Windows 7 PAGE_FAULT_IN_NONPAGED_AREA Mavi ekran

Bellek sorunu gibi görünüyor.


Kod:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff87fcb2a8a50, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880042b1aba, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name
fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80002f00300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 2

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-0141DB3

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 2

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 63

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: fffff87fcb2a8a50

BUGCHECK_P2: 0

BUGCHECK_P3: fffff880042b1aba

BUGCHECK_P4: 5

READ_ADDRESS: fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002f002f0
GetUlongPtrFromAddress: unable to read from fffff80002f004a8
 fffff87fcb2a8a50

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

TRAP_FRAME:  fffff8800384b6d0 -- (.trap 0xfffff8800384b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004d2dba0 rbx=0000000000000000 rcx=fffffa8004d2db50
rdx=fffffa80037ba110 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880042b1aba rsp=fffff8800384b860 rbp=fffff8800384bca0
 r8=00000000000d38c4  r9=0000000000000009 r10=0000000000000000
r11=fffff88002a90120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
dxgkrnl!DxgkEscape+0x1d6:
fffff880`042b1aba 44843d8f6fffff  test    byte ptr [dxgkrnl!g_loggerInfo+0x8 (fffff880`042a8a50)],r15b ds:fffff880`042a8a50=??
Resetting default scope

STACK_TEXT: 
fffff880`0384b578 fffff800`02dcedc6 : 00000000`00000050 fffff87f`cb2a8a50 00000000`00000000 fffff880`0384b6d0 : nt!KeBugCheckEx
fffff880`0384b580 fffff800`02d02fdc : 00000000`00000000 fffff87f`cb2a8a50 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x736
fffff880`0384b6d0 fffff880`042b1aba : 00000000`000007e4 00000000`00000000 fffff880`0384bca0 00000000`00000003 : nt!KiPageFault+0x35c
fffff880`0384b860 fffff960`001de542 : 00000000`03c4e580 fffffa80`04d2db50 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkEscape+0x1d6
fffff880`0384bbf0 fffff800`02d04f53 : fffffa80`04d2db50 00000000`03c4f6a0 000007fe`f8b0c610 00000000`00000000 : win32k!EngUnlockDirectDrawSurface+0x3056
fffff880`0384bc20 000007fe`fd4513ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03c4e868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`fd4513ea


SYMBOL_NAME:  dxgkrnl!DxgkEscape+1d6

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  6.1.7601.24513

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  X64_0x50_dxgkrnl!DxgkEscape+1d6

OS_VERSION:  7.1.7601.24545

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {22d8b951-7e4f-3f6e-509c-ff499041f173}

Followup:     MachineOwner

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002e259cf, Address of the instruction which caused the bugcheck
Arg3: fffff88005250940, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

fffff80002e2d0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80002ee8300

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0141DB3

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 2

Key : Analysis.Memory.CommitPeak.Mb
Value: 58

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80002e259cf

BUGCHECK_P3: fffff88005250940

BUGCHECK_P4: 0

CONTEXT:  fffff88005250940 -- (.cxr 0xfffff88005250940)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88002c8de30
rdx=fffff900c1c54000 rsi=0000000000000000 rdi=fffff900c06f1960
rip=fffff80002e259cf rsp=fffff88005251310 rbp=0000000000000000
r8=fffff900c1dd0310 r9=fffff900c1c53f00 r10=0000000000000001
r11=fffff900c1c53f10 r12=fffff88002c8dcc0 r13=0000000000000000
r14=0000000000000006 r15=0000000000000001
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!ExDeferredFreePool+0x1df:
fffff800`02e259cf 4c395808 cmp qword ptr [rax+8],r11 ds:002b:00000000`00000008=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

STACK_TEXT:
fffff880`05251310 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x1df


SYMBOL_NAME: nt!ExDeferredFreePool+1df

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 6.1.7601.24545

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffff88005250940 ; kb

FAILURE_BUCKET_ID: X64_0x3B_c0000005_nt!ExDeferredFreePool+1df

OS_VERSION: 7.1.7601.24545

BUILDLAB_STR: win7sp1_ldr_escrow

OSPLATFORM_TYPE: x64

OSNAME: Windows 7

FAILURE_ID_HASH: {599daa89-6b98-55c3-86f3-c72abe59b13d}

Followup: Pool_corruption
---------
---------
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…