Memory management mavi ekran hatası alıyorum. Minidump dosyalarını aşağıya bırakıyorum.
100420-16062-01.rar
drive.google.com
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa781f0f21fd4, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8060d38b542, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3054
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: ffffa781f0f21fd4
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8060d38b542
READ_ADDRESS: fffff8060dafa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8060da0f2e0: Unable to get Flags value from nt!KdVersionBlock
fffff8060da0f2e0: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa781f0f21fd4
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: ffffb80e0d46eeb0 -- (.trap 0xffffb80e0d46eeb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000041a1 rbx=0000000000000000 rcx=ffffa781e0f241a1
rdx=ffffa781f0f21fd4 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8060d38b542 rsp=ffffb80e0d46f040 rbp=ffffa781e0f14220
r8=ffffa781e0f30000 r9=ffffa781e0f24220 r10=0000000000000000
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!RtlCompressBufferXpressHuffMax+0x33e:
fffff806`0d38b542 443b3a cmp r15d,dword ptr [rdx] ds:ffffa781`f0f21fd4=????????
Resetting default scope
STACK_TEXT:
ffffb80e`0d46ed68 fffff806`0d205e69 : 00000000`0000000a ffffa781`f0f21fd4 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffb80e`0d46ed70 fffff806`0d202169 : 00000000`00000000 00000000`00000006 00000001`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb80e`0d46eeb0 fffff806`0d38b542 : ffffb80e`0d46f240 ffffa781`e0f30000 00000003`00000000 00000000`00000014 : nt!KiPageFault+0x469
ffffb80e`0d46f040 fffff806`0d28f3cf : ffffa781`e0f241a1 ffffdc83`f4de9000 ffffdc83`f4de9000 00000000`0000000c : nt!RtlCompressBufferXpressHuffMax+0x33e
ffffb80e`0d46f110 fffff806`0d7916d5 : 00000211`e32b07ae 00000000`00000003 00000000`00000000 fffff806`00000000 : nt!RtlCompressBufferProgress+0x10f83f
ffffb80e`0d46f170 fffff806`0d7915fa : ffffdc83`f3400300 ffffb80e`00000000 00000000`00015400 ffffdc83`e63dfc70 : nt!PopAddPagesToCompressedPageSet+0xb1
ffffb80e`0d46f1f0 fffff806`0d7a0dce : 0000020e`e56c3602 ffffa781`dec00180 ffffb80e`0d46f4c0 ffffdc83`e63dfc70 : nt!PopCompressHiberBlocks+0x9e
ffffb80e`0d46f3a0 fffff806`0d1fbc05 : 000000b3`333739be ffffd618`8e2f2664 00000000`002fce0c 00000000`00000000 : nt!PopSaveHiberContext+0x103fe
ffffb80e`0d46f680 fffff806`0d181f16 : ffffdc83`e679e280 fffff806`0d108480 00000000`00000000 00000000`00000000 : nt!PopSaveHiberContextWrapper+0x35
ffffb80e`0d46f6b0 fffff806`0d7905a0 : 00000000`00000000 00000000`0000b7ee ffffa781`dec00180 00000000`00000006 : nt!HaliAcpiSleep+0x1c6
ffffb80e`0d46f740 fffff806`0d790383 : fffff806`0da50460 ffffb80e`0d46f960 ffffb80e`0d46fb20 ffffdc83`e6dfeb50 : nt!PopHandleNextState+0x1f0
ffffb80e`0d46f790 fffff806`0d0e9a3e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PopInvokeStateHandlerTargetProcessor+0x53
ffffb80e`0d46f860 fffff806`0d0e8d24 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffb80e`0d46f9d0 fffff806`0d1f7a0e : ffffffff`00000000 ffffa781`dec00180 00000000`00000000 ffffa781`dec0b240 : nt!KiRetireDpcList+0x1f4
ffffb80e`0d46fc60 00000000`00000000 : ffffb80e`0d470000 ffffb80e`0d46a000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: nt!RtlCompressBufferXpressHuffMax+33e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 33e
FAILURE_BUCKET_ID: AV_nt!RtlCompressBufferXpressHuffMax
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {67a31654-b3be-59aa-868e-726eaa6a0b3a}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff823ffa780b88
Arg3: 0000000010000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3421
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10728
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffff823ffa780b88
BUGCHECK_P3: 10000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: mscorsvw.exe
STACK_TEXT:
fffffd83`f7122f88 fffff805`5a32abba : 00000000`0000001a 00000000`00041792 ffff823f`fa780b88 00000000`10000000 : nt!KeBugCheckEx
fffffd83`f7122f90 fffff805`5a2edc06 : 00000000`00000000 00000000`00000000 00000000`0000086d ffff823f`fa780b88 : nt!MiDeleteVa+0x153a
fffffd83`f7123090 fffff805`5a2edd1b : ffff8241`1ffd3c00 ffff9f0f`5e287700 fffffd83`00000000 fffffd83`f7123500 : nt!MiWalkPageTablesRecursively+0x776
fffffd83`f7123130 fffff805`5a2edd1b : ffff8241`00000000 ffff9f0f`5e287700 fffffd83`00000001 fffffd83`f7123510 : nt!MiWalkPageTablesRecursively+0x88b
fffffd83`f71231d0 fffff805`5a2edd1b : ffff8241`00000000 ffff9f0f`5e287700 fffffd83`00000002 fffffd83`f7123520 : nt!MiWalkPageTablesRecursively+0x88b
fffffd83`f7123270 fffff805`5a2dcbfb : 00000000`00000000 ffff9f0f`5e287700 00000000`00000003 fffffd83`f7123530 : nt!MiWalkPageTablesRecursively+0x88b
fffffd83`f7123310 fffff805`5a329451 : fffffd83`f71234b0 ffff9f0f`00000000 ffff823e`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffffd83`f7123410 fffff805`5a301670 : 00000000`00000001 fffffd83`00000000 ffff9f0f`5e287550 ffff9f0f`5c352080 : nt!MiDeletePagablePteRange+0x4f1
fffffd83`f7123720 fffff805`5a6999e9 : ffff9f0f`5af11800 00000000`00000000 ffff9f0f`00000000 ffff9f0f`00000000 : nt!MiDeleteVad+0x360
fffffd83`f7123830 fffff805`5a69938c : ffff9f0f`5af11800 ffff9f0f`5b981770 ffff9f0f`5c352080 00000000`00000000 : nt!MiUnmapVad+0x49
fffffd83`f7123860 fffff805`5a6e4dd3 : ffff9f0f`5af111c0 ffff9f0f`5af111c0 ffff9f0f`5af11800 ffff9f0f`5e287080 : nt!MiCleanVad+0x30
fffffd83`f7123890 fffff805`5a681f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff9f0f`5e287080 : nt!MmCleanProcessAddressSpace+0x137
fffffd83`f7123910 fffff805`5a69ea8a : ffff9f0f`5e287080 ffffb489`6a2f5900 00000000`00000000 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
fffffd83`f7123990 fffff805`5a5f3eae : ffff9f0f`00000000 00000000`00000001 00000000`00000000 000000a0`c6800000 : nt!PspExitThread+0x5f6
fffffd83`f7123a90 fffff805`5a405df1 : ffff9f0f`5e287080 ffff9f0f`5c352080 fffffd83`f7123b80 ffffffff`ffffffff : nt!NtTerminateProcess+0xde
fffffd83`f7123b00 00007ff9`e554c344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x2bc
000000a0`c6aff678 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e554c344
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffff00000a1008
Arg3: 0000000010000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6530
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffff00000a1008
BUGCHECK_P3: 10000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
ffffce0b`fa592df8 fffff802`0bb2abba : 00000000`0000001a 00000000`00041792 ffffff00`000a1008 00000000`10000000 : nt!KeBugCheckEx
ffffce0b`fa592e00 fffff802`0baedc06 : 00000000`00000000 00000000`00000000 00000000`0000020e ffffff00`000a1008 : nt!MiDeleteVa+0x153a
ffffce0b`fa592f00 fffff802`0baedd1b : ffffff7f`80000508 ffffbc83`d1caa700 ffffce0b`00000000 ffffce0b`fa593370 : nt!MiWalkPageTablesRecursively+0x776
ffffce0b`fa592fa0 fffff802`0baedd1b : ffffff7f`bfc00000 ffffbc83`d1caa700 ffffce0b`00000001 ffffce0b`fa593380 : nt!MiWalkPageTablesRecursively+0x88b
ffffce0b`fa593040 fffff802`0baedd1b : ffffff7f`bfc00000 ffffbc83`d1caa700 ffffce0b`00000002 ffffce0b`fa593390 : nt!MiWalkPageTablesRecursively+0x88b
ffffce0b`fa5930e0 fffff802`0badcbfb : 00000000`00000000 ffffbc83`d1caa700 00000000`00000003 ffffce0b`fa5933a0 : nt!MiWalkPageTablesRecursively+0x88b
ffffce0b`fa593180 fffff802`0bb29451 : ffffce0b`fa593320 ffffbc83`00000000 ffffff00`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffce0b`fa593280 fffff802`0bb01670 : 00000000`00000001 ffffce0b`00000000 ffffbc83`d1caa550 ffffbc83`d3a8c080 : nt!MiDeletePagablePteRange+0x4f1
ffffce0b`fa593590 fffff802`0be9939f : ffffbc83`d3a8c080 00000000`00000000 ffffbc83`00000000 ffffbc83`00000000 : nt!MiDeleteVad+0x360
ffffce0b`fa5936a0 fffff802`0bee4dd3 : ffffbc83`d19d6790 ffffbc83`d19d6790 ffffbc83`d3612850 ffffbc83`d1caa080 : nt!MiCleanVad+0x43
ffffce0b`fa5936d0 fffff802`0be81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffbc83`d1caa080 : nt!MmCleanProcessAddressSpace+0x137
ffffce0b`fa593750 fffff802`0be9ea8a : ffffbc83`d1caa080 ffff9289`eac81320 ffffce0b`fa593990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffce0b`fa5937d0 fffff802`0bdf4558 : fffff7cc`c0000005 00000000`00000001 ffffce0b`fa5939e0 00000000`09a5d000 : nt!PspExitThread+0x5f6
ffffce0b`fa5938d0 fffff802`0bae6ca7 : ffffbc83`c7aca610 ffffbc83`c7afa000 00000000`00000000 00000000`00501802 : nt!KiSchedulerApcTerminate+0x38
ffffce0b`fa593910 fffff802`0bbf8440 : 00000000`00000000 ffffce0b`fa5939c0 ffffbc83`c7afa388 ffffbc83`00000000 : nt!KiDeliverApc+0x487
ffffce0b`fa5939c0 fffff802`0bc0595f : ffffbc83`d3a8c080 ffffbc83`d39d2c60 ffffce0b`fa593b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffce0b`fa593b00 00000000`770a1cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`12d7eb98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x770a1cfc
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.