Sanal belleği kapatıp sistemi yeniden başlatın ve ardından sanal belleği tekrar açıp sistemi yeniden başlatın sorununuz çözülecektir. Ayrıca bununla alakalı rehber linki de aşağıda mevcut. Ek olarak Vanguard'ı kaldırıp tekrar kurabilirsiniz, bir zararı olmaz ki dumplara işlemiş zaten. Sorununuz çözülürse ya da çözülmezse belirtirseniz sevinirim.
Selam, bugün sizlerle akıllarda soru işareti bırakan sanal bellek konusunu ele alacağız. Öncelikle sanal bellek nedir ve ne işe yarar bunu bir görelim. Sanal bellek; sisteminizde bulunan fiziksel RAM’in yetmediği durumlarda devreye giren ve RAM’i taklit eden bir yapıdır. Tabii bu yapı bizim...
www.technopat.net
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: 00007ff96d80e930
Arg3: 000000000000001d
Arg4: ffffea0640c70b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4093
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 17389
Key : Analysis.Init.CPU.mSec
Value: 530
Key : Analysis.Init.Elapsed.mSec
Value: 7064
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 012122-42406-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 7ff96d80e930
BUGCHECK_P3: 1d
BUGCHECK_P4: ffffea0640c70b00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffffea06`40c70958 fffff804`16644454 : 00000000`0000001a 00000000`00061941 00007ff9`6d80e930 00000000`0000001d : nt!KeBugCheckEx
ffffea06`40c70960 fffff804`1660545e : 00000000`00000000 ffff8a81`00000001 00006a8a`0005c908 ffffea06`40c70b80 : nt!MmAccessFault+0x1a5384
ffffea06`40c70b00 00007ff9`6d80e930 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000ab`0e3fe698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`6d80e930
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000002150ce, page frame number
Arg3: 0000000000000002, current page state
Arg4: 080003f0003f7cbe, 0
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5905
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20434
Key : Analysis.Init.CPU.mSec
Value: 500
Key : Analysis.Init.Elapsed.mSec
Value: 9717
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 012122-55046-01.dmp
BUGCHECK_CODE: 4e
BUGCHECK_P1: 99
BUGCHECK_P2: 2150ce
BUGCHECK_P3: 2
BUGCHECK_P4: 80003f0003f7cbe
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffc80a`912e5c68 fffff802`61feeeef : 00000000`0000004e 00000000`00000099 00000000`002150ce 00000000`00000002 : nt!KeBugCheckEx
ffffc80a`912e5c70 fffff802`61e41568 : 00000000`00000004 ffffc80a`912e5db0 00000100`00000000 00000000`00000000 : nt!MiBadShareCount+0x5b
ffffc80a`912e5cb0 fffff802`61e41d3e : 00000000`00000000 ffffc80a`912e63c0 ffff8da8`ff803000 ffffc80a`912e6310 : nt!MiDeletePteRun+0x1798
ffffc80a`912e5ec0 fffff802`61e9ea4d : 00000000`00000000 ffff8e8a`206bd700 ffffc80a`912e6310 ffff8da8`ff802bf8 : nt!MiDeleteVaTail+0x6e
ffffc80a`912e5ef0 fffff802`61e9e66b : ffff8dc6`00000000 ffff8e8a`206bd700 ffffc80a`00000000 ffffc80a`912e6360 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc80a`912e5f90 fffff802`61e9e66b : ffff8dc6`e36a3fe0 ffff8e8a`206bd700 ffffc80a`00000001 ffffc80a`912e6370 : nt!MiWalkPageTablesRecursively+0x88b
ffffc80a`912e6030 fffff802`61e9e66b : ffff8dc6`e36a3000 ffff8e8a`206bd700 ffffc80a`00000002 ffffc80a`912e6380 : nt!MiWalkPageTablesRecursively+0x88b
ffffc80a`912e60d0 fffff802`61e04f4b : 00000000`00000000 ffff8e8a`206bd700 00000000`00000003 ffffc80a`912e6390 : nt!MiWalkPageTablesRecursively+0x88b
ffffc80a`912e6170 fffff802`61e42961 : ffffc80a`912e6310 ffff8e8a`00000000 ffff8d9a`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc80a`912e6270 fffff802`61e12aa0 : 00000000`00000001 ffffc80a`00000000 ffff8e8a`206bd550 ffff8e8a`1d4ee080 : nt!MiDeletePagablePteRange+0x4f1
ffffc80a`912e6580 fffff802`622007f3 : ffff8e8a`1d4ee080 00000000`00000000 ffff8e8a`00000000 ffff8e8a`00000000 : nt!MiDeleteVad+0x360
ffffc80a`912e6690 fffff802`621feaaf : ffff8e8a`254ddca0 ffff8e8a`254ddca0 ffff8e8a`254de150 ffff8e8a`206bd080 : nt!MiCleanVad+0x43
ffffc80a`912e66c0 fffff802`6225c5a8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8e8a`206bd080 : nt!MmCleanProcessAddressSpace+0x137
ffffc80a`912e6740 fffff802`622b0fe6 : ffff8e8a`206bd080 ffff9e80`8168f870 ffffc80a`912e6990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffc80a`912e67d0 fffff802`622f5b88 : ffff8e8a`c0000005 00000000`00000001 ffffc80a`912e69e0 00000040`a2a53000 : nt!PspExitThread+0x5f6
ffffc80a`912e68d0 fffff802`61e0ef67 : 00000000`400a0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffc80a`912e6910 fffff802`61ffb880 : 00000040`ab3ff778 ffffc80a`912e69c0 ffffc80a`912e6b80 0000000b`00000000 : nt!KiDeliverApc+0x487
ffffc80a`912e69c0 fffff802`62008d5f : ffff8e8a`00000000 ffff8e8a`00000001 ffffc80a`912e6b18 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70
ffffc80a`912e6b00 00007ffd`ac5ecdf4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000040`ab3ff748 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ac5ecdf4
SYMBOL_NAME: nt!MiBadShareCount+5b
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1466
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 5b
FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {60e553e9-e4c5-ed08-9be6-c353e0011003}
Followup: MachineOwner
---------[/CODE]