RX580 Mavi Ekran Hatası

İşletim sistemi
Windows 10

aliefe0

Femtopat
Katılım
26 Aralık 2020
Mesajlar
2
Daha fazla  
Cinsiyet
Erkek
6 Ay önce yeni PC aldım sorunsuz ilerlerken 2 hafta önce mavi ekran hatası aldım. Kendi kendine mavi ekran hatası vermedi 2 haftadır fakat bugün yine vermeye başladı ve çok sık oluyor. BlueScreenView dosyalarını paylaştım ve daha önce kontrol etiğimde dump dosyalarını yine bu 3'ü beni karşılamıştı. Yardımcı olursanız çok sevinirim.

Sistem Özellikleri:
Ekran Kartı: ASUS AREZ Dual RX580
İşlemci. i5 9400F
RAM: HyperX 2666 MHz 8 GB
Anankart: ASUS H310M-K Prime
SSD: Crucial BX500 240GB
HDD: WD Blue 3, 5" 1TB
Kasanın soğutması iyi ısınma problemi yaşamıyorum.

 

Dosya Ekleri

  • Ekran Görüntüsü (569).png
    Ekran Görüntüsü (569).png
    164 KB · Görüntüleme: 33
  • Ekran Görüntüsü (570).png
    Ekran Görüntüsü (570).png
    163,1 KB · Görüntüleme: 38
  • Ekran Görüntüsü (571).png
    Ekran Görüntüsü (571).png
    163,7 KB · Görüntüleme: 27
  • Ekran Görüntüsü (572).png
    Ekran Görüntüsü (572).png
    163,7 KB · Görüntüleme: 36
Minidump dosyalarınızı bizimle paylaşmaya ne dersiniz?

 
@aliefe0,
  • BIOS'unuz güncel değil, güncelleyin.
  • Vanguard'ı kaldırın.
  • DDU ile GPU sürücülerinizi kaldırın ve WHQL onaylı güncel sürücüyü kurun.
  • PSU ve ekran kartınıza güveniyorsanız OCCT ile 3D ve VRAM testi yapabilirsiniz. Yapabilirseniz iyi olur çünkü 5 mavi ekrandan 3'ü ekran kartınızı gösteriyor.
    • Beşer dakika yapmak, sorunun ortaya çıkması için çoğunlukla yeterli oluyor.
    • Yapacaksanız DDU rehberini uygulayıp güncel sürücüyü kurduktan sonra yapın.
Kod:
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8061128d330, The address that the exception occurred at
Arg3: ffff8a08ae9369a8, Exception Record Address
Arg4: ffff8a08ae9361e0, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 2640

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3257

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8061128d330

BUGCHECK_P3: ffff8a08ae9369a8

BUGCHECK_P4: ffff8a08ae9361e0

EXCEPTION_RECORD:  ffff8a08ae9369a8 -- (.exr 0xffff8a08ae9369a8)
ExceptionAddress: fffff8061128d330 (atikmdag+0x000000000014d330)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000001938
Attempt to read from address 0000000000001938

CONTEXT:  ffff8a08ae9361e0 -- (.cxr 0xffff8a08ae9361e0)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000009 rsi=ffffa185a7c670a0 rdi=0000000000000000
rip=fffff8061128d330 rsp=ffff8a08ae936be0 rbp=0000000000000009
r8=0000000000000000  r9=0000000000000000 r10=ffffa185a521b000
r11=ffff8a08ae936b20 r12=0000000000000000 r13=ffffa185a521aa40
r14=ffffa185a7c670a0 r15=ffffa185a78e8020
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00050282
atikmdag+0x14d330:
fffff806`1128d330 448b9138190000  mov     r10d,dword ptr [rcx+1938h] ds:002b:00000000`00001938=????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

READ_ADDRESS: fffff806098fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8060980f330: Unable to get Flags value from nt!KdVersionBlock
fffff8060980f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000001938

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek  u olamaz %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000001938

EXCEPTION_STR:  0xc0000005

STACK_TEXT:
ffff8a08`ae936be0 ffffa185`a7f58000     : 00000000`00000000 00000000`00000000 00000000`00888000 ffffa185`a7c670a0 : atikmdag+0x14d330
ffff8a08`ae936be8 00000000`00000000     : 00000000`00000000 00000000`00888000 ffffa185`a7c670a0 fffff806`113aa55c : 0xffffa185`a7f58000


SYMBOL_NAME:  atikmdag+14d330

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

STACK_COMMAND:  .cxr 0xffff8a08ae9361e0 ; kb

BUCKET_ID_FUNC_OFFSET:  14d330

FAILURE_BUCKET_ID:  AV_atikmdag!unknown_function

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {0252e3ed-fc29-a2ca-0f7a-b32a5492113a}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: ffff890a490073d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff890a49007328, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2702

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3859

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: ffff890a490073d0

BUGCHECK_P3: ffff890a49007328

BUGCHECK_P4: 0

TRAP_FRAME:  ffff890a490073d0 -- (.trap 0xffff890a490073d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb306240877d0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffffb306301b6770 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803558a3dda rsp=ffff890a49007560 rbp=ffffb3062dbefed0
r8=0000000000000001  r9=ffffb306301b6770 r10=ffffb306201c03d0
r11=ffffb3062ab3e708 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
nt!RtlpTreeDoubleRotateNodes+0x16a:
fffff803`558a3dda cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff890a49007328 -- (.exr 0xffff890a49007328)
ExceptionAddress: fffff803558a3dda (nt!RtlpTreeDoubleRotateNodes+0x000000000000016a)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff890a`490070a8 fffff803`55a07769     : 00000000`00000139 00000000`0000001d ffff890a`490073d0 ffff890a`49007328 : nt!KeBugCheckEx
ffff890a`490070b0 fffff803`55a07b90     : 00000000`00000000 ffff8b8c`f04df1e0 00000005`f05e2000 00000001`00100000 : nt!KiBugCheckDispatch+0x69
ffff890a`490071f0 fffff803`55a05f23     : 00000001`00000001 00000000`00000000 00000000`00000000 ffff890a`49007468 : nt!KiFastFailDispatch+0xd0
ffff890a`490073d0 fffff803`558a3dda     : 00000000`00000003 fffff803`558a2d8e ffffb306`2ab3e700 00000000`00000003 : nt!KiRaiseSecurityCheckFailure+0x323
ffff890a`49007560 fffff803`558a2d8e     : ffffb306`2ab3e700 00000000`00000003 00000000`00000002 ffff8b8c`f0de7478 : nt!RtlpTreeDoubleRotateNodes+0x16a
ffff890a`49007570 fffff803`509b16a0     : ffffb306`221958a0 ffffb306`240877d0 00000000`00000060 fffff803`55860913 : nt!RtlAvlInsertNodeEx+0x16e
ffff890a`490075b0 fffff803`509b155f     : 00000000`00140000 ffffb306`221958a0 ffffb306`22197848 ffffb306`2dbefed0 : dxgmms2!CVirtualAddressAllocator::InsertVadToFreeList+0x74
ffff890a`49007610 fffff803`509b2edf     : 00000000`00000000 ffffb306`221958a0 ffffb306`25eba988 ffffb306`25eba980 : dxgmms2!CVirtualAddressAllocator::FreeVadVirtualAddressRangeInternal+0x10b
ffff890a`49007690 fffff803`509b3104     : ffffb306`25eba998 ffffb306`262dc900 ffffb306`2dbefed0 ffffb306`1d765e01 : dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0xdf
ffff890a`490076e0 fffff803`509b3271     : 00000000`00000000 00000000`00000079 ffff890a`49007880 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::FreeAllocMappedVaRangeList+0x188
ffff890a`49007780 fffff803`509caa32     : ffffb306`1d765e30 ffff8b8c`00000001 00000000`00000001 ffffb306`1d6aa260 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0x11d
ffff890a`49007900 fffff803`509d43d9     : ffffb306`1d6aa1f0 ffff8b8c`f05f4201 00000000`00000000 00000000`0ee34400 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462
ffff890a`49007ae0 fffff803`55917e25     : ffff8b8c`f05f4280 fffff803`509d43d0 ffffb306`1d6aa1f0 000fa4ef`b59bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff890a`49007b10 fffff803`559fcdd8     : fffff803`504a6180 ffff8b8c`f05f4280 fffff803`55917dd0 00360032`00330038 : nt!PspSystemThreadStartup+0x55
ffff890a`49007b60 00000000`00000000     : ffff890a`49008000 ffff890a`49001000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!CVirtualAddressAllocator::InsertVadToFreeList+74

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1131

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  74

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_dxgmms2!CVirtualAddressAllocator::InsertVadToFreeList

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {bb8816d8-0f5b-2b93-2f43-33ec643f6bbe}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff73ffed30000
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3387

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff73ffed30000

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
ffffe089`4cf87408 fffff807`25a9d0fa     : 00000000`0000001a 00000000`00041792 fffff73f`fed30000 00000000`10000000 : nt!KeBugCheckEx
ffffe089`4cf87410 fffff807`25a0b9e6     : 00000000`00000000 ffffd084`67b31700 00000000`00000007 fffff73f`fed30000 : nt!MiDeleteVa+0x153a
ffffe089`4cf87510 fffff807`25a0bafb     : fffff77b`9fff6980 ffffd084`67b31700 ffffe089`00000000 ffffe089`4cf87980 : nt!MiWalkPageTablesRecursively+0x776
ffffe089`4cf875b0 fffff807`25a0bafb     : fffff77b`bdcfffb0 ffffd084`67b31700 ffffe089`00000001 ffffe089`4cf87990 : nt!MiWalkPageTablesRecursively+0x88b
ffffe089`4cf87650 fffff807`25a0bafb     : fffff77b`bdcff000 ffffd084`67b31700 ffffe089`00000002 ffffe089`4cf879a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffe089`4cf876f0 fffff807`25a5de6b     : ffff68f3`8ef69d85 ffffd084`67b31700 ffffe089`00000003 ffffe089`4cf879b0 : nt!MiWalkPageTablesRecursively+0x88b
ffffe089`4cf87790 fffff807`25a9b991     : ffffe089`4cf87930 ffffd084`00000000 fffff77b`00000002 ffffffff`00000000 : nt!MiWalkPageTables+0x36b
ffffe089`4cf87890 fffff807`25a6baf0     : 00000000`00000001 ffffe089`00000000 ffffd084`67b31550 ffffd084`60f8b080 : nt!MiDeletePagablePteRange+0x4f1
ffffe089`4cf87ba0 fffff807`25e35c99     : ffffd084`646059c0 00000000`00000000 00000000`00000000 ffffd084`00000000 : nt!MiDeleteVad+0x360
ffffe089`4cf87cb0 fffff807`25e35a72     : ffffd084`6b624720 00007ffd`a5f30000 ffffd084`67b31080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe089`4cf87ce0 fffff807`25e358e9     : ffffd084`60f8b080 fffff807`25c071b5 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffffe089`4cf87dc0 fffff807`25ed8ecc     : ffffd084`60f8b080 00000148`268e8680 00000000`00000001 ffffd084`67b31080 : nt!NtUnmapViewOfSectionEx+0x99
ffffe089`4cf87e10 fffff807`25c071b5     : 00000000`00000000 00000148`00000000 00000000`00000000 00000000`00000000 : nt!NtUnmapViewOfSection+0xc
ffffe089`4cf87e40 00007ffd`a66cc4f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000035`429fe978 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`a66cc4f4


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa43fff070d80
Arg3: 0000000010000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3108

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 3121

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffa43fff070d80

BUGCHECK_P3: 10000000

BUGCHECK_P4: 0

MEMORY_CORRUPTOR:  ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WerFault.exe

STACK_TEXT:
ffffbc81`6f106c48 fffff806`4849d0fa     : 00000000`0000001a 00000000`00041792 ffffa43f`ff070d80 00000000`10000000 : nt!KeBugCheckEx
ffffbc81`6f106c50 fffff806`4840b9e6     : 00000000`00000000 00000000`00000000 00000000`00000004 ffffa43f`ff070d80 : nt!MiDeleteVa+0x153a
ffffbc81`6f106d50 fffff806`4840bafb     : ffffa452`1fff8380 ffffe401`6b084740 ffffbc81`00000000 ffffbc81`6f1071c0 : nt!MiWalkPageTablesRecursively+0x776
ffffbc81`6f106df0 fffff806`4840bafb     : ffffa452`290fffc0 ffffe401`6b084740 ffffbc81`00000001 ffffbc81`6f1071d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffbc81`6f106e90 fffff806`4840bafb     : ffffa452`290ff000 ffffe401`6b084740 ffffbc81`00000002 ffffbc81`6f1071e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffbc81`6f106f30 fffff806`4845de6b     : 00000000`00000000 ffffe401`6b084740 00000000`00000003 ffffbc81`6f1071f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffbc81`6f106fd0 fffff806`4849b991     : ffffbc81`6f107170 ffffe401`00000000 ffffa43f`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffbc81`6f1070d0 fffff806`4846baf0     : 00000000`00000001 ffffbc81`00000000 ffffe401`6b084590 ffffe401`6b0e7080 : nt!MiDeletePagablePteRange+0x4f1
ffffbc81`6f1073e0 fffff806`48835c99     : ffffe401`6ae90b40 00000000`00000000 ffffe401`00000000 ffffe401`00000000 : nt!MiDeleteVad+0x360
ffffbc81`6f1074f0 fffff806`48835330     : ffffe401`6ae90b40 ffffe401`6b084d60 ffffe401`6b0e7080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffbc81`6f107520 fffff806`488335ff     : ffffe401`6ae90aa0 ffffe401`6ae90aa0 ffffe401`6ae90b40 ffffe401`6b0840c0 : nt!MiCleanVad+0x30
ffffbc81`6f107550 fffff806`4885d6e4     : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe401`6b0840c0 : nt!MmCleanProcessAddressSpace+0x137
ffffbc81`6f1075d0 fffff806`48906596     : ffffe401`6b0840c0 ffff808b`2e7a2770 ffffbc81`6f107820 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffbc81`6f107660 fffff806`488d22e8     : 00000000`c000007b 00000000`00000001 ffffbc81`6f107890 000000b7`7ee94000 : nt!PspExitThread+0x5f6
ffffbc81`6f107760 fffff806`48467fb7     : ffffa452`1fff0101 00000000`00000000 ffffe401`6adcec10 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffbc81`6f1077a0 fffff806`485f9d20     : 000001fc`c1e52d00 ffffbc81`6f107850 000000b7`7eddf978 ffffe401`00000000 : nt!KiDeliverApc+0x487
ffffbc81`6f107850 fffff806`4860725f     : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe401`6adcec10 : nt!KiInitiateUserApc+0x70
ffffbc81`6f107990 00007ffe`10a8fa04     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000b7`7eddf928 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`10a8fa04


MODULE_NAME: hardware

IMAGE_NAME:  memory_corruption

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     MachineOwner
---------

PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000057917, page frame number
Arg3: 0000000000000002, current page state
Arg4: 040000a0000ac216, 0

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7203

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 16089

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 57917

BUGCHECK_P3: 2

BUGCHECK_P4: 40000a0000ac216

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff406`bb1c5f08 fffff801`6929de00     : 00000000`0000004e 00000000`00000099 00000000`00057917 00000000`00000002 : nt!KeBugCheckEx
fffff406`bb1c5f10 fffff801`69093c99     : 1a000001`4a2f5867 80000000`00000000 00000000`00000001 00000000`00000016 : nt!MiDecrementShareCount+0x14ae50
fffff406`bb1c5f50 fffff801`6901d15f     : fffff406`bb1c6380 ffff988f`049d1080 00000000`00000000 fffff406`bb1c6c40 : nt!MiDeletePteList+0x2d9
fffff406`bb1c6030 fffff801`6942ed3d     : ffff988e`fe069080 ffff988f`007d0718 ffff988e`00000002 ffff988f`00000000 : nt!MiDecommitPages+0x43f
fffff406`bb1c6c00 fffff801`6942e3a3     : fffff406`bb1c6d80 00000000`00000000 fffff406`bb1c6d80 ffff988f`007d06f0 : nt!MiDecommitRegion+0x7d
fffff406`bb1c6c80 fffff801`6942dc95     : ffffc401`bf200100 fffff801`6904caf2 ffffc401`bf200340 ffffc401`d61d7cff : nt!MmFreeVirtualMemory+0x6d3
fffff406`bb1c6dd0 fffff801`692071b5     : ffff988e`fe069080 01800040`00000000 00000000`00000000 00000000`4b677844 : nt!NtFreeVirtualMemory+0x95
fffff406`bb1c6e30 fffff801`691f95e0     : fffff801`650b6448 ffffc401`cd791a60 fffff406`bb1c7089 ffffc401`cd791a60 : nt!KiSystemServiceCopyEnd+0x25
fffff406`bb1c6fc8 fffff801`650b6448     : ffffc401`cd791a60 fffff406`bb1c7089 ffffc401`cd791a60 fffff801`650b8c97 : nt!KiServiceLinkage
fffff406`bb1c6fd0 fffff801`650b4c5a     : 00000000`00190000 ffff988f`0420c330 ffff988f`0420c940 ffffc401`cd783720 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
fffff406`bb1c7020 fffff801`650430c4     : 00000000`00000000 00000000`00000001 ffff988e`fec9a890 ffff988e`fec9ac30 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::~VIDMM_RECYCLE_HEAP_MGR+0x34a
fffff406`bb1c70f0 fffff801`650b5220     : ffffc401`dcf98070 fffff801`00000000 ffff988e`ffca9088 01000000`00100000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::`vector deleting destructor'+0x14
fffff406`bb1c7120 fffff801`65043112     : ffffc401`dcf98070 ffffc401`c3cc4b30 ffff988e`fec9a890 00000000`00000070 : dxgmms2!VIDMM_PROCESS::~VIDMM_PROCESS+0xa0
fffff406`bb1c7150 fffff801`6c7a8a44     : 00000000`00000001 ffffc401`c3cc4c00 ffffc401`00000000 00000000`00000023 : dxgmms2!VidMmTerminateProcess+0x12
fffff406`bb1c7180 fffff801`6c7a8547     : ffff988f`05fe47d0 fffff406`bb1c72b0 00000000`00000400 ffffc401`c3cc4b30 : dxgkrnl!VidMmTerminateProcessX+0x64
fffff406`bb1c71b0 fffff801`6c7a38e5     : ffffc401`c3cc4b30 ffff988f`049d1080 ffffc401`c3cc4b30 00000000`00040282 : dxgkrnl!DXGPROCESS::Destroy+0x1bf
fffff406`bb1c7420 fffff801`6c696b67     : 00000000`00000000 ffffc401`c3cc4b30 ffff988e`fb6edd30 fffff406`bb1c7580 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffff406`bb1c7570 fffff801`6943759f     : 00000000`00000000 ffff988f`049d1080 ffff988e`fb6ed790 fffff801`01046000 : dxgkrnl!DxgkProcessNotify+0xf7
fffff406`bb1c75d0 fffff801`69462894     : ffff988f`049d1000 ffff988f`049d1080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffff406`bb1c76a0 fffff801`69506552     : ffff988e`fe0694b8 00000000`00000000 fffff406`bb1c7890 00000000`00000000 : nt!PspExitProcess+0x70
fffff406`bb1c76d0 fffff801`694d22e8     : ffff988e`00000022 00000000`00000001 fffff406`bb1c78e0 00000017`7cda0000 : nt!PspExitThread+0x5b2
fffff406`bb1c77d0 fffff801`69067fb7     : 00000000`408d0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffff406`bb1c7810 fffff801`691f9d20     : 00000017`017ffb08 fffff406`bb1c78c0 fffff406`bb1c7a80 000001a1`00000000 : nt!KiDeliverApc+0x487
fffff406`bb1c78c0 fffff801`6920725f     : ffff988e`fe069080 00000000`00000000 fffff406`bb1c7a18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
fffff406`bb1c7a00 00007ff9`a10ec034     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000017`017ffad8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a10ec034


SYMBOL_NAME:  nt!MiDecrementShareCount+14ae50

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.685

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  14ae50

FAILURE_BUCKET_ID:  0x4E_99_nt!MiDecrementShareCount

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {add373c4-2fe4-723e-d1db-12fcb6adef02}

Followup:     MachineOwner
---------
 
Son düzenleme:

Geri
Yukarı