PFN LIST CORRUPT Mavi Ekran Hatası

karakusmehmet

Centipat
Katılım
18 Nisan 2020
Mesajlar
47
Merhabalar öncelikle.
Yaklaşık iki veya üç ay önce bu sayfada sürekli konu açarak mavi ekran aldıgımı dile getiriyordum. Sağ olsunlar buradaki bazı arkadaslar ilgilendi. Çoğu şeyi denedik, minidump dosyaları incelendi. Yazılımsal olarak gereken testler güncellemeler vs. her şey denendi fakat sonuç olarak mavi ekran almaya devam ediyordum. En son Recep Baltaş tarafından minidump dosyalarım incelendi ve yapılması gereken şey RAM'in garantiye gönderilmesi oldu ve RAM garantiye verildi. Bunun sebebi ise sürekli Memory Managament hatası almamdı. İki hafta servis süreciyle RAM elime bugün geçti ve eski RAM geri yollandı bana. Serviste gereken tüm testlerin yapıldığı, iki farklı anakartta denendigi, Memtest ve becmark testinden geçildigi ve 0 error alındıgı ve oyunlarda test edildigi söylendi. Yani özet olarak servise verdigim RAM'ın gayet düzgün çalıştıgı söylendi bana bugün. Değişim yapılmadı. Bilgisayara RAM'ı tekrar taktım ve yarım saat geçmeden tekrar bir mavi ekran aldım (PFN LIST CORRUPT). Şu an aldıgım bu hatanın yine RAM kaynaklı bir hata oldugunun farkındayım. Ne yapacagımı bilmiyorum artık. Bilgisayarı tümden toplu şekilde garantiye teslim edemiyorum. Tüm parçaların tek tek sökülüp paketlerine konulup öyle bize getirmeniz gerekiyor diyorlar ve bu sürecin yaklasık bir veya bir bucuk ay surecegını soyluyorlar. Bunu göze alamıyorum cunku uzaktan egitim surecınde oldugumuz için bilgisayar bana lazım oluyor. Tekrar sistem özelliklerini ve minidump dosyalarını paylasıcagım. Artık ne yapabiliyoruz bilmiyorum ama yardımcı olursanız cok sevinirim. @Recep Baltaş'a ulasırsa bu yazdıklarım ve hatırlarsa kendisi ayrı sevinirim. Teşekkür ederim.

Bilgisayarda her şey güncel ve son sürüm şu an.
XMP kapalı hiç açılmadı.
Memtest86 testi dahil gereken tüm testler yapıldı hata alınmadı.
Windows güncel ve orijinal.
Minidump: minidump.rar
 
  • DDU ille GPU sürücünüzü kaldırıp yeniden yüklemeyi deneyebilirsiniz.
    • MemTest86'da bir şey yoksa ve garantide gerçekten de bir sorun çıkmadıysa sorunun GPU kaynaklı olması olası. Bu durumda GPU'yu garantiye göndermeniz gerekebilir.
    • Daha önce uygulamışsınız DDU rehberini ama tekrar uygulamaktan bir zarar gelmez.
  • Battleye'yi kaldırın.
    • Konularınızda "Battleye kaldırırsam falanca oyunu oynayamam, kaldırmak istemiyorum" yazmışsınız. Sorununuzun çözülmesini istiyorsanız bazı şeylerden vazgeçmek gerekli.
      • Zaten kaldırdıktan sonra hiçbir zaman kurmayacaksınız diye bir şey yok. Sorununuz çözülsün, ondan sonra kurarsınız.
  • MemTest86'yı defalarca uyguladığınız için tekrardan önermeyeceğim ancak bir kere daha yaparsanız iyi olur, bir zarar gelmez.
Kod:
MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffe70002302dd0
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 21298

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 84

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: ffffe70002302dd0

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  DyingLightGame.exe

STACK_TEXT:
ffffd30d`d6d8caf8 fffff803`3ea381dd     : 00000000`0000001a 00000000`00041790 ffffe700`02302dd0 00000000`00000000 : nt!KeBugCheckEx
ffffd30d`d6d8cb00 fffff803`3e9ebdf8     : 00000000`00000001 ffffe680`00000000 00000000`00000000 ffffd30d`d6d8cc70 : nt!MiDecreaseUsedPtesCount+0x1d6ed9
ffffd30d`d6d8cb40 fffff803`3e930e03     : 00000000`00000000 00000000`00000000 ffffd30d`d6d8d780 ffffd30d`d6d8d700 : nt!MiReducePteUseCount+0x30
ffffd30d`d6d8cb70 fffff803`3ece17fd     : ffffd601`54c31080 ffffd601`546c18c8 ffffd601`00000000 00000000`00000000 : nt!MiDecommitPages+0xf93
ffffd30d`d6d8d740 fffff803`3ece20c3     : ffffd30d`d6d8d8c0 00000000`00000000 ffffd30d`d6d8d8c0 ffffd601`546c18a0 : nt!MiDecommitRegion+0x7d
ffffd30d`d6d8d7c0 fffff803`3ece19b5     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x6d3
ffffd30d`d6d8d910 fffff803`3ea058b8     : ffffd601`54c31080 00000000`00000000 ffff1f00`6761a60a ffffd601`5c207b90 : nt!NtFreeVirtualMemory+0x95
ffffd30d`d6d8d970 fffff803`3e9f7d00     : fffff803`4a1a5e58 ffffd601`54c31080 ffffd601`5c1bc540 ffffd601`54c318b0 : nt!KiSystemServiceCopyEnd+0x28
ffffd30d`d6d8db08 fffff803`4a1a5e58     : ffffd601`54c31080 ffffd601`5c1bc540 ffffd601`54c318b0 fffff803`4a1a86a7 : nt!KiServiceLinkage
ffffd30d`d6d8db10 fffff803`4a1a937a     : 00000000`01000000 ffff9a09`9e5da848 ffff9a09`a5c25aa0 ffffd601`4f9a3320 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
ffffd30d`d6d8db60 fffff803`4a1f2868     : ffffd30d`00000000 ffffd601`4f9a3958 ffff9a09`a73a8101 ffff9a09`a73af7d8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffffd30d`d6d8dbd0 fffff803`4a1aab41     : ffffd601`4f9a3850 ffff9a09`a73a6f10 ffffd601`5bfe7240 ffff9a09`9ff68c01 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceListsGlobally+0xd0
ffffd30d`d6d8dc60 fffff803`4a1b5fed     : ffffd601`5ec22c10 ffff9a09`a14762b0 ffff9a09`9ff68cb0 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211
ffffd30d`d6d8dca0 fffff803`4a197aea     : ffffd601`5ec22c10 00000000`00000003 ffffd601`5ec22c10 ffff9a09`9ff68cb0 : dxgmms2!VIDMM_GLOBAL::UncommitLocalBackingStore+0x171
ffffd30d`d6d8dd30 fffff803`4a1977d5     : 00000000`00000000 ffff9a09`00000000 ffffd30d`c001cd40 ffffd601`5ec22c10 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x27a
ffffd30d`d6d8de70 fffff803`4a1328ba     : 00000000`00000003 ffff9a09`a0d03b30 ffffd30d`d6d8e000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5
ffffd30d`d6d8dec0 fffff803`4851a89d     : ffffd601`5ec22c58 ffffd30d`00000000 00000000`00000000 00000000`00000001 : dxgmms2!VidMmCloseAllocation+0x1a
ffffd30d`d6d8df00 fffff803`484fed5d     : ffffd30d`d6d8e110 fffff803`48402e7d 00000000`00000003 ffff9a09`a0d03b30 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5
ffffd30d`d6d8e0a0 fffff803`484fe20b     : 00000000`00870000 00000000`00000000 ffff9a09`00000000 ffff9a09`a5cc1730 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x92d
ffffd30d`d6d8e140 fffff803`484ff468     : ffffd601`54f73528 ffffd30d`d6d8e650 ffffffff`ffffffff ffff9a09`9c08a010 : dxgkrnl!DxgkDestroyAllocationInternal+0xefb
ffffd30d`d6d8e550 fffff803`484ffa8b     : 00000000`13b8fcc0 00000000`00000001 ffffd601`54c31080 fffff803`3ecd48fe : dxgkrnl!DxgkDestroyAllocationHelper+0x568
ffffd30d`d6d8ea20 fffff803`3ea058b8     : ffffd601`54c31080 ffffd601`54c31080 00000000`00000001 ffffd601`00000000 : dxgkrnl!DxgkDestroyAllocation2+0x21b
ffffd30d`d6d8eb00 00007ff8`34a649c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`13b8fc28 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`34a649c4


SYMBOL_NAME:  dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+160

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  160

FAILURE_BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b4dd6f57-8ae8-5c62-c567-a68fe02d924e}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 0000000000004a90, entry in list being removed
Arg3: 000000000041f37f, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4968

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8575

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 2

BUGCHECK_P2: 4a90

BUGCHECK_P3: 41f37f

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VSSVC.exe

STACK_TEXT:
ffff808d`63291c88 fffff806`660fa0e9     : 00000000`0000004e 00000000`00000002 00000000`00004a90 00000000`0041f37f : nt!KeBugCheckEx
ffff808d`63291c90 fffff806`660fbdf0     : 00000000`00000002 00000000`00000000 ffff808d`00000000 00000000`00000000 : nt!MiUnlinkPageFromList+0xc89
ffff808d`63291d20 fffff806`6614c759     : ffff808d`63292060 ffff808d`632922b8 ffffca0f`3276e480 00000000`00000000 : nt!MiFlushSectionInternal+0x490
ffff808d`63291ff0 fffff806`66149635     : 00000000`00000000 ffffca0f`2c0cf080 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x155
ffff808d`632920a0 fffff806`660a4f0f     : ffffca0f`2cb803b8 00000000`00000000 ffff8d06`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6a5
ffff808d`632921e0 fffff806`684b52bd     : 00000000`00000005 00000000`00000000 00000000`00000000 ffff8d06`fcf3e170 : nt!CcCoherencyFlushAndPurgeCache+0x6f
ffff808d`63292230 fffff806`684b517b     : ffff8d06`fcf3e170 00000000`00000000 ffff8d06`fcf3e001 ffffca0f`30f4f608 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffff808d`63292270 fffff806`683e8799     : ffffca0f`30f4f608 ffff8d06`fcf3e170 00000000`00000000 ffff8d06`fcf3e010 : Ntfs!NtfsFlushUserStream+0xa3
ffff808d`63292300 fffff806`6851f6f5     : ffffca0f`30f4f608 ffffca0f`25ae0180 ffff8d06`fcf3e010 ffff808d`63292480 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x329
ffff808d`63292450 fffff806`684b6d1c     : 00000000`00000000 00000000`00000000 ffffca0f`25ae0180 ffff8d06`e431d620 : Ntfs!NtfsFlushVolume+0x2bd
ffff808d`63292560 fffff806`684b5ef9     : ffffca0f`30f4f608 ffffca0f`2c372650 ffffca0f`30f4f601 ffff808d`63292790 : Ntfs!NtfsCommonFlushBuffers+0x8d0
ffff808d`63292680 fffff806`660b8908     : ffff808d`63292790 ffffca0f`30f4f608 ffffca0f`00000000 ffffca0f`2c372650 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffff808d`632926b0 fffff806`660b887d     : fffff806`684b5ee0 ffff808d`63292790 00000000`00000000 fffff806`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff808d`63292720 fffff806`68510f9b     : 00000000`00000000 00000000`00000310 ffff808d`63293000 00000000`00000030 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff808d`63292760 fffff806`68510ec5     : 00000000`00000000 ffffca0f`251108c0 ffff808d`632927f8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67
ffff808d`632927d0 fffff806`660d1f35     : ffffca0f`337e7010 ffffca0f`2c372650 ffffca0f`30f4f608 ffff808d`632927f8 : Ntfs!NtfsFsdFlushBuffers+0xe5
ffff808d`63292840 fffff806`62416ccf     : ffffca0f`20016380 ffff808d`00000030 ffff808d`00000000 ffff808d`63292b80 : nt!IofCallDriver+0x55
ffff808d`63292880 fffff806`624148d3     : ffff808d`63292910 00000000`00000000 00000000`00000000 ffffca0f`250fe240 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff808d`632928f0 fffff806`660d1f35     : ffffca0f`2c372650 00000000`000000c0 00000000`000000e0 00007ff7`32d3c100 : FLTMGR!FltpDispatch+0xa3
ffff808d`63292950 fffff806`664a6fb8     : ffffca0f`2c372650 00000000`00000000 00000000`00000000 fffff806`667b2094 : nt!IofCallDriver+0x55
ffff808d`63292990 fffff806`664530c9     : ffffca0f`00000000 ffff808d`63292b80 00000000`00000000 ffff808d`63292b80 : nt!IopSynchronousServiceTail+0x1a8
ffff808d`63292a30 fffff806`66452eb6     : ffffca0f`2c0cf080 00007ff7`32d3c310 ffffca0f`259aad60 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1f9
ffff808d`63292ac0 fffff806`662058b8     : ffffca0f`2c0cf080 00000000`00000000 00000000`00000001 ffffca0f`00000000 : nt!NtFlushBuffersFile+0x16
ffff808d`63292b00 00007fff`2966c724     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000068`16eff698 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2966c724


SYMBOL_NAME:  nt!MiUnlinkPageFromList+c89

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  c89

FAILURE_BUCKET_ID:  0x4E_2_nt!MiUnlinkPageFromList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b084f841-86a9-e353-1d26-a04cfe7406b4}

Followup:     MachineOwner
---------

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffc382a50bddb0
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 27245

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 33

BUGCHECK_P2: ffffc382a50bddb0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

STACK_TEXT:
fffffd00`0ed23088 fffff802`2d1b3ad0     : 00000000`0000010e 00000000`00000033 ffffc382`a50bddb0 00000000`00000000 : nt!KeBugCheckEx
fffffd00`0ed23090 fffff802`2ed17875     : 00000000`00000000 ffffc382`a50bdeb0 ffff9b8f`f4e03000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffffd00`0ed230d0 fffff802`2ec8253a     : ffffc382`a50bddb0 00000000`00000000 ffffc382`a4a3d050 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
fffffd00`0ed23110 fffff802`2ecf00b9     : ffffc382`a50bddb0 00000000`00000000 ffffc382`a4a3d050 ffff9b8f`f4c93010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
fffffd00`0ed23140 fffff802`2ecefb25     : 00000000`00000000 ffffc382`a4a3d050 ffffc382`a50bddb0 ffff9b8f`f691e080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
fffffd00`0ed23170 fffff802`2ec8257e     : ffffc382`a4c4d710 fffffd00`0ed23329 ffff9b8f`f4c93010 01000000`00100000 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
fffffd00`0ed23230 fffff802`2cf512d9     : 00000000`00000030 00000000`00000799 ffffc382`a4acaef8 00000000`00000000 : dxgmms2!VidMmCloseAdapter+0x1e
fffffd00`0ed23260 fffff802`2cf0720f     : ffff9b8f`f3667000 00000000`00000000 ffff9b8f`f4f61f90 fffff802`21ce02a3 : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
fffffd00`0ed23290 fffff802`2cee3031     : ffffc382`a4c4d710 ffffc382`00000002 ffffc382`a4c4d710 ffff9b8f`f4c93010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
fffffd00`0ed23390 fffff802`2cee1171     : ffff9b8f`f4cb6000 fffff802`00000001 ffff9b8f`f4cb6000 fffff802`00000001 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
fffffd00`0ed23420 fffff802`2cf0c699     : ffffc382`a4acaf10 fffffd00`0ed23570 00000000`00000261 ffffc382`a4acade0 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
fffffd00`0ed23470 fffff802`2cf078b5     : ffffc382`a4acade0 00000000`00000b59 ffffc382`a4acade0 ffff9b8f`f68733f0 : dxgkrnl!DXGPROCESS::Destroy+0x341
fffffd00`0ed236e0 fffff802`2ce057c7     : 00000000`00000000 ffffc382`a4acade0 ffff9b8f`f2a96330 fffff802`226ec3c8 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffffd00`0ed23830 fffff802`2209c5cf     : 00000000`00000000 ffff9b8f`f691c080 00000000`0000ff00 ffff9b8f`f4bfea10 : dxgkrnl!DxgkProcessNotify+0xf7
fffffd00`0ed23890 fffff802`22101c84     : ffff9b8f`f691c000 ffff9b8f`f691c080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffffd00`0ed23960 fffff802`2209ea46     : ffff9b8f`f691e4b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
fffffd00`0ed23990 fffff802`21ff3eae     : ffff9b8f`d00002fe 00000000`00000001 00000000`00000000 00000086`4746e000 : nt!PspExitThread+0x5b2
fffffd00`0ed23a90 fffff802`21e058b8     : ffff9b8f`f691c080 ffff9b8f`f691e080 fffffd00`0ed23b80 ffff9b8f`f691c080 : nt!NtTerminateProcess+0xde
fffffd00`0ed23b00 00007ffe`a860c344     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`4728fce8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a860c344


SYMBOL_NAME:  dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  27799

FAILURE_BUCKET_ID:  0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {590e82e4-fa32-3e14-0943-e6b01c6637c4}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffdabffcf91fc0
Arg3: 0000000020000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4015

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7949

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffdabffcf91fc0

BUGCHECK_P3: 20000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffffdb03`48875dc8 fffff807`26b2abba     : 00000000`0000001a 00000000`00041792 ffffdabf`fcf91fc0 00000000`20000000 : nt!KeBugCheckEx
ffffdb03`48875dd0 fffff807`26aedc06     : 00000000`00000000 ffffc606`7b3ab700 00000000`0000002c ffffdabf`fcf91fc0 : nt!MiDeleteVa+0x153a
ffffdb03`48875ed0 fffff807`26aedd1b     : ffffdaed`00000000 ffffc606`7b3ab700 ffffdb03`00000000 ffffdb03`48876340 : nt!MiWalkPageTablesRecursively+0x776
ffffdb03`48875f70 fffff807`26aedd1b     : ffffdaed`76afff38 ffffc606`7b3ab700 ffffdb03`00000001 ffffdb03`48876350 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb03`48876010 fffff807`26aedd1b     : ffffdaed`76aff000 ffffc606`7b3ab700 ffffdb03`00000002 ffffdb03`48876360 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb03`488760b0 fffff807`26adcbfb     : 00000000`00000000 ffffc606`7b3ab700 00000000`00000003 ffffdb03`48876370 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb03`48876150 fffff807`26b29451     : ffffdb03`488762f0 ffffc606`00000000 ffffdabf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffdb03`48876250 fffff807`26b01670     : 00000000`00000001 ffffdb03`00000000 ffffc606`7b3ab550 ffffc606`78aeb080 : nt!MiDeletePagablePteRange+0x4f1
ffffdb03`48876560 fffff807`26e999e9     : ffffc606`7c293ce0 00000000`00000000 ffffc606`00000000 ffffc606`00000000 : nt!MiDeleteVad+0x360
ffffdb03`48876670 fffff807`26e9938c     : ffffc606`7c293ce0 ffffc606`7989b9a0 ffffc606`78aeb080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffdb03`488766a0 fffff807`26ee4dd3     : ffffc606`7c2948c0 ffffc606`7c2948c0 ffffc606`7c293ce0 ffffc606`7b3ab080 : nt!MiCleanVad+0x30
ffffdb03`488766d0 fffff807`26e81f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc606`7b3ab080 : nt!MmCleanProcessAddressSpace+0x137
ffffdb03`48876750 fffff807`26e9ea8a     : ffffc606`7b3ab080 ffff9f04`6a93f060 ffffdb03`48876990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffdb03`488767d0 fffff807`26df4558     : ffffc606`00000000 00000260`00000001 ffffdb03`488769e0 000000ff`41bbf000 : nt!PspExitThread+0x5f6
ffffdb03`488768d0 fffff807`26ae6ca7     : 00000000`406e0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffdb03`48876910 fffff807`26bf8440     : 000000ff`43bffb18 ffffdb03`488769c0 ffffdb03`48876b80 00000260`00000000 : nt!KiDeliverApc+0x487
ffffdb03`488769c0 fffff807`26c0595f     : 00000000`00000001 ffffc606`77773080 ffffdb03`48876b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffdb03`48876b00 00007ff9`f3f2be44     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000ff`43bffae8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f3f2be44


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffff28002386530
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3593

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8681

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41790

BUGCHECK_P2: fffff28002386530

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffff8f04`f7733178 fffff803`4cb2abd5     : 00000000`0000001a 00000000`00041790 fffff280`02386530 00000000`00000000 : nt!KeBugCheckEx
ffff8f04`f7733180 fffff803`4cb293ef     : ffff918c`bae9d700 00000000`00000000 ffff853b`00000002 00000000`00000000 : nt!MiDeleteVa+0x1555
ffff8f04`f7733280 fffff803`4cb01670     : 00000000`00000001 ffff8f04`00000000 ffff918c`bae9d550 ffff918c`b5417080 : nt!MiDeletePagablePteRange+0x48f
ffff8f04`f7733590 fffff803`4ce9939f     : ffff918c`b5417080 00000000`00000000 ffff918c`00000000 ffff918c`00000000 : nt!MiDeleteVad+0x360
ffff8f04`f77336a0 fffff803`4cee4dd3     : ffff918c`b89682e0 ffff918c`b89682e0 ffff918c`b90d63c0 ffff918c`bae9d080 : nt!MiCleanVad+0x43
ffff8f04`f77336d0 fffff803`4ce81f5f     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff918c`bae9d080 : nt!MmCleanProcessAddressSpace+0x137
ffff8f04`f7733750 fffff803`4ce9ea8a     : ffff918c`bae9d080 ffffba82`c28c85f0 ffff8f04`f7733990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8f04`f77337d0 fffff803`4cdf4558     : ffff918c`00000000 00000000`00000001 ffff8f04`f77339e0 00000069`8d5de000 : nt!PspExitThread+0x5f6
ffff8f04`f77338d0 fffff803`4cae6ca7     : 00000000`40280088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8f04`f7733910 fffff803`4cbf8440     : 00000069`99dff818 ffff8f04`f77339c0 ffff8f04`f7733b80 00000258`00000000 : nt!KiDeliverApc+0x487
ffff8f04`f77339c0 fffff803`4cc0595f     : ffff918c`b5417080 00000000`00000000 ffff8f04`f7733b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff8f04`f7733b00 00007ff8`da06be44     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000069`99dff7e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`da06be44


SYMBOL_NAME:  nt!MiDeleteVa+1555

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1555

FAILURE_BUCKET_ID:  0x1a_41790_nt!MiDeleteVa

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9b5ebc95-f4cf-8c11-5593-7f5337165669}

Followup:     MachineOwner
---------
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı