Rocket League yüklerken MEMORY_MANAGEMENT hatası

İşletim sistemi
Windows 10

shotgunned

Hectopat
Katılım
6 Haziran 2019
Mesajlar
2.637
Çözümler
7
Daha fazla  
Cinsiyet
Erkek
Epic Games'ten Rocket League yükleyecektim. Dün %45 inmiş. Bugün devam ettirdim. Devam et tuşuna basar basmaz mavi ekran yedim. Bu neden kaynaklanıyor?
 
Minidump dosyasını paylaşırsanız sorunun kaynağını söyleyebiliriz.
 
Minidump dosyasını paylaşırsanız sorunun kaynağını söyleyebiliriz.
 
Memtest86 sonuçları nedir?

[CODE title="Dökümler"]
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zOC989B2C0\031421-9734-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`07000000 PsLoadedModuleList = 0xfffff800`07c2a490
Debug session time: Sun Mar 14 14:03:12.424 2021 (UTC + 3:00)
System Uptime: 0 days 18:06:00.085
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`073f5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe785`04f32db0=000000000000001a
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061948, The subtype of the bugcheck.
Arg2: 0000000800404a99
Arg3: 0000000000000001
Arg4: 0000000800404a99

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7436

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 39837

Key : Analysis.Init.CPU.mSec
Value: 2030

Key : Analysis.Init.Elapsed.mSec
Value: 33198

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 1a

BUGCHECK_P1: 61948

BUGCHECK_P2: 800404a99

BUGCHECK_P3: 1

BUGCHECK_P4: 800404a99

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffffe785`04f32da8 fffff800`07465054 : 00000000`0000001a 00000000`00061948 00000008`00404a99 00000000`00000001 : nt!KeBugCheckEx
ffffe785`04f32db0 fffff800`0729a1b0 : 00000000`00000002 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDereferenceIoPages+0x16a86c
ffffe785`04f32e40 fffff800`0729ad6e : 00000000`00000000 ffffe785`04f33550 fffffebf`fe6b4728 ffffe785`04f334a0 : nt!MiDeletePteRun+0x13b0
ffffe785`04f33050 fffff800`0720bedd : 00000000`00000000 ffffc009`35a35740 ffffe785`04f334a0 fffffebf`fe6b43a0 : nt!MiDeleteVaTail+0x6e
ffffe785`04f33080 fffff800`0720bafb : fffffeff`00000000 ffffc009`35a35740 ffffe785`00000000 ffffe785`04f334f0 : nt!MiWalkPageTablesRecursively+0xc6d
ffffe785`04f33120 fffff800`0720bafb : fffffeff`7fafff98 ffffc009`35a35740 ffffe785`00000001 ffffe785`04f33500 : nt!MiWalkPageTablesRecursively+0x88b
ffffe785`04f331c0 fffff800`0720bafb : fffffeff`7faff000 ffffc009`35a35740 ffffe785`00000002 ffffe785`04f33510 : nt!MiWalkPageTablesRecursively+0x88b
ffffe785`04f33260 fffff800`0725de6b : 00000000`00000000 ffffc009`35a35740 00000000`00000003 ffffe785`04f33520 : nt!MiWalkPageTablesRecursively+0x88b
ffffe785`04f33300 fffff800`0729b991 : ffffe785`04f334a0 ffffc009`00000000 fffffebf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffe785`04f33400 fffff800`0726baf0 : 00000000`00000001 ffffe785`00000000 ffffc009`35a35590 ffffc009`36283080 : nt!MiDeletePagablePteRange+0x4f1
ffffe785`04f33710 fffff800`076360f9 : ffffc009`3290aa00 00000000`00000000 ffffc009`00000000 ffffc009`00000000 : nt!MiDeleteVad+0x360
ffffe785`04f33820 fffff800`07635790 : ffffc009`3290aa00 ffffc009`2cc804a0 ffffc009`36283080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe785`04f33850 fffff800`07633a5f : 00000000`00000000 00000000`00000000 ffffc009`3290aa00 ffffc009`35a350c0 : nt!MiCleanVad+0x30
ffffe785`04f33880 fffff800`0765db44 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc009`35a350c0 : nt!MmCleanProcessAddressSpace+0x137
ffffe785`04f33900 fffff800`07706b36 : ffffc009`35a350c0 ffffa00a`b810f060 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffe785`04f33990 fffff800`0770a02e : ffffc009`00000000 00000000`00000001 00000000`00000000 00000073`9a034000 : nt!PspExitThread+0x5f6
ffffe785`04f33a90 fffff800`074075b8 : ffffc009`35a350c0 ffffc009`36283080 ffffe785`04f33b80 ffffc009`00000000 : nt!NtTerminateProcess+0xde
ffffe785`04f33b00 00007ffc`d678d194 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000073`9a27fc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d678d194


SYMBOL_NAME: nt!MiDereferenceIoPages+16a86c

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.867

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 16a86c

FAILURE_BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {16899f95-043e-78ea-0aba-e664d76c4fc5}

Followup: MachineOwner
---------[/CODE]
 

Geri
Yukarı