fffff807`289ef51f     : ffffb709`520cfb18 00000000`00000000 ffff9609`761f1080 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb709`520cfa90 00007ffd`b1eab8e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c2`8dcff708 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b1eab8e4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffc7bffed87088
Arg3: 0000000008000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2218

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-8G3PQ7K

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 2213

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffc7bffed87088

BUGCHECK_P3: 8000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
ffffb709`520cef58 fffff807`28a54286     : 00000000`0000001a 00000000`00041792 ffffc7bf`fed87088 00000000`08000000 : nt!KeBugCheckEx
ffffb709`520cef60 fffff807`288c217f     : ffff9609`76f1f700 00007ffd`b0e10000 ffffc7bf`00000002 ffffb709`520cf150 : nt!MiDeleteVa+0x191f46
ffffb709`520cf050 fffff807`288a789f     : 00000000`00000000 00000000`00000060 ffff9609`76f1f7c0 00000000`00000000 : nt!MiDeletePagablePteRange+0x31f
ffffb709`520cf4d0 fffff807`28beab99     : ffff9609`76f1f080 00000000`00000000 ffff9609`00000000 ffff9609`00000001 : nt!MiDeleteVad+0x41f
ffffb709`520cf600 fffff807`28c66dc0     : ffff9609`76d64d40 ffff9609`6cf04a10 ffff9609`761f1080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffb709`520cf630 fffff807`28c67c73     : ffff9609`76d64ca0 ffff9609`76d64ca0 ffff9609`76d64d40 ffff9609`76f1f080 : nt!MiCleanVad+0x30
ffffb709`520cf660 fffff807`28cba247     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9609`76f1f080 : nt!MmCleanProcessAddressSpace+0x137
ffffb709`520cf6e0 fffff807`28be8e32     : ffff9609`76f1f080 ffffcf06`81a30090 ffffb709`520cf920 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffb709`520cf760 fffff807`28cf5298     : 00000000`000000ff 00000000`00000101 00000000`00000000 000000c2`8d2fb000 : nt!PspExitThread+0x5f6
ffffb709`520cf860 fffff807`2882a507     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffb709`520cf8a0 fffff807`289e2100     : 00000000`00000001 ffffb709`520cf950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffb709`520cf950 fffff807`289ef51f     : ffffb709`520cfb18 00000000`00000000 ffff9609`761f1080 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffb709`520cfa90 00007ffd`b1eab8e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c2`8dcff708 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b1eab8e4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
AULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a single bit error was found in this page.  This is a hardware memory error.
Arguments:
Arg1: ffffffffc00002c4, virtual address mapping the corrupted page
Arg2: 00000000000002ca, physical page number
Arg3: 00000206f7b90000, zero
Arg4: ffffce81673f3000, zero

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3061

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-8G3PQ7K

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17437

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : BlackBox.SmDecompressionFailure.CompressedSize
    Value: 0x2ca

    Key  : BlackBox.SmDecompressionFailure.CompressionFormat
    Value: 0x3

    Key  : BlackBox.SmDecompressionFailure.SourceDataHash
    Value: 0x653a2075

    Key  : BlackBox.SmDecompressionFailure.SourceDataOffset
    Value: 0x0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN1
    Value: 0x1d11b0

    Key  : BlackBox.SmDecompressionFailure.SourcePFN2
    Value: 0xffffffffffffffff

    Key  : BlackBox.SmDecompressionFailure.TargetPFN
    Value: 0x1c9808

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  12b

BUGCHECK_P1: ffffffffc00002c4

BUGCHECK_P2: 2ca

BUGCHECK_P3: 206f7b90000

BUGCHECK_P4: ffffce81673f3000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MemCompression

STACK_TEXT: 
ffff9c84`2874f208 fffff807`46fa4bb2     : 00000000`0000012b ffffffff`c00002c4 00000000`000002ca 00000206`f7b90000 : nt!KeBugCheckEx
ffff9c84`2874f210 fffff807`46e2b76f     : ffff9a80`00000001 00000000`c00002c4 ffffce81`673f3000 fffff807`46c58d29 : nt!ST_STORE<SM_TRAITS>::StDmPageError+0x10a
ffff9c84`2874f270 fffff807`46c70bc5     : 00000000`00000004 fffff807`46c7072e 00000000`00000000 00000000`00000001 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageCopy+0x1bab87
ffff9c84`2874f330 fffff807`46c70494     : 00000000`00000001 00000000`00000000 00000000`00000000 ffffb98d`00010000 : nt!ST_STORE<SM_TRAITS>::StDmSinglePageTransfer+0xa5
ffff9c84`2874f380 fffff807`46c71090     : 00000000`ffffffff ffffb98d`dfb07000 ffff9c84`2874f460 ffffb98d`e2bf19d0 : nt!ST_STORE<SM_TRAITS>::StDmpSinglePageRetrieve+0x180
ffff9c84`2874f420 fffff807`46c71301     : ffffce81`667d6730 00000000`00000001 00000000`00000000 00000000`00000000 : nt!ST_STORE<SM_TRAITS>::StDmPageRetrieve+0xc8
ffff9c84`2874f4d0 fffff807`46c713c1     : ffffb98d`dd77c000 ffffb98d`e2bf19d0 ffffb98d`dfb07000 ffffb98d`dd77d9c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadIssue+0x85
ffff9c84`2874f550 fffff807`46c37218     : ffffb98d`de6b8080 ffffb98d`dd77c000 00000000`00000000 ffffb98d`e32ea3a0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectReadCallout+0x21
ffff9c84`2874f580 fffff807`46d0e223     : fffff807`46c713a0 ffff9c84`2874f620 00000000`00000003 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff9c84`2874f5f0 fffff807`46c63008     : ffff9c84`2874f6f0 00000000`31526d73 00000000`000003ff fffff807`477229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStDirectRead+0xc7
ffff9c84`2874f6c0 fffff807`46c62a3c     : 00000000`0000000c 00000000`000003ff ffff9c84`2874f770 fffff807`477229c0 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkItemQueue+0x1ac
ffff9c84`2874f710 fffff807`46d0cb1f     : 00000000`0000000c 00000000`00000010 ffffb98d`e2bf19d0 ffffb98d`e32ea3a0 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxQueueWork+0xc0
ffff9c84`2874f7a0 fffff807`46d4ae5f     : ffffb98d`00000010 ffffb98d`e32ea460 00000000`00000000 ffffb98d`dd77c000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmPageRead+0x167
ffff9c84`2874f810 fffff807`46c95ea4     : ffffb98d`e32ea350 ffffb98d`dde32700 ffff9c84`2874fa58 fffff807`46c9429c : nt!SmPageRead+0x33
ffff9c84`2874f860 fffff807`46c940f8     : 00000000`00000002 ffff9c84`2874f8f0 00000000`00000000 ffffb98d`e32ea350 : nt!MiIssueHardFaultIo+0x10c
ffff9c84`2874f8b0 fffff807`46c12d68     : 00000000`c0033333 00000000`00000001 000002b8`33377b0c 00000000`00000001 : nt!MiIssueHardFault+0x3e8
ffff9c84`2874f960 fffff807`46debc1e     : 000002b8`00000000 000000f4`00000001 00007ffe`eed415f8 ffff9c84`2874fb80 : nt!MmAccessFault+0x468
ffff9c84`2874fb00 00007ffe`ee4a1bba     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000f4`b3cfaac0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`ee4a1bba


SYMBOL_NAME:  nt!ST_STORE<SM_TRAITS>::StDmPageError+10a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  10a

FAILURE_BUCKET_ID:  0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6a6bb4d-3b77-dff6-2d9b-75f5d0f61a50}

Followup:     MachineOwner
---------

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff94062aa86eb0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8007fe41920, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for dxgkrnl.sys

Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3733

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-8G3PQ7K

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 59680

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffff94062aa86eb0

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8007fe41920

BUGCHECK_P4: 2

READ_ADDRESS: fffff800808fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8008080f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8008080f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffff94062aa86eb0

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

TRAP_FRAME:  ffffb98e44f39b80 -- (.trap 0xffffb98e44f39b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff94062aa86eb8 rbx=0000000000000000 rcx=0000000095130000
rdx=0000000000130000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8007fe41920 rsp=ffffb98e44f39d10 rbp=ffffb98e44f39d88
 r8=3326a10410bcd6fa  r9=0000000000000000 r10=0000000000000001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!RtlpHpVsChunkSplit+0x590:
fffff800`7fe41920 8b4bf8          mov     ecx,dword ptr [rbx-8] ds:ffffffff`fffffff8=????????
Resetting default scope

STACK_TEXT: 
ffffb98e`44f398d8 fffff800`80035d15     : 00000000`00000050 ffff9406`2aa86eb0 00000000`00000000 ffffb98e`44f39b80 : nt!KeBugCheckEx
ffffb98e`44f398e0 fffff800`7fe12d00     : 000000fe`00000000 00000000`00000000 ffffb98e`44f39c00 00000000`00000000 : nt!MiSystemFault+0x1ad5c5
ffffb98e`44f399e0 fffff800`7ffebc1e     : 00000000`00000000 00000000`00000001 00000000`00000000 fffff780`00000000 : nt!MmAccessFault+0x400
ffffb98e`44f39b80 fffff800`7fe41920     : 00000000`00000000 ffffb98e`44f39d88 00000000`00000022 00000000`00000022 : nt!KiPageFault+0x35e
ffffb98e`44f39d10 fffff800`7fe411ba     : 00000004`00000000 ffff9406`39604c90 00000000`00000013 ffffdb09`00000000 : nt!RtlpHpVsChunkSplit+0x590
ffffb98e`44f39dd0 fffff800`7ff13f49     : 00000000`00000000 00000000`00000210 ffff9406`2be00280 00000000`00000000 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffb98e`44f39e30 fffff800`7fe44920     : fffff800`80857f40 ffffb98e`44f39f91 00000000`00000001 00000000`00000008 : nt!RtlpHpVsContextMultiAlloc+0x69
ffffb98e`44f39eb0 fffff800`805c2094     : ffffdb09`510e3000 ffffdb09`53903000 00000000`31306956 fffff800`86e38c59 : nt!ExAllocateHeapPool+0xa70
ffffb98e`44f39ff0 fffff800`890219b6     : 00000000`00000005 ffffb98e`44f3a1f0 00000000`00000002 00000000`00000000 : nt!ExAllocatePoolWithTag+0x64
ffffb98e`44f3a040 fffff800`8908b0ab     : 00000000`00000005 00000000`00000002 00000000`01001002 00000000`00000000 : dxgmms2!operator new+0x2e
ffffb98e`44f3a070 fffff800`8908966e     : 00000000`00000000 ffffdb09`56d5d440 ffffb98e`00000000 00000000`00060000 : dxgmms2!VIDMM_GLOBAL::CreateOneAllocation+0x39b
ffffb98e`44f3a270 fffff800`890216c2     : ffffdb09`00000000 00000000`00000000 ffffdb09`575356a0 fffff800`87047544 : dxgmms2!VIDMM_GLOBAL::CreateAllocation+0xaa
ffffb98e`44f3a330 fffff800`86f35503     : ffffb98e`44f3a900 ffff0858`ab34d8bb 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCreateAllocation+0x72
ffffb98e`44f3a3d0 ffffb98e`44f3a900     : ffff0858`ab34d8bb 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl+0x105503
ffffb98e`44f3a3d8 ffff0858`ab34d8bb     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffb98e`44f3a448 : 0xffffb98e`44f3a900
ffffb98e`44f3a3e0 00000000`00000000     : 00000000`00000000 00000000`00000000 ffffb98e`44f3a448 ffffb98e`44f3a900 : 0xffff0858`ab34d8bb


SYMBOL_NAME:  dxgmms2!operator new+2e

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2e

FAILURE_BUCKET_ID:  AV_R_INVALID_dxgmms2!operator_new

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a06302ce-5000-8a2d-005e-b183536b2481}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffffbbbffe786380
Arg3: 810000009284e005
Arg4: ffffdf8796040920

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-8G3PQ7K

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9508

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41201

BUGCHECK_P2: ffffbbbffe786380

BUGCHECK_P3: 810000009284e005

BUGCHECK_P4: ffffdf8796040920

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  SearchFilterHost.exe

STACK_TEXT: 
ffff8407`3a637548 fffff801`6f44bf86     : 00000000`0000001a 00000000`00041201 ffffbbbf`fe786380 81000000`9284e005 : nt!KeBugCheckEx
ffff8407`3a637550 fffff801`6f2b5d34     : 00000000`00001000 00000000`00000000 00000000`00000000 ffffdf87`96040920 : nt!MiGetPageProtection+0x195526
ffff8407`3a6375b0 fffff801`6f2a3c1f     : 00000000`00000000 00007ffc`f0c70000 00000000`00000282 fffff801`6f21eb3b : nt!MiQueryAddressState+0x2f4
ffff8407`3a6377d0 fffff801`6f66a5dc     : ffff8407`3a630000 00000000`00000000 ffffdf87`00000000 ffffdf87`00000000 : nt!MiQueryAddressSpan+0xcf
ffff8407`3a637890 fffff801`6f669d85     : 00000000`00000000 00000000`00000000 00000000`10000000 00000000`10000000 : nt!MmQueryVirtualMemory+0x83c
ffff8407`3a637a40 fffff801`6f3ef478     : 00000000`00000000 00000000`00000001 00000000`000000e0 ffff8407`3a637b80 : nt!NtQueryVirtualMemory+0x25
ffff8407`3a637a90 00007ffc`f10ab1f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007b`87c7ef18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`f10ab1f4


SYMBOL_NAME:  nt!MiGetPageProtection+195526

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  195526

FAILURE_BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c1fe3b27-3ba8-d99e-656f-85f3d58dc669}

Followup:     MachineOwner
---------
 
Dediğim gibi bellek ancak HDD önbelleği kaynaklı gözüküyor. Bu hata üreticiden kaynaklı olabilir, firmware yazılımı güncel değil bu yüzden bununla güncellemeniz lazım:
Ancak bu işlemi yapmanız kullandığınız diskteki verileri silebilir bu yüzden önemli dosyalarınızı farklı disk veya upload sitesine aldıktan sonra diski kendiniz silip işlemi yapmanızı öneririm.
Diski yeni aldıysanız sorunlu olduğunu da bildirip değişim talep edebilirsiniz.

Ancak RAM'ler de seri numarasız sahte ürün gibi onları da yeni aldıysanız bilindik markalarla değiştirmeniz yararınıza olur.
Ses sürücüsü, Wireless sürücün güncel değil güncelleyin. Wireless aygıtını mecbur değilsen aygıtı çıkartın kullanmayın. CDROM çıkartın kullanmayın takıp çıkarıyorsanız(şimdi yok gözüküyor).

TOSHIBA belleği D diski olarak kullanıyorsun çıkartın o şekilde kullanmayın.
 

Yeni konular

Geri
Yukarı