PAGE_FAULT_IN_NONPAGED_AREA (50) hatası

Arda Elmalı

Decapat
Katılım
17 Ağustos 2018
Mesajlar
21
  • Page fault in nonpaged area
  • System service exception
  • Kernel Security check failure
  • IRQL_NOT_LESS_OR_EQUAL
Bu hataların hepsini alıyorum, nasıl düzeltebilirim?
 
Son düzenleyen: Moderatör:
  • Windows sürümün çok eski. 20H2 sürümüne güncelle.
  • CPU-Z SPD bilgisi paylaş.
  • Belleklerini Memtes86 ile test et.

Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac8c54dcb87a, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8073d8f88d0, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5265

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 34289

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs5_release

    Key  : WER.OS.Timestamp
    Value: 2018-09-14T14:34:00Z

    Key  : WER.OS.Version
    Value: 10.0.17763.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffac8c54dcb87a

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8073d8f88d0

BUGCHECK_P4: 2

READ_ADDRESS: fffff8073d6bdf08: Unable to get Flags value from nt!KdVersionBlock
GetUlongFromAddress: unable to read from fffff8073d782500
fffff8073d7fd390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8073d6bdf08: Unable to get Flags value from nt!KdVersionBlock
 ffffac8c54dcb87a

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Discord.exe

TRAP_FRAME:  fffff205be510030 -- (.trap 0xfffff205be510030)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe081d1aa1000 rbx=0000000000000000 rcx=ffff9a819ede44e0
rdx=ffffe081d1aa1000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8073d8f88d0 rsp=fffff205be5101c0 rbp=ffff9a819ede44e0
 r8=ffffac8c54dcb87a  r9=fffffffff94f0000 r10=0000000000000004
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiApplyCompressedFixups+0x60:
fffff807`3d8f88d0 0fb613          movzx   edx,byte ptr [rbx] ds:00000000`00000000=??
Resetting default scope

STACK_TEXT: 
fffff205`be50fd48 fffff807`3d49fb73     : 00000000`00000050 ffffac8c`54dcb87a 00000000`00000000 fffff205`be510030 : nt!KeBugCheckEx
fffff205`be50fd50 fffff807`3d36cc68     : fffff807`3d6f7250 ffff8000`00000000 ffffe081`d1aa1000 ffffac8c`54dcb87a : nt!MiSystemFault+0x1b9673
fffff205`be50fe90 fffff807`3d4815c9     : 00000000`00000000 00000000`00000000 3fffffff`ffffffff ffff9700`025a83e0 : nt!MmAccessFault+0x1d8
fffff205`be510030 fffff807`3d8f88d0     : 00000000`00000001 ffff9700`03a122c0 00000000`00000001 fffff807`3d6f7060 : nt!KiPageFault+0x349
fffff205`be5101c0 fffff807`3d8f87b0     : ffffe081`d1aa1000 ffffac8c`54dcb87a 00000000`00000927 00000000`00000004 : nt!MiApplyCompressedFixups+0x60
fffff205`be510220 fffff807`3d8f868f     : ffffac84`54dae000 ffff9a81`9ede44e0 ffff9a81`9ede44e0 ffffffff`f94f0000 : nt!MiPerformFixups+0x88
fffff205`be5102c0 fffff807`3d358d95     : ffffd270`40e8aea0 ffff9700`05ff5920 00000000`00135b64 00000000`00000000 : nt!MiRelocateImagePfn+0x18f
fffff205`be510330 fffff807`3d853191     : 00000000`ffffffff 00000000`00000000 00000000`00000000 ffffd270`40e8aea0 : nt!MiWalkEntireImage+0xc15
fffff205`be510550 fffff807`3d852bbb     : ffff9a81`9ede44e0 ffffd270`40e8aea0 00000000`00000000 ffffac84`54dae000 : nt!MiSwitchBaseAddress+0x5d
fffff205`be510580 fffff807`3d852674     : 00000000`5a2e0000 00000000`00000000 00000000`60df0000 ffff9a81`a0d45080 : nt!MiRelocateImageAgain+0x19b
fffff205`be510600 fffff807`3d92081e     : 00000000`00000001 fffff205`00000000 ffff9a81`a1846820 fffff205`be510840 : nt!MiValidateExistingImage+0x64
fffff205`be5106a0 fffff807`3d91ffe5     : ffff9a81`a1846820 fffff205`be510840 ffff9a81`a0d45080 00000000`00000002 : nt!MiShareExistingControlArea+0xc2
fffff205`be5106d0 fffff807`3d91f63e     : ffff9a81`9ede44e0 00000000`00000000 ffff9a81`a1846820 00000000`00000000 : nt!MiCreateImageOrDataSection+0x1e5
fffff205`be5107c0 fffff807`3d91f408     : fffff205`be5109b8 00000000`01000000 fffff205`be510b80 00000000`00000001 : nt!MiCreateSection+0x10e
fffff205`be510940 fffff807`3d91f204     : 00000000`098be2e8 00000000`0000000f 00000000`00000000 00000000`00000001 : nt!MiCreateSectionCommon+0x1f8
fffff205`be510a20 fffff807`3d484d08     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtCreateSection+0x54
fffff205`be510a90 00007ff9`28e500a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`098be248 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`28e500a4


SYMBOL_NAME:  nt!MiApplyCompressedFixups+60

MODULE_NAME: nt

IMAGE_VERSION:  10.0.17763.1217

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  60

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!MiApplyCompressedFixups

OS_VERSION:  10.0.17763.1

BUILDLAB_STR:  rs5_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {651d4d46-768e-c310-7395-6118b790f7b1}

Followup:     MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8020d0f0d50, The address that the exception occurred at
Arg3: fffff407e2296aa8, Exception Record Address
Arg4: fffff407e22962f0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5671

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 48890

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: rs5_release

    Key  : WER.OS.Timestamp
    Value: 2018-09-14T14:34:00Z

    Key  : WER.OS.Version
    Value: 10.0.17763.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8020d0f0d50

BUGCHECK_P3: fffff407e2296aa8

BUGCHECK_P4: fffff407e22962f0

EXCEPTION_RECORD:  fffff407e2296aa8 -- (.exr 0xfffff407e2296aa8)
ExceptionAddress: fffff8020d0f0d50 (nt!MiDemoteCombinedPte+0x0000000000000040)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff407e22962f0 -- (.cxr 0xfffff407e22962f0)
rax=fffff0783c1e0000 rbx=8100000902bc686f rcx=ffffb184ef3fb9c0
rdx=fffff00000094160 rsi=fffff00000094160 rdi=ffff92001b083520
rip=fffff8020d0f0d50 rsp=fffff407e2296ce0 rbp=0000000000000000
 r8=8000000000000000  r9=0000000000000000 r10=fffff0783c1e0000
r11=fffff00000000000 r12=ffffb184e8318b20 r13=fffff407e2297450
r14=8000000000000000 r15=ffffb184ef3fb9c0
iopl=0         nv up ei ng nz na po cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010287
nt!MiDemoteCombinedPte+0x40:
fffff802`0d0f0d50 498378f001      cmp     qword ptr [r8-10h],1 ds:002b:7fffffff`fffffff0=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  League of Legends.exe

READ_ADDRESS: fffff8020d408f08: Unable to get Flags value from nt!KdVersionBlock
GetUlongFromAddress: unable to read from fffff8020d4cd4c0
fffff8020d548390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8020d408f08: Unable to get Flags value from nt!KdVersionBlock
 ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

EXCEPTION_STR:  0xc0000005

STACK_TEXT: 
fffff407`e2296ce0 fffff802`0d0efc99     : ffffb184`e8318b20 ffffb184`ef3fb9c0 fffff407`e2297350 fffff407`e2297450 : nt!MiDemoteCombinedPte+0x40
fffff407`e2296db0 fffff802`0d0f4c0e     : 00000000`00000001 00000000`00000004 fffff000`00094160 00000000`00000000 : nt!MiAgePte+0x3b9
fffff407`e2296e40 fffff802`0d0f4774     : fffff407`e2297450 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x127e
fffff407`e2296f20 fffff802`0d0f4774     : fffff407`e2297450 00000000`00000000 00000000`00000001 00000000`00001000 : nt!MiWalkPageTablesRecursively+0xde4
fffff407`e2297000 fffff802`0d0f4774     : fffff407`e2297450 00000000`00000000 00000000`00000002 ffffb184`73576d4d : nt!MiWalkPageTablesRecursively+0xde4
fffff407`e22970e0 fffff802`0d0f362a     : fffff407`e2297450 ffffb184`00000000 fffff407`00000003 fffff802`0d35006d : nt!MiWalkPageTablesRecursively+0xde4
fffff407`e22971c0 fffff802`0d0f2cee     : fffff407`e2297450 ffffb184`00000002 ffffb184`00000000 00000000`00000000 : nt!MiWalkPageTables+0x1da
fffff407`e22972c0 fffff802`0d0f2475     : ffff47e8`01a31c06 ffffc780`9661e000 00000000`00000000 00000000`00000000 : nt!MiAgeWorkingSet+0x38e
fffff407`e22977d0 fffff802`0d0f1c35     : 00000000`00000000 fffff407`e2297a80 fffff407`e22979b0 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3e5
fffff407`e22978b0 fffff802`0d13221a     : fffff802`00000002 fffff802`00000000 fffff802`0d443980 ffffb184`e3e43530 : nt!MiProcessWorkingSets+0x255
fffff407`e2297a60 fffff802`0d18b437     : 00000000`00000004 00000000`00000004 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xaa
fffff407`e2297b20 fffff802`0d0803a5     : ffffb184`e3eed040 00000000`00000080 fffff802`0d18b2f0 558948f7`558966ef : nt!KeBalanceSetManager+0x147
fffff407`e2297c10 fffff802`0d1c5f2c     : ffffc780`961ad180 ffffb184`e3eed040 fffff802`0d080350 483874c0`8548d88b : nt!PspSystemThreadStartup+0x55
fffff407`e2297c60 00000000`00000000     : fffff407`e2298000 fffff407`e2292000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x1c


SYMBOL_NAME:  nt!MiDemoteCombinedPte+40

MODULE_NAME: nt

IMAGE_VERSION:  10.0.17763.1158

STACK_COMMAND:  .cxr 0xfffff407e22962f0 ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  40

FAILURE_BUCKET_ID:  AV_nt!MiDemoteCombinedPte

OS_VERSION:  10.0.17763.1

BUILDLAB_STR:  rs5_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c577c73b-79a7-0c44-6c62-58e1d697b6d8}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80721371e16, Address of the instruction which caused the bugcheck
Arg3: ffffdf09c5137790, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 62

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 60

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 44

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.CorruptModuleList
    Value: 1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80721371e16

BUGCHECK_P3: ffffdf09c5137790

BUGCHECK_P4: 0

CONTEXT:  ffffdf09c5137790 -- (.cxr 0xffffdf09c5137790)
rax=0000000000000000 rbx=ffffffffffffffff rcx=0000000800000000
rdx=0000000000000000 rsi=0000000800000000 rdi=0000000000000000
rip=fffff80721371e16 rsp=ffffdf09c5138180 rbp=ffffe50e96dd6c00
 r8=ffffe50e9f9f7970  r9=0000000000000000 r10=fffff80721371df0
r11=ffffbe7cf5000000 r12=0000000000000001 r13=ffffe50e9b77b970
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
fffff807`21371e16 ??              ???
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

STACK_TEXT: 
ffffdf09`c5136e58 fffff807`214802e9     : 00000000`0000003b 00000000`c0000005 fffff807`21371e16 ffffdf09`c5137790 : 0xfffff807`2146eab0
ffffdf09`c5136e60 00000000`0000003b     : 00000000`c0000005 fffff807`21371e16 ffffdf09`c5137790 00000000`00000000 : 0xfffff807`214802e9
ffffdf09`c5136e68 00000000`c0000005     : fffff807`21371e16 ffffdf09`c5137790 00000000`00000000 ffffdf09`00000008 : 0x3b
ffffdf09`c5136e70 fffff807`21371e16     : ffffdf09`c5137790 00000000`00000000 ffffdf09`00000008 00000000`00000000 : 0xc0000005
ffffdf09`c5136e78 ffffdf09`c5137790     : 00000000`00000000 ffffdf09`00000008 00000000`00000000 00000000`00000000 : 0xfffff807`21371e16
ffffdf09`c5136e80 00000000`00000000     : ffffdf09`00000008 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffdf09`c5137790


SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  CORRUPT_MODULELIST_0x3B_c0000005

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {74bb4c27-742f-ebb4-fa0a-8074317b8a14}

Followup:     MachineOwner
---------
 

Geri
Yukarı