XPG Gammix 16 GB RAM'li sistemde MEMORY_MANAGEMENT hatası

İşletim sistemi
Windows 10
Katılım
4 Aralık 2019
Mesajlar
4.775
Çözümler
6
Yer
BesDokuz
Daha fazla  
Cinsiyet
Erkek
RAM
XPG Gammix D30 3000 MHz CL16
SSD veya HDD modeli
Samsung 860 EVO 500 GB
Ekran kartı
Sapphire Nitro RX 570
Anakart
ASUS TUF X570 GAMİNG PLUS MAX
İşlemci
Ryzen 5 3600
Uzun süredir mavi ekran hatalarıyla cebelleşiyorum diyebilirim. 2 gün önce sistemim tamamen sorun vermeye başladı masaüstünü göremiyordum hangi yolu denediysem aşamadım ve sistemi formatlamak zorunda kaldım. İlk gün sorun yoktu ama bugün hatalar yine başladı. Önceki konumda RAM'leri test etmiştik yaklaşık 6 saat süren testte bir hata almadık inanın kafayı yemek üzereyim. Yardımlarınızı bekliyorum.

ASUS TUF X570 Plus.
Ryzen 5 3600.
16 GB RAM XPG Gammix D30 8 GB kit.
Sapphire Nitro RX 570.

 
Son düzenleyen: Moderatör:
1) Corsair yazılımını kaldırın.

2) Ses sürücünüzü DDU ile kaldırıp aşağıdan indireceğiniz ses sürücüsünü kurun.


3) Sanal belleğinizi kapatın. Kapatma ve açma işlemleri sonrasında sisteminizi yeniden başlatmalısınız, bilgilendireyim.


Ek olarak BIOS sürümünüz beta sürümünde, yani 4203 sürümünde. Onu da beta olmayan bir önceki sürüme döndürebilirseniz fena olmaz.

Sorun çözülürse ya da çözülmezse belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff9bfffec8c00
Arg3: 0000a10000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4764

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 9726

Key : Analysis.Init.CPU.mSec
Value: 952

Key : Analysis.Init.Elapsed.mSec
Value: 9920

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : MemoryManagement.PFN
Value: a10000000


FILE_IN_CAB: 030522-6937-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41792

BUGCHECK_P2: fffff9bfffec8c00

BUGCHECK_P3: a10000000000

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WerFault.exe

STACK_TEXT:
fffffa87`ecc76128 fffff806`584440ca : 00000000`0000001a 00000000`00041792 fffff9bf`ffec8c00 0000a100`00000000 : nt!KeBugCheckEx
fffffa87`ecc76130 fffff806`5849e5c6 : 00000000`00000000 fffff9fc`dffff640 00000000`0000000b fffff9bf`ffec8c00 : nt!MiDeleteVa+0x153a
fffffa87`ecc76230 fffff806`5849e6db : fffff9fc`dffff640 ffffdb09`68d9d700 fffffa87`00000000 fffffa87`ecc766a0 : nt!MiWalkPageTablesRecursively+0x776
fffffa87`ecc762d0 fffff806`5849e6db : fffff9fc`fe6ffff8 ffffdb09`68d9d700 fffffa87`00000001 fffffa87`ecc766b0 : nt!MiWalkPageTablesRecursively+0x88b
fffffa87`ecc76370 fffff806`5849e6db : fffff9fc`fe6ff000 ffffdb09`68d9d700 fffffa87`00000002 fffffa87`ecc766c0 : nt!MiWalkPageTablesRecursively+0x88b
fffffa87`ecc76410 fffff806`58404f4b : 00000000`00000000 ffffdb09`68d9d700 00000000`00000003 fffffa87`ecc766d0 : nt!MiWalkPageTablesRecursively+0x88b
fffffa87`ecc764b0 fffff806`58442961 : fffffa87`ecc76650 00000000`00000000 fffff9be`00000002 fffff9fc`00000000 : nt!MiWalkPageTables+0x36b
fffffa87`ecc765b0 fffff806`58412aa0 : 00000000`00000001 fffffa87`00000000 ffffdb09`68d9d550 ffffdb09`66fc7040 : nt!MiDeletePagablePteRange+0x4f1
fffffa87`ecc768c0 fffff806`588011b9 : ffffdb09`6aea48a0 00000000`00000000 ffffdb09`00000000 ffffdb09`00000000 : nt!MiDeleteVad+0x360
fffffa87`ecc769d0 fffff806`58800850 : ffffdb09`6aea48a0 ffffdb09`6650a010 ffffdb09`66fc7040 00000000`00000000 : nt!MiUnmapVad+0x49
fffffa87`ecc76a00 fffff806`587feb1f : ffffdb09`6aea44e0 ffffdb09`6aea44e0 ffffdb09`6aea48a0 ffffdb09`68d9d080 : nt!MiCleanVad+0x30
fffffa87`ecc76a30 fffff806`5885c6e8 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffdb09`68d9d080 : nt!MmCleanProcessAddressSpace+0x137
fffffa87`ecc76ab0 fffff806`58b07b92 : ffffdb09`66136080 ffffdb09`68d9d080 fffff806`58b07b60 00000000`00000100 : nt!PspRundownSingleProcess+0x20c
fffffa87`ecc76b40 fffff806`584b86c5 : ffffdb09`66fc7040 fffff806`58898cd0 ffffdb09`596888e0 ffffdb09`00000000 : nt!PspProcessRundownWorkerSingle+0x32
fffffa87`ecc76b70 fffff806`58555a05 : ffffdb09`66fc7040 00000000`00000080 ffffdb09`59692200 f4547360`00000001 : nt!ExpWorkerThread+0x105
fffffa87`ecc76c10 fffff806`585fea08 : ffffa301`625c0180 ffffdb09`66fc7040 fffff806`585559b0 c16c0c5d`000c6e00 : nt!PspSystemThreadStartup+0x55
fffffa87`ecc76c60 00000000`00000000 : fffffa87`ecc77000 fffffa87`ecc71000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!MiDeleteVa+153a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.1526

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 153a

FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup: MachineOwner
---------

PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 132909464804802135
PnpEventInformation: 2
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : PCI\VEN_1002&DEV_AAF0&SUBSYS_AAF01DA2&REV_00\4&2ae1b128&0&0119
VetoString :

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb60d76c00000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80113223fa3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Type
Value: Write

Key : Analysis.CPU.mSec
Value: 6983

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 9236

Key : Analysis.Init.CPU.mSec
Value: 905

Key : Analysis.Init.Elapsed.mSec
Value: 14431

Key : Analysis.Memory.CommitPeak.Mb
Value: 77


FILE_IN_CAB: 030522-8546-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffb60d76c00000

BUGCHECK_P2: 2

BUGCHECK_P3: fffff80113223fa3

BUGCHECK_P4: 2

READ_ADDRESS: fffff801116fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffb60d76c00000

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: fffff18629794bf0 -- (.trap 0xfffff18629794bf0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb60d769028e8 rbx=0000000000000000 rcx=ffffb60d76c00040
rdx=ffffffffffffff58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80113223fa3 rsp=fffff18629794d88 rbp=fffff18629795be0
r8=0000000000000008 r9=03ffffffffff40a1 r10=fffff80111031980
r11=ffffb60d769027e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
Ntfs+0x33fa3:
fffff801`13223fa3 0f2b49c0 movntps xmmword ptr [rcx-40h],xmm1 ds:ffffb60d`76c00000=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff186`29794948 fffff801`10e1ecf1 : 00000000`00000050 ffffb60d`76c00000 00000000`00000002 fffff186`29794bf0 : nt!KeBugCheckEx
fffff186`29794950 fffff801`10c0c960 : 00000000`00000114 00000000`00000002 fffff186`29794c70 00000000`00000000 : nt!MiSystemFault+0x1f44e1
fffff186`29794a50 fffff801`10e03f5e : fffff186`29794fa0 ffffdf84`c6be6920 00000000`00000000 ffff8d84`1f91a6c0 : nt!MmAccessFault+0x400
fffff186`29794bf0 fffff801`13223fa3 : fffff801`133056c8 fffff186`29794fa0 ffff8d84`3d1b2bf0 00000000`00182000 : nt!KiPageFault+0x35e
fffff186`29794d88 fffff801`133056c8 : fffff186`29794fa0 ffff8d84`3d1b2bf0 00000000`00182000 00000001`00000000 : Ntfs+0x33fa3
fffff186`29794d90 fffff801`1330f0b9 : ffff8d84`3f7f4170 fffff186`297951f0 ffff8d84`3d1b2bf0 00000000`00000000 : Ntfs+0x1156c8
fffff186`29794e40 fffff801`1330eea1 : 00000000`00000030 ffff8d84`3f7f4170 fffff186`29794fa0 00000000`00004000 : Ntfs+0x11f0b9
fffff186`29794f10 fffff801`1343f631 : fffff186`29795840 fffff186`297965d1 fffff801`00000000 ffff8d84`3f7ac010 : Ntfs+0x11eea1
fffff186`29795180 fffff801`134353a1 : ffff8d84`3f7f4170 ffff8d84`3f7f4010 fffff186`29795840 fffff801`13258030 : Ntfs+0x24f631
fffff186`297953c0 fffff801`1343ba3c : fffff186`29795840 00000000`00000000 fffff801`13261cb0 00000000`000007e6 : Ntfs+0x2453a1
fffff186`29795600 fffff801`13241b43 : fffff801`132418a0 ffffdf84`c6c2a180 ffffdf84`c6c2a180 00000000`00000000 : Ntfs+0x24ba3c
fffff186`29795b80 fffff801`10d17e85 : ffffdf84`d4af6080 ffffdf84`d4af6080 fffff801`132418a0 ffffdf84`c6c2a180 : Ntfs+0x51b43
fffff186`29795c10 fffff801`10dfd498 : ffff9d80`9aee6180 ffffdf84`d4af6080 fffff801`10d17e30 fffff186`29795ec0 : nt!PspSystemThreadStartup+0x55
fffff186`29795c60 00000000`00000000 : fffff186`29796000 fffff186`29790000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: Ntfs+33fa3

MODULE_NAME: Ntfs

IMAGE_NAME: Ntfs.sys

IMAGE_VERSION: 10.0.19041.928

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 33fa3

FAILURE_BUCKET_ID: AV_W_(null)_Ntfs!unknown_function

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {41fb6853-8c2a-bd88-5d70-a56f176592ca}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa33ffdc0a1c0
Arg3: 0000f70000000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5608

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 8618

Key : Analysis.Init.CPU.mSec
Value: 983

Key : Analysis.Init.Elapsed.mSec
Value: 9053

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : MemoryManagement.PFN
Value: f70000000


FILE_IN_CAB: 030522-6562-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffa33ffdc0a1c0

BUGCHECK_P3: f70000000000

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WmiPrvSE.exe

STACK_TEXT:
ffff8a0c`622ba0c8 fffff802`5369d0fa : 00000000`0000001a 00000000`00041792 ffffa33f`fdc0a1c0 0000f700`00000000 : nt!KeBugCheckEx
ffff8a0c`622ba0d0 fffff802`5360b9e6 : 00000000`00000000 00000000`00000000 00000000`00000044 ffffa33f`fdc0a1c0 : nt!MiDeleteVa+0x153a
ffff8a0c`622ba1d0 fffff802`5360bafb : ffffa351`9ffee050 ffffb38b`1a51c700 ffff8a0c`00000000 ffff8a0c`622ba640 : nt!MiWalkPageTablesRecursively+0x776
ffff8a0c`622ba270 fffff802`5360bafb : ffffa351`a8cfff70 ffffb38b`1a51c700 ffff8a0c`00000001 ffff8a0c`622ba650 : nt!MiWalkPageTablesRecursively+0x88b
ffff8a0c`622ba310 fffff802`5360bafb : ffffa351`a8cff000 ffffb38b`1a51c700 ffff8a0c`00000002 ffff8a0c`622ba660 : nt!MiWalkPageTablesRecursively+0x88b
ffff8a0c`622ba3b0 fffff802`5365de6b : ffff59c1`10ec8a00 ffffb38b`1a51c700 ffff8a0c`00000003 ffff8a0c`622ba670 : nt!MiWalkPageTablesRecursively+0x88b
ffff8a0c`622ba450 fffff802`5369b991 : ffff8a0c`622ba5f0 ffffb38b`00000000 ffffa351`00000002 ffffffff`00000000 : nt!MiWalkPageTables+0x36b
ffff8a0c`622ba550 fffff802`5366baf0 : 00000000`00000001 ffff8a0c`00000000 ffffb38b`1a51c550 ffffb38b`1a5200c0 : nt!MiDeletePagablePteRange+0x4f1
ffff8a0c`622ba860 fffff802`53a36189 : ffffb38b`0fffa570 00000000`00000000 00000000`00000000 ffffb38b`00000000 : nt!MiDeleteVad+0x360
ffff8a0c`622ba970 fffff802`53a35f62 : ffffb38b`1d5cc0e0 00007ffb`81130000 ffffb38b`1a51c080 00000000`00000000 : nt!MiUnmapVad+0x49
ffff8a0c`622ba9a0 fffff802`53a35dd9 : ffffb38b`1a5200c0 fffff802`538077b8 00000000`00000000 00000000`00000000 : nt!MiUnmapViewOfSection+0x152
ffff8a0c`622baa80 fffff802`53ad94fc : ffffb38b`1a5200c0 000001f8`aa43c920 00000000`00000001 ffffb38b`1a51c080 : nt!NtUnmapViewOfSectionEx+0x99
ffff8a0c`622baad0 fffff802`538077b8 : ffffb38b`1a5200c0 00000000`00000000 ffff8a0c`00000001 ffffb38b`00000000 : nt!NtUnmapViewOfSection+0xc
ffff8a0c`622bab00 00007ffb`818ed264 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000b`534fc548 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`818ed264


SYMBOL_NAME: nt!MiDeleteVa+153a

MODULE_NAME: nt

IMAGE_VERSION: 10.0.19041.928

STACK_COMMAND: .cxr; .ecxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 153a

FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup: MachineOwner
---------

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbc86d30c02a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8017cc3867b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Type
Value: Read

Key : Analysis.CPU.mSec
Value: 6265

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 9984

Key : Analysis.Init.CPU.mSec
Value: 874

Key : Analysis.Init.Elapsed.mSec
Value: 13536

Key : Analysis.Memory.CommitPeak.Mb
Value: 76


FILE_IN_CAB: 030522-8625-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffbc86d30c02a8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8017cc3867b

BUGCHECK_P4: 2

READ_ADDRESS: fffff80180afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffbc86d30c02a8

MM_INTERNAL_CODE: 2

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffec89015bf280 -- (.trap 0xffffec89015bf280)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc86d30c0288 rbx=0000000000000000 rcx=ffff97075ddcfa60
rdx=ffff97075e20bc90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017cc3867b rsp=ffffec89015bf410 rbp=ffffec89015bf589
r8=ffffffffffffffff r9=7fff97075ddcfa48 r10=fffff801800609e0
r11=ffff9707531b4040 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
FLTMGR!TreeUnlinkMulti+0x4b:
fffff801`7cc3867b 483b7020 cmp rsi,qword ptr [rax+20h] ds:ffffbc86`d30c02a8=????????????????
Resetting default scope

STACK_TEXT:
ffffec89`015befd8 fffff801`8021ecf1 : 00000000`00000050 ffffbc86`d30c02a8 00000000`00000000 ffffec89`015bf280 : nt!KeBugCheckEx
ffffec89`015befe0 fffff801`8000c960 : 00000000`00000000 00000000`00000000 ffffec89`015bf300 00000000`00000000 : nt!MiSystemFault+0x1f44e1
ffffec89`015bf0e0 fffff801`80203f5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000014 : nt!MmAccessFault+0x400
ffffec89`015bf280 fffff801`7cc3867b : ffff9707`531b4690 fffff801`80060ace ffff9707`531b4040 ffff9707`5ddcfa48 : nt!KiPageFault+0x35e
ffffec89`015bf410 fffff801`7cc6c437 : ffff9707`5ddcf9e0 ffff9707`00000000 ffffec89`00000000 ffff9707`531e10a0 : FLTMGR!TreeUnlinkMulti+0x4b
ffffec89`015bf460 fffff801`7cc365be : ffff9707`5c2eda20 ffff9707`5e20bc90 ffffec89`015bf589 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject+0xb7
ffffec89`015bf4d0 fffff801`7cc35b37 : ffffec89`015bf700 ffff9707`00000002 ffff9707`5311fd00 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x89e
ffffec89`015bf5f0 fffff801`7cc34b46 : ffffec89`015c0000 ffffec89`015ba000 ffff9707`5b6e1b20 ffffec89`015bf710 : FLTMGR!FltpPassThroughInternal+0xc7
ffffec89`015bf640 fffff801`7cc348bb : ffffffff`fffe7960 00000000`00000000 00000000`00000000 00000000`00000080 : FLTMGR!FltpPassThrough+0x1d6
ffffec89`015bf6e0 fffff801`80052f55 : ffff9707`5e20bc90 fffff801`80055758 ffff9707`531ef1f0 005000d0`00000000 : FLTMGR!FltpDispatch+0x8b
ffffec89`015bf740 fffff801`80400f9a : ffff9707`5e20bc90 ffffc386`c8b9e3b0 ffff9707`5311fd60 ffff9707`5311fd60 : nt!IofCallDriver+0x55
ffffec89`015bf780 fffff801`803fb300 : ffffc386`c8b9e3b0 00000000`00000000 ffff9707`4d964a60 fffff801`807b1019 : nt!IopDeleteFile+0x13a
ffffec89`015bf800 fffff801`80061277 : 00000000`00000000 00000000`00000000 ffffc386`c8b9e3b0 ffff9707`5e20bc90 : nt!ObpRemoveObjectRoutine+0x80
ffffec89`015bf860 fffff801`8006119e : 00000000`00000000 ffff9707`5c68dc70 ffff9707`5c68dc70 01000000`00100000 : nt!ObfDereferenceObjectWithTag+0xc7
ffffec89`015bf8a0 fffff801`8043e459 : 00000000`00000017 00000000`000800a1 fffff801`80a50c80 ffffc386`c8b9e3b0 : nt!HalPutDmaAdapter+0xe
ffffec89`015bf8d0 fffff801`801843bd : 00000000`00000001 00000000`00000000 ffffec89`015bf9a0 ffff9707`5c68dc78 : nt!MiSegmentDelete+0x155
ffffec89`015bf920 fffff801`801b9259 : 00000000`00000000 fffff801`00000001 00000000`00000000 00000000`00000000 : nt!MiProcessDereferenceList+0xc1
ffffec89`015bf9e0 fffff801`80117e85 : ffff9707`531b4040 ffff9707`531b4040 00000000`00000080 fffff801`801b9130 : nt!MiDereferenceSegmentThread+0x129
ffffec89`015bfc10 fffff801`801fd498 : ffffae80`40240180 ffff9707`531b4040 fffff801`80117e30 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffec89`015bfc60 00000000`00000000 : ffffec89`015c0000 ffffec89`015ba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: FLTMGR!TreeUnlinkMulti+4b

MODULE_NAME: FLTMGR

IMAGE_NAME: FLTMGR.SYS

IMAGE_VERSION: 10.0.19041.264

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 4b

FAILURE_BUCKET_ID: AV_R_(null)_FLTMGR!TreeUnlinkMulti

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {19d2f5d5-fdf4-c5b2-f8ec-915b9de0c51b}

Followup: MachineOwner
---------[/CODE]
 
Dediğim şeyleri kaldırmanız ve yapmanız gerekmekte. Corsair yazılımını kaldırdıktan sonra kurabilirsiniz, sanal belleği de kapadıktan sonra açabilirsiniz. Buradaki temel olay işlemler sonrası sistemi yeniden başlatmanız. :)
 
DDU ile ekran kartı sürücünüzü kaldırıp kurmayı deneyin. Gerekli rehber aşağıda mevcut, sonucu belirtirseniz sevinirim.


[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80559702ac4, The address that the exception occurred at
Arg3: ffff9e0dccced118, Exception Record Address
Arg4: ffff9e0dcccec950, Context Record Address

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.Fault
Value: Read

Key : Analysis.CPU.mSec
Value: 5437

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 7203

Key : Analysis.Init.CPU.mSec
Value: 983

Key : Analysis.Init.Elapsed.mSec
Value: 11561

Key : Analysis.Memory.CommitPeak.Mb
Value: 80


FILE_IN_CAB: 030822-6984-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80559702ac4

BUGCHECK_P3: ffff9e0dccced118

BUGCHECK_P4: ffff9e0dcccec950

EXCEPTION_RECORD: ffff9e0dccced118 -- (.exr 0xffff9e0dccced118)
ExceptionAddress: fffff80559702ac4 (dxgmms2!VIDMM_PAGE_TABLE_BASE::IsResident)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffff9e0dcccec950 -- (.cxr 0xffff9e0dcccec950)
rax=ffffe68707410000 rbx=0000d40000000000 rcx=0000d40000000000
rdx=ffffe68702630760 rsi=ffffe68702630760 rdi=ffffe687050e8f10
rip=fffff80559702ac4 rsp=ffff9e0dccced358 rbp=ffffc4829afd1000
r8=000000000281e000 r9=0000000000840001 r10=ffffe68702630760
r11=000000000281e000 r12=00000000000a0380 r13=ffffe68702630701
r14=0000000000080000 r15=000000000281e000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050286
dxgmms2!VIDMM_PAGE_TABLE_BASE::IsResident:
fffff805`59702ac4 488b5108 mov rdx,qword ptr [rcx+8] ds:002b:0000d400`00000008=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

READ_ADDRESS: fffff805476fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffffff

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
ffff9e0d`ccced358 fffff805`5975a6a4 : ffffe687`02630760 ffffc482`9afd1000 00000000`00000050 fffff805`59773ade : dxgmms2!VIDMM_PAGE_TABLE_BASE::IsResident
ffff9e0d`ccced360 fffff805`59773ca8 : ffffc482`9ac84901 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::EvictPageTable+0x18
ffff9e0d`ccced3a0 fffff805`5976be23 : 00000000`00840000 ffffe686`f4f3de90 00000000`00010000 00000000`00000001 : dxgmms2!VIDMM_PAGE_DIRECTORY::EvictPageDirectory+0x31c
ffff9e0d`ccced4a0 fffff805`5976b0cc : ffffc482`9ac84968 ffffe687`02630760 00000000`00840000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0xce3
ffff9e0d`ccced610 fffff805`5976ea9f : 00000000`00000001 00000000`00000000 00000000`00000000 ffffe686`fb657ac0 : dxgmms2!CVirtualAddressAllocator::UncommitVirtualAddressRange+0xf4
ffff9e0d`ccced720 fffff805`5976eb29 : 00000000`00000000 ffffe686`fb657ac0 ffffe687`02630701 fffff805`46c0ac67 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRangeSystemCommand+0x3f
ffff9e0d`ccced750 fffff805`5975abe3 : ffffe687`05037990 00000000`00000000 ffffe687`02630760 fffff805`44ad9440 : dxgmms2!VIDMM_GLOBAL::UncommitVirtualAddressRange+0x71
ffff9e0d`ccced7e0 fffff805`5976e3c7 : 00000000`00000078 ffffe687`02937ca0 00000000`40bc0088 00000000`00010000 : dxgmms2!VIDMM_GLOBAL::FreeGpuVirtualAddressSystemCommand+0xff
ffff9e0d`ccced880 fffff805`5977cc62 : ffffe686`f4f3e2b0 ffffc482`00000001 00000000`00000001 ffffe686`f5282510 : dxgmms2!VIDMM_GLOBAL::processSystemCommand+0x27b
ffff9e0d`ccceda00 fffff805`59786809 : ffffe686`f52824a0 ffffc482`9ade8001 ffff9e0d`ccc67800 00000000`03f56a00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462
ffff9e0d`cccedbe0 fffff805`46d55a05 : ffffc482`9ade8080 fffff805`59786800 ffffe686`f52824a0 000f8067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff9e0d`cccedc10 fffff805`46dfea08 : ffff8281`ec360180 ffffc482`9ade8080 fffff805`46d559b0 00000000`72657275 : nt!PspSystemThreadStartup+0x55
ffff9e0d`cccedc60 00000000`00000000 : ffff9e0d`cccee000 ffff9e0d`ccce8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: dxgmms2!VIDMM_PAGE_TABLE_BASE::IsResident+0

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr 0xffff9e0dcccec950 ; kb

BUCKET_ID_FUNC_OFFSET: 0

FAILURE_BUCKET_ID: AV_dxgmms2!VIDMM_PAGE_TABLE_BASE::IsResident

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {a89038c2-13a7-ca54-5acb-564f12261b9f}

Followup: MachineOwner
---------[/CODE]
 
Hocam geçenlerde bir yazınızı görmüştüm ondan dolayı adrenalin 22.1.2 optional (WHQL) olanı sistemime yükledim. Bunun güncel sürümleride mevcut DDU ile kaldırdıktan sonra aynı sürümü kursam sıkıntı olur mu? İnanın artık çok sıkıldım.
Hocam DDU'yu güvenli modda çalıştırıp sürücüleri temizledim. Driver indirirken tekrar mavi ekran yedim. Minidump dosyaları.
Sistem açıldı uzun sürmedi MEMORY_MANAGEMENT mavi ekran yedim :(
 
Son düzenleme:
Bir süre Corsair'in kontrol aracını kurmayın bakalım ne olacak. Ek olarak aşağıdan en güncel BIOS dosyanızı da indirip güncelleyin derim. BIOS ayarlarınızı da varsayılana döndürmeyi unutmayın.

 

Technopat Haberler

Yeni konular

Geri
Yukarı