The_rain_master
Hectopat
- Katılım
- 11 Haziran 2022
- Mesajlar
- 1.300
- Çözümler
- 6
www.technopat.net
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff81bffe1680e8
Arg3: 0000000000200000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4073
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 10511
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : MemoryManagement.PFN
Value: 200
FILE_IN_CAB: 042323-5046-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff81bffe1680e8
BUGCHECK_P3: 200000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: F1_22.exe
STACK_TEXT:
ffff840d`4e2feea8 fffff801`4bd00197 : 00000000`0000001a 00000000`00041792 ffff81bf`fe1680e8 00000000`00200000 : nt!KeBugCheckEx
ffff840d`4e2feeb0 fffff801`4bcefb3d : 00000000`00000000 ffff840d`4e2ff3b0 ffff6536`79227ab3 00000000`00000000 : nt!MiDeleteVa+0x1597
ffff840d`4e2fefb0 fffff801`4bcef93d : ffff81bf`00000000 00000000`00000000 00000000`00000000 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0xb2d
ffff840d`4e2ff040 fffff801`4bcef93d : ffff81c0`00000000 00000000`00000000 00000000`00000001 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff0d0 fffff801`4bcef93d : ffff81c0`00000000 00000000`00000000 00000000`00000002 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff160 fffff801`4bd12a01 : 00000000`00000000 00000000`00000000 00000000`00000003 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d
ffff840d`4e2ff1f0 fffff801`4bcfe9e7 : ffff840d`4e2ff3b0 ffff81c0`00000001 00000000`00000002 ffff81c0`00000000 : nt!MiWalkPageTables+0x371
ffff840d`4e2ff2f0 fffff801`4bc57ff2 : 00000000`00000000 fffff801`4bc581bd ffff840d`4e2ff6b8 ffffd00a`82a28080 : nt!MiDeletePagablePteRange+0x747
ffff840d`4e2ff620 fffff801`4c0c17f8 : 00000000`00000000 ffff840d`00000001 ffffd00a`82aed080 ffff840d`4e2ff6f0 : nt!MiDeleteVirtualAddresses+0x52
ffff840d`4e2ff670 fffff801`4c12b871 : ffffd00a`82aed080 ffffd00a`82b16760 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8
ffff840d`4e2ff730 fffff801`4c12b213 : ffffd00a`82b16760 00000000`00000000 ffffd00a`82a28080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff840d`4e2ff760 fffff801`4c12ad8d : ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`82aed080 : nt!MiCleanVad+0x2f
ffff840d`4e2ff790 fffff801`4c1a590d : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd00a`82aed080 : nt!MmCleanProcessAddressSpace+0x10d
ffff840d`4e2ff810 fffff801`4c093c54 : ffffd00a`82aed080 ffffab06`8ff49770 ffffd00a`82aed080 00000000`00000000 : nt!PspRundownSingleProcess+0xc1
ffff840d`4e2ff8a0 fffff801`4c1aa952 : 00000000`c000004b ffffd00a`82aed001 ffffd00a`82a280f4 00000000`00214000 : nt!PspExitThread+0x63c
ffff840d`4e2ff9a0 fffff801`4be3e0e5 : ffffd00a`00003200 ffffd00a`82a28080 ffffd00a`82aed080 ffffd00a`82aed080 : nt!NtTerminateProcess+0xf2
ffff840d`4e2ffa20 00007ffc`43caf1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`12f5daf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`43caf1d4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Yaptım hocam hiçbir hata çıkmadı bütün testler başarılıRAM'lerin hakkı rahmetine kavuşmuş görünüyor;
Memtest86 ile RAM testi yapın.
![]()
Memtest86 ile Bozuk RAM Testi
Bu rehberimizde Memtes86 ile RAM testi yaparak bozuk RAM modüllerini nasıl tespit edeceğinize bakıyoruz. Bilgisayarda karşılaşılan mavi ekran hatalarıwww.technopat.net
Kod:1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffff81bffe1680e8 Arg3: 0000000000200000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2124 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4073 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 296 Key : Analysis.Init.Elapsed.mSec Value: 10511 Key : Analysis.Memory.CommitPeak.Mb Value: 91 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : Dump.Attributes.AsUlong Value: 1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : MemoryManagement.PFN Value: 200 FILE_IN_CAB: 042323-5046-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage Dump BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffff81bffe1680e8 BUGCHECK_P3: 200000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: F1_22.exe STACK_TEXT: ffff840d`4e2feea8 fffff801`4bd00197 : 00000000`0000001a 00000000`00041792 ffff81bf`fe1680e8 00000000`00200000 : nt!KeBugCheckEx ffff840d`4e2feeb0 fffff801`4bcefb3d : 00000000`00000000 ffff840d`4e2ff3b0 ffff6536`79227ab3 00000000`00000000 : nt!MiDeleteVa+0x1597 ffff840d`4e2fefb0 fffff801`4bcef93d : ffff81bf`00000000 00000000`00000000 00000000`00000000 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0xb2d ffff840d`4e2ff040 fffff801`4bcef93d : ffff81c0`00000000 00000000`00000000 00000000`00000001 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d ffff840d`4e2ff0d0 fffff801`4bcef93d : ffff81c0`00000000 00000000`00000000 00000000`00000002 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d ffff840d`4e2ff160 fffff801`4bd12a01 : 00000000`00000000 00000000`00000000 00000000`00000003 ffffd00a`82aed700 : nt!MiWalkPageTablesRecursively+0x92d ffff840d`4e2ff1f0 fffff801`4bcfe9e7 : ffff840d`4e2ff3b0 ffff81c0`00000001 00000000`00000002 ffff81c0`00000000 : nt!MiWalkPageTables+0x371 ffff840d`4e2ff2f0 fffff801`4bc57ff2 : 00000000`00000000 fffff801`4bc581bd ffff840d`4e2ff6b8 ffffd00a`82a28080 : nt!MiDeletePagablePteRange+0x747 ffff840d`4e2ff620 fffff801`4c0c17f8 : 00000000`00000000 ffff840d`00000001 ffffd00a`82aed080 ffff840d`4e2ff6f0 : nt!MiDeleteVirtualAddresses+0x52 ffff840d`4e2ff670 fffff801`4c12b871 : ffffd00a`82aed080 ffffd00a`82b16760 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x1a8 ffff840d`4e2ff730 fffff801`4c12b213 : ffffd00a`82b16760 00000000`00000000 ffffd00a`82a28080 00000000`00000000 : nt!MiUnmapVad+0x49 ffff840d`4e2ff760 fffff801`4c12ad8d : ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`831b9600 ffffd00a`82aed080 : nt!MiCleanVad+0x2f ffff840d`4e2ff790 fffff801`4c1a590d : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd00a`82aed080 : nt!MmCleanProcessAddressSpace+0x10d ffff840d`4e2ff810 fffff801`4c093c54 : ffffd00a`82aed080 ffffab06`8ff49770 ffffd00a`82aed080 00000000`00000000 : nt!PspRundownSingleProcess+0xc1 ffff840d`4e2ff8a0 fffff801`4c1aa952 : 00000000`c000004b ffffd00a`82aed001 ffffd00a`82a280f4 00000000`00214000 : nt!PspExitThread+0x63c ffff840d`4e2ff9a0 fffff801`4be3e0e5 : ffffd00a`00003200 ffffd00a`82a28080 ffffd00a`82aed080 ffffd00a`82aed080 : nt!NtTerminateProcess+0xf2 ffff840d`4e2ffa20 00007ffc`43caf1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000000`12f5daf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`43caf1d4 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.