Volmgr hatası win 11

Fersah

80+
Katılım
15 Ekim 2024
Mesajlar
2
Reaksiyon skoru
0
RAM 16 3600 xmp aktif dual 2x 8
SSD veya HDD modeli PNY CS3140 1 TB M.2 SSD
Ekran kartı MSI 6700 XT Dual OC gaming
Anakart Gigabyte b 550 DS3H rev 4 İşlemci Ryzen 5 5600

Birkaç haftadır bu şekilde garip hatalar alıyorum tarayıcı açıkken gerçekleşiyor son aldığım hatalar için yardım edebilir misiniz?

İşte Debug dosyam

Uyguladığım çözümler XMP kapatmak, MPO kapatmak, TDR değiştirmek, DDU ile GPU driver tekrar kurmak, DISM Online ile repairler, SFC komutu, Windows ISO'su ile repair

Windows, BIOS, chipset AMD GPU her şey güncel

bu da debug dosyam
 

Ekler

  • aaxx.webp
    aaxx.webp
    112 KB · Hit: 6
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.359 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 46

Microsoft (R) Windows Debugger Version 10.0.29482.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ogunm\OneDrive\Masaüstü\010826-5031-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 26100 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Kernel base = 0xfffff806`8e200000 PsLoadedModuleList = 0xfffff806`8f0f5010
Debug session time: Thu Jan 8 00:00:26.344 2026 (UTC + 3:00)
System Uptime: 0 days 10:50:02.977
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00374018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`8e6fb310 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe809`6e8472c0=0000000000000050
10: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`00374018). Type ".hh dbgerr001" for details
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8d0001522ac8, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8068e46db8e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : AV.PTE
Value: Invalid

Key : AV.Page.Virtual
Value: 0xffff8d0001520000

Key : AV.Type
Value: Read

Key : Analysis.CPU.mSec
Value: 1546

Key : Analysis.Elapsed.mSec
Value: 7030

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 1

Key : Analysis.IO.Write.Mb
Value: 8

Key : Analysis.Init.CPU.mSec
Value: 765

Key : Analysis.Init.Elapsed.mSec
Value: 28624

Key : Analysis.Memory.CommitPeak.Mb
Value: 120

Key : Analysis.Version.DbgEng
Value: 10.0.29482.1003

Key : Analysis.Version.Description
Value: 10.2509.29.03 amd64fre

Key : Analysis.Version.Ext
Value: 1.2509.29.3

Key : Bugcheck.Code.LegacyAPI
Value: 0x50

Key : Bugcheck.Code.TargetModel
Value: 0x50

Key : Dump.Attributes.AsUlong
Value: 0x21008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0x0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : Failure.Bucket
Value: AV_win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace

Key : Failure.Exception.IP.Address
Value: 0xfffff8068e46db8e

Key : Failure.Exception.IP.Module
Value: nt

Key : Failure.Exception.IP.Offset
Value: 0x26db8e

Key : Failure.Hash
Value: {19d98517-59c7-0b9d-6f39-afd9affd277d}

Key : Faulting.IP.Type
Value: Paged

Key : WER.System.BIOSRevision
Value: 5.17.0.0


BUGCHECK_CODE: 50

BUGCHECK_P1: ffff8d0001522ac8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff8068e46db8e

BUGCHECK_P4: 2

FILE_IN_CAB: 010826-5031-01.dmp

DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump

FAULTING_THREAD: ffff8c0ffbbf9080

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffff8d0001522ac8

READ_ADDRESS: fffff8068f1c44c0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff8d0001522ac8

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1 (!blackboxwinlogon)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dwm.exe

IP_IN_PAGED_CODE:
nt!MiManageSubsectionView+20e
fffff806`8e46db8e 4c3938 cmp qword ptr [rax],r15

STACK_TEXT:
ffffe809`6e8472b8 fffff806`8e5661e0 : 00000000`00000050 ffff8d00`01522ac8 00000000`00000000 ffffe809`6e847520 : nt!KeBugCheckEx
ffffe809`6e8472c0 fffff806`8e553146 : ffffe809`6e8474f0 ffff8000`00000000 ffff8d00`01522ac8 0000007f`fffffff8 : nt!MiSystemFault+0x850
ffffe809`6e8473b0 fffff806`8e8b11cb : 00000000`00000000 00000000`00000000 ffff8c0f`fbbf99c0 00000000`00000000 : nt!MmAccessFault+0x646
ffffe809`6e847520 fffff806`8e46db8e : ffff8c00`01522b28 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x38b
ffffe809`6e8476b0 fffff806`8eadc084 : 00000000`00000008 ffffe809`6e847770 ffff8c0f`f09a70c0 ffffd802`96e7e3a0 : nt!MiManageSubsectionView+0x20e
ffffe809`6e847700 fffff806`8eadbc69 : ffff8c0f`f09a70c0 ffff8c00`09b247a0 00000000`00000000 ffff8c00`01522b40 : nt!MiDeleteVad+0x354
ffffe809`6e8477b0 fffff806`8eadb8ea : ffff8c00`09b247a0 ffffe809`6e847859 00000000`0a4e0000 00000000`00000000 : nt!MiUnmapVad+0x49
ffffe809`6e8477e0 fffff806`8eadb5ff : ffffd802`95ef6270 ffffd802`9c968700 00000000`0013ab5c ffffd802`96e7df80 : nt!MiUnmapViewOfSection+0x146
ffffe809`6e8478c0 fffff806`351d12e0 : 00000000`71c0d790 00000000`00000000 00000000`00153bed 00000000`00000000 : nt!MmUnmapViewOfSection+0xf
ffffe809`6e8478f0 fffff806`3516ba7d : 00000000`00153bed 00000000`00000000 00000000`71c0cd80 00000000`00000000 : win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace+0x4c
ffffe809`6e847920 fffff806`3516b9de : ffffd802`b0b55010 ffffd802`b0b55010 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CBatch::Clear+0x59
ffffe809`6e847950 fffff806`3516b30e : ffffd802`b0b55000 00000000`00000000 00000000`00000000 8c0ffb7f`64b01281 : win32kbase!DirectComposition::CApplicationChannel::ProcessReturnedBatches+0x7e
ffffe809`6e847980 fffff806`35314e5b : 00000000`00000000 ffffe809`0013ab5c 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x2e
ffffe809`6e8479f0 fffff806`351dd48b : 00000000`69f125c0 ffffe809`6e847b20 00000000`69f125c0 ffff8c0f`fb7f64e0 : win32kbase!DirectComposition::CApplicationChannel::PreallocateNextBatch+0x2f
ffffe809`6e847a30 fffff806`1ff1473f : 00000000`69f125c0 00000000`00000004 ffffd802`b0b55010 00000000`00000000 : win32kbase!NtDCompositionSynchronize+0x3b
ffffe809`6e847a70 fffff806`8e8b5658 : ffff8c0f`fbbf9080 00000000`0000084c ffff8c0f`fbbf9080 00000000`00000000 : win32k!NtDCompositionSynchronize+0x3f
ffffe809`6e847aa0 00007ff9`dcb53a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`71c0d628 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dcb53a84


SYMBOL_NAME: win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace+4c

MODULE_NAME: win32kbase

IMAGE_NAME: win32kbase.sys

IMAGE_VERSION: 10.0.26100.7309

STACK_COMMAND: .process /r /p 0xffff8c0ffb5c90c0; .thread 0xffff8c0ffbbf9080 ; kb

BUCKET_ID_FUNC_OFFSET: 4c

FAILURE_BUCKET_ID: AV_win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {19d98517-59c7-0b9d-6f39-afd9affd277d}

Followup: MachineOwner
---------

10: kd> .process /r /p 0xffff8c0ffb5c90c0; .thread 0xffff8c0ffbbf9080 ; kb
Implicit process is now ffff8c0f`fb5c90c0
Loading User Symbols
Unable to get PEB pointer
Implicit thread is now ffff8c0f`fbbf9080
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr : Args to Child : Call Site
00 fffff806`8e5661e0 : 00000000`00000050 ffff8d00`01522ac8 00000000`00000000 ffffe809`6e847520 : nt!KeBugCheckEx
01 fffff806`8e553146 : ffffe809`6e8474f0 ffff8000`00000000 ffff8d00`01522ac8 0000007f`fffffff8 : nt!MiSystemFault+0x850
02 fffff806`8e8b11cb : 00000000`00000000 00000000`00000000 ffff8c0f`fbbf99c0 00000000`00000000 : nt!MmAccessFault+0x646
03 fffff806`8e46db8e : ffff8c00`01522b28 00000000`00000002 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x38b
04 fffff806`8eadc084 : 00000000`00000008 ffffe809`6e847770 ffff8c0f`f09a70c0 ffffd802`96e7e3a0 : nt!MiManageSubsectionView+0x20e
05 fffff806`8eadbc69 : ffff8c0f`f09a70c0 ffff8c00`09b247a0 00000000`00000000 ffff8c00`01522b40 : nt!MiDeleteVad+0x354
06 fffff806`8eadb8ea : ffff8c00`09b247a0 ffffe809`6e847859 00000000`0a4e0000 00000000`00000000 : nt!MiUnmapVad+0x49
07 fffff806`8eadb5ff : ffffd802`95ef6270 ffffd802`9c968700 00000000`0013ab5c ffffd802`96e7df80 : nt!MiUnmapViewOfSection+0x146
08 fffff806`351d12e0 : 00000000`71c0d790 00000000`00000000 00000000`00153bed 00000000`00000000 : nt!MmUnmapViewOfSection+0xf
09 fffff806`3516ba7d : 00000000`00153bed 00000000`00000000 00000000`71c0cd80 00000000`00000000 : win32kbase!DirectComposition::CBatchSharedMemoryPool::ConfirmSpace+0x4c
0a fffff806`3516b9de : ffffd802`b0b55010 ffffd802`b0b55010 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CBatch::Clear+0x59
0b fffff806`3516b30e : ffffd802`b0b55000 00000000`00000000 00000000`00000000 8c0ffb7f`64b01281 : win32kbase!DirectComposition::CApplicationChannel::ProcessReturnedBatches+0x7e
0c fffff806`35314e5b : 00000000`00000000 ffffe809`0013ab5c 00000000`00000000 00000000`00000000 : win32kbase!DirectComposition::CApplicationChannel::GetBatchFragment+0x2e
0d fffff806`351dd48b : 00000000`69f125c0 ffffe809`6e847b20 00000000`69f125c0 ffff8c0f`fb7f64e0 : win32kbase!DirectComposition::CApplicationChannel::PreallocateNextBatch+0x2f
0e fffff806`1ff1473f : 00000000`69f125c0 00000000`00000004 ffffd802`b0b55010 00000000`00000000 : win32kbase!NtDCompositionSynchronize+0x3b
0f fffff806`8e8b5658 : ffff8c0f`fbbf9080 00000000`0000084c ffff8c0f`fbbf9080 00000000`00000000 : win32k!NtDCompositionSynchronize+0x3f
10 00007ff9`dcb53a84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
11 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`dcb53a84
10: kd> !memusage 8
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
Search: READ_PVOID error
InitTypeRead(nt!MmPhysicalMemoryBlock, nt!_PHYSICAL_MEMORY_DESCRIPTOR) error 1
PhysicalMemoryBlock not found.
10: kd> lmvm win32kbase
Browse full module list
start end module name
fffff806`350f0000 fffff806`35421000 win32kbase (pdb symbols) C:\ProgramData\Dbg\sym\win32kbase.pdb\8C6FC183E1C437D51003CE91E1609CF81\win32kbase.pdb
Loaded symbol image file: win32kbase.sys
Mapped memory image file: C:\ProgramData\Dbg\sym\win32kbase.sys\BB362062331000\win32kbase.sys
Image path: win32kbase.sys
Image name: win32kbase.sys
Browse all global symbols functions data Symbol Reload
Image was built with /Brepro flag.
Timestamp: BB362062 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00332AE7
ImageSize: 00331000
Mapping Form: Loaded
File version: 10.0.26100.7309
Product version: 10.0.26100.7309
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.7 Driver
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: win32kbase.sys
OriginalFilename: win32kbase.sys
ProductVersion: 10.0.26100.7309
FileVersion: 10.0.26100.7309 (WinBuild.160101.0800)
FileDescription: Base Win32k Kernel Driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
10: kd> !errrec ffff8d0001522ac8
===============================================================================
Common Platform Error Record @ ffff8d0001522ac8
-------------------------------------------------------------------------------
Signature : *** INVALID ***
Revision : 0.0
Record Id : 0000000000000000
Severity : Recoverable (0)
Length : 0
Creator : {00000000-0000-0000-0000-000000000000}
Notify Type : {00000000-0000-0000-0000-000000000000}
Flags : 0x00000000
 
Geri
Top