MEMORY_MANAGEMENT Mavi ekran hatası

İşletim sistemi
Windows 10

Hakan Turan

Hectopat
Katılım
23 Mayıs 2015
Mesajlar
604
Yer
İstanbul/Ümraniye
Daha fazla  
Cinsiyet
Erkek
Meslek
Öğrenci
Merhabalar. Sistemim genelde sorun çıkarmaz fakat geçen gün boşta beklerken mavi ekran verip restart attı. Ben de dump dosyasında 4 adet hata dosyası buldum geçmiştekilerle birlikte. Konu hakkında fazla bilgim olmadığı için yardımlarınızı bekliyorum.

Not: sistemim uzatma prizleri üzerinde çalışmakta, belki bu da sorun yaratıyor olabilir belirtmek istedim.

Sistem özelliklerim: MSI B450 Tomahawk Max, Ryzen 1600 AF, GeIL EVO X II 16 GB 3200MHz çift modül RAM, Sapphire Pulse 8 GB RX570, 120 GB M.2 SSD, 120 GB SATA SSD, 1TB HDD, 650W 80+ ın-Win PSU, 2 adet PWM 1 adet normal fan.

Hata 1:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\072321-12250-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff804`78c00000 psloadedmodulelist = 0xfffff804`7982a1d0
Debug session time: Fri jul 23 23:02:38.498 2021 (utc + 3:00)
System uptime: 4 days 21:45:29.189
Loading kernel symbols.




Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff804'78ff6F20 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffc89'7E3392A0 = 000000000000003B.
6: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, the subtype of the bugcheck.
Arg2: 0000016F005F2D18.
Arg3: 000000000000000F.
Arg4: Ffff8E02A9A37B00.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 3749.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 50378.

Key: Analysis. Init. CPU. Msec.
Value: 733.

Key: Analysis. Init. Elapsed. Msec.
Value: 60820.

Key: Analysis. Memory.commitpeak. MB.
Value: 77.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 1A.

Bugcheck_p1: 61941.

Bugcheck_p2: 16F005F2D18.

Bugcheck_p3: F

Bugcheck_p4: Ffff8E02A9A37B00.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: svchost.exe

Stack_text:
Ffff8e02'a9a37958 fffff802'51C87C62: 00000000'0000001A 00000000'00061941 0000016F'005F2D18 00000000'0000000F: NT! Kebugcheckex.
Ffff8e02'a9a37960 fffff802'51C04D5e: Ffffc10b'b7F80000 ffffc10b'C0475A80 0000016F'7af59b20 ffffc10b'00002D84: NT! Mmaccessfault+0x15FE52
Ffff8e02'a9a37b00 00007FFE'6183E37B: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kipagefault+0x35e
00000045'e8C7e128 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffe`6183e37b

Module_name: Hardware.

Image_name: Hardware_ram.

Stack_command: Thread. Cxr; KB.

Faılure_bucket_ıd: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {C6E5C6CF-692e-7852-5DC5-B74944540fc0}

Followup: Machineowner.
---------

Hata 2:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\072321-12250-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff804`78c00000 psloadedmodulelist = 0xfffff804`7982a1d0
Debug session time: Fri jul 23 23:02:38.498 2021 (utc + 3:00)
System uptime: 4 days 21:45:29.189
Loading kernel symbols.




Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff804'78ff6F20 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:fffffc89'7E3392A0 = 000000000000003B.
6: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a System service routine.
Arguments:
Arg1: 00000000C0000005, exception code that caused the bugcheck.
Arg2: FffFF804791F665b, address of the instruction which caused the bugcheck.
Arg3: FfffFC897E339ba0, address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, Zero.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4468.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 28399.

Key: Analysis. Init. CPU. Msec.
Value: 405.

Key: Analysis. Init. Elapsed. Msec.
Value: 4616.

Key: Analysis. Memory.commitpeak. MB.
Value: 83.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 3B.

Bugcheck_p1: C0000005.

Bugcheck_p2: FffFF804791F665b.

Bugcheck_p3: FfffFC897E339ba0.

Bugcheck_p4: 0

Context: FfffFC897E339ba0 -- (.cxr 0xfffffc897e339ba0)
Rax = 0000000000000000 rbx = 0000000000000000 rcx = fffFE18F539C5080.
Rdx = ffffce0A1419FD00 rsi = 00000000001F0003 rdi = ffffce0A1419FD00.
Rip = fffFF804791F665b rsp = ffffFC897E33a5a0 rbp = ffffFC897E33a6C0.
R8 = ffffFC897E33a5b0 R9 = 0000000000000000 R10 = 7ffffffffffffffc.
R11 = 0000000000000070 R12 = 0000000000000000 R13 = fffFE18F539C5080.
R14 = 0000000000000000 R15 = 0000000000000006.
İopl = 0 nv up ei pl nzna po nc.
CS = 0010 SS = 0018 DS = 002b es = 002b fs = 0053 GS = 002b efl = 00050206.
NT! Obpcreatehandle+0x3fb:
Fffff804'791F665b 488B4608 mov rax, qword ptr [rsi+8] DS:002b:00000000'001F000b=?
Resetting default scope.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: svchost.exe

Stack_text:
Fffffc89'7E33A5A0 fffff804'79279EED: Ffffe18F'4A010340 ffffe18F'4A012900 ffffe18F'4A017F00 ffffce0a'00000080: NT! Obpcreatehandle+0x3fb
Fffffc89'7E33A790 fffff804'792790F1: 00000000'00000001 fffffc89'7E33AB80 00000000'00000001 00000000'00000001: NT! Obınsertobjectex+0x13D
Fffffc89'7E33AA20 fffff804'790088B8: Ffffe18F'539C5080 00000007'3bb9de58 fffffc89'7E33AAA8 00000000'00000000: NT! Ntcreateevent+0Xe1
Fffffc89'7E33AA90 00007FFD'E20ed724: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000007'3bb9de38 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffd`e20ed724

Symbol_name: NT! Obpcreatehandle+3fb

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.19041.1110

Stack_command: Cxr 0xfffffc897e339ba0; KB.

Bucket_ıd_func_offset: 3fb.

Faılure_bucket_ıd: 0x3B_c0000005_nt!ObpCreateHandle

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {DCD9630C-1938-35EA-221a-7B842C7Aa859}

Followup: Machineowner.
---------

Hata 3:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\060621-41265-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff805`68200000 psloadedmodulelist = 0xfffff805`68e2a1b0
Debug session time: Sun jun 6 09:31:07.383 2021 (utc + 3:00)
System uptime: 4 days 0:31:06.328
Loading kernel symbols.




Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff805'685F6CF0 48894C2408 mov qword ptr [rsp+8],rcx SS: Ffff9608'5bee4200 = 000000000000012B.
9: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

FAULTY_HARDWARE_CORRUPTED_PAGE (12b)
This bugcheck indicates that a Single bit error was found in this page. This is a hardware Memory error.
Arguments:
Arg1: FffffffFC00002C4, Virtual address mapping the corrupted page.
Arg2: 0000000000000AD2, physical page number.
Arg3: 000002330D079930, Zero.
Arg4: FfffAE8084995000, Zero.

Debugging details:
------------------

*** Warnıng: Unable to verify checksum for win32k.sys

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 3875.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 34324.

Key: Analysis. Init. CPU. Msec.
Value: 702.

Key: Analysis. Init. Elapsed. Msec.
Value: 35115.

Key: Analysis. Memory.commitpeak. MB.
Value: 79.

Key: Blackbox. Smdecompressionfailure.compressedsize
Value: 0xad2.

Key: Blackbox. Smdecompressionfailure.compressionformat
Value: 0x3.

Key: Blackbox. Smdecompressionfailure. Sourcedatahash.
Value: 0xf34c3bf7.

Key: Blackbox. Smdecompressionfailure. Sourcedataoffset.
Value: 0x19930.

Key: Blackbox. Smdecompressionfailure. Sourcepfn1.
Value: 0x13d499.

Key: Blackbox. Smdecompressionfailure. Sourcepfn2.
Value: 0x13d49a.

Key: Blackbox. Smdecompressionfailure. Targetpfn.
Value: 0x25794e.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 12b.

Bugcheck_p1: FffffffFC00002C4.

Bugcheck_p2: AD2.

Bugcheck_p3: 2330D079930.

Bugcheck_p4: FfffAE8084995000.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: Memcompression.

Stack_text:
Ffff9608'5bee41F8 fffff805'68796E62: 00000000'0000012B ffffffff'C00002C4 00000000'00000AD2 00000233'0D079930: NT! Kebugcheckex.
Ffff9608'5bee4200 fffff805'6864A5DF: 00000000'00000001 00000000'C00002C4 ffffae80'84995000 00000000'00000000: NT! St_store<sm_traıts>:stdmpageerror+0x10a
Ffff9608'5bee4260 fffff805'684A67C5: 00000000'00000004 fffff805'684A632e 00000000'00000000 00000000'00000001: NT! St_store<sm_traıts>:stdmsinglepagecopy+0x1a3df7
Ffff9608'5bee4320 fffff805'684a5ffc: 00000000'00000001 00000000'00019930 ffffc006'7fadf000 ffffc006'00001000: NT! St_store<sm_traıts>:stdmsinglepagetransfer+0xa5
Ffff9608'5bee4370 fffff805'684a5e2C: Fffff805'ffffffff ffffc006'83D83000 ffff9608'5bee4450 ffffc006'87AE8B10: NT! St_store<sm_traıts>:stdmpsinglepageretrieve+0x180
Ffff9608'5bee4410 fffff805'684a5C79: Ffffae80'82688730 00000000'00000001 00000000'00000000 00000000'00000000: NT! St_store<sm_traıts>:stdmpageretrieve+0xc8
Ffff9608'5bee44C0 fffff805'684a5b31: Ffffc006'7fadf000 ffffc006'87AE8B10 ffffc006'83D83000 ffffc006'7fae09C0: NT! Smkm_store<sm_traıts>:smstdirectreadıssue+0x85
Ffff9608'5bee4540 fffff805'68498BC8: Ffffc006'81C10080 ffffc006'7fadf000 00000000'00000000 ffffc006'8723B890: NT! Smkm_store<sm_traıts>:smstdirectreadcallout+0x21
Ffff9608'5bee4570 fffff805'684a368F: Fffff805'684a5B10 ffff9608'5bee4610 00000000'00000003 00000000'00000000: NT! Keexpandkernelstackandcalloutınternal+0x78
Ffff9608'5bee45e0 fffff805'68559934: Ffff9608'5bee46e0 00000000'31526D73 00000000'000003FF fffff805'68F229C0: NT! Smkm_store<sm_traıts>:smstdirectread+0xc7
Ffff9608'5bee46b0 fffff805'68559368: 00000000'0000000C 00000000'000003FF ffff9608'5bee4760 fffff805'68F229C0: NT! Smkm_store<sm_traıts>:smstworkıtemqueue+0x1AC
Ffff9608'5bee4700 fffff805'684a4117: 00000000'0000000C 00000000'00000001 ffffc006'87AE8B10 ffffc006'8723B890: NT! Smkm_store_mgr<sm_traıts>:smıoctxqueuework+0xc0
Ffff9608'5bee4790 fffff805'684fa96b: Ffffc006'00000001 ffffc006'8723B950 00000000'00000000 ffffc006'7fadf000: NT! Smkm_store_mgr<sm_traıts>:smpageread+0x167
Ffff9608'5bee4800 fffff805'6845E0A0: 0000007F'00000100 00000000'00000000 ffff9608'5bee4A58 fffff805'6845BFF0: NT! Smpageread+0x33
Ffff9608'5bee4850 fffff805'6845BB4D: 00000000'00000002 ffff9608'5bee48e0 ffff9608'5bee4A58 ffffc006'8723B840: NT! Miıssuehardfaultıo+0x10C
Ffff9608'5bee48a0 fffff805'68528278: 00000000'C0033333 00000000'00000001 00000297'24900C08 00000000'00000000: NT! Miıssuehardfault+0x29D
Ffff9608'5bee4960 fffff805'68604E5E: 00000297'1EBA365e 000000D6'94F7af10 ffff9608'5bee4b80 ffffc006'00000000: NT! Mmaccessfault+0x468
Ffff9608'5bee4b00 00007FF8'4D6FE5ab: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kipagefault+0x35e
000000D6'94F7ba50 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ff8`4d6fe5ab

Symbol_name: NT! St_store<sm_traıts>:stdmpageerror+10a

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.19041.985

Stack_command: Thread. Cxr; KB.

Bucket_ıd_func_offset: 10a.

Faılure_bucket_ıd: 0x12B_c00002c4_StCtDecompressFailed_nt!ST_STORE_SM_TRAITS_::StDmPageError

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {C6a6BB4D-3B77-DFF6-2D9B-75F5D0F61A50}

Followup: Machineowner.
---------

Hata 4:
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\HakanaruTo\Desktop\mavi ekran\031321-12953-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

************* Path validation summary **************
Response time (ms) location.
Deferred srv*
Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (12 procs) Free X64.
Product: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff801`26e00000 psloadedmodulelist = 0xfffff801`27a2a490
Debug session time: Sat mar 13 14:37:13.038 2021 (utc + 3:00)
System uptime: 0 days 23:00:08.728
Loading kernel symbols.




Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff801'271F5C50 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffff8b0e'0D124CE0 = 0000000000000050.
8: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid System Memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed Memory.
Arguments:
Arg1: FffFD6001996e022, Memory referenced.
Arg2: 0000000000000000, Value 0 = read operation, 1 = write operation.
Arg3: FffFF8012704D1ca, ıf non-Zero, the instruction address which referenced the bad Memory.
Address.
Arg4: 0000000000000000, (reserved)

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 3530.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 6477.

Key: Analysis. Init. CPU. Msec.
Value: 406.

Key: Analysis. Init. Elapsed. Msec.
Value: 2325.

Key: Analysis. Memory.commitpeak. MB.
Value: 74.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: 50.

Bugcheck_p1: FFFFD6001996E022.

Bugcheck_p2: 0

Bugcheck_p3: FffFF8012704D1ca.

Bugcheck_p4: 0

Read_address: FffFF80127Afb390: Unable to get mivisiblestate.
Unable to get nonpagedpoolstart.
Unable to get nonpagedpoolend.
Unable to get pagedpoolstart.
Unable to get pagedpoolend.
Unable to get NT! Mmspecialpagesınuse.
FFFFD6001996E022

Mm_ınternal_code: 0

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: explorer.exe

Trap_frame: Ffff8b0e0D124F80 -- (.trap 0xffff8b0e0d124f80)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000002BED rbx = 0000000000000000 rcx = 00000000000ec000.
Rdx = 0000000003F914DC rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8012704D1ca rsp = ffff8b0e0D125110 rbp = fffFD60FDC800280.
R8 = 03F914DC576fc2e4 R9 = 0000000000050008 R10 = fffFD6001996e000.
R11 = ffff8b0e0D125228 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 nv up ei ng nzna po nc.
NT! Rtlphpvscontextallocateınternal+0x1aa:
Fffff801'2704D1CA 410FB74A22 movzx ecx, Word ptr [r10+22h] DS: Ffffd600'1996E022=?
Resetting default scope.

Stack_text:
Ffff8b0e'0D124CD8 fffff801'2721EDB1: 00000000'00000050 ffffd600'1996E022 00000000'00000000 ffff8b0e'0D124F80: NT! Kebugcheckex.
Ffff8b0e'0D124CE0 fffff801'2700C960: 00000000'00000000 00000000'00000000 ffff8b0e'0D125000 00000000'00000000: NT! Misystemfault+0x1F45a1
Ffff8b0e'0D124DE0 fffff801'27203D5E: Ffffd60F'FD265268 ffffd60F'FD2651B0 ffffd60F'FD265218 00000000'002ffc38: NT! Mmaccessfault+0x400
Ffff8b0e'0D124F80 fffff801'2704D1CA: Ffffdd3D'C9483FEA 00000000'00000003 00000000'00000000 ffffc10F'C04e8DC0: NT! Kipagefault+0x35e
Ffff8b0e'0D125110 fffff801'270505FD: 00000000'00001820 ffff8b0e'00001820 ffff8b0e'0D125251 00000000'74536D4D: NT! Rtlphpvscontextallocateınternal+0x1aa
Ffff8b0e'0D125170 fffff801'2704FEDF: 00000000'00000000 ffff8b0e'0D1254B0 00000000'74536D4D 00000000'00000000: NT! Exallocateheappool+0x6ed
Ffff8b0e'0D1252B0 fffff801'270A1036: 00000000'80000000 00000000'00001820 00000000'74536D4D 00000000'00000000: NT! Expallocatepoolwithtagfromnode+0x5F
Ffff8b0e'0D125300 fffff801'274D04b0: 00000000'00000000 ffff8b0e'0D125610 00000000'00000002 ffffc10F'00000000: NT! Miallocatepool+0x86
Ffff8b0e'0D125350 fffff801'27441853: 00000000'00000002 ffffab81'85272220 ffff8b0e'0D125610 00000000'00000304: NT! Mibuildımagecontrolarea+0x104
Ffff8b0e'0D1253E0 fffff801'2744309B: Ffff8b0e'0D125840 00000005'00000003 00000000'00000000 00000000'00000000: NT! Micreateımagefilemap+0x33F
Ffff8b0e'0D125560 fffff801'274309CB: Ffffc10F'C8702E60 ffff8b0e'0D125840 ffff8b0e'0D125840 00000008'00000000: NT! Micreatenewsection+0x127
Ffff8b0e'0D1256D0 fffff801'27430014: Ffff8b0e'0D125700 00000000'00000000 ffffc10F'C8702E60 00000000'00000000: NT! Micreateımageordatasection+0x2dB
Ffff8b0e'0D1257C0 fffff801'2742FDF7: 00000000'11000000 ffff8b0e'0D125B80 00000000'00000001 00000000'00000002: NT! Micreatesection+0xf4
Ffff8b0e'0D125940 fffff801'2742FBDC: 00000000'00a7D920 00000000'00000001 00000000'00000000 00000000'00000001: NT! Micreatesectioncommon+0x207
Ffff8b0e'0D125A20 fffff801'272075B8: 00000000'000017A2 00000000'058e0000 00000000'00000000 fffff801'27435D5A: NT! Ntcreatesection+0x5C
Ffff8b0e'0D125A90 00007FFA'0226D554: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: NT! Kisystemservicecopyend+0x28
00000000'00a7D8D8 00000000'00000000: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'00000000: 0x00007ffa`0226d554

Symbol_name: NT! Rtlphpvscontextallocateınternal+1aa

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.19041.867

Stack_command: Thread. Cxr; KB.

Bucket_ıd_func_offset: 1aa.

Faılure_bucket_ıd: Av_r_ınvalıd_nt! Rtlphpvscontextallocateınternal

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {BB97F450-3432-3449-B336-0cebcfb26F4b}

Followup: Machineowner.
---------
Eklemeyi unutmuşum, USB Wi-Fi kartı ve USB ses kartı kullanıyorum bu sistemde.
 
Son düzenleme:
Sorun RAM veya depolama kaynaklı görünüyor, attığınız dosyalarda. Dosyaların kendisini paylaşır mısınız? Ek komutlar girip birkaç şey daha kontrol etmek istiyorum.

Dediğim durum için RAM'lere Memtest, depolama birimlerine HD Tune Pro'dan quick scan kapalı olacak şekilde error scan yapıp sonuçlarını paylaşın. Donanımsal bir hata bulunursa bunları değiştirmek sorunu çözmeli.
 
Tamamdır. Ek olarak BIOS sürümünüz eski kalmış, buradan güncelleyiniz.

Önceliği disklere yapacağınız testlere verebilirsiniz, çoğunlukla onlardan şüpheleniyorum şu an.
 
SSD testlerim bitti. Sağlık sorunu görünmüyor. HDD testi uzun süreceği için önden bunları attım. Ayrıca sorunlar disk veya RAM ile alakalı gibi duruyorsa muhtemelen sıcaklıktan böyle sorun çıkmış olabilir diye düşünüyorum. Kasam baya havasız ve sıcakta kalıyor maalesef.

Bios sürümünü ileriki bir zamanda mutlaka yapacağım.

m2ssd.png
satassd.png

HDD testi de tamamlandı, diskler normal. Ayrıca sistem FurMark ve Cinebench gibi testlerde oldukça başarılı ve hata vermedi. Sanırım sıcaklıkla alakalı bir problemim var sadece. Memtest86 testini ileriki bir tarihte yapabilirim çünkü uzun sürecektir.
hdd.png
 
Son düzenleme:
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı