Memory_managament hatası ile mavi ekran aldım. Sorunun RAM'ler ile alakalı olduğunu sanmıyorum. Önceden de 2-3 defa aynı sorun adı altında konu açmıştım. Her konu açışımda Memtest86 ile test yaptım ve herhangi bir hata yoktu. Genede bu gece tekrar test edeceğim. Ayrıca konularda MSI Afterburner ve Dragon Center ile alakalı olabileceği yazılmıştı. Ancak bilgisayarıma 1 hafta önce format attım ve bu sefer MSI uygulamalarını da kurmadım. Hata ile formattan sonra ilk defa karşılaştım. Bir daha karşılaşır mıyım bilmiyorum.
RAM ile alakası yok demişsiniz pardon.Telefon da olduğumdan dolayı minidump okuyamıyorum, XMP açıksa kapatabilme şansınız var mı ayrıca anakart ile RAM'i yazarsanız daha iyi olur.
RAM ile alakası yok demişsiniz pardon.Telefon da olduğumdan dolayı minidump okuyamıyorum, XMP açıksa kapatabilme şansınız var mı ayrıca anakart ile RAM'i yazarsanız daha iyi olur.
Çok özür dilerim. Sistem bilgisini yazmayı unutmuşum.Telefon da olduğumdan dolayı minidump okuyamıyorum, XMP açıksa kapatabilme şansınız var mı ayrıca anakart ile RAM'i yazarsanız daha iyi olur.
RAM ile alakası yok demişsiniz pardon.
RAM ile alakası yok demişsiniz pardon.
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\YIIT~1\AppData\Local\Temp\Rar$DIa4080.41709\060121-12921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`57600000 PsLoadedModuleList = 0xfffff805`5822a2b0
Debug session time: Tue Jun 1 18:56:56.047 2021 (UTC + 3:00)
System Uptime: 0 days 16:58:29.700
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`579f6c90 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9c8d`ddc82c80=000000000000001a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1874
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11634
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 44945
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff97bffe06ae08
BUGCHECK_P3: 60000041d308025
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9 : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1 : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10 : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49 : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0 : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916 : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758 : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230 : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1023
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the BugCheck.
Arg2: ffff97bffe06ae08
Arg3: 060000041d308025
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1593
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2763
Key : Analysis.Init.CPU.mSec
Value: 2249
Key : Analysis.Init.Elapsed.mSec
Value: 56582
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 403
BUGCHECK_P2: ffff97bffe06ae08
BUGCHECK_P3: 60000041d308025
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffff9c8d`ddc82c78 fffff805`578416f9 : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx
ffff9c8d`ddc82c80 fffff805`57841eae : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9
ffff9c8d`ddc82e90 fffff805`5792778d : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e
ffff9c8d`ddc82ec0 fffff805`579273ab : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d
ffff9c8d`ddc82f60 fffff805`579273ab : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83000 fffff805`579273ab : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc830a0 fffff805`57804f4b : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b
ffff9c8d`ddc83140 fffff805`57842ad1 : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffff9c8d`ddc83240 fffff805`57812c10 : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1
ffff9c8d`ddc83550 fffff805`57c00b49 : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360
ffff9c8d`ddc83660 fffff805`57c001e0 : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff9c8d`ddc83690 fffff805`57bfe4af : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30
ffff9c8d`ddc836c0 fffff805`57cc9418 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137
ffff9c8d`ddc83740 fffff805`57c5b916 : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffff9c8d`ddc837d0 fffff805`57ca5758 : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6
ffff9c8d`ddc838d0 fffff805`5780f0d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38
ffff9c8d`ddc83910 fffff805`579fb230 : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487
ffff9c8d`ddc839c0 fffff805`57a0875f : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70
ffff9c8d`ddc83b00 00007ffc`0d62d4a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000038`d25ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4
SYMBOL_NAME: nt!MiDeletePteRun+17b9
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1023
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17b9
FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}
Followup: MachineOwner
---------
10: kd> lmvm nt
Browse full module list
start end module name
fffff805`57600000 fffff805`58646000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\121F238DD43DA32C1476AC846D4FEA741\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\E304EA6D1046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: E304EA6D (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5BFB2
ImageSize: 01046000
File version: 10.0.19041.1023
Product version: 10.0.19041.1023
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.1023
FileVersion: 10.0.19041.1023 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
Minidump dosyalarını okumayı tam olarak bilmiyorum fakat sorun RAM gibi duruyor, XMP kapalı Memtest86 yaptınız mı? Ayrıca 3200 MHz de çalışan RAM'i eğer 2666 MHz yaparsanız sorun kalkabilir denemekte fayda var.Kod:Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\YIIT~1\AppData\Local\Temp\Rar$DIa4080.41709\060121-12921-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff805`57600000 PsLoadedModuleList = 0xfffff805`5822a2b0 Debug session time: Tue Jun 1 18:56:56.047 2021 (UTC + 3:00) System Uptime: 0 days 16:58:29.700 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ .............. Loading User Symbols Loading unloaded module list ........................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`579f6c90 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9c8d`ddc82c80=000000000000001a 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000403, The subtype of the BugCheck. Arg2: ffff97bffe06ae08 Arg3: 060000041d308025 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1874 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 11634 Key : Analysis.Init.CPU.mSec Value: 374 Key : Analysis.Init.Elapsed.mSec Value: 44945 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 1a BUGCHECK_P1: 403 BUGCHECK_P2: ffff97bffe06ae08 BUGCHECK_P3: 60000041d308025 BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffff9c8d`ddc82c78 fffff805`578416f9 : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx ffff9c8d`ddc82c80 fffff805`57841eae : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9 ffff9c8d`ddc82e90 fffff805`5792778d : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e ffff9c8d`ddc82ec0 fffff805`579273ab : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d ffff9c8d`ddc82f60 fffff805`579273ab : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b ffff9c8d`ddc83000 fffff805`579273ab : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b ffff9c8d`ddc830a0 fffff805`57804f4b : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b ffff9c8d`ddc83140 fffff805`57842ad1 : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffff9c8d`ddc83240 fffff805`57812c10 : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1 ffff9c8d`ddc83550 fffff805`57c00b49 : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360 ffff9c8d`ddc83660 fffff805`57c001e0 : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49 ffff9c8d`ddc83690 fffff805`57bfe4af : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30 ffff9c8d`ddc836c0 fffff805`57cc9418 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137 ffff9c8d`ddc83740 fffff805`57c5b916 : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c ffff9c8d`ddc837d0 fffff805`57ca5758 : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6 ffff9c8d`ddc838d0 fffff805`5780f0d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38 ffff9c8d`ddc83910 fffff805`579fb230 : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487 ffff9c8d`ddc839c0 fffff805`57a0875f : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70 ffff9c8d`ddc83b00 00007ffc`0d62d4a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000038`d25ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4 SYMBOL_NAME: nt!MiDeletePteRun+17b9 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.1023 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 17b9 FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5} Followup: MachineOwner --------- 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000000403, The subtype of the BugCheck. Arg2: ffff97bffe06ae08 Arg3: 060000041d308025 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1593 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 2763 Key : Analysis.Init.CPU.mSec Value: 2249 Key : Analysis.Init.Elapsed.mSec Value: 56582 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 1a BUGCHECK_P1: 403 BUGCHECK_P2: ffff97bffe06ae08 BUGCHECK_P3: 60000041d308025 BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: svchost.exe STACK_TEXT: ffff9c8d`ddc82c78 fffff805`578416f9 : 00000000`0000001a 00000000`00000403 ffff97bf`fe06ae08 06000004`1d308025 : nt!KeBugCheckEx ffff9c8d`ddc82c80 fffff805`57841eae : 00000000`00000000 ffff9c8d`ddc83390 ffff97bf`fe06b000 ffff9c8d`ddc832e0 : nt!MiDeletePteRun+0x17b9 ffff9c8d`ddc82e90 fffff805`5792778d : 00000000`00000000 ffffdd03`6931d900 ffff9c8d`ddc832e0 ffff97bf`fe06aff8 : nt!MiDeleteVaTail+0x6e ffff9c8d`ddc82ec0 fffff805`579273ab : ffff97cb`00000000 ffffdd03`6931d900 ffff9c8d`00000000 ffff9c8d`ddc83330 : nt!MiWalkPageTablesRecursively+0xc6d ffff9c8d`ddc82f60 fffff805`579273ab : ffff97cb`e5efff80 ffffdd03`6931d900 ffff9c8d`00000001 ffff9c8d`ddc83340 : nt!MiWalkPageTablesRecursively+0x88b ffff9c8d`ddc83000 fffff805`579273ab : ffff97cb`e5eff000 ffffdd03`6931d900 ffff9c8d`00000002 ffff9c8d`ddc83350 : nt!MiWalkPageTablesRecursively+0x88b ffff9c8d`ddc830a0 fffff805`57804f4b : 00000000`00000000 ffffdd03`6931d900 00000000`00000003 ffff9c8d`ddc83360 : nt!MiWalkPageTablesRecursively+0x88b ffff9c8d`ddc83140 fffff805`57842ad1 : ffff9c8d`ddc832e0 ffffdd03`00000000 ffff97bf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b ffff9c8d`ddc83240 fffff805`57812c10 : 00000000`00000001 ffff9c8d`00000000 ffffdd03`6931d750 ffffdd03`757df080 : nt!MiDeletePagablePteRange+0x4f1 ffff9c8d`ddc83550 fffff805`57c00b49 : ffffdd03`70609e20 00000000`00000000 ffffdd03`00000000 ffffdd03`00000000 : nt!MiDeleteVad+0x360 ffff9c8d`ddc83660 fffff805`57c001e0 : ffffdd03`70609e20 ffffdd03`6ab1c9b0 ffffdd03`757df080 00000000`00000000 : nt!MiUnmapVad+0x49 ffff9c8d`ddc83690 fffff805`57bfe4af : 00000000`00000000 00000000`00000000 ffffdd03`70609e20 ffffdd03`6931d280 : nt!MiCleanVad+0x30 ffff9c8d`ddc836c0 fffff805`57cc9418 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdd03`6931d280 : nt!MmCleanProcessAddressSpace+0x137 ffff9c8d`ddc83740 fffff805`57c5b916 : ffffdd03`6931d280 ffffb209`57fc9060 ffff9c8d`ddc83990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c ffff9c8d`ddc837d0 fffff805`57ca5758 : 00000000`000000ff 00000000`00000101 00000000`00000000 00000038`d1d8d000 : nt!PspExitThread+0x5f6 ffff9c8d`ddc838d0 fffff805`5780f0d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`71023560 : nt!KiSchedulerApcTerminate+0x38 ffff9c8d`ddc83910 fffff805`579fb230 : 00000000`00000000 ffff9c8d`ddc839c0 ffff8300`3faa0180 fffff805`00000000 : nt!KiDeliverApc+0x487 ffff9c8d`ddc839c0 fffff805`57a0875f : ffffdd03`757df000 00007ffc`0cc1a554 ffffffff`ee1e5d00 ffffdd03`00000000 : nt!KiInitiateUserApc+0x70 ffff9c8d`ddc83b00 00007ffc`0d62d4a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000038`d25ff668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`0d62d4a4 SYMBOL_NAME: nt!MiDeletePteRun+17b9 MODULE_NAME: nt IMAGE_VERSION: 10.0.19041.1023 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 17b9 FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5} Followup: MachineOwner --------- 10: kd> lmvm nt Browse full module list start end module name fffff805`57600000 fffff805`58646000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\121F238DD43DA32C1476AC846D4FEA741\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\E304EA6D1046000\ntoskrnl.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: E304EA6D (This is a reproducible build file hash, not a timestamp) CheckSum: 00A5BFB2 ImageSize: 01046000 File version: 10.0.19041.1023 Product version: 10.0.19041.1023 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 10.0.19041.1023 FileVersion: 10.0.19041.1023 (WinBuild.160101.0800) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.
Eğer tekrar mavi ekran yerseniz MHz düşürmeyi deneyin.Sanmıyorum ama bu gece XMP kapalı ve açık şekilde 2 test gerçekleştireceğim.
Hocam selamlar sorunu nasıl çözdünüz?Sanmıyorum ama bu gece XMP kapalı ve açık şekilde 2 test gerçekleştireceğim.