Mavi Ekran Hatası: PAGE_FAULT_IN_NONPAGED_AREA

Carawana

Hectopat
Katılım
22 Ocak 2020
Mesajlar
19
Konuya katılacak herkese merhaba. Bundan 20-25 gün önce bilgisayar parçası almak üzere Vatan Bilgisayar'a gittim. Aklımda ilk önce işlemci değiştirmek vardı ancak anakart değiştirmem gerekti RAM değiştirmem gerekti derken birsürü parça aldım.
  • ASUS Dual Series RX580 ekran kartı
  • AMD Ryzen 5 2600 işlemci
  • G.Skill Sniper X 8 GB RAM
  • MSI A320M Pro-E anakart
  • Bir de Kasa
Parçaları düzgünce monte ettim, Windows kurdum. Bilgisayarı kullanmaya başladığımda mavi ekran hataları ile karşılaştım. Sonra aklıma Driver'ları güncellemek geldi ve Driver güncellemelerini yaptım. Mavi ekran hataları durdu meğersem öyle sanıyormuşum. Her yerde aradım bu sorunu ancak yaptığım birçok çözüm işe yaramadı. Ekran kartı Driver'ını kökten silip tekrar kurdum, aynı şekilde Realtek PCI-e GbE Family Controller'ı da. Ancak sorunum çözülmedi ve artık çıldırmak üzereyim. Memtest'i de yaptım 1. kontrolde sıkıntı çıkmadı ki genelde RAM'den kaynaklı diyorlar, katılıyorum çünkü RAM kullanımı Minecraft oyununda kullandığım doku paketi yüzünden %92, %98, %100 oluyor sonrasında mavi ekran yiyorum. Sizce yüksek RAM kullanımından mavi ekran yemesi normal mi? Çözümü size bırakıyorum arkadaşlar var mı yardımcı olabilecek?

Minidump:
  • Anakart: MSI A320M Pro-E
  • Ekran Kartı: ASUS RX580
  • İşlemci: AMD Ryzen 5 2600
  • RAM: 8 GB
  • Depolama: 256 GB SSD, 500GB HDD
  • Güç Kaynağı: 550W PSU
 
Son düzenleyen: Moderatör:
Hatalar ekran kartına işaret ediyor. OCCT ve Furmark ile test et. Patlarsa garanti yolları gözükür sana.



Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa00ef9ab7000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80744510224, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 19

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa00ef9ab7000

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80744510224

BUGCHECK_P4: 0

READ_ADDRESS: fffff807369733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8073682a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8073682a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa00ef9ab7000

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff818314bf4880 -- (.trap 0xffff818314bf4880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffa00ef8cf7be0
rdx=ffffa00ef9ab6890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80744510224 rsp=ffff818314bf4a10 rbp=0000000000000051
r8=ffff818314bf4d70  r9=0000000000000770 r10=000000000009e762
r11=ffffa00ef9ab6890 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4:
fffff807`44510224 42843c0a        test    byte ptr [rdx+r9],dil ds:ffffa00e`f9ab7000=??
Resetting default scope

STACK_TEXT:
ffff8183`14bf45d8 fffff807`365e3863 : 00000000`00000050 ffffa00e`f9ab7000 00000000`00000000 ffff8183`14bf4880 : nt!KeBugCheckEx
ffff8183`14bf45e0 fffff807`36472eef : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa00e`f9ab7000 : nt!MiSystemFault+0x1d6af3
ffff8183`14bf46e0 fffff807`365cf520 : ffffe30b`39643700 00000000`005ed000 00000000`00000200 ffffa00e`f9ab2890 : nt!MmAccessFault+0x34f
ffff8183`14bf4880 fffff807`44510224 : 00000000`0003e000 ffffa00e`f8cf7be0 00000000`00000200 fffff807`4450fe35 : nt!KiPageFault+0x360
ffff8183`14bf4a10 fffff807`4450fe35 : 00000000`00000000 00000000`00000000 ffff8183`14bf4d70 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4
ffff8183`14bf4a30 fffff807`4450eb38 : 00000000`00000000 ffffa00e`f7367950 00000000`00000000 00000000`2c6ab000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x185
ffff8183`14bf4b10 fffff807`4450dd13 : ffffa00e`f7367950 ffffa00e`f8c724f0 ffff8183`14bf4d70 00000000`2aaab000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x9c8
ffff8183`14bf4cb0 fffff807`444fc510 : ffff8800`00962701 ffffa00e`fac27cf0 00000000`2aaab000 fffff807`00000003 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2e3
ffff8183`14bf4e20 fffff807`44521b15 : 00000000`9caeb000 ffff8183`14bf4fa0 ffffe30b`32a47000 00000000`0f000000 : dxgmms2!VIDMM_PAGING_PROCESS::MapScratchAreaVaRange+0x14c
ffff8183`14bf4ea0 fffff807`445218cf : ffffa00e`fac27cf0 00000000`00000000 00000000`00000003 ffffe30b`32a47000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferUsingGpuVaWorker+0x21d
ffff8183`14bf5130 fffff807`4452171c : ffffa00f`13c19910 00000000`00000000 ffffa00e`fac27cf0 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferInternal+0x127
ffff8183`14bf5330 fffff807`4455eb7f : 00000000`2aaab000 ffff8183`14bf5410 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransfer+0x88
ffff8183`14bf53a0 fffff807`44545ffd : 00000000`00000000 00000000`7204000d 00000000`72040000 ffffe30b`2ea11c50 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemorySlow+0x237
ffff8183`14bf5450 fffff807`444fb7cd : 00000000`00000000 ffffe30b`32a47000 00000000`00000000 ffffa00e`fac27cf0 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemory+0x24c09
ffff8183`14bf54a0 fffff807`444fb3c2 : ffffa00f`03969df8 ffffa00f`03969cb0 ffffe30b`32a47ea8 ffffe30b`32a47ea8 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferToSegment+0x22d
ffff8183`14bf5610 fffff807`4450c99f : ffffe30b`3491d410 ffffe30b`32a47000 00000000`00000000 ffffa00e`fac27cf0 : dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0x62
ffff8183`14bf5660 fffff807`44517eb2 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1ef
ffff8183`14bf5770 fffff807`44527da4 : 00000000`00000001 00000000`00989680 ffffa00f`15d1f1d0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x862
ffff8183`14bf59e0 fffff807`44526ee9 : ffffa00e`f89fad10 fffff807`36991401 ffffe30b`3287e600 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4
ffff8183`14bf5be0 fffff807`3652a7a5 : ffffe30b`3287e680 fffff807`44526ee0 ffffa00e`f89fad10 00000067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8183`14bf5c10 fffff807`365c8b2a : fffff807`342fd180 ffffe30b`3287e680 fffff807`3652a750 0039007b`ffffffa8 : nt!PspSystemThreadStartup+0x55
ffff8183`14bf5c60 00000000`00000000 : ffff8183`14bf6000 ffff8183`14bf0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+f4

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  f4

FAILURE_BUCKET_ID:  AV_R_INVALID_dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f9c6c20c-c4a8-7477-c72d-7aebe9a8592c}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff83046fc6a000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8036ce70224, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 9

Key : Analysis.Memory.CommitPeak.Mb
Value: 70

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffff83046fc6a000

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8036ce70224

BUGCHECK_P4: 0

READ_ADDRESS: fffff8035a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035a82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8035a82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff83046fc6a000

MM_INTERNAL_CODE: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  fffff40a08f92b40 -- (.trap 0xfffff40a08f92b40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffff83046eef6be0
rdx=ffff83046fc68cd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036ce70224 rsp=fffff40a08f92cd0 rbp=0000000000000051
r8=fffff40a08f93030 r9=0000000000001330 r10=0000000000083b89
r11=ffff83046fc68cd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4:
fffff803`6ce70224 42843c0a test byte ptr [rdx+r9],dil ds:ffff8304`6fc6a000=??
Resetting default scope

STACK_TEXT:
fffff40a`08f92898 fffff803`5a5e3863 : 00000000`00000050 ffff8304`6fc6a000 00000000`00000000 fffff40a`08f92b40 : nt!KeBugCheckEx
fffff40a`08f928a0 fffff803`5a472eef : 00000000`00000110 00000000`00000000 00000000`00000000 ffff8304`6fc6a000 : nt!MiSystemFault+0x1d6af3
fffff40a`08f929a0 fffff803`5a5cf520 : fffff40a`08f92bd0 fffff803`5a5cf64e 00000000`00000200 fffff803`5a5cf64e : nt!MmAccessFault+0x34f
fffff40a`08f92b40 fffff803`6ce70224 : 00000000`0003c400 ffff8304`6eef6be0 00000000`00000200 fffff803`6ce6fe35 : nt!KiPageFault+0x360
fffff40a`08f92cd0 fffff803`6ce6fe35 : 00000000`00000000 00000000`00000000 fffff40a`08f93030 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4
fffff40a`08f92cf0 fffff803`6ce6eb38 : 00000000`00000000 ffff8304`6c626c90 00000000`00000000 00000000`15556000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x185
fffff40a`08f92dd0 fffff803`6ce6dd13 : ffff8304`6c626c90 ffff8304`6ee73d10 fffff40a`08f93030 00000000`15556000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x9c8
fffff40a`08f92f70 fffff803`6ce5c510 : 00000000`7cf49101 ffff8304`7b00fd50 00000000`15556000 00000000`00000003 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2e3
fffff40a`08f930e0 fffff803`6ce81ab1 : 00000000`15556000 fffff40a`08f93260 ffff9388`eae36000 00000000`0f000000 : dxgmms2!VIDMM_PAGING_PROCESS::MapScratchAreaVaRange+0x14c
fffff40a`08f93160 fffff803`6ce818cf : ffff8304`7b00fd50 fffff2fc`00000000 fffff2f9`00000003 ffff9388`eae36000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferUsingGpuVaWorker+0x1b9
fffff40a`08f933f0 fffff803`6ce8171c : ffff8304`8d16f210 00000000`00000000 ffff8304`7b00fd50 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferInternal+0x127
fffff40a`08f935f0 fffff803`6cebeb7f : 00000000`20000000 fffff40a`08f936d0 ffff9388`e7800000 ffff9388`e77a0000 : dxgmms2!VIDMM_GLOBAL::MemoryTransfer+0x88
fffff40a`08f93660 fffff803`6cea5ffd : ffff8304`7b00fd00 00000000`6e50000d 00000000`6e500000 ffff9388`e9108c80 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemorySlow+0x237
fffff40a`08f93710 fffff803`6ce90dc3 : ffff8304`7b00fd01 ffff8304`71484901 ffff8304`7b00fd50 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemory+0x24c09
fffff40a`08f93760 fffff803`6ce5ad11 : ffff8304`7b00fd50 ffff8304`00000000 ffff8304`00000001 ffff9388`eae36000 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferToSystem+0x35ddb
fffff40a`08f938f0 fffff803`6cec0bf3 : ffff9388`e9108d30 ffff8304`714849a0 ffff9388`eae36000 ffff8304`7b00fd50 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0xb1
fffff40a`08f93940 fffff803`6ceab502 : ffff8304`715dfd90 ffff9388`eae36000 ffff9388`e9108c80 ffff9388`e9108c80 : dxgmms2!VIDMM_SEGMENT::OldDefragment+0x47
fffff40a`08f93990 fffff803`6ce888b0 : 00000000`0000885c fffff40a`08f93ae0 ffff9388`e9108c80 00000001`451b2858 : dxgmms2!VIDMM_GLOBAL::Defragment+0x20a
fffff40a`08f939e0 fffff803`6ce86ee9 : ffff8304`6c794010 fffff803`5a991401 ffff9388`eac78600 00000000`00000001 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x19b0
fffff40a`08f93be0 fffff803`5a52a7a5 : ffff9388`eac78680 fffff803`6ce86ee0 ffff8304`6c794010 00000067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
fffff40a`08f93c10 fffff803`5a5c8b2a : fffff803`586f2180 ffff9388`eac78680 fffff803`5a52a750 00000001`00000001 : nt!PspSystemThreadStartup+0x55
fffff40a`08f93c60 00000000`00000000 : fffff40a`08f94000 fffff40a`08f8e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME: dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+f4

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION: 10.0.18362.449

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: f4

FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f9c6c20c-c4a8-7477-c72d-7aebe9a8592c}

Followup: MachineOwner
---------
 
Hatalar ekran kartına işaret ediyor. OCCT ve Furmark ile test et. Patlarsa garanti yolları gözükür sana.



Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa00ef9ab7000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80744510224, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 5

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 19

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 70

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffa00ef9ab7000

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80744510224

BUGCHECK_P4: 0

READ_ADDRESS: fffff807369733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8073682a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8073682a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa00ef9ab7000

MM_INTERNAL_CODE:  0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff818314bf4880 -- (.trap 0xffff818314bf4880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffa00ef8cf7be0
rdx=ffffa00ef9ab6890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80744510224 rsp=ffff818314bf4a10 rbp=0000000000000051
r8=ffff818314bf4d70  r9=0000000000000770 r10=000000000009e762
r11=ffffa00ef9ab6890 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4:
fffff807`44510224 42843c0a        test    byte ptr [rdx+r9],dil ds:ffffa00e`f9ab7000=??
Resetting default scope

STACK_TEXT:
ffff8183`14bf45d8 fffff807`365e3863 : 00000000`00000050 ffffa00e`f9ab7000 00000000`00000000 ffff8183`14bf4880 : nt!KeBugCheckEx
ffff8183`14bf45e0 fffff807`36472eef : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa00e`f9ab7000 : nt!MiSystemFault+0x1d6af3
ffff8183`14bf46e0 fffff807`365cf520 : ffffe30b`39643700 00000000`005ed000 00000000`00000200 ffffa00e`f9ab2890 : nt!MmAccessFault+0x34f
ffff8183`14bf4880 fffff807`44510224 : 00000000`0003e000 ffffa00e`f8cf7be0 00000000`00000200 fffff807`4450fe35 : nt!KiPageFault+0x360
ffff8183`14bf4a10 fffff807`4450fe35 : 00000000`00000000 00000000`00000000 ffff8183`14bf4d70 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4
ffff8183`14bf4a30 fffff807`4450eb38 : 00000000`00000000 ffffa00e`f7367950 00000000`00000000 00000000`2c6ab000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x185
ffff8183`14bf4b10 fffff807`4450dd13 : ffffa00e`f7367950 ffffa00e`f8c724f0 ffff8183`14bf4d70 00000000`2aaab000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x9c8
ffff8183`14bf4cb0 fffff807`444fc510 : ffff8800`00962701 ffffa00e`fac27cf0 00000000`2aaab000 fffff807`00000003 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2e3
ffff8183`14bf4e20 fffff807`44521b15 : 00000000`9caeb000 ffff8183`14bf4fa0 ffffe30b`32a47000 00000000`0f000000 : dxgmms2!VIDMM_PAGING_PROCESS::MapScratchAreaVaRange+0x14c
ffff8183`14bf4ea0 fffff807`445218cf : ffffa00e`fac27cf0 00000000`00000000 00000000`00000003 ffffe30b`32a47000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferUsingGpuVaWorker+0x21d
ffff8183`14bf5130 fffff807`4452171c : ffffa00f`13c19910 00000000`00000000 ffffa00e`fac27cf0 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferInternal+0x127
ffff8183`14bf5330 fffff807`4455eb7f : 00000000`2aaab000 ffff8183`14bf5410 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransfer+0x88
ffff8183`14bf53a0 fffff807`44545ffd : 00000000`00000000 00000000`7204000d 00000000`72040000 ffffe30b`2ea11c50 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemorySlow+0x237
ffff8183`14bf5450 fffff807`444fb7cd : 00000000`00000000 ffffe30b`32a47000 00000000`00000000 ffffa00e`fac27cf0 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemory+0x24c09
ffff8183`14bf54a0 fffff807`444fb3c2 : ffffa00f`03969df8 ffffa00f`03969cb0 ffffe30b`32a47ea8 ffffe30b`32a47ea8 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferToSegment+0x22d
ffff8183`14bf5610 fffff807`4450c99f : ffffe30b`3491d410 ffffe30b`32a47000 00000000`00000000 ffffa00e`fac27cf0 : dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0x62
ffff8183`14bf5660 fffff807`44517eb2 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1ef
ffff8183`14bf5770 fffff807`44527da4 : 00000000`00000001 00000000`00989680 ffffa00f`15d1f1d0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x862
ffff8183`14bf59e0 fffff807`44526ee9 : ffffa00e`f89fad10 fffff807`36991401 ffffe30b`3287e600 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4
ffff8183`14bf5be0 fffff807`3652a7a5 : ffffe30b`3287e680 fffff807`44526ee0 ffffa00e`f89fad10 00000067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8183`14bf5c10 fffff807`365c8b2a : fffff807`342fd180 ffffe30b`3287e680 fffff807`3652a750 0039007b`ffffffa8 : nt!PspSystemThreadStartup+0x55
ffff8183`14bf5c60 00000000`00000000 : ffff8183`14bf6000 ffff8183`14bf0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+f4

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  f4

FAILURE_BUCKET_ID:  AV_R_INVALID_dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f9c6c20c-c4a8-7477-c72d-7aebe9a8592c}

Followup:     MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff83046fc6a000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8036ce70224, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 4

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 9

Key : Analysis.Memory.CommitPeak.Mb
Value: 70

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffff83046fc6a000

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8036ce70224

BUGCHECK_P4: 0

READ_ADDRESS: fffff8035a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035a82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8035a82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff83046fc6a000

MM_INTERNAL_CODE: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME:  fffff40a08f92b40 -- (.trap 0xfffff40a08f92b40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffff83046eef6be0
rdx=ffff83046fc68cd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036ce70224 rsp=fffff40a08f92cd0 rbp=0000000000000051
r8=fffff40a08f93030 r9=0000000000001330 r10=0000000000083b89
r11=ffff83046fc68cd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4:
fffff803`6ce70224 42843c0a test byte ptr [rdx+r9],dil ds:ffff8304`6fc6a000=??
Resetting default scope

STACK_TEXT:
fffff40a`08f92898 fffff803`5a5e3863 : 00000000`00000050 ffff8304`6fc6a000 00000000`00000000 fffff40a`08f92b40 : nt!KeBugCheckEx
fffff40a`08f928a0 fffff803`5a472eef : 00000000`00000110 00000000`00000000 00000000`00000000 ffff8304`6fc6a000 : nt!MiSystemFault+0x1d6af3
fffff40a`08f929a0 fffff803`5a5cf520 : fffff40a`08f92bd0 fffff803`5a5cf64e 00000000`00000200 fffff803`5a5cf64e : nt!MmAccessFault+0x34f
fffff40a`08f92b40 fffff803`6ce70224 : 00000000`0003c400 ffff8304`6eef6be0 00000000`00000200 fffff803`6ce6fe35 : nt!KiPageFault+0x360
fffff40a`08f92cd0 fffff803`6ce6fe35 : 00000000`00000000 00000000`00000000 fffff40a`08f93030 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4
fffff40a`08f92cf0 fffff803`6ce6eb38 : 00000000`00000000 ffff8304`6c626c90 00000000`00000000 00000000`15556000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x185
fffff40a`08f92dd0 fffff803`6ce6dd13 : ffff8304`6c626c90 ffff8304`6ee73d10 fffff40a`08f93030 00000000`15556000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x9c8
fffff40a`08f92f70 fffff803`6ce5c510 : 00000000`7cf49101 ffff8304`7b00fd50 00000000`15556000 00000000`00000003 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2e3
fffff40a`08f930e0 fffff803`6ce81ab1 : 00000000`15556000 fffff40a`08f93260 ffff9388`eae36000 00000000`0f000000 : dxgmms2!VIDMM_PAGING_PROCESS::MapScratchAreaVaRange+0x14c
fffff40a`08f93160 fffff803`6ce818cf : ffff8304`7b00fd50 fffff2fc`00000000 fffff2f9`00000003 ffff9388`eae36000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferUsingGpuVaWorker+0x1b9
fffff40a`08f933f0 fffff803`6ce8171c : ffff8304`8d16f210 00000000`00000000 ffff8304`7b00fd50 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferInternal+0x127
fffff40a`08f935f0 fffff803`6cebeb7f : 00000000`20000000 fffff40a`08f936d0 ffff9388`e7800000 ffff9388`e77a0000 : dxgmms2!VIDMM_GLOBAL::MemoryTransfer+0x88
fffff40a`08f93660 fffff803`6cea5ffd : ffff8304`7b00fd00 00000000`6e50000d 00000000`6e500000 ffff9388`e9108c80 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemorySlow+0x237
fffff40a`08f93710 fffff803`6ce90dc3 : ffff8304`7b00fd01 ffff8304`71484901 ffff8304`7b00fd50 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemory+0x24c09
fffff40a`08f93760 fffff803`6ce5ad11 : ffff8304`7b00fd50 ffff8304`00000000 ffff8304`00000001 ffff9388`eae36000 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferToSystem+0x35ddb
fffff40a`08f938f0 fffff803`6cec0bf3 : ffff9388`e9108d30 ffff8304`714849a0 ffff9388`eae36000 ffff8304`7b00fd50 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0xb1
fffff40a`08f93940 fffff803`6ceab502 : ffff8304`715dfd90 ffff9388`eae36000 ffff9388`e9108c80 ffff9388`e9108c80 : dxgmms2!VIDMM_SEGMENT::OldDefragment+0x47
fffff40a`08f93990 fffff803`6ce888b0 : 00000000`0000885c fffff40a`08f93ae0 ffff9388`e9108c80 00000001`451b2858 : dxgmms2!VIDMM_GLOBAL::Defragment+0x20a
fffff40a`08f939e0 fffff803`6ce86ee9 : ffff8304`6c794010 fffff803`5a991401 ffff9388`eac78600 00000000`00000001 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x19b0
fffff40a`08f93be0 fffff803`5a52a7a5 : ffff9388`eac78680 fffff803`6ce86ee0 ffff8304`6c794010 00000067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
fffff40a`08f93c10 fffff803`5a5c8b2a : fffff803`586f2180 ffff9388`eac78680 fffff803`5a52a750 00000001`00000001 : nt!PspSystemThreadStartup+0x55
fffff40a`08f93c60 00000000`00000000 : fffff40a`08f94000 fffff40a`08f8e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME: dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+f4

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION: 10.0.18362.449

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: f4

FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f9c6c20c-c4a8-7477-c72d-7aebe9a8592c}

Followup: MachineOwner
---------
Evet efendim ekran kartı aşırıdı derecede ısınıyordu PUBG'de 85 dereceye kadar çıkıyordu. Tabiki! İçinde 5 tane fan eksikti onları da yerleştirdim ancak sadece 78 79 dereceye kadar düşebildi. Bir de Ram'lerin Megahertz ayarını xmp ayarından profile 1: 2933mhz yerine profile 2: 2800mhz olarak değiştirdim şuan ram full dolu olsa bile mavi ekran vermiyor ancak yine takılmalar oluyor o kadar da olacak :D
 
İlla mavi ekran verecek diye bir kaide yok. Denilen testleri yapın ve o ısılar yüksek haberin olsun.
Aslında kimilerini gördüm 90 derece ile oynayan bu kartla yine testleri yapacağım merak etmeyin.
Testleri yaprım 1080p de kartım en fazla 75 78 dereceye kadar çıktı ve sıkıntı göremedim sorun güç kaynağından kaynaklanıyor olabilir mi? neden Ram'ler 2933 mhz deyken mavi ekran veriyor da 2800 mhz de vermiyor? Ram'ler ısındığı için mi bu olay başıma geliyor?
Recep abinin de dediği gibi hatanın ekran kartına işaret etmesi biraz kafamı karıştırdı.
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı