PDA

Archiv verlassen und diese Seite im Standarddesign anzeigen : Blue screen: "Memory management"?


Janni555
2023-08-31, 17:55:15
Hi, ich habe letzte Zeit einige Male einen BlueScreen gehabt, immer stand da memory management
die dmp Datei habe ich ausgelesen, verstehe allerdings nicht, was sie sagt,. kann mir da jemand helfen?

Ich habe auf anaylse bei windbg gedrückt und das kam raus:


MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffa800fc2693e8
Arg3: 0000000800000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0x7b5e, File: 0xc0cc - C:\ProgramData\Dbg\sym\hal.dll\1A7BE8E96000\hal.dll

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2780

Key : Analysis.Elapsed.mSec
Value: 3801

Key : Analysis.IO.Other.Mb
Value: 19

Key : Analysis.IO.Read.Mb
Value: 16

Key : Analysis.IO.Write.Mb
Value: 49

Key : Analysis.Init.CPU.mSec
Value: 1077

Key : Analysis.Init.Elapsed.mSec
Value: 114816

Key : Analysis.Memory.CommitPeak.Mb
Value: 109

Key : Bugcheck.Code.KiBugCheckData
Value: 0x1a

Key : Bugcheck.Code.LegacyAPI
Value: 0x1a

Key : Failure.Bucket
Value: MEMORY_CORRUPTION_ONE_BIT

Key : Failure.Hash
Value: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Key : Hypervisor.Enlightenments.Value
Value: 0

Key : Hypervisor.Enlightenments.ValueHex
Value: 0

Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0

Key : Hypervisor.Flags.ApicEnlightened
Value: 0

Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1

Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0

Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0

Key : Hypervisor.Flags.CpuManager
Value: 0

Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0

Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0

Key : Hypervisor.Flags.Epf
Value: 0

Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0

Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1

Key : Hypervisor.Flags.MaxBankNumber
Value: 0

Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0

Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0

Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0

Key : Hypervisor.Flags.Phase0InitDone
Value: 0

Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0

Key : Hypervisor.Flags.RootScheduler
Value: 0

Key : Hypervisor.Flags.SynicAvailable
Value: 0

Key : Hypervisor.Flags.UseQpcBias
Value: 0

Key : Hypervisor.Flags.Value
Value: 16908288

Key : Hypervisor.Flags.ValueHex
Value: 1020000

Key : Hypervisor.Flags.VpAssistPage
Value: 0

Key : Hypervisor.Flags.VsmAvailable
Value: 0

Key : Hypervisor.RootFlags.AccessStats
Value: 0

Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0

Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0

Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0

Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0

Key : Hypervisor.RootFlags.IsHyperV
Value: 0

Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0

Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0

Key : Hypervisor.RootFlags.MceEnlightened
Value: 0

Key : Hypervisor.RootFlags.Nested
Value: 0

Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0

Key : Hypervisor.RootFlags.Value
Value: 0

Key : Hypervisor.RootFlags.ValueHex
Value: 0

Key : MemoryManagement.PFN
Value: 800000

Key : SecureKernel.HalpHvciEnabled
Value: 0

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffffa800fc2693e8

BUGCHECK_P3: 800000000

BUGCHECK_P4: 0

FILE_IN_CAB: MEMORY.DMP

MEMORY_CORRUPTOR: ONE_BIT

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME: dwm.exe

STACK_TEXT:
ffffec06`eabe0168 fffff801`2ae8124a : 00000000`0000001a 00000000`00041792 ffffa800`fc2693e8 00000008`00000000 : nt!KeBugCheckEx
ffffec06`eabe0170 fffff801`2ae2f7b6 : 00000000`00000000 ffffa854`2a000000 00000000`0000000b ffffa800`fc2693e8 : nt!MiDeleteVa+0x153a
ffffec06`eabe0270 fffff801`2ae2f8cb : ffffa854`007e1348 ffffda84`1e01c700 ffffec06`00000000 ffffec06`eabe06e0 : nt!MiWalkPageTablesRecursively+0x776
ffffec06`eabe0310 fffff801`2ae2f8cb : ffffa854`2a003f08 ffffda84`1e01c700 ffffec06`00000001 ffffec06`eabe06f0 : nt!MiWalkPageTablesRecursively+0x88b
ffffec06`eabe03b0 fffff801`2ae2f8cb : ffffa854`2a003000 ffffda84`1e01c700 ffffec06`00000002 ffffec06`eabe0700 : nt!MiWalkPageTablesRecursively+0x88b
ffffec06`eabe0450 fffff801`2ae2c8cb : 00000000`00000000 ffffda84`1e01c700 00000000`00000003 ffffec06`eabe0710 : nt!MiWalkPageTablesRecursively+0x88b
ffffec06`eabe04f0 fffff801`2ae7fae1 : ffffec06`eabe0690 ffffda84`00000000 00000000`00000002 00008e10`00000000 : nt!MiWalkPageTables+0x36b
ffffec06`eabe05f0 fffff801`2ae407b0 : 00000000`00000001 ffffec06`00000000 ffffda84`1e01c550 ffffda84`1b29d080 : nt!MiDeletePagablePteRange+0x4f1
ffffec06`eabe0900 fffff801`2b2b03e9 : ffffda84`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDeleteVad+0x360
ffffec06`eabe0a10 fffff801`2b2b01c2 : ffffda84`19b0fc80 00000000`00000000 ffffda84`1e01c080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec06`eabe0a40 fffff801`2b2efd5f : ffffda84`278314c0 00000000`00000000 ffff9655`c26b1a50 ffffda84`278314c0 : nt!MiUnmapViewOfSection+0x152
ffffec06`eabe0b20 ffff9615`4d08bf83 : ffffda84`15647830 ffffec06`00000006 00000000`00000700 00000000`00000000 : nt!MmUnmapViewOfSection+0xf
ffffec06`eabe0b50 ffff9615`4d08bc80 : ffffda84`278314c0 ffffec06`eabe0c50 00000000`00000002 00000000`00000000 : win32kbase!SURFACE::Map+0x2d3
ffffec06`eabe0bb0 ffff9615`4d462a87 : fffff801`2ae20760 ffff9615`4d02dc65 ffff9655`c06028a0 00000000`00000000 : win32kbase!SURFREFVIEW::bMap+0x20
ffffec06`eabe0be0 ffff9615`4d338fd9 : 000003be`000007d1 00000000`000007d1 ffff9655`c28d5af0 00000000`050402e6 : win32kfull!GrePtInSprite+0x12adef
ffffec06`eabe0d00 ffff9615`4d43fc39 : 000003be`000007d1 000003be`000007d1 00000000`00000000 000003be`000007d1 : win32kfull!DCELayerHitTest+0x89
ffffec06`eabe0d40 ffff9615`4d34c7a8 : 00000000`00000001 00000000`00000000 ffff9615`4d60a000 ffff9615`4d5c2e50 : win32kfull!xxxDCEWindowHitTestIndirect_Iterative+0x505
ffffec06`eabe0e30 ffff9615`4d309d8e : ffff9655`c868e010 ffffec06`eabe1998 00000000`00000000 00000000`00000000 : win32kfull!xxxScanSysQueue+0x2bf8
ffffec06`eabe1670 ffff9615`4d309278 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffec06`eabe1a68 : win32kfull!xxxRealInternalGetMessage+0xaae
ffffec06`eabe1940 ffff9615`4dd671ad : ffffda84`1b29d080 00000000`0b75e328 ffffec06`eabe1a68 00000000`06195000 : win32kfull!NtUserPeekMessage+0x158
ffffec06`eabe1a00 fffff801`2b0104f8 : 00000000`0b85f9f0 00000000`00000202 00000000`00000040 00000000`000000b6 : win32k!NtUserPeekMessage+0x29
ffffec06`eabe1a50 00007ffa`2e98ff74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0b75e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`2e98ff74


MODULE_NAME: hardware

IMAGE_NAME: memory_corruption

STACK_COMMAND: .cxr; .ecxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup: MachineOwner
---------