*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff80722f17350, Address of the instruction which caused the BugCheck
Arg3: ffffac8e528de870, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7427
Key : Analysis.Init.CPU.mSec
Value: 2249
Key : Analysis.Init.Elapsed.mSec
Value: 56248
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092222-6921-01.dmp
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80722f17350
BUGCHECK_P3: ffffac8e528de870
BUGCHECK_P4: 0
CONTEXT: ffffac8e528de870 -- (.cxr 0xffffac8e528de870)
rax=ffff9c01c2c68a48 rbx=0000000000000000 rcx=ffffac8e528df2b8
rdx=0000000000000000 rsi=0000000000000004 rdi=ffffba0ebbccbbd0
rip=fffff80722f17350 rsp=ffffac8e528df270 rbp=ffffac8e528df329
r8=ffffba0ebbccbbd0 r9=ffffba0ebd911230 r10=ffffba0ebd911230
r11=0000000000000000 r12=ffffac8e528df590 r13=0000000000000000
r14=000000000000d9db r15=ffff9c01c2c10000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050202
nt!MiProcessCrcList+0x580:
fffff807`22f17350 488b7610 mov rsi,qword ptr [rsi+10h] ds:002b:00000000`00000014=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffac8e`528df270 fffff807`22f17a47 : 00000000`00000000 ffffb080`0cbda7d0 00000000`00000080 00000000`00000001 : nt!MiProcessCrcList+0x580
ffffac8e`528df390 fffff807`22f16b70 : 00000000`00000000 00000000`00000000 ffffac8e`528df5c0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x4e7
ffffac8e`528df4c0 fffff807`22f1694e : 00000000`0000000d 00000084`5a9ffdf0 00000000`00000000 00000000`00000002 : nt!MiCombineIdenticalPages+0x214
ffffac8e`528df730 fffff807`22e44fbe : 00000000`00000000 00000000`00000000 ffff8700`7439f180 00000000`00000001 : nt!MmCombineIdenticalPages+0x42
ffffac8e`528df770 fffff807`22c09bf1 : ffffba0e`b7da4080 00000000`00000000 ffffac8e`528dfb80 00000000`00000000 : nt!NtSetSystemInformation+0x140e
ffffac8e`528dfb00 00007ffe`24030274 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
00000084`5a9ffd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`24030274
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffac14152a2070 - win32kbase!hbmCreateDriverSurface+4c
[ 4c:48 ]
ffffac14152a2072-ffffac14152a2095 36 bytes - win32kbase!hbmCreateDriverSurface+4e (+0x02)
[ 45 7f 0f ba f1 0f 89 45:02 49 3b 00 77 09 1b c0 ]
ffffac14152a2097-ffffac14152a20c2 44 bytes - win32kbase!hbmCreateDriverSurface+73 (+0x25)
[ 85 c9 74 36 83 e9 01 0f:88 01 85 d2 0f 84 8d 00 ]
ffffac14152a20c4-ffffac14152a20c7 4 bytes - win32kbase!hbmCreateDriverSurface+a0 (+0x2d)
[ 83 f9 01 75:8d 4a 58 eb ]
ffffac14152a20c9-ffffac14152a20d4 12 bytes - win32kbase!hbmCreateDriverSurface+a5 (+0x05)
[ 41 c1 e9 02 44 89 4d 13:b8 40 00 00 00 8d 48 10 ]
ffffac14152a20d6-ffffac14152a20f7 34 bytes - win32kbase!hbmCreateDriverSurface+b2 (+0x0d)
[ 8d 55 0f 89 7c 24 48 4d:85 d2 74 0c f3 0f 11 12 ]
ffffac14152a20f9-ffffac14152a212e 54 bytes - win32kbase!hbmCreateDriverSurface+d5 (+0x23)
[ 00 89 7d 0b 48 8d 4d ff:8d 4a 5b eb d3 b8 00 10 ]
ffffac14152a2130-ffffac14152a216f 64 bytes - win32kbase!hbmCreateDriverSurface+10c (+0x37)
[ 85 f6 75 65 0f ba 68 70:02 00 00 b9 68 00 00 00 ]
ffffac14152ad070-ffffac14152ad074 5 bytes - win32kbase!HmgReferenceCheckLock+70 (+0xaf40)
[ 0f b7 4e 02 44:48 83 ec 28 48 ]
ffffac14152ad076-ffffac14152ad0bb 70 bytes - win32kbase!HmgReferenceCheckLock+76 (+0x06)
[ c0 44 8b 8e 08 08 00 00:ca e8 24 7e f9 ff 48 83 ]
ffffac14152ad0bd-ffffac14152ad16f 179 bytes - win32kbase!HmgReferenceCheckLock+bd (+0x47)
[ 0f b6 c8 48 8b 00 48 03:83 e8 02 0f 84 db 34 06 ]
ffffac14152af180-ffffac14152af1e2 99 bytes - win32kbase!NSInstrumentation::CSectionEntry<180224,704>::Initialize+18 (+0x20c3)
[ 89 43 10 48 85 c0 74 36:48 83 ec 28 8b ca 45 33 ]
ffffac14152af1ef - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+27 (+0x6f)
[ 48:44 ]
ffffac14152af1f1-ffffac14152af21d 45 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+29 (+0x02)
[ d8 48 85 c0 0f 84 16 19:c9 33 db 48 21 58 20 0f ]
ffffac14152af21f-ffffac14152af23f 33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+57 (+0x2e)
[ 00 00 84 c0 0f 84 ef 18:49 8d 48 08 49 3b c8 72 ]
ffffac14152af241-ffffac14152af261 33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+1 (+0x22)
[ 89 5c 24 10 57 48 83 ec:3b ca 72 0c 48 8b 05 f4 ]
ffffac14152af26e-ffffac14152af27c 15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x2d)
[ 8b c0 48 8d 4c 24 30 48:c5 0f 10 02 f3 0f 7f 44 ]
729 errors : !win32kbase (ffffac14152a2070-ffffac14152af27c)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffffac8e528de870 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff800ce58052e0
Arg3: 0000000000004000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3499
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 8732
Key : Analysis.Init.CPU.mSec
Value: 2671
Key : Analysis.Init.Elapsed.mSec
Value: 58332
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : MemoryManagement.PFN
Value: 4
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 091722-4015-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff800ce58052e0
BUGCHECK_P3: 4000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
STACK_TEXT:
ffff9b0a`235dadf8 fffff804`49f2abba : 00000000`0000001a 00000000`00041792 ffff800c`e58052e0 00000000`00004000 : nt!KeBugCheckEx
ffff9b0a`235dae00 fffff804`49eedc06 : 00000000`00000000 00000000`00000000 00000000`0000020e ffff800c`e58052e0 : nt!MiDeleteVa+0x153a
ffff9b0a`235daf00 fffff804`49eedd1b : ffff8040`0672c028 ffff8a04`53a04700 ffff9b0a`00000000 ffff9b0a`235db370 : nt!MiWalkPageTablesRecursively+0x776
ffff9b0a`235dafa0 fffff804`49eedd1b : ffff8040`20033960 ffff8a04`53a04700 ffff9b0a`00000001 ffff9b0a`235db380 : nt!MiWalkPageTablesRecursively+0x88b
ffff9b0a`235db040 fffff804`49eedd1b : ffff8040`20033000 ffff8a04`53a04700 ffff9b0a`00000002 ffff9b0a`235db390 : nt!MiWalkPageTablesRecursively+0x88b
ffff9b0a`235db0e0 fffff804`49edcbfb : ffff8040`20100800 ffff8a04`53a04700 00000219`00000003 ffff9b0a`235db3a0 : nt!MiWalkPageTablesRecursively+0x88b
ffff9b0a`235db180 fffff804`49f29451 : ffff9b0a`235db320 ffff8a04`00000000 00000219`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9b0a`235db280 fffff804`49f01670 : 00000000`00000001 ffff9b0a`00000000 ffff8a04`53a04550 ffff8a04`557c2080 : nt!MiDeletePagablePteRange+0x4f1
ffff9b0a`235db590 fffff804`4a29939f : ffff8a04`557c2080 00000000`00000000 ffff8a04`00000000 ffff8a04`00000000 : nt!MiDeleteVad+0x360
ffff9b0a`235db6a0 fffff804`4a2e4dd3 : ffff8a04`57f163c0 ffff8a04`57f163c0 ffff8a04`57f18c10 ffff8a04`53a04080 : nt!MiCleanVad+0x43
ffff9b0a`235db6d0 fffff804`4a281f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8a04`53a04080 : nt!MmCleanProcessAddressSpace+0x137
ffff9b0a`235db750 fffff804`4a29ea8a : ffff8a04`53a04080 ffffe60d`2e3657b0 ffff9b0a`235db990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff9b0a`235db7d0 fffff804`4a1f4558 : ffff8a04`c0000005 00000863`00000001 ffff9b0a`235db9e0 000000d4`c706f000 : nt!PspExitThread+0x5f6
ffff9b0a`235db8d0 fffff804`49ee6ca7 : 00000000`40610088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff9b0a`235db910 fffff804`49ff8440 : 000000d4`c7dff4c8 ffff9b0a`235db9c0 ffff9b0a`235dbb80 00000863`00000000 : nt!KiDeliverApc+0x487
ffff9b0a`235db9c0 fffff804`4a00595f : ffff8a04`557c2080 00000000`00000000 ffff9b0a`235dbb18 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70
ffff9b0a`235dbb00 00007ffe`2304be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000d4`c7dff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2304be44
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000026de7, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803434136b9, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6671
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 23171
Key : Analysis.Init.CPU.mSec
Value: 2593
Key : Analysis.Init.Elapsed.mSec
Value: 59909
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092222-10171-01.dmp
BUGCHECK_CODE: a
BUGCHECK_P1: 26de7
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803434136b9
READ_ADDRESS: fffff80343efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000026de7
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffaa8fcb931310 -- (.trap 0xffffaa8fcb931310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000008080 rbx=0000000000000000 rcx=ffffe30007943040
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803434136b9 rsp=ffffaa8fcb9314a0 rbp=ffffaa8fcb931579
r8=ffff860ae3163210 r9=0000000000000000 r10=ffffe170b85c2000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiPfPutPagesInTransition+0x2c9:
fffff803`434136b9 498b0f mov rcx,qword ptr [r15] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffaa8f`cb9311c8 fffff803`43609c69 : 00000000`0000000a 00000000`00026de7 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaa8f`cb9311d0 fffff803`43605f69 : 00000000`00206d70 00000000`00206d70 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaa8f`cb931310 fffff803`434136b9 : ffff860a`00000000 ffffaa8f`cb931579 00000000`00000000 80000002`86bac963 : nt!KiPageFault+0x469
ffffaa8f`cb9314a0 fffff803`4383a2e3 : ffff860a`e2f992f0 00000000`00000000 ffff860a`00000000 00000000`00000000 : nt!MiPfPutPagesInTransition+0x2c9
ffffaa8f`cb9315e0 fffff803`434d0c97 : ffff860a`df2b0d30 ffffaa8f`cb9317f0 ffff860a`e2f992f0 ffff860a`e5085390 : nt!MmPrefetchForCacheManager+0xb7
ffffaa8f`cb931640 fffff803`435b5930 : ffff860a`00020000 00000000`00000000 00000000`033c0000 ffff860a`d3424080 : nt!CcAsyncReadPrefetch+0x13f
ffffaa8f`cb9316f0 fffff803`434eea75 : ffff860a`d3424080 ffff860a`d3424080 fffff803`435b57a0 ffff860a`d33f9920 : nt!CcAsyncReadWorker+0x190
ffffaa8f`cb931c10 fffff803`435ff3b8 : ffff9681`803e8180 ffff860a`d3424080 fffff803`434eea20 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffaa8f`cb931c60 00000000`00000000 : ffffaa8f`cb932000 ffffaa8f`cb92c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiPfPutPagesInTransition+2c9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1706
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 2c9
FAILURE_BUCKET_ID: AV_nt!MiPfPutPagesInTransition
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d4722b20-c317-dab0-0f83-fcc7584d2184}
Followup: MachineOwner
---------
teşekkürler hocam test edicem şimdiGenel itibarıyla RAM ile alakalı bir sıkıntı var.
Aşağıdaki rehberi uygulayın ve RAM'lerinizin testten geçip geçmediğini paylaşmayı unutmayın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Dökümler:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff80722f17350, Address of the instruction which caused the BugCheck Arg3: ffffac8e528de870, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5530 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 7427 Key : Analysis.Init.CPU.mSec Value: 2249 Key : Analysis.Init.Elapsed.mSec Value: 56248 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092222-6921-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80722f17350 BUGCHECK_P3: ffffac8e528de870 BUGCHECK_P4: 0 CONTEXT: ffffac8e528de870 -- (.cxr 0xffffac8e528de870) rax=ffff9c01c2c68a48 rbx=0000000000000000 rcx=ffffac8e528df2b8 rdx=0000000000000000 rsi=0000000000000004 rdi=ffffba0ebbccbbd0 rip=fffff80722f17350 rsp=ffffac8e528df270 rbp=ffffac8e528df329 r8=ffffba0ebbccbbd0 r9=ffffba0ebd911230 r10=ffffba0ebd911230 r11=0000000000000000 r12=ffffac8e528df590 r13=0000000000000000 r14=000000000000d9db r15=ffff9c01c2c10000 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050202 nt!MiProcessCrcList+0x580: fffff807`22f17350 488b7610 mov rsi,qword ptr [rsi+10h] ds:002b:00000000`00000014=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffffac8e`528df270 fffff807`22f17a47 : 00000000`00000000 ffffb080`0cbda7d0 00000000`00000080 00000000`00000001 : nt!MiProcessCrcList+0x580 ffffac8e`528df390 fffff807`22f16b70 : 00000000`00000000 00000000`00000000 ffffac8e`528df5c0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x4e7 ffffac8e`528df4c0 fffff807`22f1694e : 00000000`0000000d 00000084`5a9ffdf0 00000000`00000000 00000000`00000002 : nt!MiCombineIdenticalPages+0x214 ffffac8e`528df730 fffff807`22e44fbe : 00000000`00000000 00000000`00000000 ffff8700`7439f180 00000000`00000001 : nt!MmCombineIdenticalPages+0x42 ffffac8e`528df770 fffff807`22c09bf1 : ffffba0e`b7da4080 00000000`00000000 ffffac8e`528dfb80 00000000`00000000 : nt!NtSetSystemInformation+0x140e ffffac8e`528dfb00 00007ffe`24030274 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 00000084`5a9ffd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`24030274 CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase ffffac14152a2070 - win32kbase!hbmCreateDriverSurface+4c [ 4c:48 ] ffffac14152a2072-ffffac14152a2095 36 bytes - win32kbase!hbmCreateDriverSurface+4e (+0x02) [ 45 7f 0f ba f1 0f 89 45:02 49 3b 00 77 09 1b c0 ] ffffac14152a2097-ffffac14152a20c2 44 bytes - win32kbase!hbmCreateDriverSurface+73 (+0x25) [ 85 c9 74 36 83 e9 01 0f:88 01 85 d2 0f 84 8d 00 ] ffffac14152a20c4-ffffac14152a20c7 4 bytes - win32kbase!hbmCreateDriverSurface+a0 (+0x2d) [ 83 f9 01 75:8d 4a 58 eb ] ffffac14152a20c9-ffffac14152a20d4 12 bytes - win32kbase!hbmCreateDriverSurface+a5 (+0x05) [ 41 c1 e9 02 44 89 4d 13:b8 40 00 00 00 8d 48 10 ] ffffac14152a20d6-ffffac14152a20f7 34 bytes - win32kbase!hbmCreateDriverSurface+b2 (+0x0d) [ 8d 55 0f 89 7c 24 48 4d:85 d2 74 0c f3 0f 11 12 ] ffffac14152a20f9-ffffac14152a212e 54 bytes - win32kbase!hbmCreateDriverSurface+d5 (+0x23) [ 00 89 7d 0b 48 8d 4d ff:8d 4a 5b eb d3 b8 00 10 ] ffffac14152a2130-ffffac14152a216f 64 bytes - win32kbase!hbmCreateDriverSurface+10c (+0x37) [ 85 f6 75 65 0f ba 68 70:02 00 00 b9 68 00 00 00 ] ffffac14152ad070-ffffac14152ad074 5 bytes - win32kbase!HmgReferenceCheckLock+70 (+0xaf40) [ 0f b7 4e 02 44:48 83 ec 28 48 ] ffffac14152ad076-ffffac14152ad0bb 70 bytes - win32kbase!HmgReferenceCheckLock+76 (+0x06) [ c0 44 8b 8e 08 08 00 00:ca e8 24 7e f9 ff 48 83 ] ffffac14152ad0bd-ffffac14152ad16f 179 bytes - win32kbase!HmgReferenceCheckLock+bd (+0x47) [ 0f b6 c8 48 8b 00 48 03:83 e8 02 0f 84 db 34 06 ] ffffac14152af180-ffffac14152af1e2 99 bytes - win32kbase!NSInstrumentation::CSectionEntry<180224,704>::Initialize+18 (+0x20c3) [ 89 43 10 48 85 c0 74 36:48 83 ec 28 8b ca 45 33 ] ffffac14152af1ef - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+27 (+0x6f) [ 48:44 ] ffffac14152af1f1-ffffac14152af21d 45 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+29 (+0x02) [ d8 48 85 c0 0f 84 16 19:c9 33 db 48 21 58 20 0f ] ffffac14152af21f-ffffac14152af23f 33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+57 (+0x2e) [ 00 00 84 c0 0f 84 ef 18:49 8d 48 08 49 3b c8 72 ] ffffac14152af241-ffffac14152af261 33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+1 (+0x22) [ 89 5c 24 10 57 48 83 ec:3b ca 72 0c 48 8b 05 f4 ] ffffac14152af26e-ffffac14152af27c 15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x2d) [ 8b c0 48 8d 4c 24 30 48:c5 0f 10 02 f3 0f 7f 44 ] 729 errors : !win32kbase (ffffac14152a2070-ffffac14152af27c) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: LARGE STACK_COMMAND: .cxr 0xffffac8e528de870 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption ---------
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffff800ce58052e0 Arg3: 0000000000004000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3499 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 8732 Key : Analysis.Init.CPU.mSec Value: 2671 Key : Analysis.Init.Elapsed.mSec Value: 58332 Key : Analysis.Memory.CommitPeak.Mb Value: 91 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : MemoryManagement.PFN Value: 4 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 091722-4015-01.dmp BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffff800ce58052e0 BUGCHECK_P3: 4000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe STACK_TEXT: ffff9b0a`235dadf8 fffff804`49f2abba : 00000000`0000001a 00000000`00041792 ffff800c`e58052e0 00000000`00004000 : nt!KeBugCheckEx ffff9b0a`235dae00 fffff804`49eedc06 : 00000000`00000000 00000000`00000000 00000000`0000020e ffff800c`e58052e0 : nt!MiDeleteVa+0x153a ffff9b0a`235daf00 fffff804`49eedd1b : ffff8040`0672c028 ffff8a04`53a04700 ffff9b0a`00000000 ffff9b0a`235db370 : nt!MiWalkPageTablesRecursively+0x776 ffff9b0a`235dafa0 fffff804`49eedd1b : ffff8040`20033960 ffff8a04`53a04700 ffff9b0a`00000001 ffff9b0a`235db380 : nt!MiWalkPageTablesRecursively+0x88b ffff9b0a`235db040 fffff804`49eedd1b : ffff8040`20033000 ffff8a04`53a04700 ffff9b0a`00000002 ffff9b0a`235db390 : nt!MiWalkPageTablesRecursively+0x88b ffff9b0a`235db0e0 fffff804`49edcbfb : ffff8040`20100800 ffff8a04`53a04700 00000219`00000003 ffff9b0a`235db3a0 : nt!MiWalkPageTablesRecursively+0x88b ffff9b0a`235db180 fffff804`49f29451 : ffff9b0a`235db320 ffff8a04`00000000 00000219`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffff9b0a`235db280 fffff804`49f01670 : 00000000`00000001 ffff9b0a`00000000 ffff8a04`53a04550 ffff8a04`557c2080 : nt!MiDeletePagablePteRange+0x4f1 ffff9b0a`235db590 fffff804`4a29939f : ffff8a04`557c2080 00000000`00000000 ffff8a04`00000000 ffff8a04`00000000 : nt!MiDeleteVad+0x360 ffff9b0a`235db6a0 fffff804`4a2e4dd3 : ffff8a04`57f163c0 ffff8a04`57f163c0 ffff8a04`57f18c10 ffff8a04`53a04080 : nt!MiCleanVad+0x43 ffff9b0a`235db6d0 fffff804`4a281f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8a04`53a04080 : nt!MmCleanProcessAddressSpace+0x137 ffff9b0a`235db750 fffff804`4a29ea8a : ffff8a04`53a04080 ffffe60d`2e3657b0 ffff9b0a`235db990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b ffff9b0a`235db7d0 fffff804`4a1f4558 : ffff8a04`c0000005 00000863`00000001 ffff9b0a`235db9e0 000000d4`c706f000 : nt!PspExitThread+0x5f6 ffff9b0a`235db8d0 fffff804`49ee6ca7 : 00000000`40610088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38 ffff9b0a`235db910 fffff804`49ff8440 : 000000d4`c7dff4c8 ffff9b0a`235db9c0 ffff9b0a`235dbb80 00000863`00000000 : nt!KiDeliverApc+0x487 ffff9b0a`235db9c0 fffff804`4a00595f : ffff8a04`557c2080 00000000`00000000 ffff9b0a`235dbb18 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70 ffff9b0a`235dbb00 00007ffe`2304be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 000000d4`c7dff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2304be44 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000026de7, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff803434136b9, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6671 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 23171 Key : Analysis.Init.CPU.mSec Value: 2593 Key : Analysis.Init.Elapsed.mSec Value: 59909 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092222-10171-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: 26de7 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff803434136b9 READ_ADDRESS: fffff80343efb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000026de7 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffaa8fcb931310 -- (.trap 0xffffaa8fcb931310) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000008080 rbx=0000000000000000 rcx=ffffe30007943040 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff803434136b9 rsp=ffffaa8fcb9314a0 rbp=ffffaa8fcb931579 r8=ffff860ae3163210 r9=0000000000000000 r10=ffffe170b85c2000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MiPfPutPagesInTransition+0x2c9: fffff803`434136b9 498b0f mov rcx,qword ptr [r15] ds:00000000`00000000=???????????????? Resetting default scope STACK_TEXT: ffffaa8f`cb9311c8 fffff803`43609c69 : 00000000`0000000a 00000000`00026de7 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffaa8f`cb9311d0 fffff803`43605f69 : 00000000`00206d70 00000000`00206d70 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffaa8f`cb931310 fffff803`434136b9 : ffff860a`00000000 ffffaa8f`cb931579 00000000`00000000 80000002`86bac963 : nt!KiPageFault+0x469 ffffaa8f`cb9314a0 fffff803`4383a2e3 : ffff860a`e2f992f0 00000000`00000000 ffff860a`00000000 00000000`00000000 : nt!MiPfPutPagesInTransition+0x2c9 ffffaa8f`cb9315e0 fffff803`434d0c97 : ffff860a`df2b0d30 ffffaa8f`cb9317f0 ffff860a`e2f992f0 ffff860a`e5085390 : nt!MmPrefetchForCacheManager+0xb7 ffffaa8f`cb931640 fffff803`435b5930 : ffff860a`00020000 00000000`00000000 00000000`033c0000 ffff860a`d3424080 : nt!CcAsyncReadPrefetch+0x13f ffffaa8f`cb9316f0 fffff803`434eea75 : ffff860a`d3424080 ffff860a`d3424080 fffff803`435b57a0 ffff860a`d33f9920 : nt!CcAsyncReadWorker+0x190 ffffaa8f`cb931c10 fffff803`435ff3b8 : ffff9681`803e8180 ffff860a`d3424080 fffff803`434eea20 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffaa8f`cb931c60 00000000`00000000 : ffffaa8f`cb932000 ffffaa8f`cb92c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiPfPutPagesInTransition+2c9 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.1706 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 2c9 FAILURE_BUCKET_ID: AV_nt!MiPfPutPagesInTransition OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {d4722b20-c317-dab0-0f83-fcc7584d2184} Followup: MachineOwner ---------
Ramleri test ettim ve bir tanesinde çok fazla hata çıktı. onu söküp diğer ram i test ettim ve onda hata bulmadı. TeşekkürlerGenel itibarıyla RAM ile alakalı bir sıkıntı var.
Aşağıdaki rehberi uygulayın ve RAM'lerinizin testten geçip geçmediğini paylaşmayı unutmayın.
Memtest86 USB'den Çalışan RAM Test Programı
RAM'lerinizi test etmek için kullanabileceğiniz en kapsamlı yazılım Memtest86'dır. Aracı USB belleğe yazmak için: Bu video rehberde Memtest86 ile belleklerinizi nasıl test edeceğinizi öğrenebilirsiniz: Adım adım: Öncelikle yazılımı buradan indirin. UEFI desteği olmayan eski sistemler...www.technopat.net
Dökümler:
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff80722f17350, Address of the instruction which caused the BugCheck Arg3: ffffac8e528de870, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5530 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 7427 Key : Analysis.Init.CPU.mSec Value: 2249 Key : Analysis.Init.Elapsed.mSec Value: 56248 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092222-6921-01.dmp BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80722f17350 BUGCHECK_P3: ffffac8e528de870 BUGCHECK_P4: 0 CONTEXT: ffffac8e528de870 -- (.cxr 0xffffac8e528de870) rax=ffff9c01c2c68a48 rbx=0000000000000000 rcx=ffffac8e528df2b8 rdx=0000000000000000 rsi=0000000000000004 rdi=ffffba0ebbccbbd0 rip=fffff80722f17350 rsp=ffffac8e528df270 rbp=ffffac8e528df329 r8=ffffba0ebbccbbd0 r9=ffffba0ebd911230 r10=ffffba0ebd911230 r11=0000000000000000 r12=ffffac8e528df590 r13=0000000000000000 r14=000000000000d9db r15=ffff9c01c2c10000 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00050202 nt!MiProcessCrcList+0x580: fffff807`22f17350 488b7610 mov rsi,qword ptr [rsi+10h] ds:002b:00000000`00000014=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffffac8e`528df270 fffff807`22f17a47 : 00000000`00000000 ffffb080`0cbda7d0 00000000`00000080 00000000`00000001 : nt!MiProcessCrcList+0x580 ffffac8e`528df390 fffff807`22f16b70 : 00000000`00000000 00000000`00000000 ffffac8e`528df5c0 00000000`00000000 : nt!MiCombineAllPhysicalMemory+0x4e7 ffffac8e`528df4c0 fffff807`22f1694e : 00000000`0000000d 00000084`5a9ffdf0 00000000`00000000 00000000`00000002 : nt!MiCombineIdenticalPages+0x214 ffffac8e`528df730 fffff807`22e44fbe : 00000000`00000000 00000000`00000000 ffff8700`7439f180 00000000`00000001 : nt!MmCombineIdenticalPages+0x42 ffffac8e`528df770 fffff807`22c09bf1 : ffffba0e`b7da4080 00000000`00000000 ffffac8e`528dfb80 00000000`00000000 : nt!NtSetSystemInformation+0x140e ffffac8e`528dfb00 00007ffe`24030274 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc 00000084`5a9ffd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`24030274 CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase ffffac14152a2070 - win32kbase!hbmCreateDriverSurface+4c [ 4c:48 ] ffffac14152a2072-ffffac14152a2095 36 bytes - win32kbase!hbmCreateDriverSurface+4e (+0x02) [ 45 7f 0f ba f1 0f 89 45:02 49 3b 00 77 09 1b c0 ] ffffac14152a2097-ffffac14152a20c2 44 bytes - win32kbase!hbmCreateDriverSurface+73 (+0x25) [ 85 c9 74 36 83 e9 01 0f:88 01 85 d2 0f 84 8d 00 ] ffffac14152a20c4-ffffac14152a20c7 4 bytes - win32kbase!hbmCreateDriverSurface+a0 (+0x2d) [ 83 f9 01 75:8d 4a 58 eb ] ffffac14152a20c9-ffffac14152a20d4 12 bytes - win32kbase!hbmCreateDriverSurface+a5 (+0x05) [ 41 c1 e9 02 44 89 4d 13:b8 40 00 00 00 8d 48 10 ] ffffac14152a20d6-ffffac14152a20f7 34 bytes - win32kbase!hbmCreateDriverSurface+b2 (+0x0d) [ 8d 55 0f 89 7c 24 48 4d:85 d2 74 0c f3 0f 11 12 ] ffffac14152a20f9-ffffac14152a212e 54 bytes - win32kbase!hbmCreateDriverSurface+d5 (+0x23) [ 00 89 7d 0b 48 8d 4d ff:8d 4a 5b eb d3 b8 00 10 ] ffffac14152a2130-ffffac14152a216f 64 bytes - win32kbase!hbmCreateDriverSurface+10c (+0x37) [ 85 f6 75 65 0f ba 68 70:02 00 00 b9 68 00 00 00 ] ffffac14152ad070-ffffac14152ad074 5 bytes - win32kbase!HmgReferenceCheckLock+70 (+0xaf40) [ 0f b7 4e 02 44:48 83 ec 28 48 ] ffffac14152ad076-ffffac14152ad0bb 70 bytes - win32kbase!HmgReferenceCheckLock+76 (+0x06) [ c0 44 8b 8e 08 08 00 00:ca e8 24 7e f9 ff 48 83 ] ffffac14152ad0bd-ffffac14152ad16f 179 bytes - win32kbase!HmgReferenceCheckLock+bd (+0x47) [ 0f b6 c8 48 8b 00 48 03:83 e8 02 0f 84 db 34 06 ] ffffac14152af180-ffffac14152af1e2 99 bytes - win32kbase!NSInstrumentation::CSectionEntry<180224,704>::Initialize+18 (+0x20c3) [ 89 43 10 48 85 c0 74 36:48 83 ec 28 8b ca 45 33 ] ffffac14152af1ef - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+27 (+0x6f) [ 48:44 ] ffffac14152af1f1-ffffac14152af21d 45 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+29 (+0x02) [ d8 48 85 c0 0f 84 16 19:c9 33 db 48 21 58 20 0f ] ffffac14152af21f-ffffac14152af23f 33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Create+57 (+0x2e) [ 00 00 84 c0 0f 84 ef 18:49 8d 48 08 49 3b c8 72 ] ffffac14152af241-ffffac14152af261 33 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+1 (+0x22) [ 89 5c 24 10 57 48 83 ec:3b ca 72 0c 48 8b 05 f4 ] ffffac14152af26e-ffffac14152af27c 15 bytes - win32kbase!NSInstrumentation::CSectionBitmapAllocator<180224,704>::Initialize+2e (+0x2d) [ 8b c0 48 8d 4c 24 30 48:c5 0f 10 02 f3 0f 7f 44 ] 729 errors : !win32kbase (ffffac14152a2070-ffffac14152af27c) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption MEMORY_CORRUPTOR: LARGE STACK_COMMAND: .cxr 0xffffac8e528de870 ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c} Followup: memory_corruption ---------
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: ffff800ce58052e0 Arg3: 0000000000004000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3499 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 8732 Key : Analysis.Init.CPU.mSec Value: 2671 Key : Analysis.Init.Elapsed.mSec Value: 58332 Key : Analysis.Memory.CommitPeak.Mb Value: 91 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : MemoryManagement.PFN Value: 4 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 091722-4015-01.dmp BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: ffff800ce58052e0 BUGCHECK_P3: 4000 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: opera.exe STACK_TEXT: ffff9b0a`235dadf8 fffff804`49f2abba : 00000000`0000001a 00000000`00041792 ffff800c`e58052e0 00000000`00004000 : nt!KeBugCheckEx ffff9b0a`235dae00 fffff804`49eedc06 : 00000000`00000000 00000000`00000000 00000000`0000020e ffff800c`e58052e0 : nt!MiDeleteVa+0x153a ffff9b0a`235daf00 fffff804`49eedd1b : ffff8040`0672c028 ffff8a04`53a04700 ffff9b0a`00000000 ffff9b0a`235db370 : nt!MiWalkPageTablesRecursively+0x776 ffff9b0a`235dafa0 fffff804`49eedd1b : ffff8040`20033960 ffff8a04`53a04700 ffff9b0a`00000001 ffff9b0a`235db380 : nt!MiWalkPageTablesRecursively+0x88b ffff9b0a`235db040 fffff804`49eedd1b : ffff8040`20033000 ffff8a04`53a04700 ffff9b0a`00000002 ffff9b0a`235db390 : nt!MiWalkPageTablesRecursively+0x88b ffff9b0a`235db0e0 fffff804`49edcbfb : ffff8040`20100800 ffff8a04`53a04700 00000219`00000003 ffff9b0a`235db3a0 : nt!MiWalkPageTablesRecursively+0x88b ffff9b0a`235db180 fffff804`49f29451 : ffff9b0a`235db320 ffff8a04`00000000 00000219`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffff9b0a`235db280 fffff804`49f01670 : 00000000`00000001 ffff9b0a`00000000 ffff8a04`53a04550 ffff8a04`557c2080 : nt!MiDeletePagablePteRange+0x4f1 ffff9b0a`235db590 fffff804`4a29939f : ffff8a04`557c2080 00000000`00000000 ffff8a04`00000000 ffff8a04`00000000 : nt!MiDeleteVad+0x360 ffff9b0a`235db6a0 fffff804`4a2e4dd3 : ffff8a04`57f163c0 ffff8a04`57f163c0 ffff8a04`57f18c10 ffff8a04`53a04080 : nt!MiCleanVad+0x43 ffff9b0a`235db6d0 fffff804`4a281f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff8a04`53a04080 : nt!MmCleanProcessAddressSpace+0x137 ffff9b0a`235db750 fffff804`4a29ea8a : ffff8a04`53a04080 ffffe60d`2e3657b0 ffff9b0a`235db990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b ffff9b0a`235db7d0 fffff804`4a1f4558 : ffff8a04`c0000005 00000863`00000001 ffff9b0a`235db9e0 000000d4`c706f000 : nt!PspExitThread+0x5f6 ffff9b0a`235db8d0 fffff804`49ee6ca7 : 00000000`40610088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38 ffff9b0a`235db910 fffff804`49ff8440 : 000000d4`c7dff4c8 ffff9b0a`235db9c0 ffff9b0a`235dbb80 00000863`00000000 : nt!KiDeliverApc+0x487 ffff9b0a`235db9c0 fffff804`4a00595f : ffff8a04`557c2080 00000000`00000000 ffff9b0a`235dbb18 ffffffff`eced3000 : nt!KiInitiateUserApc+0x70 ffff9b0a`235dbb00 00007ffe`2304be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 000000d4`c7dff498 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`2304be44 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------
Kod:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000026de7, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff803434136b9, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6671 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 23171 Key : Analysis.Init.CPU.mSec Value: 2593 Key : Analysis.Init.Elapsed.mSec Value: 59909 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 092222-10171-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: 26de7 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff803434136b9 READ_ADDRESS: fffff80343efb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000026de7 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffffaa8fcb931310 -- (.trap 0xffffaa8fcb931310) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000008080 rbx=0000000000000000 rcx=ffffe30007943040 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff803434136b9 rsp=ffffaa8fcb9314a0 rbp=ffffaa8fcb931579 r8=ffff860ae3163210 r9=0000000000000000 r10=ffffe170b85c2000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!MiPfPutPagesInTransition+0x2c9: fffff803`434136b9 498b0f mov rcx,qword ptr [r15] ds:00000000`00000000=???????????????? Resetting default scope STACK_TEXT: ffffaa8f`cb9311c8 fffff803`43609c69 : 00000000`0000000a 00000000`00026de7 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffaa8f`cb9311d0 fffff803`43605f69 : 00000000`00206d70 00000000`00206d70 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffaa8f`cb931310 fffff803`434136b9 : ffff860a`00000000 ffffaa8f`cb931579 00000000`00000000 80000002`86bac963 : nt!KiPageFault+0x469 ffffaa8f`cb9314a0 fffff803`4383a2e3 : ffff860a`e2f992f0 00000000`00000000 ffff860a`00000000 00000000`00000000 : nt!MiPfPutPagesInTransition+0x2c9 ffffaa8f`cb9315e0 fffff803`434d0c97 : ffff860a`df2b0d30 ffffaa8f`cb9317f0 ffff860a`e2f992f0 ffff860a`e5085390 : nt!MmPrefetchForCacheManager+0xb7 ffffaa8f`cb931640 fffff803`435b5930 : ffff860a`00020000 00000000`00000000 00000000`033c0000 ffff860a`d3424080 : nt!CcAsyncReadPrefetch+0x13f ffffaa8f`cb9316f0 fffff803`434eea75 : ffff860a`d3424080 ffff860a`d3424080 fffff803`435b57a0 ffff860a`d33f9920 : nt!CcAsyncReadWorker+0x190 ffffaa8f`cb931c10 fffff803`435ff3b8 : ffff9681`803e8180 ffff860a`d3424080 fffff803`434eea20 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffffaa8f`cb931c60 00000000`00000000 : ffffaa8f`cb932000 ffffaa8f`cb92c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: nt!MiPfPutPagesInTransition+2c9 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.1706 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 2c9 FAILURE_BUCKET_ID: AV_nt!MiPfPutPagesInTransition OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {d4722b20-c317-dab0-0f83-fcc7584d2184} Followup: MachineOwner ---------