Çözüldü Fortnite crash ve ardından yeterli sistem kaynağı yok hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

yigido0990

Hectopat
Katılım
19 Kasım 2019
Mesajlar
519
Çözümler
3
Daha fazla  
Cinsiyet
Erkek
Merhaba, bugün oynarken crash aldım, artı olarak bu hatayla karşılaştım. Sistemim yeterince iyi, 300 FPS alıyorum. Acaba neden olabilir?
Sistem:
AMD Ryzen 5 3600 ve RTX 2060 Super 16 GB RAM.
Hata:

Ekran Alıntısı2.PNG


Bir başka aldığım hatayı da söyleyeceğim. CS:GO oynarken mavi ekran verdi. Niye olabilir? Herhangi fotosunu alamadım ama neden olabilir + PC yeni neyle alakası olabilir?
 
Son düzenleyen: Moderatör:
Çözüm
Memtes86 ile bellek testi yapınız. Ekran kartı sürücüsünü DDU ile kaldırıp en güncelini yükleyiniz. Battleye yazılımını kaldırır mısınız? DDU ile Sürücü Kaldırma Rehberi - Technopat Sosyal
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffe3ffc166338
Arg3: 2000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


MEMORY_CORRUPTOR:  LARGE

BUGCHECK_STR:  0x1a_41792

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT: 
ffff8a06`f26dee48 fffff801`3785418e : 00000000`0000001a 00000000`00041792 fffffe3f`fc166338 20000000`00000000 : nt!KeBugCheckEx
ffff8a06`f26dee50 fffff801`376119d1 : 00000000`00000003 fffffe3f`fc166000 ffff8a06`f26df320 00000000`00000003 : nt!MiDeleteVa+0x191e6e
ffff8a06`f26def40 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffff8a06`f26defd0 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 fffffe7f`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df060 fffff801`37611cf0 : ffff8a06`f26df320 ffffe58b`d0c949c0 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df0f0 fffff801`3760e5fb : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df180 fffff801`376c22d1 : ffff8a06`f26df320 ffffe58b`00000000 fffffe3f`00000002 ffff8a06`00000000 : nt!MiWalkPageTables+0x36b
ffff8a06`f26df280 fffff801`376a787f : 00000000`00000000 00000000`00000060 ffffe58b`d0c94a80 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
ffff8a06`f26df700 fffff801`379ea999 : ffffe58b`d0c94340 00000000`00000000 ffffe58b`00000000 ffffe58b`00000001 : nt!MiDeleteVad+0x41f
ffff8a06`f26df830 fffff801`37a66a00 : ffffe58b`d2fa4d00 ffffe58b`d91af010 ffffe58b`cd143080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8a06`f26df860 fffff801`37a678b3 : ffffe58b`d2fa4b20 ffffe58b`d2fa4b20 ffffe58b`d2fa4d00 ffffe58b`d0c94340 : nt!MiCleanVad+0x30
ffff8a06`f26df890 fffff801`37ab9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe58b`d0c94340 : nt!MmCleanProcessAddressSpace+0x137
ffff8a06`f26df910 fffff801`379e8c32 : ffffe58b`d0c94340 ffff970e`f84f65f0 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8a06`f26df990 fffff801`37a4e29e : ffffe58b`00000000 00000000`00000001 00000000`00000000 00000052`90718000 : nt!PspExitThread+0x5f6
ffff8a06`f26dfa90 fffff801`377ef378 : ffffe58b`d0c94340 ffffe58b`cd143080 ffff8a06`f26dfb80 ffffe58b`d0c94340 : nt!NtTerminateProcess+0xde
ffff8a06`f26dfb00 00007ff8`2edeb314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`904ffa98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2edeb314


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8013760e63d-fffff8013760e63e  2 bytes - nt!MiWalkPageTables+3ad
    [ 80 f6:00 fe ]
    fffff80137611a4c-fffff80137611a51  6 bytes - nt!MiWalkPageTablesRecursively+37c (+0x340f)
    [ 68 df be 7d fb f6:e0 cf 9f 3f 7f fe ]
    fffff80137611a6b-fffff80137611a6f  5 bytes - nt!MiWalkPageTablesRecursively+39b (+0x1f)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff80137611a8c-fffff80137611a90  5 bytes - nt!MiWalkPageTablesRecursively+3bc (+0x21)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff80137611d24-fffff80137611d28  5 bytes - nt!MiWalkPageTablesRecursively+654 (+0x298)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff80137611d87-fffff80137611d8b  5 bytes - nt!MiWalkPageTablesRecursively+6b7 (+0x63)
    [ df be 7d fb f6:cf 9f 3f 7f fe ]
    fffff80137611dc9-fffff80137611dcd  5 bytes - nt!MiWalkPageTablesRecursively+6f9 (+0x42)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff801376127c9-fffff801376127ca  2 bytes - nt!MiGetNextPageTablePte+1c9 (+0xa00)
    [ 80 f6:00 fe ]
    fffff801376c2348-fffff801376c234c  5 bytes - nt!MiDeleteVa+28 (+0xafb7f)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff801376c235b-fffff801376c235f  5 bytes - nt!MiDeleteVa+3b (+0x13)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff801376c23c3-fffff801376c23c4  2 bytes - nt!MiDeleteVa+a3 (+0x68)
    [ 80 f6:00 fe ]
    fffff80137784f1e-fffff80137784f21  4 bytes - nt!MiFreeUltraMapping+32 (+0xc2b5b)
    [ a0 7d fb f6:80 3f 7f fe ]
    fffff801378541d7-fffff801378541db  5 bytes - nt!MiDeleteVa+191eb7 (+0xcf2b9)
    [ df be 7d fb f6:cf 9f 3f 7f fe ]
    fffff801378541ef-fffff801378541f3  5 bytes - nt!MiDeleteVa+191ecf (+0x18)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
61 errors : !nt (fffff8013760e63d-fffff801378541f3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8016490822d, The address that the exception occurred at
Arg3: ffffba894ebee048, Exception Record Address
Arg4: ffffba894ebed880, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0

EXCEPTION_RECORD:  ffffba894ebee048 -- (.exr 0xffffba894ebee048)
ExceptionAddress: fffff8016490822d (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000029)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffba894ebed880 -- (.cxr 0xffffba894ebed880;r)
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
 r8=ffffd307085d78b0  r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Last set context:
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
 r8=ffffd307085d78b0  r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 ffffffffffffffff

FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0

BUGCHECK_STR:  AV

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_STR:  0x0

LAST_CONTROL_TRANSFER:  from fffff80164911008 to fffff8016490822d

STACK_TEXT: 
ffffba89`4ebee280 fffff801`64911008 : 00000000`01001002 fffff801`648a1ee7 ffff968d`c1cc9a48 fffff801`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29
ffffba89`4ebee710 fffff801`6491209b : ffff968d`af7be010 ffffba89`4ebee800 ffff968d`af7be130 ffffd307`0c3d4db0 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0
ffffba89`4ebee770 fffff801`6490e387 : ffff968d`c1cc9a10 ffffba89`4ebee8c0 ffffd307`0c67a000 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b
ffffba89`4ebee7c0 fffff801`649279e8 : ffffd307`0c67a000 ffffd307`0c683c10 ffffd307`0c67a000 ffffd307`0c67a000 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x8f7
ffffba89`4ebeea00 fffff801`64931b89 : ffff968d`ac98e6a0 ffffd307`0c4f0000 00000000`00000000 00000000`072dac00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xb78
ffffba89`4ebeebe0 fffff801`56d46715 : ffffd307`0c4f0080 fffff801`64931b80 ffff968d`ac98e6a0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba89`4ebeec10 fffff801`56de5078 : ffffe600`59d36180 ffffd307`0c4f0080 fffff801`56d466c0 00076b76`ffffffe0 : nt!PspSystemThreadStartup+0x55
ffffba89`4ebeec60 00000000`00000000 : ffffba89`4ebef000 ffffba89`4ebe9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8015417995c-fffff8015417995d  2 bytes - FLTMGR!FltpDataScanCsqAcquireLock+1c
    [ 48 ff:4c 8b ]
    fffff80154179963-fffff80154179967  5 bytes - FLTMGR!FltpDataScanCsqAcquireLock+23 (+0x07)
    [ 0f 1f 44 00 00:e8 98 b6 aa 02 ]
    fffff80154179a2e-fffff80154179a2f  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+6e (+0xcb)
    [ 48 ff:4c 8b ]
    fffff80154179a35-fffff80154179a39  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+75 (+0x07)
    [ 0f 1f 44 00 00:e8 d6 aa be 02 ]
    fffff80154179a51-fffff80154179a52  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+91 (+0x1c)
    [ 48 ff:4c 8b ]
    fffff80154179a58-fffff80154179a5c  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+98 (+0x07)
    [ 0f 1f 44 00 00:e8 13 96 bb 02 ]
    fffff80154179aad-fffff80154179aae  2 bytes - FLTMGR!FltpDataScanCsqReleaseLock+d (+0x55)
    [ 48 ff:4c 8b ]
    fffff80154179ab4-fffff80154179ab8  5 bytes - FLTMGR!FltpDataScanCsqReleaseLock+14 (+0x07)
    [ 0f 1f 44 00 00:e8 e7 c6 aa 02 ]
    fffff80154179bb8-fffff80154179bb9  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+90 (+0x104)
    [ 48 ff:4c 8b ]
    fffff80154179bbf-fffff80154179bc3  5 bytes - FLTMGR!FltpQueueDataScanSynchronization+97 (+0x07)
    [ 0f 1f 44 00 00:e8 5c fd b7 02 ]
    fffff80154179bde-fffff80154179bdf  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+b6 (+0x1f)
    [ 48 ff:4c 8b ]
37 errors : !FLTMGR (fffff8015417995c-fffff80154179bdf)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffba894ebed880 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Merhaba, bugün oynarken crash aldım, artı olarak bu hatayla karşılaştım. Sistemim yeterince iyi, 300 FPS alıyorum. Acaba neden olabilir?
Sistem:
AMD Ryzen 5 3600 ve RTX 2060 Super 16 GB RAM.
Hata:

Eki Görüntüle 662142

Bir başka aldığım hatayı da söyleyeceğim. CS:GO oynarken mavi ekran verdi. Niye olabilir? Herhangi fotosunu alamadım ama neden olabilir + PC yeni neyle alakası olabilir?
Hocam mavi ekran konusunda mini-dump dosyalarını paylaşabilirsiniz, bilen biri eminim ilgilenecektir.

Konuyla ilgili:
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
 
Hocam mavi ekran konusunda mini-dump dosyalarını paylaşabilirsiniz, bilen biri eminim ilgilenecektir.

Konuyla ilgili:
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Sistem kaynaklarının yetmeme sebebini bilmiyorum ama minidump dosyalarını paylaşınız. Minidump Dosyalarını Paylaşın - Technopat Sosyal

Merhaba yazım hatasından dolayı ceza yemişim şu an yazabiliyorum. Link burada. Yardım edebilirseniz ya da edebilecek varsa sevinirim. Google Drive'la Tanışın – Tüm dosyalarınız için tek bir yer
 
Memtes86 ile bellek testi yapınız. Ekran kartı sürücüsünü DDU ile kaldırıp en güncelini yükleyiniz. Battleye yazılımını kaldırır mısınız? DDU ile Sürücü Kaldırma Rehberi - Technopat Sosyal
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffe3ffc166338
Arg3: 2000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


MEMORY_CORRUPTOR:  LARGE

BUGCHECK_STR:  0x1a_41792

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT: 
ffff8a06`f26dee48 fffff801`3785418e : 00000000`0000001a 00000000`00041792 fffffe3f`fc166338 20000000`00000000 : nt!KeBugCheckEx
ffff8a06`f26dee50 fffff801`376119d1 : 00000000`00000003 fffffe3f`fc166000 ffff8a06`f26df320 00000000`00000003 : nt!MiDeleteVa+0x191e6e
ffff8a06`f26def40 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffff8a06`f26defd0 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 fffffe7f`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df060 fffff801`37611cf0 : ffff8a06`f26df320 ffffe58b`d0c949c0 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df0f0 fffff801`3760e5fb : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df180 fffff801`376c22d1 : ffff8a06`f26df320 ffffe58b`00000000 fffffe3f`00000002 ffff8a06`00000000 : nt!MiWalkPageTables+0x36b
ffff8a06`f26df280 fffff801`376a787f : 00000000`00000000 00000000`00000060 ffffe58b`d0c94a80 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
ffff8a06`f26df700 fffff801`379ea999 : ffffe58b`d0c94340 00000000`00000000 ffffe58b`00000000 ffffe58b`00000001 : nt!MiDeleteVad+0x41f
ffff8a06`f26df830 fffff801`37a66a00 : ffffe58b`d2fa4d00 ffffe58b`d91af010 ffffe58b`cd143080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8a06`f26df860 fffff801`37a678b3 : ffffe58b`d2fa4b20 ffffe58b`d2fa4b20 ffffe58b`d2fa4d00 ffffe58b`d0c94340 : nt!MiCleanVad+0x30
ffff8a06`f26df890 fffff801`37ab9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe58b`d0c94340 : nt!MmCleanProcessAddressSpace+0x137
ffff8a06`f26df910 fffff801`379e8c32 : ffffe58b`d0c94340 ffff970e`f84f65f0 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8a06`f26df990 fffff801`37a4e29e : ffffe58b`00000000 00000000`00000001 00000000`00000000 00000052`90718000 : nt!PspExitThread+0x5f6
ffff8a06`f26dfa90 fffff801`377ef378 : ffffe58b`d0c94340 ffffe58b`cd143080 ffff8a06`f26dfb80 ffffe58b`d0c94340 : nt!NtTerminateProcess+0xde
ffff8a06`f26dfb00 00007ff8`2edeb314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`904ffa98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2edeb314


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8013760e63d-fffff8013760e63e  2 bytes - nt!MiWalkPageTables+3ad
    [ 80 f6:00 fe ]
    fffff80137611a4c-fffff80137611a51  6 bytes - nt!MiWalkPageTablesRecursively+37c (+0x340f)
    [ 68 df be 7d fb f6:e0 cf 9f 3f 7f fe ]
    fffff80137611a6b-fffff80137611a6f  5 bytes - nt!MiWalkPageTablesRecursively+39b (+0x1f)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff80137611a8c-fffff80137611a90  5 bytes - nt!MiWalkPageTablesRecursively+3bc (+0x21)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff80137611d24-fffff80137611d28  5 bytes - nt!MiWalkPageTablesRecursively+654 (+0x298)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff80137611d87-fffff80137611d8b  5 bytes - nt!MiWalkPageTablesRecursively+6b7 (+0x63)
    [ df be 7d fb f6:cf 9f 3f 7f fe ]
    fffff80137611dc9-fffff80137611dcd  5 bytes - nt!MiWalkPageTablesRecursively+6f9 (+0x42)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff801376127c9-fffff801376127ca  2 bytes - nt!MiGetNextPageTablePte+1c9 (+0xa00)
    [ 80 f6:00 fe ]
    fffff801376c2348-fffff801376c234c  5 bytes - nt!MiDeleteVa+28 (+0xafb7f)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff801376c235b-fffff801376c235f  5 bytes - nt!MiDeleteVa+3b (+0x13)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff801376c23c3-fffff801376c23c4  2 bytes - nt!MiDeleteVa+a3 (+0x68)
    [ 80 f6:00 fe ]
    fffff80137784f1e-fffff80137784f21  4 bytes - nt!MiFreeUltraMapping+32 (+0xc2b5b)
    [ a0 7d fb f6:80 3f 7f fe ]
    fffff801378541d7-fffff801378541db  5 bytes - nt!MiDeleteVa+191eb7 (+0xcf2b9)
    [ df be 7d fb f6:cf 9f 3f 7f fe ]
    fffff801378541ef-fffff801378541f3  5 bytes - nt!MiDeleteVa+191ecf (+0x18)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
61 errors : !nt (fffff8013760e63d-fffff801378541f3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8016490822d, The address that the exception occurred at
Arg3: ffffba894ebee048, Exception Record Address
Arg4: ffffba894ebed880, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0

EXCEPTION_RECORD:  ffffba894ebee048 -- (.exr 0xffffba894ebee048)
ExceptionAddress: fffff8016490822d (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000029)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffba894ebed880 -- (.cxr 0xffffba894ebed880;r)
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
 r8=ffffd307085d78b0  r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Last set context:
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
 r8=ffffd307085d78b0  r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 ffffffffffffffff

FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0

BUGCHECK_STR:  AV

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_STR:  0x0

LAST_CONTROL_TRANSFER:  from fffff80164911008 to fffff8016490822d

STACK_TEXT: 
ffffba89`4ebee280 fffff801`64911008 : 00000000`01001002 fffff801`648a1ee7 ffff968d`c1cc9a48 fffff801`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29
ffffba89`4ebee710 fffff801`6491209b : ffff968d`af7be010 ffffba89`4ebee800 ffff968d`af7be130 ffffd307`0c3d4db0 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0
ffffba89`4ebee770 fffff801`6490e387 : ffff968d`c1cc9a10 ffffba89`4ebee8c0 ffffd307`0c67a000 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b
ffffba89`4ebee7c0 fffff801`649279e8 : ffffd307`0c67a000 ffffd307`0c683c10 ffffd307`0c67a000 ffffd307`0c67a000 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x8f7
ffffba89`4ebeea00 fffff801`64931b89 : ffff968d`ac98e6a0 ffffd307`0c4f0000 00000000`00000000 00000000`072dac00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xb78
ffffba89`4ebeebe0 fffff801`56d46715 : ffffd307`0c4f0080 fffff801`64931b80 ffff968d`ac98e6a0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba89`4ebeec10 fffff801`56de5078 : ffffe600`59d36180 ffffd307`0c4f0080 fffff801`56d466c0 00076b76`ffffffe0 : nt!PspSystemThreadStartup+0x55
ffffba89`4ebeec60 00000000`00000000 : ffffba89`4ebef000 ffffba89`4ebe9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8015417995c-fffff8015417995d  2 bytes - FLTMGR!FltpDataScanCsqAcquireLock+1c
    [ 48 ff:4c 8b ]
    fffff80154179963-fffff80154179967  5 bytes - FLTMGR!FltpDataScanCsqAcquireLock+23 (+0x07)
    [ 0f 1f 44 00 00:e8 98 b6 aa 02 ]
    fffff80154179a2e-fffff80154179a2f  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+6e (+0xcb)
    [ 48 ff:4c 8b ]
    fffff80154179a35-fffff80154179a39  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+75 (+0x07)
    [ 0f 1f 44 00 00:e8 d6 aa be 02 ]
    fffff80154179a51-fffff80154179a52  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+91 (+0x1c)
    [ 48 ff:4c 8b ]
    fffff80154179a58-fffff80154179a5c  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+98 (+0x07)
    [ 0f 1f 44 00 00:e8 13 96 bb 02 ]
    fffff80154179aad-fffff80154179aae  2 bytes - FLTMGR!FltpDataScanCsqReleaseLock+d (+0x55)
    [ 48 ff:4c 8b ]
    fffff80154179ab4-fffff80154179ab8  5 bytes - FLTMGR!FltpDataScanCsqReleaseLock+14 (+0x07)
    [ 0f 1f 44 00 00:e8 e7 c6 aa 02 ]
    fffff80154179bb8-fffff80154179bb9  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+90 (+0x104)
    [ 48 ff:4c 8b ]
    fffff80154179bbf-fffff80154179bc3  5 bytes - FLTMGR!FltpQueueDataScanSynchronization+97 (+0x07)
    [ 0f 1f 44 00 00:e8 5c fd b7 02 ]
    fffff80154179bde-fffff80154179bdf  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+b6 (+0x1f)
    [ 48 ff:4c 8b ]
37 errors : !FLTMGR (fffff8015417995c-fffff80154179bdf)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffba894ebed880 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Çözüm
Memtes86 ile bellek testi yapınız. Ekran kartı sürücüsünü DDU ile kaldırıp en güncelini yükleyiniz. Battleye yazılımını kaldırır mısınız? DDU ile Sürücü Kaldırma Rehberi - Technopat Sosyal
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffffe3ffc166338
Arg3: 2000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


MEMORY_CORRUPTOR:  LARGE

BUGCHECK_STR:  0x1a_41792

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

STACK_TEXT:
ffff8a06`f26dee48 fffff801`3785418e : 00000000`0000001a 00000000`00041792 fffffe3f`fc166338 20000000`00000000 : nt!KeBugCheckEx
ffff8a06`f26dee50 fffff801`376119d1 : 00000000`00000003 fffffe3f`fc166000 ffff8a06`f26df320 00000000`00000003 : nt!MiDeleteVa+0x191e6e
ffff8a06`f26def40 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x301
ffff8a06`f26defd0 fffff801`37611cf0 : 00000000`00000000 ffffe58b`d0c949c0 fffffe7f`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df060 fffff801`37611cf0 : ffff8a06`f26df320 ffffe58b`d0c949c0 00000000`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df0f0 fffff801`3760e5fb : 00000000`00000000 ffffe58b`d0c949c0 00000000`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively+0x620
ffff8a06`f26df180 fffff801`376c22d1 : ffff8a06`f26df320 ffffe58b`00000000 fffffe3f`00000002 ffff8a06`00000000 : nt!MiWalkPageTables+0x36b
ffff8a06`f26df280 fffff801`376a787f : 00000000`00000000 00000000`00000060 ffffe58b`d0c94a80 00000000`00000000 : nt!MiDeletePagablePteRange+0x491
ffff8a06`f26df700 fffff801`379ea999 : ffffe58b`d0c94340 00000000`00000000 ffffe58b`00000000 ffffe58b`00000001 : nt!MiDeleteVad+0x41f
ffff8a06`f26df830 fffff801`37a66a00 : ffffe58b`d2fa4d00 ffffe58b`d91af010 ffffe58b`cd143080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8a06`f26df860 fffff801`37a678b3 : ffffe58b`d2fa4b20 ffffe58b`d2fa4b20 ffffe58b`d2fa4d00 ffffe58b`d0c94340 : nt!MiCleanVad+0x30
ffff8a06`f26df890 fffff801`37ab9e87 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe58b`d0c94340 : nt!MmCleanProcessAddressSpace+0x137
ffff8a06`f26df910 fffff801`379e8c32 : ffffe58b`d0c94340 ffff970e`f84f65f0 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8a06`f26df990 fffff801`37a4e29e : ffffe58b`00000000 00000000`00000001 00000000`00000000 00000052`90718000 : nt!PspExitThread+0x5f6
ffff8a06`f26dfa90 fffff801`377ef378 : ffffe58b`d0c94340 ffffe58b`cd143080 ffff8a06`f26dfb80 ffffe58b`d0c94340 : nt!NtTerminateProcess+0xde
ffff8a06`f26dfb00 00007ff8`2edeb314 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000052`904ffa98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`2edeb314


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8013760e63d-fffff8013760e63e  2 bytes - nt!MiWalkPageTables+3ad
    [ 80 f6:00 fe ]
    fffff80137611a4c-fffff80137611a51  6 bytes - nt!MiWalkPageTablesRecursively+37c (+0x340f)
    [ 68 df be 7d fb f6:e0 cf 9f 3f 7f fe ]
    fffff80137611a6b-fffff80137611a6f  5 bytes - nt!MiWalkPageTablesRecursively+39b (+0x1f)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff80137611a8c-fffff80137611a90  5 bytes - nt!MiWalkPageTablesRecursively+3bc (+0x21)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff80137611d24-fffff80137611d28  5 bytes - nt!MiWalkPageTablesRecursively+654 (+0x298)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff80137611d87-fffff80137611d8b  5 bytes - nt!MiWalkPageTablesRecursively+6b7 (+0x63)
    [ df be 7d fb f6:cf 9f 3f 7f fe ]
    fffff80137611dc9-fffff80137611dcd  5 bytes - nt!MiWalkPageTablesRecursively+6f9 (+0x42)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff801376127c9-fffff801376127ca  2 bytes - nt!MiGetNextPageTablePte+1c9 (+0xa00)
    [ 80 f6:00 fe ]
    fffff801376c2348-fffff801376c234c  5 bytes - nt!MiDeleteVa+28 (+0xafb7f)
    [ d0 be 7d fb f6:c0 9f 3f 7f fe ]
    fffff801376c235b-fffff801376c235f  5 bytes - nt!MiDeleteVa+3b (+0x13)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
    fffff801376c23c3-fffff801376c23c4  2 bytes - nt!MiDeleteVa+a3 (+0x68)
    [ 80 f6:00 fe ]
    fffff80137784f1e-fffff80137784f21  4 bytes - nt!MiFreeUltraMapping+32 (+0xc2b5b)
    [ a0 7d fb f6:80 3f 7f fe ]
    fffff801378541d7-fffff801378541db  5 bytes - nt!MiDeleteVa+191eb7 (+0xcf2b9)
    [ df be 7d fb f6:cf 9f 3f 7f fe ]
    fffff801378541ef-fffff801378541f3  5 bytes - nt!MiDeleteVa+191ecf (+0x18)
    [ d7 be 7d fb f6:c7 9f 3f 7f fe ]
61 errors : !nt (fffff8013760e63d-fffff801378541f3)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8016490822d, The address that the exception occurred at
Arg3: ffffba894ebee048, Exception Record Address
Arg4: ffffba894ebed880, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0

EXCEPTION_RECORD:  ffffba894ebee048 -- (.exr 0xffffba894ebee048)
ExceptionAddress: fffff8016490822d (dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x0000000000000029)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffba894ebed880 -- (.cxr 0xffffba894ebed880;r)
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
r8=ffffd307085d78b0  r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Last set context:
rax=ffff1e2a2dfbe18c rbx=ffff968dc1cc9a48 rcx=ffffd3070c67a000
rdx=dfff968dc1cc9a10 rsi=ffff968daf7be130 rdi=ffffd3070c67a000
rip=fffff8016490822d rsp=ffffba894ebee280 rbp=ffff968daf7be010
r8=ffffd307085d78b0  r9=000000023c480000 r10=000000023c450000
r11=ffffd307115e1010 r12=0000000000000000 r13=ffffba894ebeeb40
r14=dfff968dc1cc9a38 r15=ffff968dc1cc9a38
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29:
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0 ds:002b:dfff968d`c1cc9a2a=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff

FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+29
fffff801`6490822d c6421a00        mov     byte ptr [rdx+1Ah],0

BUGCHECK_STR:  AV

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_STR:  0x0

LAST_CONTROL_TRANSFER:  from fffff80164911008 to fffff8016490822d

STACK_TEXT:
ffffba89`4ebee280 fffff801`64911008 : 00000000`01001002 fffff801`648a1ee7 ffff968d`c1cc9a48 fffff801`00000003 : dxgmms2!VIDMM_GLOBAL::MakeOneVirtualAddressRangeNotResident+0x29
ffffba89`4ebee710 fffff801`6491209b : ffff968d`af7be010 ffffba89`4ebee800 ffff968d`af7be130 ffffd307`0c3d4db0 : dxgmms2!VIDMM_GLOBAL::MakeVirtualAddressRangeNotResident+0xc0
ffffba89`4ebee770 fffff801`6490e387 : ffff968d`c1cc9a10 ffffba89`4ebee8c0 ffffd307`0c67a000 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0x23b
ffffba89`4ebee7c0 fffff801`649279e8 : ffffd307`0c67a000 ffffd307`0c683c10 ffffd307`0c67a000 ffffd307`0c67a000 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x8f7
ffffba89`4ebeea00 fffff801`64931b89 : ffff968d`ac98e6a0 ffffd307`0c4f0000 00000000`00000000 00000000`072dac00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xb78
ffffba89`4ebeebe0 fffff801`56d46715 : ffffd307`0c4f0080 fffff801`64931b80 ffff968d`ac98e6a0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba89`4ebeec10 fffff801`56de5078 : ffffe600`59d36180 ffffd307`0c4f0080 fffff801`56d466c0 00076b76`ffffffe0 : nt!PspSystemThreadStartup+0x55
ffffba89`4ebeec60 00000000`00000000 : ffffba89`4ebef000 ffffba89`4ebe9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !FLTMGR
    fffff8015417995c-fffff8015417995d  2 bytes - FLTMGR!FltpDataScanCsqAcquireLock+1c
    [ 48 ff:4c 8b ]
    fffff80154179963-fffff80154179967  5 bytes - FLTMGR!FltpDataScanCsqAcquireLock+23 (+0x07)
    [ 0f 1f 44 00 00:e8 98 b6 aa 02 ]
    fffff80154179a2e-fffff80154179a2f  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+6e (+0xcb)
    [ 48 ff:4c 8b ]
    fffff80154179a35-fffff80154179a39  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+75 (+0x07)
    [ 0f 1f 44 00 00:e8 d6 aa be 02 ]
    fffff80154179a51-fffff80154179a52  2 bytes - FLTMGR!FltpDataScanCsqInsertIrp+91 (+0x1c)
    [ 48 ff:4c 8b ]
    fffff80154179a58-fffff80154179a5c  5 bytes - FLTMGR!FltpDataScanCsqInsertIrp+98 (+0x07)
    [ 0f 1f 44 00 00:e8 13 96 bb 02 ]
    fffff80154179aad-fffff80154179aae  2 bytes - FLTMGR!FltpDataScanCsqReleaseLock+d (+0x55)
    [ 48 ff:4c 8b ]
    fffff80154179ab4-fffff80154179ab8  5 bytes - FLTMGR!FltpDataScanCsqReleaseLock+14 (+0x07)
    [ 0f 1f 44 00 00:e8 e7 c6 aa 02 ]
    fffff80154179bb8-fffff80154179bb9  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+90 (+0x104)
    [ 48 ff:4c 8b ]
    fffff80154179bbf-fffff80154179bc3  5 bytes - FLTMGR!FltpQueueDataScanSynchronization+97 (+0x07)
    [ 0f 1f 44 00 00:e8 5c fd b7 02 ]
    fffff80154179bde-fffff80154179bdf  2 bytes - FLTMGR!FltpQueueDataScanSynchronization+b6 (+0x1f)
    [ 48 ff:4c 8b ]
37 errors : !FLTMGR (fffff8015417995c-fffff80154179bdf)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffffba894ebed880 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------

Hocam DMP dosyalarını hangi program ile açtınız, söyleyebilir misiniz?
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı