Şimdi Ara

Memory.DMP hatası nasıl çözülür?

Daha Fazla
Bu Konudaki Kullanıcılar: Daha Az
1 Misafir - 1 Masaüstü
5 sn
5
Cevap
0
Favori
686
Tıklama
Daha Fazla
İstatistik
  • Konu İstatistikleri Yükleniyor
0 oy
Öne Çıkar
Sayfa: 1
Giriş
Mesaj
  • Daha önce sistemim bir kez Memory.DMP hatası vermişti, onun içeriğini kontrol edip not etmiştim. Şimdi ikinci kez verdi onun da içeriğine baktım. İkisinin 'de farklı sebeplerden kaynaklı gibi duruyor.

    1. Memory.DMP dosya içeriği;

    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\Users\emana\OneDrive\Masaüstü\MEMORY.DMP]
    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 18362 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
    Machine Name:
    Kernel base = 0xfffff803`2f600000 PsLoadedModuleList = 0xfffff803`2fa48150
    Debug session time: Wed Aug 12 02:24:33.380 2020 (UTC + 3:00)
    System Uptime: 0 days 20:51:59.053
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ..................

    Loading User Symbols
    PEB address is NULL !
    Loading unloaded module list

    ..................................................

    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff803`2f7c23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa8c`5fc6e740=000000000000007e
    7: kd> !analyze -v

    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)

    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.

    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff8032f745b44, The address that the exception occurred at
    Arg3: fffffa8c5fc6f758, Exception Record Address
    Arg4: fffffa8c5fc6efa0, Context Record Address

    Debugging Details:

    ------------------

    KEY_VALUES_STRING: 1
    Key : AV.Fault
    Value: Read

    Key : Analysis.CPU.mSec
    Value: 2687

    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-9IGTL22

    Key : Analysis.DebugData
    Value: CreateObject

    Key : Analysis.DebugModel
    Value: CreateObject

    Key : Analysis.Elapsed.mSec
    Value: 6223

    Key : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key : Analysis.System
    Value: CreateObject

    Key : WER.OS.Branch
    Value: 19h1_release

    Key : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key : WER.OS.Version
    Value: 10.0.18362.1


    ADDITIONAL_XML: 1

    OS_BUILD_LAYERS: 1

    BUGCHECK_CODE: 7e

    BUGCHECK_P1: ffffffffc0000005

    BUGCHECK_P2: fffff8032f745b44

    BUGCHECK_P3: fffffa8c5fc6f758

    BUGCHECK_P4: fffffa8c5fc6efa0

    EXCEPTION_RECORD: fffffa8c5fc6f758 -- (.exr 0xfffffa8c5fc6f758)

    ExceptionAddress: fffff8032f745b44 (nt!RtlCompressBufferXpressLzStandard+0x0000000000000144)
    ExceptionCode: c0000005 (Access violation)
    ExceptionFlags: 00000000

    NumberParameters: 2
    Parameter[0]: 0000000000000000
    Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff


    CONTEXT: fffffa8c5fc6efa0 -- (.cxr 0xfffffa8c5fc6efa0)
    rax=00000000000008fc rbx=ffffaf04b24d59cc rcx=0000000000000073
    rdx=ffffaf04b24c63c0 rsi=0000000000100000 rdi=000000000000047e
    rip=fffff8032f745b44 rsp=fffffa8c5fc6f990 rbp=ffffaf04b42f5c20
    r8=3abed0cbb24d4f4f r9=ffffaf04b24d5f29 r10=ffffaf04b42f5c20
    r11=ffffaf04b42f6000 r12=ffffaf04b24d5f29 r13=ffffaf04b42f5fd7
    r14=ffffaf04b42f5c38 r15=ffffaf04b24c6028
    iopl=0 nv up ei pl nz ac po nc

    cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050216

    nt!RtlCompressBufferXpressLzStandard+0x144:
    fffff803`2f745b44 413808 cmp byte ptr [r8],cl ds:002b:3abed0cb`b24d4f4f=??
    Resetting default scope



    BLACKBOXBSD: 1 (!blackboxbsd)

    BLACKBOXNTFS: 1 (!blackboxntfs)

    BLACKBOXPNP: 1 (!blackboxpnp)

    BLACKBOXWINLOGON: 1

    PROCESS_NAME: MemCompression

    READ_ADDRESS: ffffffffffffffff

    ERRR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.

    EXCEPTION_CODE_STR: c0000005

    EXCEPTION_PARAMETER1: 0000000000000000

    EXCEPTION_PARAMETER2: ffffffffffffffff

    EXCEPTION_STR: 0xc0000005

    STACK_TEXT:

    fffffa8c`5fc6f990 fffff803`2f7459f1 : ffffaf04`b24d5f29 fffff803`2f6ecee9 ffffaf04`b42f5070 ffffaf04`b24d4f4f : nt!RtlCompressBufferXpressLzStandard+0x144
    fffffa8c`5fc6fa40 fffff803`2f71667f : fffff803`2fb8df10 fffff803`2fb8df20 00000000`00000000 ffffd269`349a4af0 : nt!RtlCompressBufferXpressLz+0x61
    fffffa8c`5fc6faa0 fffff803`2f7495cd : fffff803`2fb8deb0 ffffaf04`a46c20e0 ffffaf04`b37d1028 ffffaf04`b24d4f4f : nt!RtlCompressBuffer+0x6f
    fffffa8c`5fc6fb00 fffff803`2f7493ed : fffff803`2fb8deb0 fffff803`2fb8d9c0 ffffaf04`b42f5028 fffff803`2fb8de00 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxProcessEntry+0x91
    fffffa8c`5fc6fb90 fffff803`2f71e155 : ffffffff`fd050f80 ffffaf04`ad1f2540 fffff803`2f749280 ffffffff`00000001 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxWorkerThread+0x16d
    fffffa8c`5fc6fc10 fffff803`2f7c99c8 : ffff8281`14679180 ffffaf04`ad1f2540 fffff803`2f71e100 fffffa8c`5fc6fcd0 : nt!PspSystemThreadStartup+0x55
    fffffa8c`5fc6fc60 00000000`00000000 : fffffa8c`5fc70000 fffffa8c`5fc6a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


    SYMBOL_NAME: nt!RtlCompressBufferXpressLzStandard+144

    MODULE_NAME: nt

    IMAGE_NAME: ntkrnlmp.exe

    STACK_COMMAND: .cxr 0xfffffa8c5fc6efa0 ; kb

    BUCKET_ID_FUNC_OFFSET: 144

    FAILURE_BUCKET_ID: AV_nt!RtlCompressBufferXpressLzStandard

    OS_VERSION: 10.0.18362.1

    BUILDLAB_STR: 19h1_release

    OSPLATFORM_TYPE: x64

    OSNAME: Windows 10

    FAILURE_ID_HASH: {ecd29322-2063-7ed6-1d71-1cd65a0a5eee}

    Followup: MachineOwner

    ---------


    2. Memory.DMP dosya içeriği;

    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\MEMORY.DMP]
    Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


    ************* Path validation summary **************
    Response Time (ms) Location
    Deferred srv*
    Symbol search path is: srv*
    Executable search path is:
    Windows 10 Kernel Version 18362 MP (12 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
    Machine Name:
    Kernel base = 0xfffff805`5aa00000 PsLoadedModuleList = 0xfffff805`5ae480f0
    Debug session time: Thu Aug 13 21:25:14.791 2020 (UTC + 3:00)
    System Uptime: 0 days 1:02:02.462
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details
    ..................................................
    .....................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00000010`f6fb6018). Type ".hh dbgerr001" for details
    Loading unloaded module list
    ...........
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff805`5abc23c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff9b0f`a6725740=0000000000000192
    6: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL (192)
    A lock tracked by AutoBoost was acquired while executing at DISPATCH_LEVEL or
    above.
    Arguments:
    Arg1: ffffc48a997b3080, The address of the thread.
    Arg2: ffffc48a8b4f78c0, The lock address.
    Arg3: 0000000000000000, The IRQL at which the lock was acquired.
    Arg4: 0000000000000000, Reserved.

    Debugging Details:
    ------------------

    Page 24df0e not present in the dump file. Type ".hh dbgerr004" for details

    KEY_VALUES_STRING: 1

    Key : Analysis.CPU.mSec
    Value: 3265

    Key : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-9IGTL22

    Key : Analysis.DebugData
    Value: CreateObject

    Key : Analysis.DebugModel
    Value: CreateObject

    Key : Analysis.Elapsed.mSec
    Value: 3359

    Key : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key : Analysis.System
    Value: CreateObject

    Key : WER.OS.Branch
    Value: 19h1_release

    Key : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key : WER.OS.Version
    Value: 10.0.18362.1


    ADDITIONAL_XML: 1

    OS_BUILD_LAYERS: 1

    BUGCHECK_CODE: 192

    BUGCHECK_P1: ffffc48a997b3080

    BUGCHECK_P2: ffffc48a8b4f78c0

    BUGCHECK_P3: 0

    BUGCHECK_P4: 0

    BLACKBOXBSD: 1 (!blackboxbsd)

    BLACKBOXNTFS: 1 (!blackboxntfs)

    BLACKBOXPNP: 1 (!blackboxpnp)

    BLACKBOXWINLOGON: 1

    PROCESS_NAME: ModernWarfare.exe

    STACK_TEXT:
    ffff9b0f`a6725738 fffff805`5aaa163d : 00000000`00000192 ffffc48a`997b3080 ffffc48a`8b4f78c0 00000000`00000000 : nt!KeBugCheckEx
    ffff9b0f`a6725740 fffff805`5d6e4b95 : ffffc48a`8b4f78c0 ffffc48a`00000000 ffffc48a`8f53fb30 ffffc48a`99fb8c40 : nt!ExAcquireCacheAwarePushLockSharedEx+0x14d
    ffff9b0f`a6725780 fffff805`5d6e2f5c : ffff9b0f`a6725920 ffff9b0f`a6725900 00000000`00000003 fffff805`5d6e6400 : FLTMGR!FltpPerformPreCallbacks+0x435
    ffff9b0f`a6725890 fffff805`5d71c7c5 : ffff9b0f`a67259f8 ffff9b0f`a6725b80 ffffc48a`997b3080 ffffc48a`97d816c0 : FLTMGR!FltpPassThroughFastIo+0x8c
    ffff9b0f`a67258f0 fffff805`5b00407f : ffffc48a`97d816c0 00000000`00000000 00000000`00000000 ffffc48a`00000000 : FLTMGR!FltpFastIoRead+0x165
    ffff9b0f`a67259a0 fffff805`5abd3c18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000010`f7dfd718 : nt!NtReadFile+0x39f
    ffff9b0f`a6725a90 00007ff9`a62fc134 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
    00000010`f7dfd658 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`a62fc134


    SYMBOL_NAME: nt!ExAcquireCacheAwarePushLockSharedEx+14d

    MODULE_NAME: nt

    IMAGE_NAME: ntkrnlmp.exe

    STACK_COMMAND: .thread ; .cxr ; kb

    BUCKET_ID_FUNC_OFFSET: 14d

    FAILURE_BUCKET_ID: 0x192_nt!ExAcquireCacheAwarePushLockSharedEx

    OS_VERSION: 10.0.18362.1

    BUILDLAB_STR: 19h1_release

    OSPLATFORM_TYPE: x64

    OSNAME: Windows 10

    FAILURE_ID_HASH: {0b3e94d6-ae37-4afe-1a69-72779fd6e91e}

    Followup: MachineOwner
    ---------


    Memory.DMP hatası nasıl çözülür?


    İlkini hatırlamıyorum ama, ikinci olan oyun içerisinde iken oldu şimdi. Diğeri de belki oyunda iken olmuş olabilir. Oyun: Call Of Duty: Warzone.
    Memtest86 İle RAM'larımı test ettim bir sorun çıkmadı. Yardımlarınızı bekliyorum...

    * Oyun daha önce DEV ERROR 6328 hatası ve çeşitli hatalar veriyordu, dün akşam bazı ayarlamalar yaptım oyun için internet'den araştırıp uyguladığım.

    Sistem:
    Windows 10 Home
    R5 3600
    RX 5700 XT Nitro+
    Corsair Vengeance RGB Pro 16GB (2x8GB) 3200MHz



    < Bu mesaj bu kişi tarafından değiştirildi suns3t -- 14 Ağustos 2020; 1:50:37 >







  • Sürücülerinizi yeniden ve en güncel olanları ile güncelleyin, biosu default ayarlara getirin, kayıt defterini kontrol edin, dual channel ram mı kullanıyorsunuz?
  • Sürücülerim güncel, bios'um default değil sadece işlemcimi 4.2 GHz hızında kullanıyorum RAM'a da 1.35V veriyorum. Evet Dual ch. Ram kullanıyorum.
    Kayıt defterinde neyi kontrol etmeliyim?
  • Güncel.
  • 
Sayfa: 1
- x
Bildirim
mesajınız kopyalandı (ctrl+v) yapıştırmak istediğiniz yere yapıştırabilirsiniz.