ATTEMPTED_WRITE_TO_READONLY_MEMORY mavi ekran hatası

  • Konuyu başlatan 192809
  • Başlangıç Tarihi
  • Mesaj 52
  • Görüntüleme 3.915
Katılım
8 Aralık 2017
Mesajlar
4.402
Çözümler
25
Bilgisayarda tek hesap var ve yönetici. Mavi ekranı aldım ve yönetici iznim gitti. İşin tuhaf tarafı hala hesap yönetici görünüyor. Minidump'ımı arşive ekleyemiyorum, sfc /scannow vb. yapamıyorum. Çözümü nedir? Bu sorunu çözsem Minidump'ı upload edeceğim.@Enes3078 @Bora Dere @Recep Baltaş minidump.rar sanırım başardım.
 
Son düzenleme:
XMP kapayın demiştim. Artık Memtest86 testi uygulama vakti gelmiş. Memtest86 testini XMP modu kapalıyken uygular mısınız?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff90d6465025e8, Virtual address for the attempted write.
Arg2: 8a00000005000121, PTE contents.
Arg3: ffffa50c07a96c10, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15660

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff90d6465025e8

BUGCHECK_P2: 8a00000005000121

BUGCHECK_P3: ffffa50c07a96c10

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

TRAP_FRAME:  ffffa50c07a96c10 -- (.trap 0xffffa50c07a96c10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff830000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffff830000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80065efeaee rsp=ffffa50c07a96da0 rbp=0000000000000000
 r8=0000000000000000  r9=000000003d00116c r10=8000000000000000
r11=ffffa50c07a96e28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff800`65efeaee f0480fba2e3f    lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT: 
ffffa50c`07a96a18 fffff800`6604126c     : 00000000`000000be ffff90d6`465025e8 8a000000`05000121 ffffa50c`07a96c10 : nt!KeBugCheckEx
ffffa50c`07a96a20 fffff800`65eea58f     : 8a000000`05000121 00000000`00000003 ffffa50c`07a96c90 00000000`00000000 : nt!MiRaisedIrqlFault+0x1bf460
ffffa50c`07a96a70 fffff800`6600335e     : 00000001`ffffffff fffffff6`00000005 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffa50c`07a96c10 fffff800`65efeaee     : 00000000`00000000 fffff800`65efe7fe ffff8e2d`f6ea94c0 00000000`00000000 : nt!KiPageFault+0x35e
ffffa50c`07a96da0 fffff800`65efdf7b     : ffffc00d`c401d700 00007ffc`00000000 1a000001`00000000 870dc76c`c561f381 : nt!MiWsleFree+0x17e
ffffa50c`07a96e30 fffff800`65f30239     : ffffa50c`07a97560 00000000`00000000 ffffa50c`07a97460 00000000`00000000 : nt!MiFreeWsleList+0x1bb
ffffa50c`07a97000 fffff800`65ee9a1d     : 00000000`00000004 00000000`00000000 ffffc00d`c401d700 80000001`15c47025 : nt!MiAgeWorkingSetTail+0x139
ffffa50c`07a97040 fffff800`65ee963b     : ffff8341`00000000 ffffc00d`c401d700 00000000`00000000 ffffa50c`07a975b0 : nt!MiWalkPageTablesRecursively+0xc6d
ffffa50c`07a970e0 fffff800`65ee963b     : ffff8341`a0cfff98 ffffc00d`c401d700 00000000`00000001 ffffa50c`07a975c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa50c`07a97180 fffff800`65ee963b     : ffff8341`a0cff000 ffffc00d`c401d700 00000000`00000002 ffffa50c`07a975d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa50c`07a97220 fffff800`65ed859b     : 00000000`00000000 ffffc00d`c401d700 ffffa50c`00000003 ffffa50c`07a975e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa50c`07a972c0 fffff800`65ed8031     : ffffa50c`07a97560 00000000`00000000 00000000`00000002 fffff800`00000000 : nt!MiWalkPageTables+0x36b
ffffa50c`07a973c0 fffff800`65ed7739     : 00000000`00000000 00000000`00000000 ffffd780`c6f4b1c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa50c`07a978d0 fffff800`65ed6f47     : 00000000`00000000 ffffa50c`07a97a80 ffffa50c`07a97a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa50c`07a979c0 fffff800`65e08e60     : fffff800`66850c00 ffffa50c`07a97a80 00000000`0000214c ffffd780`00000200 : nt!MiProcessWorkingSets+0x227
ffffa50c`07a97a60 fffff800`65fb4847     : 00000000`00000007 00000000`00000007 00000000`ffffffff fffff800`61367180 : nt!MiWorkingSetManager+0x110
ffffa50c`07a97b20 fffff800`65ea29a5     : ffffc00d`bbf13080 00000000`00000080 fffff800`65fb46f0 6520746f`6e207369 : nt!KeBalanceSetManager+0x157
ffffa50c`07a97c10 fffff800`65ffc868     : ffffd780`c6a80180 ffffc00d`bbf13080 fffff800`65ea2950 0a2e746e`65736572 : nt!PspSystemThreadStartup+0x55
ffffa50c`07a97c60 00000000`00000000     : ffffa50c`07a98000 ffffa50c`07a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffa7e3848a9740-ffffa7e3848a9771  50 bytes - win32kbase!CInputThread::_CalledOnInputThread+18
    [ 0f 94 c0 48 83 c4 20 5b:48 8b 02 49 3b 00 77 09 ]
    ffffa7e3848a977e-ffffa7e3848a9786  9 bytes - win32kbase!CInputThread::InputThreadState::Init+2e (+0x3e)
    [ 89 43 18 c7 03 01 00 00:74 66 83 ea 01 74 55 83 ]
    ffffa7e3848a9793-ffffa7e3848a979b  9 bytes - win32kbase!CInputThread::InputThreadState::Init+43 (+0x15)
    [ 48 85 c0 74 07 c7 40 30:00 8d 4a 58 eb 08 b8 40 ]
    ffffa7e3848a979e - win32kbase!CInputThread::InputThreadState::Init+4e (+0x0b)
    [ 00:8d ]
    ffffa7e3848a97a0-ffffa7e3848a97d6  55 bytes - win32kbase!CInputThread::InputThreadState::Init+50 (+0x02)
    [ 83 c4 20 5b c3 cc cc cc:10 49 8d 14 0a 48 85 d2 ]
    ffffa7e3848a97d8-ffffa7e3848a97e0  9 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+28 (+0x38)
    [ e8 07 dd f8 ff 48 83 67:eb c7 b8 00 01 00 00 b9 ]
    ffffa7e3848a97e2-ffffa7e3848a9834  83 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+32 (+0x0a)
    [ 48 8b 5c 24 30 48 83 c4:00 00 eb bb b8 00 04 00 ]
    ffffa7e3848a9836-ffffa7e3848a983f  10 bytes - win32kbase!W32PIDLOCK::vInit+16 (+0x54)
    [ 61 0c 00 83 61 08 00 83:63 10 df b2 01 8a c2 48 ]
    ffffa7e3848b2910-ffffa7e3848b2955  70 bytes - win32kbase!NtMITUpdateInputGlobals+1a0 (+0x90da)
    [ c0 0f 84 81 00 00 00 f7:48 83 ec 28 48 8b ca e8 ]
    ffffa7e3848b2962-ffffa7e3848b296c  11 bytes - win32kbase!NtMITUpdateInputGlobals+1f2 (+0x52)
    [ 3c 01 0f 84 7a 8a 06 00:b5 9e 06 00 41 83 e8 01 ]
    ffffa7e3848b2979-ffffa7e3848b298b  19 bytes - win32kbase!NtMITUpdateInputGlobals+209 (+0x17)
    [ 48 8b 35 78 33 1a 00 48:00 41 83 f8 02 0f 85 3a ]
    ffffa7e3848b2998-ffffa7e3848b299e  7 bytes - win32kbase!NtMITUpdateInputGlobals+228 (+0x1f)
    [ 48 8b 35 51 4d 1a 00:00 c6 00 01 0f ba 69 ]
    ffffa7e3848b29ab-ffffa7e3848b29af  5 bytes - win32kbase!NtMITUpdateInputGlobals+23b (+0x13)
    [ 33 d2 48 8b ce:c0 e8 03 24 01 ]
    ffffa7e3848b29c8-ffffa7e3848b29d2  11 bytes - win32kbase!NtMITUpdateInputGlobals+258 (+0x1d)
    [ 8b 5e 28 33 d2 48 8b ce:c6 00 01 41 0f ba 6a 10 ]
    ffffa7e3848b29eb-ffffa7e3848b2a0f  37 bytes - win32kbase!NtMITUpdateInputGlobals+27b (+0x23)
    [ 3b fb 75 32 41 8b cd e8:e1 ef eb cb cc cc cc cc ]
    ffffa7e3848b4781-ffffa7e3848b4799  25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+a9 (+0x1d96)
    [ 8b 5c 24 50 48 8b 74 24:83 ec 28 8b ca 45 33 c0 ]
    ffffa7e3848b479b-ffffa7e3848b47b3  25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+c3 (+0x1a)
    [ b8 bb 00 00 c0 eb 9b cc:cc cc cc cc cc 48 8b c4 ]
    ffffa7e3848b47b5-ffffa7e3848b47f5  65 bytes - win32kbase!DirectComposition::CSharedInteractionMarshaler::OpenSharedHandle+5 (+0x1a)
    [ 8b 89 50 01 00 00 48 85:21 58 20 0f 57 c0 0f 11 ]
    ffffa7e3848b47f8-ffffa7e3848b47fb  4 bytes - win32kbase!PostPlaySoundMessage+c (+0x43)
    [ 85 c0 74 0c:89 44 24 58 ]
    ffffa7e3848b4802-ffffa7e3848b480a  9 bytes - win32kbase!PostPlaySoundMessage+16 (+0x0a)
    [ 48 83 c4 28 c3 cc b8 bb:ca 72 0c 48 8b 05 1c 8b ]
    ffffa7e3848b480c-ffffa7e3848b4865  90 bytes - win32kbase!PostPlaySoundMessage+20 (+0x0a)
    [ c0 eb f3 cc cc cc cc cc:48 3b 08 76 1e 48 8b 05 ]
    ffffa7e3848b4872-ffffa7e3848b4876  5 bytes - win32kbase!CSpatialProcessor::CheckAndSendPointerPositionEffectsUpdate+3a (+0x66)
    [ 33 d2 48 8b ce:20 e8 24 1a 00 ]
609 errors : !win32kbase (ffffa7e3848a9740-ffffa7e3848b4876)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
 
XMP kapayın demiştim. Artık Memtest86 testi uygulama vakti gelmiş. Memtest86 testini XMP modu kapalıyken uygular mısınız?

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff90d6465025e8, Virtual address for the attempted write.
Arg2: 8a00000005000121, PTE contents.
Arg3: ffffa50c07a96c10, (reserved)
Arg4: 000000000000000a, (reserved)

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 9734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 15660

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  be

BUGCHECK_P1: ffff90d6465025e8

BUGCHECK_P2: 8a00000005000121

BUGCHECK_P3: ffffa50c07a96c10

BUGCHECK_P4: a

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  explorer.exe

TRAP_FRAME:  ffffa50c07a96c10 -- (.trap 0xffffa50c07a96c10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff830000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffff830000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80065efeaee rsp=ffffa50c07a96da0 rbp=0000000000000000
r8=0000000000000000  r9=000000003d00116c r10=8000000000000000
r11=ffffa50c07a96e28 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
nt!MiWsleFree+0x17e:
fffff800`65efeaee f0480fba2e3f    lock bts qword ptr [rsi],3Fh ds:00000000`00000000=????????????????
Resetting default scope

STACK_TEXT:
ffffa50c`07a96a18 fffff800`6604126c     : 00000000`000000be ffff90d6`465025e8 8a000000`05000121 ffffa50c`07a96c10 : nt!KeBugCheckEx
ffffa50c`07a96a20 fffff800`65eea58f     : 8a000000`05000121 00000000`00000003 ffffa50c`07a96c90 00000000`00000000 : nt!MiRaisedIrqlFault+0x1bf460
ffffa50c`07a96a70 fffff800`6600335e     : 00000001`ffffffff fffffff6`00000005 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
ffffa50c`07a96c10 fffff800`65efeaee     : 00000000`00000000 fffff800`65efe7fe ffff8e2d`f6ea94c0 00000000`00000000 : nt!KiPageFault+0x35e
ffffa50c`07a96da0 fffff800`65efdf7b     : ffffc00d`c401d700 00007ffc`00000000 1a000001`00000000 870dc76c`c561f381 : nt!MiWsleFree+0x17e
ffffa50c`07a96e30 fffff800`65f30239     : ffffa50c`07a97560 00000000`00000000 ffffa50c`07a97460 00000000`00000000 : nt!MiFreeWsleList+0x1bb
ffffa50c`07a97000 fffff800`65ee9a1d     : 00000000`00000004 00000000`00000000 ffffc00d`c401d700 80000001`15c47025 : nt!MiAgeWorkingSetTail+0x139
ffffa50c`07a97040 fffff800`65ee963b     : ffff8341`00000000 ffffc00d`c401d700 00000000`00000000 ffffa50c`07a975b0 : nt!MiWalkPageTablesRecursively+0xc6d
ffffa50c`07a970e0 fffff800`65ee963b     : ffff8341`a0cfff98 ffffc00d`c401d700 00000000`00000001 ffffa50c`07a975c0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa50c`07a97180 fffff800`65ee963b     : ffff8341`a0cff000 ffffc00d`c401d700 00000000`00000002 ffffa50c`07a975d0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa50c`07a97220 fffff800`65ed859b     : 00000000`00000000 ffffc00d`c401d700 ffffa50c`00000003 ffffa50c`07a975e0 : nt!MiWalkPageTablesRecursively+0x88b
ffffa50c`07a972c0 fffff800`65ed8031     : ffffa50c`07a97560 00000000`00000000 00000000`00000002 fffff800`00000000 : nt!MiWalkPageTables+0x36b
ffffa50c`07a973c0 fffff800`65ed7739     : 00000000`00000000 00000000`00000000 ffffd780`c6f4b1c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
ffffa50c`07a978d0 fffff800`65ed6f47     : 00000000`00000000 ffffa50c`07a97a80 ffffa50c`07a97a40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
ffffa50c`07a979c0 fffff800`65e08e60     : fffff800`66850c00 ffffa50c`07a97a80 00000000`0000214c ffffd780`00000200 : nt!MiProcessWorkingSets+0x227
ffffa50c`07a97a60 fffff800`65fb4847     : 00000000`00000007 00000000`00000007 00000000`ffffffff fffff800`61367180 : nt!MiWorkingSetManager+0x110
ffffa50c`07a97b20 fffff800`65ea29a5     : ffffc00d`bbf13080 00000000`00000080 fffff800`65fb46f0 6520746f`6e207369 : nt!KeBalanceSetManager+0x157
ffffa50c`07a97c10 fffff800`65ffc868     : ffffd780`c6a80180 ffffc00d`bbf13080 fffff800`65ea2950 0a2e746e`65736572 : nt!PspSystemThreadStartup+0x55
ffffa50c`07a97c60 00000000`00000000     : ffffa50c`07a98000 ffffa50c`07a92000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffffa7e3848a9740-ffffa7e3848a9771  50 bytes - win32kbase!CInputThread::_CalledOnInputThread+18
    [ 0f 94 c0 48 83 c4 20 5b:48 8b 02 49 3b 00 77 09 ]
    ffffa7e3848a977e-ffffa7e3848a9786  9 bytes - win32kbase!CInputThread::InputThreadState::Init+2e (+0x3e)
    [ 89 43 18 c7 03 01 00 00:74 66 83 ea 01 74 55 83 ]
    ffffa7e3848a9793-ffffa7e3848a979b  9 bytes - win32kbase!CInputThread::InputThreadState::Init+43 (+0x15)
    [ 48 85 c0 74 07 c7 40 30:00 8d 4a 58 eb 08 b8 40 ]
    ffffa7e3848a979e - win32kbase!CInputThread::InputThreadState::Init+4e (+0x0b)
    [ 00:8d ]
    ffffa7e3848a97a0-ffffa7e3848a97d6  55 bytes - win32kbase!CInputThread::InputThreadState::Init+50 (+0x02)
    [ 83 c4 20 5b c3 cc cc cc:10 49 8d 14 0a 48 85 d2 ]
    ffffa7e3848a97d8-ffffa7e3848a97e0  9 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+28 (+0x38)
    [ e8 07 dd f8 ff 48 83 67:eb c7 b8 00 01 00 00 b9 ]
    ffffa7e3848a97e2-ffffa7e3848a9834  83 bytes - win32kbase!DirectComposition::CMaskBrushMarshaler::ReleaseAllReferences+32 (+0x0a)
    [ 48 8b 5c 24 30 48 83 c4:00 00 eb bb b8 00 04 00 ]
    ffffa7e3848a9836-ffffa7e3848a983f  10 bytes - win32kbase!W32PIDLOCK::vInit+16 (+0x54)
    [ 61 0c 00 83 61 08 00 83:63 10 df b2 01 8a c2 48 ]
    ffffa7e3848b2910-ffffa7e3848b2955  70 bytes - win32kbase!NtMITUpdateInputGlobals+1a0 (+0x90da)
    [ c0 0f 84 81 00 00 00 f7:48 83 ec 28 48 8b ca e8 ]
    ffffa7e3848b2962-ffffa7e3848b296c  11 bytes - win32kbase!NtMITUpdateInputGlobals+1f2 (+0x52)
    [ 3c 01 0f 84 7a 8a 06 00:b5 9e 06 00 41 83 e8 01 ]
    ffffa7e3848b2979-ffffa7e3848b298b  19 bytes - win32kbase!NtMITUpdateInputGlobals+209 (+0x17)
    [ 48 8b 35 78 33 1a 00 48:00 41 83 f8 02 0f 85 3a ]
    ffffa7e3848b2998-ffffa7e3848b299e  7 bytes - win32kbase!NtMITUpdateInputGlobals+228 (+0x1f)
    [ 48 8b 35 51 4d 1a 00:00 c6 00 01 0f ba 69 ]
    ffffa7e3848b29ab-ffffa7e3848b29af  5 bytes - win32kbase!NtMITUpdateInputGlobals+23b (+0x13)
    [ 33 d2 48 8b ce:c0 e8 03 24 01 ]
    ffffa7e3848b29c8-ffffa7e3848b29d2  11 bytes - win32kbase!NtMITUpdateInputGlobals+258 (+0x1d)
    [ 8b 5e 28 33 d2 48 8b ce:c6 00 01 41 0f ba 6a 10 ]
    ffffa7e3848b29eb-ffffa7e3848b2a0f  37 bytes - win32kbase!NtMITUpdateInputGlobals+27b (+0x23)
    [ 3b fb 75 32 41 8b cd e8:e1 ef eb cb cc cc cc cc ]
    ffffa7e3848b4781-ffffa7e3848b4799  25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+a9 (+0x1d96)
    [ 8b 5c 24 50 48 8b 74 24:83 ec 28 8b ca 45 33 c0 ]
    ffffa7e3848b479b-ffffa7e3848b47b3  25 bytes - win32kbase!ApiSetEditionOpenInputDesktopEntryPoint+c3 (+0x1a)
    [ b8 bb 00 00 c0 eb 9b cc:cc cc cc cc cc 48 8b c4 ]
    ffffa7e3848b47b5-ffffa7e3848b47f5  65 bytes - win32kbase!DirectComposition::CSharedInteractionMarshaler::OpenSharedHandle+5 (+0x1a)
    [ 8b 89 50 01 00 00 48 85:21 58 20 0f 57 c0 0f 11 ]
    ffffa7e3848b47f8-ffffa7e3848b47fb  4 bytes - win32kbase!PostPlaySoundMessage+c (+0x43)
    [ 85 c0 74 0c:89 44 24 58 ]
    ffffa7e3848b4802-ffffa7e3848b480a  9 bytes - win32kbase!PostPlaySoundMessage+16 (+0x0a)
    [ 48 83 c4 28 c3 cc b8 bb:ca 72 0c 48 8b 05 1c 8b ]
    ffffa7e3848b480c-ffffa7e3848b4865  90 bytes - win32kbase!PostPlaySoundMessage+20 (+0x0a)
    [ c0 eb f3 cc cc cc cc cc:48 3b 08 76 1e 48 8b 05 ]
    ffffa7e3848b4872-ffffa7e3848b4876  5 bytes - win32kbase!CSpatialProcessor::CheckAndSendPointerPositionEffectsUpdate+3a (+0x66)
    [ 33 d2 48 8b ce:20 e8 24 1a 00 ]
609 errors : !win32kbase (ffffa7e3848a9740-ffffa7e3848b4876)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------

XMP açık değil aslında. BIOS'ta kapalı gözüküyordu. Sorun kesin RAM kaynaklı mı?
 
Hayır onunla alakalı bir şey gözüme çarpmadı. Paylaştığım dökümde de zaten RAM hatası kendini belli ediyor. Başka bir sorunuz varsa sorabilirsiniz, yoksa da test sonrası yazarsınız ki bildirimi gelsin.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı