FX550V Mavi Ekran: PFN_LIST_CORRUPT Hatası

Hakoz

Femtopat
Katılım
5 Ekim 2020
Mesajlar
4
Daha fazla  
Cinsiyet
Kadın
Merhaba,

Format atıldıktan sonra üç hafta içerisinde dört kez PFN_LIST_CORRUPT hatasıyla karşılaştım. Hatanın kaynağını öğrenebilmek için minidump dosyalarının analizi konusunda yardımcı olabilir misiniz?

Teşekkürler,

ASUS FX550V NOTEBOOK
İşlemci: Intel Core i7-7700 HQ [email protected] GHz
RAM: DDR4 16.0 GB
Sistem Türü: 64 bit işletim sistemi x64 tabanlı işlemci
Ekran Kartı: HD Grafics 630

Minidump dosyaları : Minidump Dosyaları.rar
 
Son düzenleyen: Moderatör:
Hatalardan ikisi klavye kısayol tuşları sürücüsü (ATK) kaynaklı. Sürücü eski ise siteden güncel sürümü indirin.

Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000046acb9
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 14737

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 9a

BUGCHECK_P2: 46acb9

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  HControl.exe

STACK_TEXT: 
fffff301`f78deec8 fffff804`39021733     : 00000000`0000004e 00000000`0000009a 00000000`0046acb9 00000000`00000006 : nt!KeBugCheckEx
fffff301`f78deed0 fffff804`38e1f206     : ffffda42`051c7b88 fffff301`f78df040 fffff301`00000002 ffffda6d`00000000 : nt!MiDeleteNonPagedPoolPte+0x202403
fffff301`f78def40 fffff804`38e1ffee     : ffff840a`00000400 ffff840a`524e60c0 ffff840a`524e60c0 fffff301`f78df220 : nt!MiClearNonPagedPtes+0x162
fffff301`f78df170 fffff804`38e1fe12     : 00000000`00000000 fffff301`f78df2e1 ffffffff`fffffff2 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
fffff301`f78df1f0 fffff804`38e1fda6     : 00000000`00000004 ffff840a`524e60c0 fffff804`39819f00 00000000`00000fff : nt!RtlpHpEnvFreeVA+0x12
fffff301`f78df220 fffff804`38f3eec3     : 00000000`00000000 fffff804`38f0f037 ffff840a`39481680 00000000`00000001 : nt!RtlpHpFreeVA+0x3a
fffff301`f78df260 fffff804`38f3eb6e     : 00000000`00000000 00000000`fffffff2 00000000`00000002 00000000`fffffff2 : nt!RtlpHpSegMgrCommit+0x1e3
fffff301`f78df330 fffff804`38f3d357     : ffff840a`00000001 ffff840a`38f00c40 ffff840a`00000002 fffff804`0000000e : nt!RtlpHpSegPageRangeCommit+0x1ee
fffff301`f78df3d0 fffff804`38e25d7f     : ffffffff`ffffffff 00000000`0000e000 ffff840a`38f62018 ffff840a`39000280 : nt!RtlpHpSegLfhVsDecommit+0xd7
fffff301`f78df420 fffff804`38ecd603     : ffff840a`38f62000 ffff840a`39000280 ffff840a`38f62000 fffff301`f78df568 : nt!RtlpHpVsSubsegmentCommitPages+0xef
fffff301`f78df4c0 fffff804`38ecbc44     : 00000000`00000000 00000000`00000e02 00010000`00000000 fffff301`00000000 : nt!RtlpHpVsContextFree+0x4d3
fffff301`f78df560 fffff804`395b2019     : fffff301`00000440 ffff840a`38fe78b0 00000000`00260024 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff301`f78df640 fffff804`479713cf     : 00000000`00000000 ffff840a`4b7f6070 ffffffff`feced300 ffff840a`38fe78b0 : nt!ExFreePool+0x9
fffff301`f78df670 00000000`00000000     : ffff840a`4b7f6070 ffffffff`feced300 ffff840a`38fe78b0 00000400`53545344 : atkwmiacpi64+0x13cf


SYMBOL_NAME:  atkwmiacpi64+13cf

MODULE_NAME: atkwmiacpi64

IMAGE_NAME:  atkwmiacpi64.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  13cf

FAILURE_BUCKET_ID:  0x4E_9a_atkwmiacpi64!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9de67b89-f518-4a63-4e6d-7faf71959baf}

Followup:     MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000046ad14
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3842

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 11585

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 4e

BUGCHECK_P1: 9a

BUGCHECK_P2: 46ad14

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: HControl.exe

STACK_TEXT:
ffffde86`b170edf8 fffff803`13421733 : 00000000`0000004e 00000000`0000009a 00000000`0046ad14 00000000`00000006 : nt!KeBugCheckEx
ffffde86`b170ee00 fffff803`1321f206 : ffffbddf`47eabf40 ffffde86`b170ef70 00000000`00000002 ffffbdde`00000000 : nt!MiDeleteNonPagedPoolPte+0x202403
ffffde86`b170ee70 fffff803`1321ffee : ffffbe8f`f16fc100 ffffbe8f`de4af6a0 00000000`00000000 00000000`00000074 : nt!MiClearNonPagedPtes+0x162
ffffde86`b170f0a0 fffff803`1321fe12 : 00000000`00000000 ffffde86`b170f211 ffffffff`fffffff0 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
ffffde86`b170f120 fffff803`1321fda6 : ffffbe8f`00000000 ffffbe8f`f16fc170 ffffbe8f`f16fc170 ffffde86`b170f200 : nt!RtlpHpEnvFreeVA+0x12
ffffde86`b170f150 fffff803`1333eec3 : ffffbe8f`de4af838 00000000`00000004 ffffbe8f`ed717660 ffffce81`af771050 : nt!RtlpHpFreeVA+0x3a
ffffde86`b170f190 fffff803`1333eb6e : 00000000`00000000 00000000`fffffff0 00000000`00000000 00000000`ffffffef : nt!RtlpHpSegMgrCommit+0x1e3
ffffde86`b170f260 fffff803`1333da61 : 00040004`00000001 ffffbe8f`d5701b20 00000000`00000000 ffffbe8f`00000010 : nt!RtlpHpSegPageRangeCommit+0x1ee
ffffde86`b170f300 fffff803`1333d4fb : ffffffff`ffffffff 00000000`00000011 ffffffff`ffffffff ffffbe8f`eaa68e40 : nt!RtlpHpSegPageRangeCoalesce+0x1b1
ffffde86`b170f380 fffff803`13220420 : ffffbe8f`d5800280 ffffbe8f`d5800100 ffffbe8f`d5700000 fffff803`1324f347 : nt!RtlpHpSegPageRangeShrink+0xeb
ffffde86`b170f3f0 fffff803`1321fd60 : ffffbe8f`d57d9000 fffff803`132cda98 00000000`0000000f 00010000`00000000 : nt!RtlpHpSegFree+0x9c
ffffde86`b170f430 fffff803`132265fa : 00000000`00000000 ffffbe8f`d57d9030 ffffbe8f`d57ea040 00000000`00000ffd : nt!RtlpHpSegLfhVsFree+0x10
ffffde86`b170f460 fffff803`132cd6bc : ffffbe8f`d5800280 ffffbe8f`d57d9000 ffffbe8f`d5800280 ffffde86`b170f548 : nt!RtlpHpVsSubsegmentFree+0x3a
ffffde86`b170f4a0 fffff803`132cbc44 : 00000000`00000000 00000000`00000ffd 00000000`00000000 ffffde86`00000000 : nt!RtlpHpVsContextFree+0x58c
ffffde86`b170f540 fffff803`139b2019 : ffffde86`00000450 ffffbe8f`d57da010 00000000`00260024 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffde86`b170f620 fffff803`25511279 : 00000000`00000000 ffffbe8f`f242ccc0 ffffffff`feced300 ffffbe8f`d57da010 : nt!ExFreePool+0x9
ffffde86`b170f650 00000000`00000000 : ffffbe8f`f242ccc0 ffffffff`feced300 ffffbe8f`d57da010 00000004`53545344 : atkwmiacpi64+0x1279


SYMBOL_NAME: atkwmiacpi64+1279

MODULE_NAME: atkwmiacpi64

IMAGE_NAME:  atkwmiacpi64.sys

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1279

FAILURE_BUCKET_ID: 0x4E_9a_atkwmiacpi64!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {9de67b89-f518-4a63-4e6d-7faf71959baf}

Followup: MachineOwner
---------

2: kd> lmvm atkwmiacpi64
Browse full module list
start             end                 module name
fffff803`25510000 fffff803`25519000   atkwmiacpi64 T (no symbols)           
    Loaded symbol image file: atkwmiacpi64.sys
Image path: \??\C:\Program Files (x86)\ASUS\ATK Package\ATK WMIACPI\atkwmiacpi64.sys
Image name: atkwmiacpi64.sys
    Browse all global symbols  functions  data
    Timestamp:        Tue Jul  2 11:35:32 2013 (51D290D4)
    CheckSum:         0000D3B2
ImageSize: 00009000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

Diğer iki hata ise bellek kaynaklı olabilir. Bellek testi yapın:


Kod:
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000046ad39
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5921

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10540

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 9a

BUGCHECK_P2: 46ad39

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff38c`57b56588 fffff803`3c421733     : 00000000`0000004e 00000000`0000009a 00000000`0046ad39 00000000`00000006 : nt!KeBugCheckEx
fffff38c`57b56590 fffff803`3c21f206     : ffffebc2`06a93bc0 fffff38c`57b56700 ffff840d`00000002 ffffebf5`00000000 : nt!MiDeleteNonPagedPoolPte+0x202403
fffff38c`57b56600 fffff803`3c21ffee     : 00000000`00000000 00000000`00000000 ffff9175`3da2dda8 ffff840d`69be1300 : nt!MiClearNonPagedPtes+0x162
fffff38c`57b56830 fffff803`3c21fe12     : 00000000`00000000 fffff38c`57b569a1 ffffffff`fffffffe 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
fffff38c`57b568b0 fffff803`3c21fda6     : fffff38c`57b57790 ffff840d`54fbc570 00000000`00000000 00000000`00000000 : nt!RtlpHpEnvFreeVA+0x12
fffff38c`57b568e0 fffff803`3c33eec3     : 00000000`00000000 fffff803`3c30f037 ffff840d`52cb4e10 00000000`00000001 : nt!RtlpHpFreeVA+0x3a
fffff38c`57b56920 fffff803`3c33eb6e     : 00000000`00000000 00000000`fffffffe 00000000`00000004 00000000`fffffffe : nt!RtlpHpSegMgrCommit+0x1e3
fffff38c`57b569f0 fffff803`3c33d357     : 00000000`00000001 ffff840d`52700e60 ffff840d`00000004 00000000`00000002 : nt!RtlpHpSegPageRangeCommit+0x1ee
fffff38c`57b56a90 fffff803`3c225d7f     : ffffffff`ffffffff 00000000`00002000 ffff840d`52773018 ffff840d`52800280 : nt!RtlpHpSegLfhVsDecommit+0xd7
fffff38c`57b56ae0 fffff803`3c2cd603     : ffff840d`52773000 ffff840d`52800280 ffff840d`52773000 fffff38c`57b56c28 : nt!RtlpHpVsSubsegmentCommitPages+0xef
fffff38c`57b56b80 fffff803`3c2cbc44     : fffff38c`00000000 ffff980e`000004eb 00010000`00000000 00001000`00000000 : nt!RtlpHpVsContextFree+0x4d3
fffff38c`57b56c20 fffff803`3c9b2019     : 00000000`00000e10 fffff803`3cc4ec40 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff38c`57b56d00 ffff840d`6608c1c7     : ffff840d`67c4b080 fffff38c`57b56e30 ffff840d`66078299 ffffffff`b8797400 : nt!ExFreePool+0x9
fffff38c`57b56d30 ffff840d`67c4b080     : fffff38c`57b56e30 ffff840d`66078299 ffffffff`b8797400 00000000`00000000 : 0xffff840d`6608c1c7
fffff38c`57b56d38 fffff38c`57b56e30     : ffff840d`66078299 ffffffff`b8797400 00000000`00000000 fffff803`3f7add60 : 0xffff840d`67c4b080
fffff38c`57b56d40 ffff840d`66078299     : ffffffff`b8797400 00000000`00000000 fffff803`3f7add60 00000000`000000ff : 0xfffff38c`57b56e30
fffff38c`57b56d48 ffffffff`b8797400     : 00000000`00000000 fffff803`3f7add60 00000000`000000ff 00000000`00000000 : 0xffff840d`66078299
fffff38c`57b56d50 00000000`00000000     : fffff803`3f7add60 00000000`000000ff 00000000`00000000 ffff980e`ae5b7d00 : 0xffffffff`b8797400


SYMBOL_NAME:  nt!MiDeleteNonPagedPoolPte+202403

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  202403

FAILURE_BUCKET_ID:  0x4E_9a_nt!MiDeleteNonPagedPoolPte

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {aec87dc6-8e5e-ffb2-0aed-142948a6cbb3}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 000000000000009a,
Arg2: 000000000046acbc
Arg3: 0000000000000006
Arg4: 0000000000000002

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6124

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17346

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 9a

BUGCHECK_P2: 46acbc

BUGCHECK_P3: 6

BUGCHECK_P4: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffad0b`6c2f6558 fffff806`42021733     : 00000000`0000004e 00000000`0000009a 00000000`0046acbc 00000000`00000006 : nt!KeBugCheckEx
ffffad0b`6c2f6560 fffff806`41e1f206     : ffffbf43`4673fbb8 ffffad0b`6c2f66d0 ffffbf00`00000002 ffffbf5f`00000000 : nt!MiDeleteNonPagedPoolPte+0x202403
ffffad0b`6c2f65d0 fffff806`41e1ffee     : ffff868c`e85ec080 ffffad0b`6c2f6899 00000000`00076000 40000000`00200000 : nt!MiClearNonPagedPtes+0x162
ffffad0b`6c2f6800 fffff806`41e1fe12     : 00000000`00000000 ffffad0b`6c2f6971 ffffffff`fffffffb 00000000`00004000 : nt!MmFreePoolMemory+0x1aa
ffffad0b`6c2f6880 fffff806`41e1fda6     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff806`41e27159 : nt!RtlpHpEnvFreeVA+0x12
ffffad0b`6c2f68b0 fffff806`41f3eec3     : 00000000`00000000 fffff806`41f0f037 00000000`00000000 ffff868c`e84c3080 : nt!RtlpHpFreeVA+0x3a
ffffad0b`6c2f68f0 fffff806`41f3eb6e     : 41e0333a`9a4ccc00 00000000`fffffffb 00000000`00000001 00000000`fffffffb : nt!RtlpHpSegMgrCommit+0x1e3
ffffad0b`6c2f69c0 fffff806`41f3d357     : 00000000`00000001 ffff868c`e7f00e40 ffff868c`00000001 00000000`00000005 : nt!RtlpHpSegPageRangeCommit+0x1ee
ffffad0b`6c2f6a60 fffff806`41e25d7f     : ffffffff`ffffffff 00000000`00005000 ffff868c`e7f72018 ffff868c`e8000280 : nt!RtlpHpSegLfhVsDecommit+0xd7
ffffad0b`6c2f6ab0 fffff806`41ecd603     : ffff868c`e7f72000 ffff868c`e8000280 ffff868c`e7f72000 ffffad0b`6c2f6bf8 : nt!RtlpHpVsSubsegmentCommitPages+0xef
ffffad0b`6c2f6b50 fffff806`41ecbc44     : 00000000`00000000 ffffad0b`000005f5 00010000`00000000 fffff806`00000000 : nt!RtlpHpVsContextFree+0x4d3
ffffad0b`6c2f6bf0 fffff806`425b2019     : ffff868c`00000d90 ffffffff`b8797400 ffff868c`e7f861be 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffad0b`6c2f6cd0 ffff868c`e7f9a0ec     : 28996b8d`5c23e6f1 ffffad0b`6c2f6e00 ffff868c`e7f861be ffffffff`b8797400 : nt!ExFreePool+0x9
ffffad0b`6c2f6d00 28996b8d`5c23e6f1     : ffffad0b`6c2f6e00 ffff868c`e7f861be ffffffff`b8797400 ffffad0b`00000002 : 0xffff868c`e7f9a0ec
ffffad0b`6c2f6d08 ffffad0b`6c2f6e00     : ffff868c`e7f861be ffffffff`b8797400 ffffad0b`00000002 fffff806`425b2000 : 0x28996b8d`5c23e6f1
ffffad0b`6c2f6d10 ffff868c`e7f861be     : ffffffff`b8797400 ffffad0b`00000002 fffff806`425b2000 00000000`00000000 : 0xffffad0b`6c2f6e00
ffffad0b`6c2f6d18 ffffffff`b8797400     : ffffad0b`00000002 fffff806`425b2000 00000000`00000000 ffffad0b`6c2f7070 : 0xffff868c`e7f861be
ffffad0b`6c2f6d20 ffffad0b`00000002     : fffff806`425b2000 00000000`00000000 ffffad0b`6c2f7070 ffffffff`ffffffff : 0xffffffff`b8797400
ffffad0b`6c2f6d28 fffff806`425b2000     : 00000000`00000000 ffffad0b`6c2f7070 ffffffff`ffffffff 01000000`00100000 : 0xffffad0b`00000002
ffffad0b`6c2f6d30 00000000`00000000     : ffffad0b`6c2f7070 ffffffff`ffffffff 01000000`00100000 ffff868c`e7fa2b25 : nt!LZNT1Formats <PERF> (nt+0x9b2000)


SYMBOL_NAME:  nt!MiDeleteNonPagedPoolPte+202403

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  202403

FAILURE_BUCKET_ID:  0x4E_9a_nt!MiDeleteNonPagedPoolPte

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {aec87dc6-8e5e-ffb2-0aed-142948a6cbb3}

Followup:     MachineOwner
---------
 
Memtest86 ile RAM testi yaptım. Anladığım kadarıyla bir hataya rastlanmadı. Sonuçları fotoğraf olarak ekledim.

Ayrıca ASUS atk package 1.0.0005 yüklüydü. Onun yerine Windows 10 64 Bit işlemciye uygun olacak şekilde atk package 1.0.0061 yükledim.

Son olarak, sorunun çözüldüğüne nasıl emin olabilirim?

Yardımınız için çok teşekkür ederim.
 

Dosya Ekleri

  • IMG_20201005_152901.jpg
    IMG_20201005_152901.jpg
    277,2 KB · Görüntüleme: 18
  • IMG_20201005_152922.jpg
    IMG_20201005_152922.jpg
    295,5 KB · Görüntüleme: 19
  • IMG_20201005_152941.jpg
    IMG_20201005_152941.jpg
    174,5 KB · Görüntüleme: 18
  • IMG_20201005_153145.jpg
    IMG_20201005_153145.jpg
    216,4 KB · Görüntüleme: 19

Yeni konular

Geri
Yukarı