"KERNEL_DATA_INPAGE" mavi ekran hatası

İşletim sistemi
Windows 10

Poinej

Hectopat
Katılım
10 Ağustos 2016
Mesajlar
94
Merhabalar, uzun zamandır PC'yi başlatırken mavi ekran hataları alıyordum. Format attım hala devam ediyor. Yardım eder misiniz? Minidump dosyamı buraya linkliyorum.
 
KS
KS
Poinej

Poinej

Hectopat
Katılım
10 Ağustos 2016
Mesajlar
94
Daha öncesinde KERNEL_DATA_INPAGE hatası alıyordum, şimdi de bu olmaya başladı. Yardım eder misiniz? Minidump dosyalarımı uploadladım. Minidump
 

Dosya Ekleri

  • WhatsApp Image 2021-11-28 at 10.05.23.jpeg
    WhatsApp Image 2021-11-28 at 10.05.23.jpeg
    64,1 KB · Görüntüleme: 21

Enes3078

Gigapat
Moderatör
Sosyal Tayfı
Katılım
28 Nisan 2020
Mesajlar
13.637
Makaleler
12
Çözümler
445
Yer
Malatya
OCCT ile kartınıza VRAM ve 3D testleri uygulayın. Ayrıca kulaklığınızın kontrol yazılımı varsa kaldırın.

Dökümler:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the BugCheck:
Arg2: ffff840b01a35d60
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 12530

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 38242

    Key  : Analysis.Init.CPU.mSec
    Value: 1030

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7356

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  112821-8593-01.dmp

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffff840b01a35d60

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT: 
fffffb09`5bab5098 fffff801`20843ad0     : 00000000`0000010e 00000000`00000033 ffff840b`01a35d60 00000000`00000000 : nt!KeBugCheckEx
fffffb09`5bab50a0 fffff801`2139d30d     : 00000000`00000000 ffff840b`01a35e60 ffffaa87`188d3000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffffb09`5bab50e0 fffff801`21310eca     : ffff840b`01a35d60 00000000`00000000 ffff840b`0149ccd0 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x33179
fffffb09`5bab5120 fffff801`2136a14d     : ffff840b`01a35d60 00000000`00000000 ffff840b`0149ccd0 ffffaa87`187840c0 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
fffffb09`5bab5150 fffff801`2136a81d     : 00000000`00000000 ffff840b`0149ccd0 ffff840b`01a35d60 ffffaa87`1931c080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
fffffb09`5bab5180 fffff801`21310eae     : ffff840b`0151d5f0 fffffb09`5bab5339 ffffaa87`187840c0 00000000`4b677844 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
fffffb09`5bab5240 fffff801`205f6749     : 00000000`00000030 00000000`00000799 00000000`00000002 ffffaa87`194ce320 : dxgmms2!VidMmCloseAdapter+0x1e
fffffb09`5bab5270 fffff801`205a3c6f     : ffffaa87`0e010100 fffff801`152892b2 ffffaa87`0e010340 00000000`000000ff : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
fffffb09`5bab52a0 fffff801`20574c9d     : ffff840b`0151d5f0 ffff840a`00000002 ffff840b`0151d5f0 ffffaa87`187840c0 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
fffffb09`5bab53a0 fffff801`205730f1     : ffffaa87`187a7000 fffff801`00000001 ffffaa87`187a7000 fffff801`00000001 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
fffffb09`5bab5430 fffff801`205a4785     : ffff840a`fed3dca0 fffffb09`5bab5580 00000000`00000329 ffff840a`fed3db70 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
fffffb09`5bab5480 fffff801`205a5709     : ffff840a`fed3db70 00000000`00000001 ffff840a`fed3db70 fffffb09`5bab5888 : dxgkrnl!DXGPROCESS::Destroy+0x341
fffffb09`5bab56f0 fffff801`204967b1     : 00000000`00000000 ffffaa87`25a76ec0 00000000`00000000 fffff801`15000000 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffffb09`5bab5840 fffff801`15602a4f     : 00000000`00000000 ffffaa87`10bcbf70 ffffaa87`193312c0 fffff801`01046000 : dxgkrnl!DxgkProcessNotify+0x1a1
fffffb09`5bab5890 fffff801`1561d664     : ffffaa87`19331200 ffffaa87`193312c0 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffffb09`5bab5960 fffff801`156b0be2     : ffffaa87`1931c4b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
fffffb09`5bab5990 fffff801`156b418e     : ffffaa87`d00002fe 00000000`00000001 00000000`00000000 000000a8`cc070000 : nt!PspExitThread+0x5b2
fffffb09`5bab5a90 fffff801`15408cb8     : ffffaa87`193312c0 ffffaa87`1931c080 fffffb09`5bab5b80 ffffaa87`193312c0 : nt!NtTerminateProcess+0xde
fffffb09`5bab5b00 00007ffc`9e24d2f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a8`cbfcf618 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`9e24d2f4


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+33179

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1261

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  33179

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

    PnpActivityId      : {00000000-0000-0000-0000-000000000000}
    PnpActivityTime    : 132825212416172937
    PnpEventInformation: 3
    PnpEventInProgress : 0
    PnpProblemCode     : 24
    PnpVetoType        : 0
    DeviceId           : STORAGE\Volume\{ad664aab-3ff8-11ec-9c6b-3c7c3f7ceba5}#0000000000004000
    VetoString         :
    
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000006, Exception code that caused the BugCheck
Arg2: fffff8035bccc2a2, Address of the instruction which caused the BugCheck
Arg3: fffffe86ceb86570, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8968

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 20097

    Key  : Analysis.Init.CPU.mSec
    Value: 828

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1964

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 81

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  112821-5906-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000006

BUGCHECK_P2: fffff8035bccc2a2

BUGCHECK_P3: fffffe86ceb86570

BUGCHECK_P4: 0

CONTEXT:  fffffe86ceb86570 -- (.cxr 0xfffffe86ceb86570)
rax=0000000000000000 rbx=fffffe86ceb86fd0 rcx=0000000000000007
rdx=00000000005608e0 rsi=0000000000000057 rdi=ffff80861bbda000
rip=fffff8035bccc2a2 rsp=fffffe86ceb86f78 rbp=ffff80861bbda000
 r8=000000000000001c  r9=ffff9f84b9abc580 r10=00000124a27518e0
r11=00000000000008e0 r12=000000007c0d35b1 r13=fffffe86ceb87250
r14=0000000000000057 r15=00000124a27a6024
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050202
nt!HvpGetCellPaged+0xa2:
fffff803`5bccc2a2 418b02          mov     eax,dword ptr [r10] ds:002b:00000124`a27518e0=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Registry

STACK_TEXT: 
fffffe86`ceb86f78 fffff803`5bbe69df     : 00000000`21805984 fffffe86`ceb872d0 00000124`a328200c 00000000`c0000034 : nt!HvpGetCellPaged+0xa2
fffffe86`ceb86f80 fffff803`5bbec815     : 00000001`ffffffff 00000000`7c0d35b1 00000000`21805984 00000000`00000000 : nt!CmpDoCompareKeyName+0x2f
fffffe86`ceb86fd0 fffff803`5bbefa39     : ffff8086`1faecc00 00000000`00000004 fffffe86`ceb871d0 fffffe86`ceb87230 : nt!CmpWalkOneLevel+0x6f5
fffffe86`ceb870d0 fffff803`5bbee323     : ffff9f84`0000001c fffffe86`ceb87420 fffffe86`ceb873d8 ffff9f84`b7c23a60 : nt!CmpDoParseKey+0x849
fffffe86`ceb87370 fffff803`5bbf23ee     : fffff803`5bbee001 00000000`00000000 ffff9f84`b7c23a60 fffff803`5bc8ae01 : nt!CmpParseKey+0x2c3
fffffe86`ceb87510 fffff803`5bc948aa     : ffff9f84`b7c23a00 fffffe86`ceb87778 00000000`00000040 ffff9f84`ad4b0ae0 : nt!ObpLookupObjectName+0x3fe
fffffe86`ceb876e0 fffff803`5bc9468c     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9f84`ad4b0ae0 : nt!ObOpenObjectByNameEx+0x1fa
fffffe86`ceb87810 fffff803`5bc941b1     : 0000007e`9db7c680 fffffe86`ceb87b80 00000000`00000001 fffff803`5b80827e : nt!ObOpenObjectByName+0x5c
fffffe86`ceb87860 fffff803`5bc93edf     : 00000223`c39e9540 0000007e`9db7e518 00000000`00000000 00000000`00000000 : nt!CmOpenKey+0x2c1
fffffe86`ceb87ac0 fffff803`5ba08cb8     : ffff9f84`b9abc500 00000000`00000010 fffffe86`ceb87b80 ffff9f84`00000000 : nt!NtOpenKeyEx+0xf
fffffe86`ceb87b00 00007ffd`9e22f164     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000007e`9db7c538 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`9e22f164


SYMBOL_NAME:  nt!HvpGetCellPaged+a2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1348

STACK_COMMAND:  .cxr 0xfffffe86ceb86570 ; kb

BUCKET_ID_FUNC_OFFSET:  a2

FAILURE_BUCKET_ID:  0x3B_c0000006_nt!HvpGetCellPaged

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {68f3db38-ae8e-4bae-c37a-85819946495f}

Followup:     MachineOwner
---------

    PnpActivityId      : {00000000-0000-0000-0000-000000000000}
    PnpActivityTime    : 132825266291729076
    PnpEventInformation: 6
    PnpEventInProgress : 0
    PnpProblemCode     : 10
    PnpVetoType        : 0
    DeviceId           : HID\VID_1532&PID_0520&MI_05&Col02\8&186b4db7&0&0001
    VetoString         :
 
Yukarı