Mavi Ekran hatası MEMORY_MANAGEMENT

LaniakeaSK

Centipat
Katılım
20 Mart 2023
Mesajlar
40
Daha fazla  
Cinsiyet
Erkek
Minidump dosyaları: minitest.rar
-Çoğunlukla MEMORY_MANAGEMENT

Sistem bileşenleri:
İŞLEMCİ: AMD RYZEN 5 5600X 3.7GHz 32MB Önbellek 6 Çekirdek AM4 7nm MPK İşlemci
ANAKART: ASUS PRIME B450M-K II 4400MHz (OC) DDR4 SOKET AM4 D-Sub DVI-D HDMI M.2 mATX Anakart
RAM: GSKILL 8GB Ripjaws V Siyah 3600MHz CL18 DDR4 Single Kit Ram
EKRAN KARTI: ASUS TUF GAMING GeForce RTX 3060Ti OC Edition ARGB 8GB GDDR6X 256Bit Ekran Kartı

Sorunun nerede olduğunu bulabilir misiniz?

@Recep Baltaş konu hakkında yardımcı olma şansınız var mı? (Yorum sonradan eklendi.)
 
Son düzenleme:
Dump dökümünü inceledim. Genel olarak erkran kartından dolayı mavi ekran hatası almışsın.

Öncelikle ekran kartı sürücüsünü DDU ile kaldırın.


En güncel WHQL ekran kartı sürücüsünü NVIDIA sitesinden indirip yükleyin.

Tüm sürücüleri güncelleyin. (Örneğin; ses sürücüsü bayağı eski kalmış)


Bir de bellek arızası olabilir. Memtest86 ile RAM testi yapın.


Güncel Memtest86 uygulaması;


Memtest86 sonuçlarını burada paylaşın.

Kod:
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8078e0adaaa, Address of the instruction which caused the BugCheck
Arg3: fffffd809d016190, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3155

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 35038

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5498

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051723-11875-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8078e0adaaa

BUGCHECK_P3: fffffd809d016190

BUGCHECK_P4: 0

CONTEXT:  fffffd809d016190 -- (.cxr 0xfffffd809d016190)
rax=ffffad8e94df1ea0 rbx=ffffad8e94df1000 rcx=ffffad8e94df1000
rdx=8000000000000000 rsi=ffffad8e94df1e10 rdi=fffffd809d016bf8
rip=fffff8078e0adaaa rsp=fffffd809d016b90 rbp=fffffd809d016c69
 r8=fffff8078e0c7680  r9=0000000000000000 r10=0000000000000000
r11=fffffd809d016d70 r12=0000000000000001 r13=ffffad8e8b1ae7e0
r14=0000000000000015 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0xfddaaa:
fffff807`8e0adaaa 448b02          mov     r8d,dword ptr [rdx] ds:002b:80000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
fffffd80`9d016b90 00000000`00000020     : 00000000`0000018f 00000000`00000003 ffffd08c`2a9fc320 fffffd80`9d016bf8 : nvlddmkm+0xfddaaa
fffffd80`9d016b98 00000000`0000018f     : 00000000`00000003 ffffd08c`2a9fc320 fffffd80`9d016bf8 fffff807`8e1274cf : 0x20
fffffd80`9d016ba0 00000000`00000003     : ffffd08c`2a9fc320 fffffd80`9d016bf8 fffff807`8e1274cf ffffad8e`94df1000 : 0x18f
fffffd80`9d016ba8 ffffd08c`2a9fc320     : fffffd80`9d016bf8 fffff807`8e1274cf ffffad8e`94df1000 fffff807`75817a42 : 0x3
fffffd80`9d016bb0 fffffd80`9d016bf8     : fffff807`8e1274cf ffffad8e`94df1000 fffff807`75817a42 ffffd08c`17400340 : 0xffffd08c`2a9fc320
fffffd80`9d016bb8 fffff807`8e1274cf     : ffffad8e`94df1000 fffff807`75817a42 ffffd08c`17400340 ffffad8e`911c50ff : 0xfffffd80`9d016bf8
fffffd80`9d016bc0 ffffad8e`94df1000     : fffff807`75817a42 ffffd08c`17400340 ffffad8e`911c50ff ffffad8e`94df16a0 : nvlddmkm+0x10574cf
fffffd80`9d016bc8 fffff807`75817a42     : ffffd08c`17400340 ffffad8e`911c50ff ffffad8e`94df16a0 ffffad8e`94df16a8 : 0xffffad8e`94df1000
fffffd80`9d016bd0 fffff807`75fb70b9     : 00000000`0000001f 00000000`00000003 00000000`00000000 fffff807`8e136bdf : nt!ExFreeHeapPool+0x362
fffffd80`9d016cb0 ffffad8e`94df1000     : ffffad8e`88666000 fffffd80`9d016d60 ffffad8e`94df1000 fffff807`8e136a0f : nt!ExFreePool+0x9
fffffd80`9d016ce0 ffffad8e`88666000     : fffffd80`9d016d60 ffffad8e`94df1000 fffff807`8e136a0f ffffad8e`94df1000 : 0xffffad8e`94df1000
fffffd80`9d016ce8 fffffd80`9d016d60     : ffffad8e`94df1000 fffff807`8e136a0f ffffad8e`94df1000 ffffad8e`8cfe9a20 : 0xffffad8e`88666000
fffffd80`9d016cf0 ffffad8e`94df1000     : fffff807`8e136a0f ffffad8e`94df1000 ffffad8e`8cfe9a20 ffffad8e`88679650 : 0xfffffd80`9d016d60
fffffd80`9d016cf8 fffff807`8e136a0f     : ffffad8e`94df1000 ffffad8e`8cfe9a20 ffffad8e`88679650 fffff807`8da2d750 : 0xffffad8e`94df1000
fffffd80`9d016d00 ffffad8e`94df1000     : ffffad8e`8cfe9a20 ffffad8e`88679650 fffff807`8da2d750 00000000`00000003 : nvlddmkm+0x1066a0f
fffffd80`9d016d08 ffffad8e`8cfe9a20     : ffffad8e`88679650 fffff807`8da2d750 00000000`00000003 fffff807`8da257a0 : 0xffffad8e`94df1000
fffffd80`9d016d10 ffffad8e`88679650     : fffff807`8da2d750 00000000`00000003 fffff807`8da257a0 ffffad8e`94df1000 : 0xffffad8e`8cfe9a20
fffffd80`9d016d18 fffff807`8da2d750     : 00000000`00000003 fffff807`8da257a0 ffffad8e`94df1000 ffffad8e`88666000 : 0xffffad8e`88679650
fffffd80`9d016d20 00000000`00000003     : fffff807`8da257a0 ffffad8e`94df1000 ffffad8e`88666000 ffffad8e`94df1000 : nvlddmkm+0x95d750
fffffd80`9d016d28 fffff807`8da257a0     : ffffad8e`94df1000 ffffad8e`88666000 ffffad8e`94df1000 00000000`0000001f : 0x3
fffffd80`9d016d30 ffffad8e`94df1000     : ffffad8e`88666000 ffffad8e`94df1000 00000000`0000001f 00000000`00000001 : nvlddmkm+0x9557a0
fffffd80`9d016d38 ffffad8e`88666000     : ffffad8e`94df1000 00000000`0000001f 00000000`00000001 fffff807`8e0ad62e : 0xffffad8e`94df1000
fffffd80`9d016d40 ffffad8e`94df1000     : 00000000`0000001f 00000000`00000001 fffff807`8e0ad62e 00000000`00000000 : 0xffffad8e`88666000
fffffd80`9d016d48 00000000`0000001f     : 00000000`00000001 fffff807`8e0ad62e 00000000`00000000 ffffad8e`94df1000 : 0xffffad8e`94df1000
fffffd80`9d016d50 00000000`00000001     : fffff807`8e0ad62e 00000000`00000000 ffffad8e`94df1000 00000000`00000000 : 0x1f
fffffd80`9d016d58 fffff807`8e0ad62e     : 00000000`00000000 ffffad8e`94df1000 00000000`00000000 00000000`00000000 : 0x1
fffffd80`9d016d60 00000000`00000000     : ffffad8e`94df1000 00000000`00000000 00000000`00000000 ffffad8e`8cfe9a20 : nvlddmkm+0xfdd62e


SYMBOL_NAME:  nvlddmkm+fddaaa

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffffd809d016190 ; kb

BUCKET_ID_FUNC_OFFSET:  fddaaa

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffff3ffe839f10
Arg3: 8000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3298

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3606

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  060123-8015-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffff3ffe839f10

BUGCHECK_P3: 8000000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  BF2042.exe

STACK_TEXT:  
fffffd0c`5180ed08 fffff805`274bc49a     : 00000000`0000001a 00000000`00041792 ffffff3f`fe839f10 80000000`00000000 : nt!KeBugCheckEx
fffffd0c`5180ed10 fffff805`2746d836     : 00000000`00000000 00000000`00000000 00000000`00000e0f ffffff3f`fe839f10 : nt!MiDeleteVa+0x153a
fffffd0c`5180ee10 fffff805`2746d94b     : ffffff7f`00000000 ffffb488`2d8b3700 fffffd0c`00000000 fffffd0c`5180f280 : nt!MiWalkPageTablesRecursively+0x776
fffffd0c`5180eeb0 fffff805`2746d94b     : ffffff7f`bfcfffa0 ffffb488`2d8b3700 fffffd0c`00000001 fffffd0c`5180f290 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180ef50 fffff805`2746d94b     : ffffff7f`bfcff000 ffffb488`2d8b3700 fffffd0c`00000002 fffffd0c`5180f2a0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180eff0 fffff805`2746a94b     : 00000000`00000000 ffffb488`2d8b3700 00000000`00000003 fffffd0c`5180f2b0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180f090 fffff805`274bad31     : fffffd0c`5180f230 ffffb488`00000000 ffffff3f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffd0c`5180f190 fffff805`2747e830     : 00000000`00000001 fffffd0c`00000000 ffffb488`2d8b3550 ffffb488`3a6f4080 : nt!MiDeletePagablePteRange+0x4f1
fffffd0c`5180f4a0 fffff805`27885ba9     : ffffb488`3c104600 00000000`00000000 ffffb488`00000000 ffffb488`00000000 : nt!MiDeleteVad+0x360
fffffd0c`5180f5b0 fffff805`2788554c     : ffffb488`3c104600 ffffb488`39a62c20 ffffb488`3a6f4080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffd0c`5180f5e0 fffff805`2782441f     : ffffb488`3ab4c060 ffffb488`3ab4c060 ffffb488`3c104600 ffffb488`2d8b3080 : nt!MiCleanVad+0x30
fffffd0c`5180f610 fffff805`27831550     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb488`2d8b3080 : nt!MmCleanProcessAddressSpace+0x137
fffffd0c`5180f690 fffff805`27883f02     : ffffb488`2d8b3080 ffff8105`70a28060 fffffd0c`5180f8e0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffffd0c`5180f720 fffff805`278c8578     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`0022e000 : nt!PspExitThread+0x5f6
fffffd0c`5180f820 fffff805`274ddf37     : 00000000`00000000 00000000`00000000 fffffd0c`00000000 00000000`d6c9b040 : nt!KiSchedulerApcTerminate+0x38
fffffd0c`5180f860 fffff805`276010f0     : 00000000`00000978 fffffd0c`5180f910 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffd0c`5180f910 fffff805`2760f59f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffd0c`5180fa50 00007ffd`1fe0d124     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0229fa98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1fe0d124


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
 
Dump dökümünü inceledim. Genel olarak erkran kartından dolayı mavi ekran hatası almışsın.

Öncelikle ekran kartı sürücüsünü DDU ile kaldırın.


En güncel WHQL ekran kartı sürücüsünü NVIDIA sitesinden indirip yükleyin.

Tüm sürücüleri güncelleyin. (Örneğin; ses sürücüsü bayağı eski kalmış)


Bir de bellek arızası olabilir. Memtest86 ile RAM testi yapın.


Güncel Memtest86 uygulaması;


Memtest86 sonuçlarını burada paylaşın.

Kod:
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8078e0adaaa, Address of the instruction which caused the BugCheck
Arg3: fffffd809d016190, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3155

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 35038

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 5498

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  051723-11875-01.dmp

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8078e0adaaa

BUGCHECK_P3: fffffd809d016190

BUGCHECK_P4: 0

CONTEXT:  fffffd809d016190 -- (.cxr 0xfffffd809d016190)
rax=ffffad8e94df1ea0 rbx=ffffad8e94df1000 rcx=ffffad8e94df1000
rdx=8000000000000000 rsi=ffffad8e94df1e10 rdi=fffffd809d016bf8
rip=fffff8078e0adaaa rsp=fffffd809d016b90 rbp=fffffd809d016c69
 r8=fffff8078e0c7680  r9=0000000000000000 r10=0000000000000000
r11=fffffd809d016d70 r12=0000000000000001 r13=ffffad8e8b1ae7e0
r14=0000000000000015 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
nvlddmkm+0xfddaaa:
fffff807`8e0adaaa 448b02          mov     r8d,dword ptr [rdx] ds:002b:80000000`00000000=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffffd80`9d016b90 00000000`00000020     : 00000000`0000018f 00000000`00000003 ffffd08c`2a9fc320 fffffd80`9d016bf8 : nvlddmkm+0xfddaaa
fffffd80`9d016b98 00000000`0000018f     : 00000000`00000003 ffffd08c`2a9fc320 fffffd80`9d016bf8 fffff807`8e1274cf : 0x20
fffffd80`9d016ba0 00000000`00000003     : ffffd08c`2a9fc320 fffffd80`9d016bf8 fffff807`8e1274cf ffffad8e`94df1000 : 0x18f
fffffd80`9d016ba8 ffffd08c`2a9fc320     : fffffd80`9d016bf8 fffff807`8e1274cf ffffad8e`94df1000 fffff807`75817a42 : 0x3
fffffd80`9d016bb0 fffffd80`9d016bf8     : fffff807`8e1274cf ffffad8e`94df1000 fffff807`75817a42 ffffd08c`17400340 : 0xffffd08c`2a9fc320
fffffd80`9d016bb8 fffff807`8e1274cf     : ffffad8e`94df1000 fffff807`75817a42 ffffd08c`17400340 ffffad8e`911c50ff : 0xfffffd80`9d016bf8
fffffd80`9d016bc0 ffffad8e`94df1000     : fffff807`75817a42 ffffd08c`17400340 ffffad8e`911c50ff ffffad8e`94df16a0 : nvlddmkm+0x10574cf
fffffd80`9d016bc8 fffff807`75817a42     : ffffd08c`17400340 ffffad8e`911c50ff ffffad8e`94df16a0 ffffad8e`94df16a8 : 0xffffad8e`94df1000
fffffd80`9d016bd0 fffff807`75fb70b9     : 00000000`0000001f 00000000`00000003 00000000`00000000 fffff807`8e136bdf : nt!ExFreeHeapPool+0x362
fffffd80`9d016cb0 ffffad8e`94df1000     : ffffad8e`88666000 fffffd80`9d016d60 ffffad8e`94df1000 fffff807`8e136a0f : nt!ExFreePool+0x9
fffffd80`9d016ce0 ffffad8e`88666000     : fffffd80`9d016d60 ffffad8e`94df1000 fffff807`8e136a0f ffffad8e`94df1000 : 0xffffad8e`94df1000
fffffd80`9d016ce8 fffffd80`9d016d60     : ffffad8e`94df1000 fffff807`8e136a0f ffffad8e`94df1000 ffffad8e`8cfe9a20 : 0xffffad8e`88666000
fffffd80`9d016cf0 ffffad8e`94df1000     : fffff807`8e136a0f ffffad8e`94df1000 ffffad8e`8cfe9a20 ffffad8e`88679650 : 0xfffffd80`9d016d60
fffffd80`9d016cf8 fffff807`8e136a0f     : ffffad8e`94df1000 ffffad8e`8cfe9a20 ffffad8e`88679650 fffff807`8da2d750 : 0xffffad8e`94df1000
fffffd80`9d016d00 ffffad8e`94df1000     : ffffad8e`8cfe9a20 ffffad8e`88679650 fffff807`8da2d750 00000000`00000003 : nvlddmkm+0x1066a0f
fffffd80`9d016d08 ffffad8e`8cfe9a20     : ffffad8e`88679650 fffff807`8da2d750 00000000`00000003 fffff807`8da257a0 : 0xffffad8e`94df1000
fffffd80`9d016d10 ffffad8e`88679650     : fffff807`8da2d750 00000000`00000003 fffff807`8da257a0 ffffad8e`94df1000 : 0xffffad8e`8cfe9a20
fffffd80`9d016d18 fffff807`8da2d750     : 00000000`00000003 fffff807`8da257a0 ffffad8e`94df1000 ffffad8e`88666000 : 0xffffad8e`88679650
fffffd80`9d016d20 00000000`00000003     : fffff807`8da257a0 ffffad8e`94df1000 ffffad8e`88666000 ffffad8e`94df1000 : nvlddmkm+0x95d750
fffffd80`9d016d28 fffff807`8da257a0     : ffffad8e`94df1000 ffffad8e`88666000 ffffad8e`94df1000 00000000`0000001f : 0x3
fffffd80`9d016d30 ffffad8e`94df1000     : ffffad8e`88666000 ffffad8e`94df1000 00000000`0000001f 00000000`00000001 : nvlddmkm+0x9557a0
fffffd80`9d016d38 ffffad8e`88666000     : ffffad8e`94df1000 00000000`0000001f 00000000`00000001 fffff807`8e0ad62e : 0xffffad8e`94df1000
fffffd80`9d016d40 ffffad8e`94df1000     : 00000000`0000001f 00000000`00000001 fffff807`8e0ad62e 00000000`00000000 : 0xffffad8e`88666000
fffffd80`9d016d48 00000000`0000001f     : 00000000`00000001 fffff807`8e0ad62e 00000000`00000000 ffffad8e`94df1000 : 0xffffad8e`94df1000
fffffd80`9d016d50 00000000`00000001     : fffff807`8e0ad62e 00000000`00000000 ffffad8e`94df1000 00000000`00000000 : 0x1f
fffffd80`9d016d58 fffff807`8e0ad62e     : 00000000`00000000 ffffad8e`94df1000 00000000`00000000 00000000`00000000 : 0x1
fffffd80`9d016d60 00000000`00000000     : ffffad8e`94df1000 00000000`00000000 00000000`00000000 ffffad8e`8cfe9a20 : nvlddmkm+0xfdd62e


SYMBOL_NAME:  nvlddmkm+fddaaa

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

STACK_COMMAND:  .cxr 0xfffffd809d016190 ; kb

BUCKET_ID_FUNC_OFFSET:  fddaaa

FAILURE_BUCKET_ID:  AV_nvlddmkm!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7eea5677-f68d-2154-717e-887e07e55cd3}

Followup:     MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffff3ffe839f10
Arg3: 8000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2671

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 3298

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 374

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3606

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 91

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x1a

    Key  : Bugcheck.Code.Register
    Value: 0x1a

    Key  : MemoryManagement.PFN
    Value: 0

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  060123-8015-01.dmp

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffff3ffe839f10

BUGCHECK_P3: 8000000000000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  BF2042.exe

STACK_TEXT:
fffffd0c`5180ed08 fffff805`274bc49a     : 00000000`0000001a 00000000`00041792 ffffff3f`fe839f10 80000000`00000000 : nt!KeBugCheckEx
fffffd0c`5180ed10 fffff805`2746d836     : 00000000`00000000 00000000`00000000 00000000`00000e0f ffffff3f`fe839f10 : nt!MiDeleteVa+0x153a
fffffd0c`5180ee10 fffff805`2746d94b     : ffffff7f`00000000 ffffb488`2d8b3700 fffffd0c`00000000 fffffd0c`5180f280 : nt!MiWalkPageTablesRecursively+0x776
fffffd0c`5180eeb0 fffff805`2746d94b     : ffffff7f`bfcfffa0 ffffb488`2d8b3700 fffffd0c`00000001 fffffd0c`5180f290 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180ef50 fffff805`2746d94b     : ffffff7f`bfcff000 ffffb488`2d8b3700 fffffd0c`00000002 fffffd0c`5180f2a0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180eff0 fffff805`2746a94b     : 00000000`00000000 ffffb488`2d8b3700 00000000`00000003 fffffd0c`5180f2b0 : nt!MiWalkPageTablesRecursively+0x88b
fffffd0c`5180f090 fffff805`274bad31     : fffffd0c`5180f230 ffffb488`00000000 ffffff3f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffd0c`5180f190 fffff805`2747e830     : 00000000`00000001 fffffd0c`00000000 ffffb488`2d8b3550 ffffb488`3a6f4080 : nt!MiDeletePagablePteRange+0x4f1
fffffd0c`5180f4a0 fffff805`27885ba9     : ffffb488`3c104600 00000000`00000000 ffffb488`00000000 ffffb488`00000000 : nt!MiDeleteVad+0x360
fffffd0c`5180f5b0 fffff805`2788554c     : ffffb488`3c104600 ffffb488`39a62c20 ffffb488`3a6f4080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffd0c`5180f5e0 fffff805`2782441f     : ffffb488`3ab4c060 ffffb488`3ab4c060 ffffb488`3c104600 ffffb488`2d8b3080 : nt!MiCleanVad+0x30
fffffd0c`5180f610 fffff805`27831550     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb488`2d8b3080 : nt!MmCleanProcessAddressSpace+0x137
fffffd0c`5180f690 fffff805`27883f02     : ffffb488`2d8b3080 ffff8105`70a28060 fffffd0c`5180f8e0 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffffd0c`5180f720 fffff805`278c8578     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`0022e000 : nt!PspExitThread+0x5f6
fffffd0c`5180f820 fffff805`274ddf37     : 00000000`00000000 00000000`00000000 fffffd0c`00000000 00000000`d6c9b040 : nt!KiSchedulerApcTerminate+0x38
fffffd0c`5180f860 fffff805`276010f0     : 00000000`00000978 fffffd0c`5180f910 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffd0c`5180f910 fffff805`2760f59f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
fffffd0c`5180fa50 00007ffd`1fe0d124     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`0229fa98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1fe0d124


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .cxr; .ecxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------
Oyunlarda hiçbir uyarı vermeden kapanma (Sadece oyunun kapanması, windows değil.) ve MEMORY MANAGEMENT mavi ekranları alınca başka bir forumda arkadaş RAM'lerde sorun olduğunu ve RAM'lerin ekran kartı sürücüsünü çökerttiğini söyledi. Muhtemelen RAM'lerde sorun var.
 
Hocam dediğim adımları yaparsan neyde sorun olduğu ortaya çıkacaktır zaten ona göre şunda sorun var bunda sorun var diyebiliriz. Her MEMORY_MANAGEMENT arızası bozuk RAM demek değildir. Sizde evet bozuk gibi görünüyor ama sadece RAM'den dolayı mavi ekran almamışsın.
 

Geri
Yukarı