KutsalErkek11
Öğrenci
- Katılım
- 7 Kasım 2020
- Mesajlar
- 3
- Reaksiyon puanı
- 2
- Puanları
- 3
- Yaş
- 34
Bugün pubg girerken birden mavi ekran hatası verdi hata ise page fault in nonpaged area yazıyordu tekrardan resetledi bir daha denedim aynı şekil oldu pubg girerken. Minidump dosyasını rarladım anlayan arkadaşlar ilgilenebilir mi ?
yok mu bakacak arkadaş ? Bekliyorum sizleri
minidump rar mevcuttur arkadaşlar
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ercan\OneDrive\Masaüstü\110720-6578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`05e00000 PsLoadedModuleList = 0xfffff807`06a2a3b0
Debug session time: Sat Nov 7 21:11:54.338 2020 (UTC + 3:00)
System Uptime: 0 days 0:11:12.102
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`061f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc8b`49ffe5b0=0000000000000050
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac8fc32aabb8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff807061fddcc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on ERCAN
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3592
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffac8fc32aabb8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff807061fddcc
BUGCHECK_P4: 2
READ_ADDRESS: fffff80706afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80706a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80706a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffac8fc32aabb8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TslGame.exe
TRAP_FRAME: fffffc8b49ffe850 -- (.trap 0xfffffc8b49ffe850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc48d1d4c1745 rbx=0000000000000000 rcx=ffffc48d1d467004
rdx=00000000000259b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807061fddcc rsp=fffffc8b49ffe9e8 rbp=fffffc8b49ffeaf0
r8=0000000000000000 r9=ffffc48d1d4c1745 r10=007fffe2468ea60b
r11=fbffad7d8eb57b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei pl nz na pe cy
nt!guard_dispatch_icall+0x1c:
fffff807`061fddcc 4f8b1cd3 mov r11,qword ptr [r11+r10*8] ds:ffffac8f`c32aabb8=????????????????
Resetting default scope
STACK_TEXT:
fffffc8b`49ffe5a8 fffff807`0627a665 : 00000000`00000050 ffffac8f`c32aabb8 00000000`00000000 fffffc8b`49ffe850 : nt!KeBugCheckEx
fffffc8b`49ffe5b0 fffff807`060ea4a0 : 00000000`00000000 00000000`00000000 fffffc8b`49ffe8d0 00000000`00000000 : nt!MiSystemFault+0x172315
fffffc8b`49ffe6b0 fffff807`0620335e : 00000000`00040286 ffffc48d`1b857610 ffffc48d`1b857618 45cd7d68`f7bc99fe : nt!MmAccessFault+0x400
fffffc8b`49ffe850 fffff807`061fddcc : fffff807`09927f13 fffffc8b`49ffeaf0 00000000`9b62e6a0 f3e67521`00000000 : nt!KiPageFault+0x35e
fffffc8b`49ffe9e8 fffff807`09927f13 : fffffc8b`49ffeaf0 00000000`9b62e6a0 f3e67521`00000000 00000000`9b62e69f : nt!guard_dispatch_icall+0x1c
fffffc8b`49ffe9f0 fffffc8b`49ffeaf0 : 00000000`9b62e6a0 f3e67521`00000000 00000000`9b62e69f ffffc48d`00000000 : navagio+0x327f13
fffffc8b`49ffe9f8 00000000`9b62e6a0 : f3e67521`00000000 00000000`9b62e69f ffffc48d`00000000 fffff807`060db39b : 0xfffffc8b`49ffeaf0
fffffc8b`49ffea00 f3e67521`00000000 : 00000000`9b62e69f ffffc48d`00000000 fffff807`060db39b ffffc48d`18c49730 : 0x9b62e6a0
fffffc8b`49ffea08 00000000`9b62e69f : ffffc48d`00000000 fffff807`060db39b ffffc48d`18c49730 fffff807`060db39b : 0xf3e67521`00000000
fffffc8b`49ffea10 ffffc48d`00000000 : fffff807`060db39b ffffc48d`18c49730 fffff807`060db39b 0000036a`18c49001 : 0x9b62e69f
fffffc8b`49ffea18 fffff807`060db39b : ffffc48d`18c49730 fffff807`060db39b 0000036a`18c49001 ffffc48d`00000003 : 0xffffc48d`00000000
fffffc8b`49ffea20 00000000`c0000225 : ffffc48d`1d4c15a0 fffff807`0ab23d01 ffffc48d`1b8a0f20 00000000`00000001 : nt!ExAcquirePushLockSharedEx+0xeb
fffffc8b`49ffea70 ffffc48d`1d4c15a0 : fffff807`0ab23d01 ffffc48d`1b8a0f20 00000000`00000001 ffffc48d`00000000 : 0xc0000225
fffffc8b`49ffea78 fffff807`0ab23d01 : ffffc48d`1b8a0f20 00000000`00000001 ffffc48d`00000000 00000000`00000000 : 0xffffc48d`1d4c15a0
fffffc8b`49ffea80 c3c18b41`e77501ea : ffffc48d`1b8a0f20 ffffc48d`1b1ee0f8 00000000`00000000 ffffc48d`1b1ee198 : FLTMGR!FltGetStreamContext+0xe1
fffffc8b`49ffead0 ffffc48d`1b8a0f20 : ffffc48d`1b1ee0f8 00000000`00000000 ffffc48d`1b1ee198 00000000`00000000 : 0xc3c18b41`e77501ea
fffffc8b`49ffead8 ffffc48d`1b1ee0f8 : 00000000`00000000 ffffc48d`1b1ee198 00000000`00000000 ffffc48d`0feb5cf0 : 0xffffc48d`1b8a0f20
fffffc8b`49ffeae0 00000000`00000000 : ffffc48d`1b1ee198 00000000`00000000 ffffc48d`0feb5cf0 ffffc48d`0fdda050 : 0xffffc48d`1b1ee0f8
SYMBOL_NAME: navagio+327f13
MODULE_NAME: navagio
IMAGE_NAME: navagio.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 327f13
FAILURE_BUCKET_ID: AV_R_INVALID_navagio!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5315b6c-8fed-581b-cecb-868a3380e27c}
Followup: MachineOwner
---------
3: kd> lmvm navagio
Browse full module list
start end module name
fffff807`09600000 fffff807`0992a000 navagio T (no symbols)
Loaded symbol image file: navagio.sys
Image path: \??\C:\Program Files\Common Files\PUBG\navagio.sys
Image name: navagio.sys
Browse all global symbols functions data
Timestamp: Wed Oct 28 05:24:37 2020 (5F98D665)
CheckSum: 0033601F
ImageSize: 0032A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Mesaj otomatik birleştirildi:
yok mu bakacak arkadaş ? Bekliyorum sizleri
Mesaj otomatik birleştirildi:
minidump rar mevcuttur arkadaşlar
Mesaj otomatik birleştirildi:
Mesaj otomatik birleştirildi:
Mesaj otomatik birleştirildi:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\ercan\OneDrive\Masaüstü\110720-6578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`05e00000 PsLoadedModuleList = 0xfffff807`06a2a3b0
Debug session time: Sat Nov 7 21:11:54.338 2020 (UTC + 3:00)
System Uptime: 0 days 0:11:12.102
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`061f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc8b`49ffe5b0=0000000000000050
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac8fc32aabb8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff807061fddcc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on ERCAN
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3592
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffac8fc32aabb8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff807061fddcc
BUGCHECK_P4: 2
READ_ADDRESS: fffff80706afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80706a0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80706a0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffac8fc32aabb8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TslGame.exe
TRAP_FRAME: fffffc8b49ffe850 -- (.trap 0xfffffc8b49ffe850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc48d1d4c1745 rbx=0000000000000000 rcx=ffffc48d1d467004
rdx=00000000000259b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807061fddcc rsp=fffffc8b49ffe9e8 rbp=fffffc8b49ffeaf0
r8=0000000000000000 r9=ffffc48d1d4c1745 r10=007fffe2468ea60b
r11=fbffad7d8eb57b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei pl nz na pe cy
nt!guard_dispatch_icall+0x1c:
fffff807`061fddcc 4f8b1cd3 mov r11,qword ptr [r11+r10*8] ds:ffffac8f`c32aabb8=????????????????
Resetting default scope
STACK_TEXT:
fffffc8b`49ffe5a8 fffff807`0627a665 : 00000000`00000050 ffffac8f`c32aabb8 00000000`00000000 fffffc8b`49ffe850 : nt!KeBugCheckEx
fffffc8b`49ffe5b0 fffff807`060ea4a0 : 00000000`00000000 00000000`00000000 fffffc8b`49ffe8d0 00000000`00000000 : nt!MiSystemFault+0x172315
fffffc8b`49ffe6b0 fffff807`0620335e : 00000000`00040286 ffffc48d`1b857610 ffffc48d`1b857618 45cd7d68`f7bc99fe : nt!MmAccessFault+0x400
fffffc8b`49ffe850 fffff807`061fddcc : fffff807`09927f13 fffffc8b`49ffeaf0 00000000`9b62e6a0 f3e67521`00000000 : nt!KiPageFault+0x35e
fffffc8b`49ffe9e8 fffff807`09927f13 : fffffc8b`49ffeaf0 00000000`9b62e6a0 f3e67521`00000000 00000000`9b62e69f : nt!guard_dispatch_icall+0x1c
fffffc8b`49ffe9f0 fffffc8b`49ffeaf0 : 00000000`9b62e6a0 f3e67521`00000000 00000000`9b62e69f ffffc48d`00000000 : navagio+0x327f13
fffffc8b`49ffe9f8 00000000`9b62e6a0 : f3e67521`00000000 00000000`9b62e69f ffffc48d`00000000 fffff807`060db39b : 0xfffffc8b`49ffeaf0
fffffc8b`49ffea00 f3e67521`00000000 : 00000000`9b62e69f ffffc48d`00000000 fffff807`060db39b ffffc48d`18c49730 : 0x9b62e6a0
fffffc8b`49ffea08 00000000`9b62e69f : ffffc48d`00000000 fffff807`060db39b ffffc48d`18c49730 fffff807`060db39b : 0xf3e67521`00000000
fffffc8b`49ffea10 ffffc48d`00000000 : fffff807`060db39b ffffc48d`18c49730 fffff807`060db39b 0000036a`18c49001 : 0x9b62e69f
fffffc8b`49ffea18 fffff807`060db39b : ffffc48d`18c49730 fffff807`060db39b 0000036a`18c49001 ffffc48d`00000003 : 0xffffc48d`00000000
fffffc8b`49ffea20 00000000`c0000225 : ffffc48d`1d4c15a0 fffff807`0ab23d01 ffffc48d`1b8a0f20 00000000`00000001 : nt!ExAcquirePushLockSharedEx+0xeb
fffffc8b`49ffea70 ffffc48d`1d4c15a0 : fffff807`0ab23d01 ffffc48d`1b8a0f20 00000000`00000001 ffffc48d`00000000 : 0xc0000225
fffffc8b`49ffea78 fffff807`0ab23d01 : ffffc48d`1b8a0f20 00000000`00000001 ffffc48d`00000000 00000000`00000000 : 0xffffc48d`1d4c15a0
fffffc8b`49ffea80 c3c18b41`e77501ea : ffffc48d`1b8a0f20 ffffc48d`1b1ee0f8 00000000`00000000 ffffc48d`1b1ee198 : FLTMGR!FltGetStreamContext+0xe1
fffffc8b`49ffead0 ffffc48d`1b8a0f20 : ffffc48d`1b1ee0f8 00000000`00000000 ffffc48d`1b1ee198 00000000`00000000 : 0xc3c18b41`e77501ea
fffffc8b`49ffead8 ffffc48d`1b1ee0f8 : 00000000`00000000 ffffc48d`1b1ee198 00000000`00000000 ffffc48d`0feb5cf0 : 0xffffc48d`1b8a0f20
fffffc8b`49ffeae0 00000000`00000000 : ffffc48d`1b1ee198 00000000`00000000 ffffc48d`0feb5cf0 ffffc48d`0fdda050 : 0xffffc48d`1b1ee0f8
SYMBOL_NAME: navagio+327f13
MODULE_NAME: navagio
IMAGE_NAME: navagio.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 327f13
FAILURE_BUCKET_ID: AV_R_INVALID_navagio!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c5315b6c-8fed-581b-cecb-868a3380e27c}
Followup: MachineOwner
---------
3: kd> lmvm navagio
Browse full module list
start end module name
fffff807`09600000 fffff807`0992a000 navagio T (no symbols)
Loaded symbol image file: navagio.sys
Image path: \??\C:\Program Files\Common Files\PUBG\navagio.sys
Image name: navagio.sys
Browse all global symbols functions data
Timestamp: Wed Oct 28 05:24:37 2020 (5F98D665)
CheckSum: 0033601F
ImageSize: 0032A000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
Son düzenleme: