bbadur
Femtopat
- Katılım
- 29 Eylül 2024
- Mesajlar
- 5
Daha fazla
- Sistem Özellikleri
- RTX 3050 8GB
i5 12400f
32 GB RAM
- Cinsiyet
- Erkek
- Meslek
- Öğretmen
Öncelikle herkese merhabalar. Son bir aydır bazen 3 saat sonra, bazen de 1-2 saat içerisinde PC çalışırken mavi ekran hatası alıyordum. Minidump dosyasını sizlerle paylaşmak istiyorum. Sıkıntı ile alakalı yapmam gerekenler konusunda yardımcı olabilirseniz çok memnun olurum. Teşekkürler.
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 42
Microsoft (R) Windows Debugger Version 10.0.27704.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\092924-8218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff804`64800000 PsLoadedModuleList = 0xfffff804`654134f0
Debug session time: Sun Sep 29 03:10:46.208 2024 (UTC + 3:00)
System Uptime: 2 days 4:25:20.959
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
...
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000ba`627b4018). Type ".hh dbgerr001" for details
Loading unloaded module list
..........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`64c16000 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa03`377aef10=000000000000001a
6: kd> !analyze -v
*******************************************************************************
*
Bugcheck Analysis *
*
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff8b005d36f660
Arg3: 0000004000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1453
Key : Analysis.Elapsed.mSec
Value: 2239
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 125
Key : Analysis.Init.Elapsed.mSec
Value: 8139
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.Version.DbgEng
Value: 10.0.27704.1001
Key : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre
Key : Analysis.Version.Ext
Value: 1.2408.27.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x1a
Key : Bugcheck.Code.TargetModel
Value: 0x1a
Key : Dump.Attributes.AsUlong
Value: 1808
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: MEMORY_CORRUPTION_ONE_BIT
Key : Failure.Hash
Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Key : Hypervisor.Enlightenments.ValueHex
Value: 1417df84
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : MemoryManagement.PFN
Value: 4000000
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff8b005d36f660
BUGCHECK_P3: 4000000000
BUGCHECK_P4: 0
FILE_IN_CAB: 092924-8218-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x1808
Kernel Generated Triage Dump
FAULTING_THREAD: ffffe70f8db9b080
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
fffffa03`377aef08 fffff804`64cc0636 : 00000000`0000001a 00000000`00041792 ffff8b00`5d36f660 00000040`00000000 : nt!KeBugCheckEx
fffffa03`377aef10 fffff804`64a233c6 : fffffa03`377af3e0 ffff8b00`5d36fff8 00000000`00000000 ffffe70f`95902740 : nt!MiDeleteVa+0x19bd36
fffffa03`377af000 fffff804`64a2378a : fffffa03`377af3e0 ffffe70f`95902740 ffff8b45`00000000 fffffa03`377af430 : nt!MiWalkPageTablesRecursively+0x266
fffffa03`377af090 fffff804`64a2378a : fffffa03`377af3e0 ffffe70f`95902740 ffff8b45`00000000 fffffa03`377af440 : nt!MiWalkPageTablesRecursively+0x62a
fffffa03`377af120 fffff804`64a2378a : fffffa03`377af3e0 ffffe70f`95902740 ffff8b45`00000000 fffffa03`377af450 : nt!MiWalkPageTablesRecursively+0x62a
fffffa03`377af1b0 fffff804`64a23061 : 00000000`00000000 ffffe70f`95902740 00000000`00000000 fffffa03`377af460 : nt!MiWalkPageTablesRecursively+0x62a
fffffa03`377af240 fffff804`64b24862 : fffffa03`377af3e0 000000ba`00000001 00000000`00000002 fffffa03`00000000 : nt!MiWalkPageTables+0x371
fffffa03`377af340 fffff804`64b32eae : ffffe70f`95902590 ffffe70f`8db9b080 fffffa03`377af6e0 ffffe70f`8db9b780 : nt!MiDeletePagablePteRange+0x3c2
fffffa03`377af650 fffff804`64fc8497 : 00000000`00000000 00000000`00000001 fffffa03`377af720 000000ba`6d000000 : nt!MiDeleteVirtualAddresses+0x4e
fffffa03`377af6a0 fffff804`64fd373a : 000000ba`6d800000 ffffe70f`96cd95f0 ffffe70f`959020c0 00000000`00000000 : nt!MiDeleteVad+0x1b7
fffffa03`377af760 fffff804`64fd4a31 : ffffe70f`96cd9640 ffffe70f`96cd9640 ffffe70f`96cd9640 ffffe70f`959020c0 : nt!MiCleanVad+0x42
fffffa03`377af790 fffff804`64ef821f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe70f`959020c0 : nt!MmCleanProcessAddressSpace+0x10d
fffffa03`377af810 fffff804`64fd9ab2 : ffffe70f`959020c0 ffffd704`6534e060 ffffe70f`959020c0 00000000`00000000 : nt!PspRundownSingleProcess+0xbf
fffffa03`377af8a0 fffff804`64fdc3e2 : 00000000`00000000 ffffe70f`95902001 ffffe70f`8db9b0f4 000000ba`627b5000 : nt!PspExitThread+0x64e
fffffa03`377af9a0 fffff804`64c2b605 : ffffe70f`000009f4 ffffe70f`8db9b080 ffffe70f`959020c0 ffffe70f`959020c0 : nt!NtTerminateProcess+0xf2
fffffa03`377afa20 00007ffe`aceb06b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ba`62fff8e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`aceb06b4
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .process /r /p 0xffffe70f959020c0; .thread 0xffffe70f8db9b080 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------