M.2 SSD taktıktan sonra "MEMORY_MANAGEMENT" hatası

İşletim sistemi
Windows 11

doganyıldız

Hectopat
Katılım
7 Nisan 2019
Mesajlar
40
RAM
Neo Forza CL15 3200 MHz 8+8 GB
SSD veya HDD modeli
WD Blue Sn580 500 GB
Ekran kartı
RTX 2060 Asus Dual OC 6GB
Anakart
Asus B450M Tuf Pro Gaming
İşlemci
Ryzen5 2600 OC 4Ghz
İyi günler yeni bir M.2 SSD aldım WD blue SN580 model. Windows'u kopyaladım açılış hızına bakmak için PC başlatır başlatmaz oyuna girdim yanlışlıkla mouse tıklamam sonucu PC dondu ve MEMORY_MANAGEMENT hatası verdi RAM'lerim OC'li işlemcim OC' lidir. Minidump dosyası aşağıdadır.

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit.
 UseExperimentalFeatureForNugetShare : true.
 AllowNugetExeUpdate : true.
 NonInteractiveNuget : true.
 AllowNugetMSCredentialProviderInstall : true.
 AllowParallelInitializationOfLocalRepositories : true.

 EnableRedirectToV8JsProvider : false.

 -- Configuring repositories.
 ----> Repository : LocalInstalled, Enabled: true.
 ----> Repository : UserExtensions, Enabled: true.

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds.

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.032 seconds.
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41.

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\032124-11781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Kernel base = 0xfffff807`56800000 PsLoadedModuleList = 0xfffff807`57413530
Debug session time: Thu Mar 21 14:58:56.664 2024 (UTC + 3:00)
System Uptime: 0 days 16:02:14.333
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
..................
Loading User Symbols.
PEB is paged out (Peb.Ldr = 000000fd`02b74018). Type ".hh dbgerr001" for details.
Loading unloaded module list.
...............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`56c177f0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff184`9c8ae0a0=000000000000001a
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
 # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
 the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa7807e818808.
Arg3: 0002000000000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 15.

 Key : Analysis.Elapsed.mSec
 Value: 8516.

 Key : Analysis.IO.Other.Mb
 Value: 3

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 26.

 Key : Analysis.Init.CPU.mSec
 Value: 171.

 Key : Analysis.Init.Elapsed.mSec
 Value: 81518.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 90.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x1a.

 Key : Bugcheck.Code.TargetModel
 Value: 0x1a.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.DiagDataWrittenToHeader
 Value: 1

 Key : Dump.Attributes.ErrorCode
 Value: 0

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : Dump.Attributes.LastLine
 Value: Dump completed successfully.

 Key : Dump.Attributes.ProgressPercentage
 Value: 0

 Key : Failure.Bucket
 Value: MEMORY_CORRUPTION_ONE_BIT

 Key : Failure.Hash
 Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

 Key : MemoryManagement.PFN
 Value: 0

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: ffffa7807e818808.

BUGCHECK_P3: 2000000000000.

BUGCHECK_P4: 0

FILE_IN_CAB: 032124-11781-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

MEMORY_CORRUPTOR: ONE_BIT.

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: sihost.exe

STACK_TEXT:
fffff184`9c8ae098 fffff807`56c778ae : 00000000`0000001a 00000000`00041792 ffffa780`7e818808 00020000`00000000 : nt!KeBugCheckEx
fffff184`9c8ae0a0 fffff807`56a3dd8f : ffffa88d`9e4a5740 00000000`00000000 00000000`00000002 fffff184`9c8ae290 : nt!MiDeleteVa+0x23998e
fffff184`9c8ae190 fffff807`56a487ea : ffffa88d`9e4a5590 ffffa88d`9e1350c0 fffff184`9c8ae530 ffffa88d`9e1357c0 : nt!MiDeletePagablePteRange+0x2cf
fffff184`9c8ae4a0 fffff807`56ec3137 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x4e
fffff184`9c8ae4f0 fffff807`56aaf7c3 : 000000fd`03100000 00000000`00000000 ffffa4cd`cdc00189 00000000`00000000 : nt!MiDeleteVad+0x1b7
fffff184`9c8ae5b0 fffff807`56ee6250 : 00000000`00000000 00000000`00000000 fffff184`9c8ae710 ffffa88d`00000000 : nt!MiFreeVadRange+0xa3
fffff184`9c8ae610 fffff807`56ee5e65 : fffff184`9c8ae900 fffff807`56ecbbc6 ffffcb88`95054c80 ffffa88d`9ea912f0 : nt!MmFreeVirtualMemory+0x3b0
fffff184`9c8ae750 fffff807`56c2c9e8 : ffffa88d`9e1350c0 fffff807`56ecb69f ffffa88d`9ea912f0 ffffa88d`9ea912f0 : nt!NtFreeVirtualMemory+0x95
fffff184`9c8ae7b0 fffff807`56c1d290 : fffff807`56eeb9d8 ffffa88d`9ea912f0 ffffa88d`9ea912f0 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x28
fffff184`9c8ae948 fffff807`56eeb9d8 : ffffa88d`9ea912f0 ffffa88d`9ea912f0 00000000`00000001 00000000`00000000 : nt!KiServiceLinkage
fffff184`9c8ae950 fffff807`56eec833 : 00000000`00000000 00000000`00000000 ffffa88d`9e135134 000000fd`02b8f000 : nt!PspExitThread+0x39c
fffff184`9c8aea50 fffff807`56eec94a : 00000000`00000000 00000000`00000000 ffffa88d`9e1350c0 fffff807`56eb2119 : nt!PspTerminateThreadByPointer+0x53
fffff184`9c8aea90 fffff807`56c2c9e8 : 00000000`00000000 ffffa88d`9e1350c0 fffff184`9c8aeb60 ffffa88d`00000000 : nt!NtTerminateThread+0x4a
fffff184`9c8aeae0 00007ffe`67a4fdd4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fd`0317f468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`67a4fdd4

MODULE_NAME: hardware.

IMAGE_NAME: memory_corruption.

STACK_COMMAND: .cxr; .ecxr ; kb.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner.
---------
 
Evet RAM hatası almışsın.

MODULE_NAME: Hardware.

IMAGE_NAME: Memory_corruption.

STACK_COMMAND: Cxr. Ecxr; KB.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
 

Yeni konular

Geri
Yukarı