ahmetaltintas
Femtopat
- Katılım
- 11 Kasım 2020
- Mesajlar
- 9
Daha fazla
- Cinsiyet
- Erkek
[CODE title="Mavi Ekran"]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ahmet\AppData\Local\Temp\Rar$DIa16784.1940\022621-39234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`66200000 PsLoadedModuleList = 0xfffff802`66645e90
Debug session time: Fri Feb 26 19:42:55.420 2021 (UTC + 3:00)
System Uptime: 0 days 4:55:08.163
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`663c3a90 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe684`f062fbe0=000000000000001a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd13ffdd7f1f0
Arg3: 0010000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7609
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OPSV0MN
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26790
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffd13ffdd7f1f0
BUGCHECK_P3: 10000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: LARGE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffe684`f062fbd8 fffff802`664034b8 : 00000000`0000001a 00000000`00041792 ffffd13f`fdd7f1f0 00100000`00000000 : nt!KeBugCheckEx
ffffe684`f062fbe0 fffff802`66258d27 : 00000000`00000000 ffffd13f`fdd7f1f0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1a8998
ffffe684`f062fcf0 fffff802`662591e1 : ffffe684`f0630140 ffffd168`9ffeebf8 00000000`00000000 0a000003`4e148867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffe684`f062fdb0 fffff802`662591e1 : ffffe684`f0630140 ffffd168`b44fff70 00000000`00000000 0a000001`bec6a867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe684`f062fe70 fffff802`662591e1 : ffffe684`f0630140 ffffd168`b45a27f8 ffffd168`00000000 0a000002`84b37867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe684`f062ff30 fffff802`6625896c : ffffe684`f0630140 ffffd168`b45a2d10 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe684`f062fff0 fffff802`662ac7f8 : ffffe684`f0630140 00000000`00000002 ffffe684`00000001 fffff802`00000000 : nt!MiWalkPageTables+0x36c
ffffe684`f06300f0 fffff802`66264f30 : ffffffff`ffffffff ffff950f`e66a83f8 ffffe684`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffe684`f0630490 fffff802`668726dd : ffff950f`ebcde080 ffff950f`ebcde080 ffff950f`f41404c0 ffff950f`e66a83f0 : nt!MiDeleteVad+0x860
ffffe684`f0630650 fffff802`66841d70 : ffff950f`f41404c0 ffff950f`f37ae010 ffff950f`ebcde080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe684`f0630680 fffff802`668412df : ffff950f`f3074c80 ffff950f`f3074c80 ffff950f`e66a8080 fffff802`66668180 : nt!MiCleanVad+0x30
ffffe684`f06306b0 fffff802`6689c801 : ffffffff`00000000 ffffffff`ffffffff ffffe684`f0630901 ffff950f`e66a8080 : nt!MmCleanProcessAddressSpace+0x137
ffffe684`f0630730 fffff802`66844993 : ffff950f`e66a8080 ffffd507`f8809060 ffffe684`f0630959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffe684`f06307b0 fffff802`668cb3d3 : 00000000`00000000 ffffbe81`85580101 000000e1`236b2000 00000000`00000000 : nt!PspExitThread+0x60b
ffffe684`f06308c0 fffff802`66252e31 : ffff950f`ebcde080 ffffe684`00000000 ffff950f`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffe684`f0630900 fffff802`663c7ff0 : 00000000`00000001 ffffe684`f06309c0 00000000`00000000 fffff802`00000000 : nt!KiDeliverApc+0x481
ffffe684`f06309c0 fffff802`663d53ff : ffff950f`ebcde080 000000e1`257ff678 ffffe684`f0630b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffe684`f0630b00 00007ffb`f365ce14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000e1`257ff648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f365ce14
CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal
fffff80266160f2a-fffff80266160f2f 6 bytes - hal!HalpTscQueryCounterOrdered+1a
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
6 errors : !hal (fffff80266160f2a-fffff80266160f2f)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
[/CODE]
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ahmet\AppData\Local\Temp\Rar$DIa16784.1940\022621-39234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff802`66200000 PsLoadedModuleList = 0xfffff802`66645e90
Debug session time: Fri Feb 26 19:42:55.420 2021 (UTC + 3:00)
System Uptime: 0 days 4:55:08.163
Loading Kernel Symbols
...............................................................
................................................................
........................................................
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`663c3a90 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe684`f062fbe0=000000000000001a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffd13ffdd7f1f0
Arg3: 0010000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7609
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-OPSV0MN
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26790
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffd13ffdd7f1f0
BUGCHECK_P3: 10000000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: LARGE
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffe684`f062fbd8 fffff802`664034b8 : 00000000`0000001a 00000000`00041792 ffffd13f`fdd7f1f0 00100000`00000000 : nt!KeBugCheckEx
ffffe684`f062fbe0 fffff802`66258d27 : 00000000`00000000 ffffd13f`fdd7f1f0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x1a8998
ffffe684`f062fcf0 fffff802`662591e1 : ffffe684`f0630140 ffffd168`9ffeebf8 00000000`00000000 0a000003`4e148867 : nt!MiWalkPageTablesRecursively+0x1e7
ffffe684`f062fdb0 fffff802`662591e1 : ffffe684`f0630140 ffffd168`b44fff70 00000000`00000000 0a000001`bec6a867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe684`f062fe70 fffff802`662591e1 : ffffe684`f0630140 ffffd168`b45a27f8 ffffd168`00000000 0a000002`84b37867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe684`f062ff30 fffff802`6625896c : ffffe684`f0630140 ffffd168`b45a2d10 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffe684`f062fff0 fffff802`662ac7f8 : ffffe684`f0630140 00000000`00000002 ffffe684`00000001 fffff802`00000000 : nt!MiWalkPageTables+0x36c
ffffe684`f06300f0 fffff802`66264f30 : ffffffff`ffffffff ffff950f`e66a83f8 ffffe684`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffe684`f0630490 fffff802`668726dd : ffff950f`ebcde080 ffff950f`ebcde080 ffff950f`f41404c0 ffff950f`e66a83f0 : nt!MiDeleteVad+0x860
ffffe684`f0630650 fffff802`66841d70 : ffff950f`f41404c0 ffff950f`f37ae010 ffff950f`ebcde080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe684`f0630680 fffff802`668412df : ffff950f`f3074c80 ffff950f`f3074c80 ffff950f`e66a8080 fffff802`66668180 : nt!MiCleanVad+0x30
ffffe684`f06306b0 fffff802`6689c801 : ffffffff`00000000 ffffffff`ffffffff ffffe684`f0630901 ffff950f`e66a8080 : nt!MmCleanProcessAddressSpace+0x137
ffffe684`f0630730 fffff802`66844993 : ffff950f`e66a8080 ffffd507`f8809060 ffffe684`f0630959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffe684`f06307b0 fffff802`668cb3d3 : 00000000`00000000 ffffbe81`85580101 000000e1`236b2000 00000000`00000000 : nt!PspExitThread+0x60b
ffffe684`f06308c0 fffff802`66252e31 : ffff950f`ebcde080 ffffe684`00000000 ffff950f`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffe684`f0630900 fffff802`663c7ff0 : 00000000`00000001 ffffe684`f06309c0 00000000`00000000 fffff802`00000000 : nt!KiDeliverApc+0x481
ffffe684`f06309c0 fffff802`663d53ff : ffff950f`ebcde080 000000e1`257ff678 ffffe684`f0630b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffe684`f0630b00 00007ffb`f365ce14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000e1`257ff648 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`f365ce14
CHKIMG_EXTENSION: !chkimg -lo 50 -d !hal
fffff80266160f2a-fffff80266160f2f 6 bytes - hal!HalpTscQueryCounterOrdered+1a
[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ]
6 errors : !hal (fffff80266160f2a-fffff80266160f2f)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}
Followup: memory_corruption
---------
[/CODE]
Son düzenleme: