MEMORY_MANAGEMENT Mavi Ekran Hataları

achilles132

Hectopat
Katılım
7 Ekim 2017
Mesajlar
52
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Dün uzun zamandır oynamadığım PUBG oynayayım dedim ve mavi ekran hatası verdi oyun ortasında. Bilgisayarı yeniden başlattım oyuna girdim, oyun ortasında yine mavi ekran hatası verdi. Sonra sistemi yeniden başlattım PC açıldıktan sonra görev yöneticisi açmaya çalışırken yine mavi ekran hatası aldım.
Mavi ekran hatalarının sebepleri hepsi farklıydı. PC'yi 1 yıldır kullanıyorum ve hiç hata almamıştım. Son aldığım hatada mavi ekranda kulaklıktan tınnn diye sabit ve uzun süreli ses geldi.
  1. Memtest86 ile iki RAM'leri de ayrı ayrı test ettim Error sayısı 0.
  2. Furmark testinde ekran kartım max 61 derece görüyor.
  3. İşlemci stres testinde 3,0 GHz Base'den 3,7 GHz OC de stres altında max 52 derece görüyor.
Aldığım Hatalar;
  • system thread exception not handled
  • kmode exception not handled
  • memory management
Sistemim:
  • Ryzen 7 1700
  • GIGA AX370 GAMING 5
  • ASUS STRIX GTX1070 OC
  • CORSAIR 32GB(16GBx2) 3000MHz
  • Samsung Evo 960 256 GB
  • MasterLiquid 120
DUMP Dosyası:
 
Son düzenleyen: Moderatör:
BIOS'u F25 sürümüne günceller misiniz?

Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8038d1b62cd, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME: AX370-Gaming 5

SYSTEM_SKU: Default string

SYSTEM_VERSION: Default string

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: F23

BIOS_DATE: 08/08/2018

BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT: AX370-Gaming 5

BASEBOARD_VERSION: Default string

DUMP_TYPE: 2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8038d1b62cd

BUGCHECK_P3: 0

BUGCHECK_P4: ffffffffffffffff

READ_ADDRESS: fffff8038d452388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!SwapContext+2bd
fffff803`8d1b62cd 0fc719 xrstors [rcx]

EXCEPTION_PARAMETER2: ffffffffffffffff

BUGCHECK_STR: 0x1E_c0000005_R

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: dllhost.exe

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 01-28-2019 20:45:01.0265

ANALYSIS_VERSION: 10.0.18303.1000 amd64fre

EXCEPTION_RECORD:  000000000000027f -- (.exr 0x27f)
Cannot read Exception record @ 000000000000027f

LAST_CONTROL_TRANSFER: from fffff8038d0c59ad to fffff8038d1af0a0

STACK_TEXT:
ffffb68c`f1644958 fffff803`8d0c59ad : 00000000`0000001e ffffffff`c0000005 fffff803`8d1b62cd 00000000`00000000 : nt!KeBugCheckEx
ffffb68c`f1644960 fffff803`8d1bfd42 : 00000000`0000027f 00000000`00000000 00000000`00000000 0002ffff`00001f80 : nt!KiDispatchException+0x58d
ffffb68c`f1645010 fffff803`8d1bc49c : 00005c00`00000000 00000600`00000000 0000f300`00000000 0000f800`00000000 : nt!KiExceptionDispatch+0xc2
ffffb68c`f16451f0 fffff803`8d1b62cd : ffff3f80`1a421180 ffff3a80`1a431400 0000fc00`00000000 00001800`00000000 : nt!KiGeneralProtectionFault+0x2dc
ffffb68c`f1645380 fffff303`8d1b5d46 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext+0x2bd
ffffb68c`f16453c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffff303`8d1b5d46


THREAD_SHA1_HASH_MOD_FUNC: 4bafef5224e4e4de236896b191e27930d24dfadd

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 229db4d9976b182062648040fdf70dd1cd9b8fe2

THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt!SwapContext+2bd
fffff803`8d1b62cd 0fc719 xrstors [rcx]

FAULT_INSTR_CODE: eb19c70f

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: nt!SwapContext+2bd

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 5c2b0c3d

IMAGE_VERSION: 10.0.17134.523

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 2bd

FAILURE_BUCKET_ID: 0x1E_c0000005_R_nt!SwapContext

BUCKET_ID: 0x1E_c0000005_R_nt!SwapContext

PRIMARY_PROBLEM_CLASS: 0x1E_c0000005_R_nt!SwapContext

TARGET_TIME: 2019-01-27T14:38:00.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 11df2

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1e_c0000005_r_nt!swapcontext

FAILURE_ID_HASH: {0538fb4b-ed77-9787-a8df-20ada630ff74}

Followup: MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff700000a2040
Arg3: 0000360000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME: AX370-Gaming 5

SYSTEM_SKU: Default string

SYSTEM_VERSION: Default string

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: F23

BIOS_DATE: 08/08/2018

BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT: AX370-Gaming 5

BASEBOARD_VERSION: Default string

DUMP_TYPE: 2

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff700000a2040

BUGCHECK_P3: 360000000000

BUGCHECK_P4: 0

BUGCHECK_STR: 0x1a_41792

CPU_COUNT: 10

CPU_MHZ: e6d

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: BroCrashRep

CURRENT_IRQL: 2

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 01-28-2019 20:45:03.0681

ANALYSIS_VERSION: 10.0.18303.1000 amd64fre

LAST_CONTROL_TRANSFER: from fffff8008def085a to fffff8008e0490a0

STACK_TEXT:
ffff9e8b`3583df98 fffff800`8def085a : 00000000`0000001a 00000000`00041792 fffff700`000a2040 00003600`00000000 : nt!KeBugCheckEx
ffff9e8b`3583dfa0 fffff800`8deed6d9 : 00000000`00000000 00003600`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x15ba
ffff9e8b`3583e0c0 fffff800`8deedae2 : ffff9e8b`3583e690 fffff700`000a2040 ffff9e8b`00000000 ffff9e8b`00000000 : nt!MiWalkPageTablesRecursively+0x299
ffff9e8b`3583e1a0 fffff800`8deedae2 : ffff9e8b`3583e690 fffff77b`80000510 ffff9e8b`00000001 ffff9e8b`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff9e8b`3583e280 fffff800`8deedae2 : ffff9e8b`3583e690 fffff77b`bdc00000 ffff9e8b`00000002 ffff9e8b`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff9e8b`3583e360 fffff800`8deeb7e7 : ffff9e8b`3583e690 fffff77b`bddee000 ffff851c`00000003 ffffb405`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffff9e8b`3583e440 fffff800`8ded5ef3 : ffff9e8b`3583e690 ffffb405`00000001 ffffb405`00000000 ffffb405`00000000 : nt!MiWalkPageTables+0x1e7
ffff9e8b`3583e530 fffff800`8e358b65 : ffffb405`de794700 ffffb405`00000000 ffffb405`d46324d0 ffffb405`de794700 : nt!MiDeleteVad+0x8d3
ffff9e8b`3583e860 fffff800`8e358987 : ffffb405`dc863100 ffffb405`dc863100 ffffb405`d46324d0 ffffb405`d43a2980 : nt!MiCleanVad+0x4d
ffff9e8b`3583e890 fffff800`8e346339 : ffffffff`00000000 ffffffff`ffffffff ffff9e8b`3583eb01 ffffb405`d43a2480 : nt!MmCleanProcessAddressSpace+0x11f
ffff9e8b`3583e910 fffff800`8e354d8c : ffffb405`d43a2480 ffffa00b`55516060 ffff9e8b`3583eb80 00000000`00000000 : nt!PspRundownSingleProcess+0x129
ffff9e8b`3583e990 fffff800`8e419c8b : 00000000`00000000 ffff9e8b`3583eb01 00000000`004ed000 ffffb405`de794700 : nt!PspExitThread+0x5ac
ffff9e8b`3583ea90 fffff800`8e059743 : ffffb405`00001338 ffffb405`de794700 ffffb405`d43a2480 00000000`00000000 : nt!NtTerminateProcess+0xeb
ffff9e8b`3583eb00 00007ffb`99aaaf24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`003bf5c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`99aaaf24


THREAD_SHA1_HASH_MOD_FUNC: efc1eb0d927f56954ae38ab97099bbcdaa5c8f3b

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fb06e88b485fe33f0d970a4c0981ae0fb682abd0

THREAD_SHA1_HASH_MOD: 7f608ac2fbce9034a3386b1d51652e4911d30234

FOLLOWUP_IP:
nt!MiDeleteVa+15ba
fffff800`8def085a cc int 3

FAULT_INSTR_CODE: c38b4ccc

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt!MiDeleteVa+15ba

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5c2b0c3d

IMAGE_VERSION: 10.0.17134.523

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 15ba

FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa

BUCKET_ID: 0x1a_41792_nt!MiDeleteVa

PRIMARY_PROBLEM_CLASS: 0x1a_41792_nt!MiDeleteVa

TARGET_TIME: 2019-01-27T15:02:26.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 9720

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x1a_41792_nt!mideleteva

FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup: MachineOwner
---------



IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80057b05cbf, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME: AX370-Gaming 5

SYSTEM_SKU: Default string

SYSTEM_VERSION: Default string

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: F25

BIOS_DATE: 01/16/2019

BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT: AX370-Gaming 5

BASEBOARD_VERSION: Default string

DUMP_TYPE: 2

BUGCHECK_P1: 10

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80057b05cbf

READ_ADDRESS: fffff80057ee8388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000010

CURRENT_IRQL: 2

FAULTING_IP:
nt!MiInsertPageInFreeOrZeroedList+29f
fffff800`57b05cbf 49034510 add rax,qword ptr [r13+10h]

CPU_COUNT: 10

CPU_MHZ: bb2

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

ANALYSIS_SESSION_HOST: DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME: 01-28-2019 20:44:58.0131

ANALYSIS_VERSION: 10.0.18303.1000 amd64fre

TRAP_FRAME:  fffff60991987120 -- (.trap 0xfffff60991987120)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000008
rdx=fe3fffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80057b05cbf rsp=fffff609919872b0 rbp=0000000000000201
r8=0000000000000003 r9=8000000000000000 r10=fffffb8000005040
r11=fffff880058e00c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr ac po nc
nt!MiInsertPageInFreeOrZeroedList+0x29f:
fffff800`57b05cbf 49034510 add rax,qword ptr [r13+10h] ds:00000000`00000010=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80057c55c69 to fffff80057c450a0

STACK_TEXT:
fffff609`91986fd8 fffff800`57c55c69 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff609`91986fe0 fffff800`57c528e5 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff609`91987219 : nt!KiBugCheckDispatch+0x69
fffff609`91987120 fffff800`57b05cbf : fffff609`91987450 fffff609`91987450 ffff9d88`00000001 fffff609`919873c0 : nt!KiPageFault+0x425
fffff609`919872b0 fffff800`57b03452 : 00000000`001da003 fffff880`058e0090 00000000`00000000 9d889850`00000004 : nt!MiInsertPageInFreeOrZeroedList+0x29f
fffff609`919873b0 fffff800`57b17865 : ffffce0c`00000011 fffff609`00000001 00000000`00000000 fffff800`00000000 : nt!MiInsertLargePageInFreeOrZeroList+0x4a2
fffff609`91987590 fffff800`57b17660 : 00000000`00000200 fffff800`57e69f40 00000000`00000320 00000000`00000032 : nt!MiDemoteLocalLargePage+0x195
fffff609`91987660 fffff800`57af2507 : 00000000`00000000 00000000`00000202 fffff800`57d936b0 00000000`00000202 : nt!MiGetFreeOrZeroPageAnyColor+0x60
fffff609`919876a0 fffff800`57f6345d : fffff800`57e69f40 ffff9d88`00000032 00000000`00000200 0a000001`00000000 : nt!MiGetPage+0x5f7
fffff609`91987770 fffff800`57fb2d4d : 00000000`00000000 ffff9d88`904d2850 ffff9d88`9055b040 00000000`00000000 : nt!MiPfPrepareSequentialReadList+0x2ed
fffff609`91987840 fffff800`57b7f3d0 : 00000000`092c0000 fffff800`57ac1080 00000000`00000000 00000000`00000000 : nt!MmPrefetchForCacheManager+0x75
fffff609`919878a0 fffff800`57ac12fb : 00000000`00000000 fffff800`57ac1080 00000000`00000000 ffff9d88`9059d2b0 : nt!CcPerformReadAhead+0x2d4
fffff609`91987a60 fffff800`57b50b05 : 00000000`00000000 ffff9d88`9055b040 ffff9d88`9043a0f0 ffff9d88`9043a0f0 : nt!CcWorkerThread+0x27b
fffff609`91987b80 fffff800`57bcb2d7 : ffff9d88`9055b040 00000000`00000080 ffff9d88`904d8440 ffff9d88`9055b040 : nt!ExpWorkerThread+0xf5
fffff609`91987c10 fffff800`57c4c516 : ffffe401`d9a21180 ffff9d88`9055b040 fffff800`57bcb290 00000000`00000000 : nt!PspSystemThreadStartup+0x47
fffff609`91987c60 00000000`00000000 : fffff609`91988000 fffff609`91982000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC: 543bbf5a65f08e8c39069d0378ab3752e47f01ec

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: ebafb24f4ec05b2e15faac5cb7ada6da8ee48aa2

THREAD_SHA1_HASH_MOD: 38bc5fec3f0409c265cf5c87da6f8f8859d0711c

FOLLOWUP_IP:
nt!MiInsertPageInFreeOrZeroedList+29f
fffff800`57b05cbf 49034510 add rax,qword ptr [r13+10h]

FAULT_INSTR_CODE: 10450349

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!MiInsertPageInFreeOrZeroedList+29f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5c2b0c3d

IMAGE_VERSION: 10.0.17134.523

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 29f

FAILURE_BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList

BUCKET_ID: AV_nt!MiInsertPageInFreeOrZeroedList

PRIMARY_PROBLEM_CLASS: AV_nt!MiInsertPageInFreeOrZeroedList

TARGET_TIME: 2019-01-27T15:13:02.000Z

OSBUILD: 17134

OSSERVICEPACK: 523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2019-01-01 09:44:13

BUILDDATESTAMP_STR: 180410-1804

BUILDLAB_STR: rs4_release

BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME: 17168

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:av_nt!miinsertpageinfreeorzeroedlist

FAILURE_ID_HASH: {779c7427-9286-2607-95ab-7b33d42c5f3a}

Followup: MachineOwner
---------

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800362d40b0, The address that the exception occurred at
Arg3: ffffe40756992ac8, Exception Record Address
Arg4: ffffe40756992310, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17134.1.amd64fre.rs4_release.180410-1804

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  AX370-Gaming 5

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F23

BIOS_DATE:  08/08/2018

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  AX370-Gaming 5

BASEBOARD_VERSION:  Default string

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800362d40b0

BUGCHECK_P3: ffffe40756992ac8

BUGCHECK_P4: ffffe40756992310

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiDemoteCombinedPte+40
fffff800`362d40b0 498378f001      cmp     qword ptr [r8-10h],1

EXCEPTION_RECORD:  ffffe40756992ac8 -- (.exr 0xffffe40756992ac8)
ExceptionAddress: fffff800362d40b0 (nt!MiDemoteCombinedPte+0x0000000000000040)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  ffffe40756992310 -- (.cxr 0xffffe40756992310)
rax=ffffecf67b3d9000 rbx=810021018acd3005 rcx=ffff8d0915cd8580
rdx=ffffecbfff943180 rsi=ffffecbfff943180 rdi=ffff86e304a06790
rip=fffff800362d40b0 rsp=ffffe40756992d00 rbp=ffff8d0915cd8580
r8=8000000000000000  r9=0000000000000000 r10=ffffecf67b3d9000
r11=ffffec8000000000 r12=ffff8d0915c7f480 r13=ffffe40756993460
r14=8000000000000000 r15=ffff8d0915cd8580
iopl=0         nv up ei ng nz na pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010283
nt!MiDemoteCombinedPte+0x40:
fffff800`362d40b0 498378f001      cmp     qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: da5

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  SearchUI.exe

CURRENT_IRQL:  2

FOLLOWUP_IP:
nt!MiDemoteCombinedPte+40
fffff800`362d40b0 498378f001      cmp     qword ptr [r8-10h],1

BUGCHECK_STR:  AV

READ_ADDRESS: fffff80036658388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

ANALYSIS_SESSION_HOST:  DESKTOP-NG9H4F5

ANALYSIS_SESSION_TIME:  01-28-2019 20:45:09.0477

ANALYSIS_VERSION: 10.0.18303.1000 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8003625cbfa to fffff800362d40b0

STACK_TEXT:
ffffe407`56992d00 fffff800`3625cbfa : 00000000`00000000 fffff800`362588ea 00000000`00000000 00000000`00000000 : nt!MiDemoteCombinedPte+0x40
ffffe407`56992dd0 fffff800`362596d9 : ffffe407`00000003 00000000`00000000 ffffecbf`ff940000 ffffe407`00000000 : nt!MiAgePte+0x37a
ffffe407`56992e60 fffff800`36259ae2 : ffffe407`56993460 ffffecbf`ff943180 ffffecf6`00000000 ffffe407`00000000 : nt!MiWalkPageTablesRecursively+0x299
ffffe407`56992f40 fffff800`36259ae2 : ffffe407`56993460 ffffecf6`5fffca18 ffffecf6`00000001 ffffe407`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffffe407`56993020 fffff800`36259ae2 : ffffe407`56993460 ffffecf6`7b2fffe0 ffffecf6`00000002 ffffe407`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffffe407`56993100 fffff800`362577e7 : ffffe407`56993460 ffffecf6`7b3d97f8 ffffe407`00000003 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a2
ffffe407`569931e0 fffff800`36255af4 : ffffe407`56993460 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiWalkPageTables+0x1e7
ffffe407`569932d0 fffff800`362552ef : ffffd400`caccbbc0 ffff8d09`0f552b40 ffff8d09`0f552580 ffff8d09`0f552b40 : nt!MiAgeWorkingSet+0x384
ffffe407`569937e0 fffff800`362545e3 : fffff800`365d9f40 ffffe407`56993a80 ffff8d09`05a905a0 fffff800`00000000 : nt!MiTrimOrAgeWorkingSet+0x32f
ffffe407`569938b0 fffff800`362d57fb : fffff800`365d9f40 fffff800`365d9f40 00000000`0000013b 00000000`00000000 : nt!MiProcessWorkingSets+0x233
ffffe407`56993a60 fffff800`363812b7 : 00000000`ffffffff 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0x9f
ffffe407`56993b20 fffff800`3633b2d7 : ffff8d09`05b71040 00000000`00000080 fffff800`36381160 0005ac33`00000003 : nt!KeBalanceSetManager+0x157
ffffe407`56993c10 fffff800`363bc516 : ffffd400`ca3b9180 ffff8d09`05b71040 fffff800`3633b290 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffe407`56993c60 00000000`00000000 : ffffe407`56994000 ffffe407`5698e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


THREAD_SHA1_HASH_MOD_FUNC:  e3a8964b8ac9f4183e9b225b40d450ed3989dd86

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fe8690959fdfbd4826b27c07b0a0e784fc0081a0

THREAD_SHA1_HASH_MOD:  7f608ac2fbce9034a3386b1d51652e4911d30234

FAULT_INSTR_CODE:  f0788349

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiDemoteCombinedPte+40

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  5c2b0c3d

IMAGE_VERSION:  10.0.17134.523

STACK_COMMAND:  .cxr 0xffffe40756992310 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_nt!MiDemoteCombinedPte

BUCKET_ID:  AV_nt!MiDemoteCombinedPte

PRIMARY_PROBLEM_CLASS:  AV_nt!MiDemoteCombinedPte

TARGET_TIME:  2019-01-27T14:24:58.000Z

OSBUILD:  17134

OSSERVICEPACK:  523

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2019-01-01 09:44:13

BUILDDATESTAMP_STR:  180410-1804

BUILDLAB_STR:  rs4_release

BUILDOSVER_STR:  10.0.17134.1.amd64fre.rs4_release.180410-1804

ANALYSIS_SESSION_ELAPSED_TIME:  10008

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_nt!midemotecombinedpte

FAILURE_ID_HASH:  {c577c73b-79a7-0c44-6c62-58e1d697b6d8}

Followup:     MachineOwner
---------
 
Son düzenleme:
Uyarı! Bu konu 7 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı