MEMORY_MANAGEMENT hatası almak

İşletim sistemi
Windows 10

efearda013

Hectopat
Katılım
6 Aralık 2022
Mesajlar
13
Daha fazla  
Cinsiyet
Erkek
RAM
Corsair Vengeance LPX 8 GB (1x8GB) DDR4 3000MHz C16, Kingston Beast 8 GB DDR4 3200MT/s CL16 ikisi de 3000 MHz de çalışıyor
Ekran kartı
RX580 8GB
Anakart
Gigabyte GA-A320M-H AMD A320
İşlemci
RYZEN 3 3100
Merhaba, bilgisayarım uzun zamandır bende ama son birkaç haftadır acayip mavi ekran yiyorum. Mavi ekran hatasında MEMORY_MANAGEMENT yazıyor bilenler bir yardım edebilir mi acaba?

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 Bit OS, parameter 2
Contains the address of the PFN for the corrupted page table page.
On a 32 Bit OS, parameter 2 contains a pointer to the number of used.
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: FFFF930002296560.
Arg3: 0000000000000000.
Arg4: 0000000000000001.
 

Dosya Ekleri

  • görsel_2025-12-26_143000248.png
    görsel_2025-12-26_143000248.png
    29,9 KB · Görüntüleme: 8
Minidump dosyası paylaşın, inceleyip kesin tahmin yapalım.
{Eğer Google Drive ile paylaşacaksanız herkese açık şekilde paylaşın.}
 
Minidump dosyası paylaşın, inceleyip kesin tahmin yapalım.
{Eğer Google Drive ile paylaşacaksanız herkese açık şekilde paylaşın.}

 
@efearda013, böyle direk klasörü kısayol atarsanız nasıl açayım ben? İnternet kafeden kısayolla oyun çekmek gibi. Minidump klasöründeki dosyaları seçip kopyalayın ve DMP uzantılı dosyaları masaüstündeki yeni klasöre atın öyle yükleyin Drive'a.
 
@efearda013, böyle direk klasörü kısayol atarsanız nasıl açayım ben? İnternet kafeden kısayolla oyun çekmek gibi. Minidump klasöründeki dosyaları seçip kopyalayın ve DMP uzantılı dosyaları masaüstündeki yeni klasöre atın öyle yükleyin Drive'a.
Çok üzgünüm bilmiyordum 2 adet link yaptım birisi direk rar olarak birisi de direkmen dmp dosyası

DMP: 122625-25062-01.dmp

RAR: Minidump.rar
 
Farklı bellekler kullanıyorsun, muhtemelen bir arada stabil çalışmıyorlar. Bu programda aşağıdan sırayla bellekleri seçip ekran görüntüsü paylaşırsan bir bakayım.

1766757983837.png
Böyle bir hata alıyorum zentimingsi kurarken
 
RAM testi yapın MemTest86 ile. Sonra da sonucu atın. HTML dosyası oluşacaktır rapor şeklinde flash bellekte MemTest işlemi bittikten sonra. Onu atabilirsiniz veya işlem sonunda PASS veya FAIL yazar, onun fotoğrafını atabilirsiniz. Bu arada MemTest işlemini RAM'leri teker teker takıp yapabilirsiniz isteğe bağlı. 2 RAM'e de ayrı ayrı test yapabilirsiniz yani.

RAM'ler birbiriyle düzgün çalışamıyor da olabilir. Bunu test etmek için de sadece 1 RAM takılıyken deneyin sistemi. Teker teker yani.

DDU ile ekran kartı sürücüsünü de temizleyip ekran kartının sitesinden yeniden kurun. dxgmms2.sys hata vermiş, ekran kartıyla ilgili bir şeydir bu.

İşlemlerden sonra dönüş yapın.

Hata kodlarını da başkalarına yardımcı olmasına yardımcı olması vesilesiyle bırakıyorum.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff930002296560
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1125

    Key  : Analysis.Elapsed.mSec
    Value: 5591

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 1

    Key  : Analysis.Init.CPU.mSec
    Value: 843

    Key  : Analysis.Init.Elapsed.mSec
    Value: 17281

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29482.1003

    Key  : Analysis.Version.Description
    Value: 10.2509.29.03 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2509.29.3

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Bugcheck.Code.TargetModel
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 0x8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit

    Key  : Failure.Hash
    Value: {b4dd6f57-8ae8-5c62-c567-a68fe02d924e}

    Key  : WER.System.BIOSRevision
    Value: 5.14.0.0


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff930002296560

BUGCHECK_P3: 0

BUGCHECK_P4: 1

FILE_IN_CAB:  122625-25062-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffffe70a5a9d0040

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RocketLeague.e

STACK_TEXT:
ffffc288`a34f39e8 fffff801`77a73a77     : 00000000`0000001a 00000000`00041790 ffff9300`02296560 00000000`00000000 : nt!KeBugCheckEx
ffffc288`a34f39f0 fffff801`779f3c90     : 00000000`00000001 00000000`00000000 00000000`00000001 0000024e`c1d2b000 : nt!MiDecreaseUsedPtesCount+0x1590c3
ffffc288`a34f3a30 fffff801`778b5e43     : ffffe70a`5c4c7700 ffffe70a`5c4c7700 ffffc288`00000002 fffffa7d`0093b070 : nt!MiReducePteUseCount+0x30
ffffc288`a34f3a60 fffff801`77c3bd8d     : ffffe70a`5a9d0040 ffffe70a`65297c28 00000000`00000001 00000000`00000000 : nt!MiDecommitPages+0xf93
ffffc288`a34f4630 fffff801`77c3b3f3     : ffffc288`a34f47b0 00000000`00000000 ffffc288`a34f47b0 ffffe70a`65297c00 : nt!MiDecommitRegion+0x7d
ffffc288`a34f46b0 fffff801`77c3ace5     : ffffc288`a34f4818 ffffe70a`5a9d0040 ffffc288`a34f4960 00000000`00000000 : nt!MmFreeVirtualMemory+0x6d3
ffffc288`a34f4800 fffff801`77a11508     : ffffe70a`5a9d0040 ffffc288`a34f4ac0 ffff9d83`15759880 00000000`00000001 : nt!NtFreeVirtualMemory+0x95
ffffc288`a34f4860 fffff801`77a023b0     : fffff801`f27996b0 ffffe70a`5fbddea0 ffffe70a`5fbdd8a0 00000000`00000100 : nt!KiSystemServiceCopyEnd+0x28
ffffc288`a34f49f8 fffff801`f27996b0     : ffffe70a`5fbddea0 ffffe70a`5fbdd8a0 00000000`00000100 fffff801`f2795a83 : nt!KiServiceLinkage
ffffc288`a34f4a00 fffff801`f27948f2     : 00000000`002cc000 ffff9d83`25c30b48 ffff9d83`0b706ba0 ffffe70a`5fbdd8a0 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
ffffc288`a34f4a50 fffff801`f279471a     : fffff801`00000000 ffffe70a`5fbdd8a0 00000000`00000000 fffff801`78325440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffffc288`a34f4ac0 fffff801`f2794691     : fffff801`78325440 fffff801`782248e8 00000000`00000000 00000000`00000100 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
ffffc288`a34f4b40 fffff801`778418f5     : ffffe70a`5a9d0040 fffff801`77c2b380 ffffe70a`500acb50 ffffe70a`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
ffffc288`a34f4b70 fffff801`7795d6e5     : ffffe70a`5a9d0040 00000000`00000080 ffffe70a`50089040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc288`a34f4c10 fffff801`77a065c8     : ffffd581`7295d180 ffffe70a`5a9d0040 fffff801`7795d690 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc288`a34f4c60 00000000`00000000     : ffffc288`a34f5000 ffffc288`a34ef000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+160

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.6456

STACK_COMMAND: .process /r /p 0xffffe70a50089040; .thread 0xffffe70a5a9d0040 ; kb

BUCKET_ID_FUNC_OFFSET:  160

FAILURE_BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b4dd6f57-8ae8-5c62-c567-a68fe02d924e}


Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe7bffda9b158
Arg3: 0000000004000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1125

    Key  : Analysis.Elapsed.mSec
    Value: 3505

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 750

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19436

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29482.1003

    Key  : Analysis.Version.Description
    Value: 10.2509.29.03 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2509.29.3

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Bugcheck.Code.TargetModel
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 0x8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: MEMORY_CORRUPTION_ONE_BIT

    Key  : Failure.Hash
    Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

    Key  : MemoryManagement.PFN
    Value: 0x4000

    Key  : WER.System.BIOSRevision
    Value: 5.14.0.0


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffe7bffda9b158

BUGCHECK_P3: 4000000

BUGCHECK_P4: 0

FILE_IN_CAB:  122625-25203-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffff8506c5454080

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT:
fffff107`b7e21d48 fffff806`686b964a     : 00000000`0000001a 00000000`00041792 ffffe7bf`fda9b158 00000000`04000000 : nt!KeBugCheckEx
fffff107`b7e21d50 fffff806`6860c4d6     : 00000000`00000000 00000000`00000000 00000000`0000003c ffffe7bf`fda9b158 : nt!MiDeleteVa+0x153a
fffff107`b7e21e50 fffff806`6860c5eb     : ffffe7f3`dffed4d8 ffff8506`bd9aa700 fffff107`00000000 fffff107`b7e222c0 : nt!MiWalkPageTablesRecursively+0x776
fffff107`b7e21ef0 fffff806`6860c5eb     : ffffe7f3`f9efff68 ffff8506`bd9aa700 fffff107`00000001 fffff107`b7e222d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff107`b7e21f90 fffff806`6860c5eb     : ffffe7f3`f9eff000 ffff8506`bd9aa700 fffff107`00000002 fffff107`b7e222e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff107`b7e22030 fffff806`686095eb     : 00000000`00000000 ffff8506`bd9aa700 00000000`00000003 fffff107`b7e222f0 : nt!MiWalkPageTablesRecursively+0x88b
fffff107`b7e220d0 fffff806`686b7ee1     : fffff107`b7e22270 ffff8506`00000000 ffff8506`00000002 fffff806`00000000 : nt!MiWalkPageTables+0x36b
fffff107`b7e221d0 fffff806`6861c328     : 00000000`00000001 ffff8506`00000000 ffff8506`bd9aa550 ffff8506`c5454080 : nt!MiDeletePagablePteRange+0x4f1
fffff107`b7e224e0 fffff806`68a1e889     : ffff8506`00000000 00000000`00000000 ffff8506`00000000 ffff8506`bd9aa080 : nt!MiDeleteVad+0x378
fffff107`b7e225e0 fffff806`68a1ece8     : ffff8506`bf39cea0 ffff8506`baaf4d40 ffff8506`c5454080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff107`b7e22610 fffff806`68a38aa3     : ffff8506`bf39f060 ffff8506`bf39f060 ffff8506`bf39cea0 ffff8506`bd9aa080 : nt!MiCleanVad+0x30
fffff107`b7e22640 fffff806`68a04944     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8506`bd9aa080 : nt!MmCleanProcessAddressSpace+0x137
fffff107`b7e226c0 fffff806`68ac3bee     : ffff8506`bd9aa080 ffffc10c`4e39f5f0 fffff107`b7e228e9 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffff107`b7e22750 fffff806`68a88708     : 00000000`c0000005 00000000`00000001 00000000`00000000 0000005a`52b06000 : nt!PspExitThread+0x5f6
fffff107`b7e22850 fffff806`6864a6cd     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff107`b7e22890 fffff806`68802c60     : 00000894`00023570 fffff107`b7e22950 fffff107`b7e22b00 00000000`00000000 : nt!KiDeliverApc+0x60d
fffff107`b7e22950 fffff806`688115af     : 00000000`00000000 00000000`00000000 00000000`00000438 fffff806`68a68e20 : nt!KiInitiateUserApc+0x70
fffff107`b7e22a90 00007ffc`101ca124     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000005a`5cbffad8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`101ca124


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND: .process /r /p 0xffff8506bd9aa080; .thread 0xffff8506c5454080 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}
 
RAM testi yapın MemTest86 ile. Sonra da sonucu atın. HTML dosyası oluşacaktır rapor şeklinde flash bellekte MemTest işlemi bittikten sonra. Onu atabilirsiniz veya işlem sonunda PASS veya FAIL yazar, onun fotoğrafını atabilirsiniz. Bu arada MemTest işlemini RAM'leri teker teker takıp yapabilirsiniz isteğe bağlı. 2 RAM'e de ayrı ayrı test yapabilirsiniz yani.

RAM'ler birbiriyle düzgün çalışamıyor da olabilir. Bunu test etmek için de sadece 1 RAM takılıyken deneyin sistemi. Teker teker yani.

DDU ile ekran kartı sürücüsünü de temizleyip ekran kartının sitesinden yeniden kurun. dxgmms2.sys hata vermiş, ekran kartıyla ilgili bir şeydir bu.

İşlemlerden sonra dönüş yapın.

Hata kodlarını da başkalarına yardımcı olmasına yardımcı olması vesilesiyle bırakıyorum.

Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff930002296560
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1125

    Key  : Analysis.Elapsed.mSec
    Value: 5591

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 1

    Key  : Analysis.Init.CPU.mSec
    Value: 843

    Key  : Analysis.Init.Elapsed.mSec
    Value: 17281

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29482.1003

    Key  : Analysis.Version.Description
    Value: 10.2509.29.03 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2509.29.3

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Bugcheck.Code.TargetModel
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 0x8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit

    Key  : Failure.Hash
    Value: {b4dd6f57-8ae8-5c62-c567-a68fe02d924e}

    Key  : WER.System.BIOSRevision
    Value: 5.14.0.0


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff930002296560

BUGCHECK_P3: 0

BUGCHECK_P4: 1

FILE_IN_CAB:  122625-25062-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffffe70a5a9d0040

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  RocketLeague.e

STACK_TEXT:
ffffc288`a34f39e8 fffff801`77a73a77     : 00000000`0000001a 00000000`00041790 ffff9300`02296560 00000000`00000000 : nt!KeBugCheckEx
ffffc288`a34f39f0 fffff801`779f3c90     : 00000000`00000001 00000000`00000000 00000000`00000001 0000024e`c1d2b000 : nt!MiDecreaseUsedPtesCount+0x1590c3
ffffc288`a34f3a30 fffff801`778b5e43     : ffffe70a`5c4c7700 ffffe70a`5c4c7700 ffffc288`00000002 fffffa7d`0093b070 : nt!MiReducePteUseCount+0x30
ffffc288`a34f3a60 fffff801`77c3bd8d     : ffffe70a`5a9d0040 ffffe70a`65297c28 00000000`00000001 00000000`00000000 : nt!MiDecommitPages+0xf93
ffffc288`a34f4630 fffff801`77c3b3f3     : ffffc288`a34f47b0 00000000`00000000 ffffc288`a34f47b0 ffffe70a`65297c00 : nt!MiDecommitRegion+0x7d
ffffc288`a34f46b0 fffff801`77c3ace5     : ffffc288`a34f4818 ffffe70a`5a9d0040 ffffc288`a34f4960 00000000`00000000 : nt!MmFreeVirtualMemory+0x6d3
ffffc288`a34f4800 fffff801`77a11508     : ffffe70a`5a9d0040 ffffc288`a34f4ac0 ffff9d83`15759880 00000000`00000001 : nt!NtFreeVirtualMemory+0x95
ffffc288`a34f4860 fffff801`77a023b0     : fffff801`f27996b0 ffffe70a`5fbddea0 ffffe70a`5fbdd8a0 00000000`00000100 : nt!KiSystemServiceCopyEnd+0x28
ffffc288`a34f49f8 fffff801`f27996b0     : ffffe70a`5fbddea0 ffffe70a`5fbdd8a0 00000000`00000100 fffff801`f2795a83 : nt!KiServiceLinkage
ffffc288`a34f4a00 fffff801`f27948f2     : 00000000`002cc000 ffff9d83`25c30b48 ffff9d83`0b706ba0 ffffe70a`5fbdd8a0 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
ffffc288`a34f4a50 fffff801`f279471a     : fffff801`00000000 ffffe70a`5fbdd8a0 00000000`00000000 fffff801`78325440 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffffc288`a34f4ac0 fffff801`f2794691     : fffff801`78325440 fffff801`782248e8 00000000`00000000 00000000`00000100 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::CurationThread+0x7a
ffffc288`a34f4b40 fffff801`778418f5     : ffffe70a`5a9d0040 fffff801`77c2b380 ffffe70a`500acb50 ffffe70a`00000000 : dxgmms2!VidMmRangeCurationThread+0x11
ffffc288`a34f4b70 fffff801`7795d6e5     : ffffe70a`5a9d0040 00000000`00000080 ffffe70a`50089040 00000000`00000000 : nt!ExpWorkerThread+0x105
ffffc288`a34f4c10 fffff801`77a065c8     : ffffd581`7295d180 ffffe70a`5a9d0040 fffff801`7795d690 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc288`a34f4c60 00000000`00000000     : ffffc288`a34f5000 ffffc288`a34ef000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+160

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.6456

STACK_COMMAND: .process /r /p 0xffffe70a50089040; .thread 0xffffe70a5a9d0040 ; kb

BUCKET_ID_FUNC_OFFSET:  160

FAILURE_BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b4dd6f57-8ae8-5c62-c567-a68fe02d924e}


Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffe7bffda9b158
Arg3: 0000000004000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1125

    Key  : Analysis.Elapsed.mSec
    Value: 3505

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 750

    Key  : Analysis.Init.Elapsed.mSec
    Value: 19436

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.Version.DbgEng
    Value: 10.0.29482.1003

    Key  : Analysis.Version.Description
    Value: 10.2509.29.03 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2509.29.3

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x1a

    Key  : Bugcheck.Code.TargetModel
    Value: 0x1a

    Key  : Dump.Attributes.AsUlong
    Value: 0x8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Failure.Bucket
    Value: MEMORY_CORRUPTION_ONE_BIT

    Key  : Failure.Hash
    Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

    Key  : MemoryManagement.PFN
    Value: 0x4000

    Key  : WER.System.BIOSRevision
    Value: 5.14.0.0


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffe7bffda9b158

BUGCHECK_P3: 4000000

BUGCHECK_P4: 0

FILE_IN_CAB:  122625-25203-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffff8506c5454080

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

STACK_TEXT:
fffff107`b7e21d48 fffff806`686b964a     : 00000000`0000001a 00000000`00041792 ffffe7bf`fda9b158 00000000`04000000 : nt!KeBugCheckEx
fffff107`b7e21d50 fffff806`6860c4d6     : 00000000`00000000 00000000`00000000 00000000`0000003c ffffe7bf`fda9b158 : nt!MiDeleteVa+0x153a
fffff107`b7e21e50 fffff806`6860c5eb     : ffffe7f3`dffed4d8 ffff8506`bd9aa700 fffff107`00000000 fffff107`b7e222c0 : nt!MiWalkPageTablesRecursively+0x776
fffff107`b7e21ef0 fffff806`6860c5eb     : ffffe7f3`f9efff68 ffff8506`bd9aa700 fffff107`00000001 fffff107`b7e222d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff107`b7e21f90 fffff806`6860c5eb     : ffffe7f3`f9eff000 ffff8506`bd9aa700 fffff107`00000002 fffff107`b7e222e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff107`b7e22030 fffff806`686095eb     : 00000000`00000000 ffff8506`bd9aa700 00000000`00000003 fffff107`b7e222f0 : nt!MiWalkPageTablesRecursively+0x88b
fffff107`b7e220d0 fffff806`686b7ee1     : fffff107`b7e22270 ffff8506`00000000 ffff8506`00000002 fffff806`00000000 : nt!MiWalkPageTables+0x36b
fffff107`b7e221d0 fffff806`6861c328     : 00000000`00000001 ffff8506`00000000 ffff8506`bd9aa550 ffff8506`c5454080 : nt!MiDeletePagablePteRange+0x4f1
fffff107`b7e224e0 fffff806`68a1e889     : ffff8506`00000000 00000000`00000000 ffff8506`00000000 ffff8506`bd9aa080 : nt!MiDeleteVad+0x378
fffff107`b7e225e0 fffff806`68a1ece8     : ffff8506`bf39cea0 ffff8506`baaf4d40 ffff8506`c5454080 00000000`00000000 : nt!MiUnmapVad+0x49
fffff107`b7e22610 fffff806`68a38aa3     : ffff8506`bf39f060 ffff8506`bf39f060 ffff8506`bf39cea0 ffff8506`bd9aa080 : nt!MiCleanVad+0x30
fffff107`b7e22640 fffff806`68a04944     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8506`bd9aa080 : nt!MmCleanProcessAddressSpace+0x137
fffff107`b7e226c0 fffff806`68ac3bee     : ffff8506`bd9aa080 ffffc10c`4e39f5f0 fffff107`b7e228e9 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
fffff107`b7e22750 fffff806`68a88708     : 00000000`c0000005 00000000`00000001 00000000`00000000 0000005a`52b06000 : nt!PspExitThread+0x5f6
fffff107`b7e22850 fffff806`6864a6cd     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff107`b7e22890 fffff806`68802c60     : 00000894`00023570 fffff107`b7e22950 fffff107`b7e22b00 00000000`00000000 : nt!KiDeliverApc+0x60d
fffff107`b7e22950 fffff806`688115af     : 00000000`00000000 00000000`00000000 00000000`00000438 fffff806`68a68e20 : nt!KiInitiateUserApc+0x70
fffff107`b7e22a90 00007ffc`101ca124     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
0000005a`5cbffad8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`101ca124


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND: .process /r /p 0xffff8506bd9aa080; .thread 0xffff8506c5454080 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Memtest86 yı yaptım ama html dosyası flash dan dolayı sanırım yüklenmedi ama bi kaç tane resim var html aşırı önemli ise yeni bi flash bellek alıp tekrar test edebilirim
 

Dosya Ekleri

  • IMG_1792.jpeg
    IMG_1792.jpeg
    109,8 KB · Görüntüleme: 6
  • IMG_1791.jpeg
    IMG_1791.jpeg
    178,6 KB · Görüntüleme: 6
  • IMG_1790.jpeg
    IMG_1790.jpeg
    252,2 KB · Görüntüleme: 6

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı