Çözüldü KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE Mavi Ekran Hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

master3492

Kilopat
Katılım
1 Aralık 2016
Mesajlar
53
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Bilgisayar her gün 1 kere mavi ekran verip reset atıyor. Sürekli farklı mavi ekran hataları veriyor. Bazen aynı hatayı veriyor. Bazen hata değişebiliyor. Minidump klasörü aşağıya bırakıyorum. Yardımcı olursanız çok sevinirim... Format attım ama sorunum düzelmedi. Ek olarak Driver Booster kullanıyorum. Ama daha önce başıma böyle bir şey gelmemişti. Driver Booster suçu olduğunu düşünmüyorum.

 
Son düzenleyen: Moderatör:
Çözüm
@claus Söylediğin işlemleri yaptım. Sorunum çözüldü. Driver booster"imiş sorunum kaynağı. O programla sadece ses ve oyun yazılımlarını kurdum ekran kartımı kendim güncelledim sorunum çözüldü. Yardımları için sayın @Recep Baltaş ve @MF @claus çok teşekkür ediyorum.
Bellek arızası var gibi görünüyor. Test edin yine de:

Kod:
KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE (162)
A lock tracked by AutoBoost was released by a thread that did not own the lock.
This is typically caused when some thread releases a lock on behalf of another
thread (which is not legal with AutoBoost tracking enabled) or when some thread
tries to release a lock it no longer owns.
Arguments:
Arg1: ffffe001e5a4c080, The address of the thread
Arg2: fffff801335d80d0, The lock address
Arg3: 00000000ffffffff, The session ID of the thread
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 1

    Key  : Analysis.Elapsed.Sec
    Value: 1

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 69


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_PRODUCT_NAME:  To Be Filled By O.E.M.

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  P1.40

BIOS_DATE:  10/31/2012

BASEBOARD_MANUFACTURER:  ASRock

BASEBOARD_PRODUCT:  N68C-GS FX

BASEBOARD_VERSION:                       

DUMP_TYPE:  2

BUGCHECK_P1: ffffe001e5a4c080

BUGCHECK_P2: fffff801335d80d0

BUGCHECK_P3: ffffffff

BUGCHECK_P4: 0

CPU_COUNT: 3

CPU_MHZ: 83e

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x162

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-K01TCKK

ANALYSIS_SESSION_TIME:  05-21-2019 15:12:34.0676

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER:  from fffff801333f13f0 to fffff801333cc9a0

STACK_TEXT: 
ffffd001`0d208f88 fffff801`333f13f0 : 00000000`00000162 ffffe001`e5a4c080 fffff801`335d80d0 00000000`ffffffff : nt!KeBugCheckEx
ffffd001`0d208f90 fffff801`332c6d28 : 00000000`00000001 fffff801`335d80c0 fffff801`335d80d0 00000001`00000000 : nt! ?? ::FNODOBFM::`string'+0x14540
ffffd001`0d208fd0 fffff801`332c67bf : 00000000`00000040 ffffd001`0d209120 ffffe001`e19d25d8 00000000`00000800 : nt!MiChargeWsles+0x194
ffffd001`0d209020 fffff801`332c6476 : 00000000`00000000 ffffe001`e19d25d8 00000000`00000000 ffffe001`e5676f00 : nt!MiObtainSystemCacheView+0x47
ffffd001`0d2091d0 fffff801`332c601e : ffffe001`00000001 ffffc001`9bfdade0 ffffe001`e5676f38 fffff801`3357f830 : nt!MmMapViewInSystemCache+0x9e
ffffd001`0d209340 fffff801`33333526 : 00000000`00000001 ffffe001`e5720df0 00000000`00000000 ffffc001`00000000 : nt!CcGetVacbMiss+0x122
ffffd001`0d2093d0 fffff801`33334a7d : 00000000`00000000 00000000`000077c3 ffffd001`0d2094d8 ffffd001`0d2094ac : nt!CcGetVirtualAddress+0x366
ffffd001`0d209470 fffff801`33367120 : ffffe001`e5720df0 00000024`10aee951 ffffd001`0d2095c8 ffffc001`00000007 : nt!CcMapAndCopyInToCache+0x14d
ffffd001`0d209560 fffff800`f1add68a : 00000000`00000007 ffffd001`0d209870 ffffc001`9c251140 00000000`00000701 : nt!CcCopyWriteEx+0x260
ffffd001`0d209600 fffff800`f1ae0b87 : ffffe001`e3320c98 ffffe001`e5ae4501 00000000`00000000 ffffe001`e3320c98 : Ntfs!NtfsCommonWrite+0xcaa
ffffd001`0d209840 fffff800`f193ab1e : ffffe001`e5fbdc00 ffffe001`e5b07510 00000000`00000000 ffffe001`e5b078b0 : Ntfs!NtfsFsdWrite+0x203
ffffd001`0d209900 fffff800`f19390c2 : ffffd001`0d2099c0 ffffe001`e2d4a040 ffffe001`e5ae4550 ffffe001`e5b07510 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd001`0d2099a0 fffff801`33662788 : 00000000`00000001 ffffd001`0d209a81 ffffe001`e5ae4550 fffff800`f1963a83 : fltmgr!FltpDispatch+0xb2
ffffd001`0d209a00 fffff801`336892d6 : ffffe001`e5ae4504 ffffe001`e5ae4550 ffffd001`0d209b18 ffffe001`e5b07510 : nt!IopSynchronousServiceTail+0x170
ffffd001`0d209ad0 fffff801`333d81b3 : ffffe001`746c6644 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x682
ffffd001`0d209bd0 00007ffe`cdf70cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000024`10aee758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`cdf70cca


THREAD_SHA1_HASH_MOD_FUNC:  5bc022311a49d4b5a12f61537e1ed20f4c80da3f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5a1d5ac71103a503db5b0ac8889db597e72bd37a

THREAD_SHA1_HASH_MOD:  b28d851ef7201e117cab079988ee3efc98250d67

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+14540
fffff801`333f13f0 cc              int     3

FAULT_INSTR_CODE:  58bcccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+14540

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

IMAGE_VERSION:  6.3.9600.17415

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  14540

FAILURE_BUCKET_ID:  0x162_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0x162_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0x162_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2019-05-20T09:14:56.000Z

OSBUILD:  9600

OSSERVICEPACK:  17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 8.1

OSEDITION:  Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2014-10-29 03:38:48

BUILDDATESTAMP_STR:  141028-1500

BUILDLAB_STR:  winblue_r4

BUILDOSVER_STR:  6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME:  777

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x162_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {5bfa73e6-c957-661c-d3fe-95f3c8575c24}

Followup:     MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd00025430cb9, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803a29194a7, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 6

Key : Analysis.Elapsed.Sec
Value: 7

Key : Analysis.Memory.CommitPeak.Mb
Value: 60


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.40

BIOS_DATE: 10/31/2012

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: N68C-GS FX

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: ffffd00025430cb9

BUGCHECK_P2: c

BUGCHECK_P3: 1

BUGCHECK_P4: fffff803a29194a7

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803a2bd3298
GetUlongPtrFromAddress: unable to read from fffff803a2bd3520
ffffd00025430cb9

CURRENT_IRQL: c

FAULTING_IP:
nt!KiIpiSendRequest+2a7
fffff803`a29194a7 088d793848d1 or byte ptr [rbp-2EB7C787h],cl

CPU_COUNT: 3

CPU_MHZ: 83e

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: AV

PROCESS_NAME: System

BAD_PAGES_DETECTED: 2f

ANALYSIS_SESSION_HOST: DESKTOP-K01TCKK

ANALYSIS_SESSION_TIME: 05-21-2019 15:13:17.0615

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffd00053fad1b0 -- (.trap 0xffffd00053fad1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000006 rbx=0000000000000000 rcx=ffffd00046d3aec0
rdx=5555555555555555 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803a29194a7 rsp=ffffd00053fad340 rbp=ffffd00053fad440
r8=ffffd00046d35180 r9=0000000000000004 r10=0000000000000001
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiIpiSendRequest+0x2a7:
fffff803`a29194a7 088d793848d1 or byte ptr [rbp-2EB7C787h],cl ss:0018:ffffd000`25430cb9=??
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff803a29cc4e9 to fffff803a29c09a0

STACK_TEXT:
ffffd000`53fad068 fffff803`a29cc4e9 : 00000000`0000000a ffffd000`25430cb9 00000000`0000000c 00000000`00000001 : nt!KeBugCheckEx
ffffd000`53fad070 fffff803`a29cad3a : 00000000`00000001 f8011538`e0000002 ffff83c1`90ca9300 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffd000`53fad1b0 fffff803`a29194a7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`53fad340 fffff803`a2917db7 : 00000000`00000000 fffff803`a291c527 00000000`00000000 fffff803`a29206f9 : nt!KiIpiSendRequest+0x2a7
ffffd000`53fad550 fffff803`a291aa06 : 00000000`00000000 55a00000`6f608001 ffffd000`53fad780 00000000`00000000 : nt!KeFlushSingleTb+0x203
ffffd000`53fad680 fffff803`a291e0e0 : ffffd000`53fadc20 fffffa80`01e4b0f0 00000000`06000000 ffffd000`53fadc40 : nt!MiStealPage+0x1266
ffffd000`53fadb20 fffff803`a2a787be : ffffffff`ffffffff 00000000`00000001 ffffd000`53fadc40 fffffa80`ffffffff : nt!MiClaimPhysicalRun+0x1e4
ffffd000`53fadba0 fffff803`a2e7875c : ffffe001`00000000 ffffe001`c0000709 00000000`00000000 00000000`00000000 : nt!MiScrubNode+0xfa
ffffd000`53fadc20 fffff803`a290c38c : fffff803`a2e7871c ffffe001`1a44e880 ffffe001`1ca53320 ffffe001`1a44e880 : nt!MiScrubMemoryWorker+0x40
ffffd000`53fadc90 fffff803`a2971c70 : 00000000`00000000 ffffe001`1a44e880 00000000`00000080 ffffe001`1a44e880 : nt!ExpWorkerThread+0x28c
ffffd000`53fadd40 fffff803`a29c6fc6 : fffff803`a2b73180 ffffe001`1a44e880 ffffe001`1b4be880 00000000`000001dc : nt!PspSystemThreadStartup+0x58
ffffd000`53fadda0 00000000`00000000 : ffffd000`53fae000 ffffd000`53fa8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
2 errors : !nt (fffff803a29194a7-fffff803a29195a7)
fffff803a29194a0 55 55 55 55 55 55 55 *08 8d 79 38 48 d1 e8 48 23 UUUUUUU..y8H..H#
...
fffff803a29195a0 c3 41 8b c4 e9 35 fe *bf ff 48 8b 54 24 48 48 8b .A...5...H.T$HH.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE

TARGET_TIME: 2019-05-18T21:09:01.000Z

OSBUILD: 9600

OSSERVICEPACK: 17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2014-10-29 03:38:48

BUILDDATESTAMP_STR: 141028-1500

BUILDLAB_STR: winblue_r4

BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME: 1d7c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_stride

FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup: memory_corruption
---------

*** Memory manager detected 47 instance(s) of page corruption, target is likely to have memory corruption.
 
Muhtemel RAM arızasına işaret ediyor dökümler.

Test edin: Memtest86 USB'den Çalışan RAM Test Programı - Technopat Sosyal

Kod:
KERNEL_AUTO_BOOST_INVALID_LOCK_RELEASE (162)
A lock tracked by AutoBoost was released by a thread that did not own the lock.
This is typically caused when some thread releases a lock on behalf of another
thread (which is not legal with AutoBoost tracking enabled) or when some thread
tries to release a lock it no longer owns.
Arguments:
Arg1: ffffe001e5a4c080, The address of the thread
Arg2: fffff801335d80d0, The lock address
Arg3: 00000000ffffffff, The session ID of the thread
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.Elapsed.Sec
Value: 233

Key : Analysis.Memory.CommitPeak.Mb
Value: 70


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.40

BIOS_DATE: 10/31/2012

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: N68C-GS FX

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: ffffe001e5a4c080

BUGCHECK_P2: fffff801335d80d0

BUGCHECK_P3: ffffffff

BUGCHECK_P4: 0

CPU_COUNT: 3

CPU_MHZ: 83e

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x162

PROCESS_NAME: chrome.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME: 05-21-2019 15:11:12.0878

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

LAST_CONTROL_TRANSFER: from fffff801333f13f0 to fffff801333cc9a0

STACK_TEXT:
ffffd001`0d208f88 fffff801`333f13f0 : 00000000`00000162 ffffe001`e5a4c080 fffff801`335d80d0 00000000`ffffffff : nt!KeBugCheckEx
ffffd001`0d208f90 fffff801`332c6d28 : 00000000`00000001 fffff801`335d80c0 fffff801`335d80d0 00000001`00000000 : nt! ?? ::FNODOBFM::`string'+0x14540
ffffd001`0d208fd0 fffff801`332c67bf : 00000000`00000040 ffffd001`0d209120 ffffe001`e19d25d8 00000000`00000800 : nt!MiChargeWsles+0x194
ffffd001`0d209020 fffff801`332c6476 : 00000000`00000000 ffffe001`e19d25d8 00000000`00000000 ffffe001`e5676f00 : nt!MiObtainSystemCacheView+0x47
ffffd001`0d2091d0 fffff801`332c601e : ffffe001`00000001 ffffc001`9bfdade0 ffffe001`e5676f38 fffff801`3357f830 : nt!MmMapViewInSystemCache+0x9e
ffffd001`0d209340 fffff801`33333526 : 00000000`00000001 ffffe001`e5720df0 00000000`00000000 ffffc001`00000000 : nt!CcGetVacbMiss+0x122
ffffd001`0d2093d0 fffff801`33334a7d : 00000000`00000000 00000000`000077c3 ffffd001`0d2094d8 ffffd001`0d2094ac : nt!CcGetVirtualAddress+0x366
ffffd001`0d209470 fffff801`33367120 : ffffe001`e5720df0 00000024`10aee951 ffffd001`0d2095c8 ffffc001`00000007 : nt!CcMapAndCopyInToCache+0x14d
ffffd001`0d209560 fffff800`f1add68a : 00000000`00000007 ffffd001`0d209870 ffffc001`9c251140 00000000`00000701 : nt!CcCopyWriteEx+0x260
ffffd001`0d209600 fffff800`f1ae0b87 : ffffe001`e3320c98 ffffe001`e5ae4501 00000000`00000000 ffffe001`e3320c98 : Ntfs!NtfsCommonWrite+0xcaa
ffffd001`0d209840 fffff800`f193ab1e : ffffe001`e5fbdc00 ffffe001`e5b07510 00000000`00000000 ffffe001`e5b078b0 : Ntfs!NtfsFsdWrite+0x203
ffffd001`0d209900 fffff800`f19390c2 : ffffd001`0d2099c0 ffffe001`e2d4a040 ffffe001`e5ae4550 ffffe001`e5b07510 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd001`0d2099a0 fffff801`33662788 : 00000000`00000001 ffffd001`0d209a81 ffffe001`e5ae4550 fffff800`f1963a83 : fltmgr!FltpDispatch+0xb2
ffffd001`0d209a00 fffff801`336892d6 : ffffe001`e5ae4504 ffffe001`e5ae4550 ffffd001`0d209b18 ffffe001`e5b07510 : nt!IopSynchronousServiceTail+0x170
ffffd001`0d209ad0 fffff801`333d81b3 : ffffe001`746c6644 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x682
ffffd001`0d209bd0 00007ffe`cdf70cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000024`10aee758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`cdf70cca


THREAD_SHA1_HASH_MOD_FUNC: 5bc022311a49d4b5a12f61537e1ed20f4c80da3f

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 5a1d5ac71103a503db5b0ac8889db597e72bd37a

THREAD_SHA1_HASH_MOD: b28d851ef7201e117cab079988ee3efc98250d67

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+14540
fffff801`333f13f0 cc int 3

FAULT_INSTR_CODE: 58bcccc

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+14540

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 54503718

IMAGE_VERSION: 6.3.9600.17415

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 14540

FAILURE_BUCKET_ID: 0x162_nt!_??_::FNODOBFM::_string_

BUCKET_ID: 0x162_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS: 0x162_nt!_??_::FNODOBFM::_string_

TARGET_TIME: 2019-05-20T09:14:56.000Z

OSBUILD: 9600

OSSERVICEPACK: 17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2014-10-29 03:38:48

BUILDDATESTAMP_STR: 141028-1500

BUILDLAB_STR: winblue_r4

BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME: 38f2d

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x162_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH: {5bfa73e6-c957-661c-d3fe-95f3c8575c24}

Followup: MachineOwner
---------


IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffd00025430cb9, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803a29194a7, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 6

Key : Analysis.Elapsed.Sec
Value: 9

Key : Analysis.Memory.CommitPeak.Mb
Value: 61


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500

SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.

SYSTEM_SKU: To Be Filled By O.E.M.

SYSTEM_VERSION: To Be Filled By O.E.M.

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: P1.40

BIOS_DATE: 10/31/2012

BASEBOARD_MANUFACTURER: ASRock

BASEBOARD_PRODUCT: N68C-GS FX

BASEBOARD_VERSION:

DUMP_TYPE: 2

BUGCHECK_P1: ffffd00025430cb9

BUGCHECK_P2: c

BUGCHECK_P3: 1

BUGCHECK_P4: fffff803a29194a7

WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803a2bd3298
GetUlongPtrFromAddress: unable to read from fffff803a2bd3520
ffffd00025430cb9

CURRENT_IRQL: c

FAULTING_IP:
nt!KiIpiSendRequest+2a7
fffff803`a29194a7 088d793848d1 or byte ptr [rbp-2EB7C787h],cl

CPU_COUNT: 3

CPU_MHZ: 83e

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 10

CPU_MODEL: 2

CPU_STEPPING: 3

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: CODE_CORRUPTION

BUGCHECK_STR: AV

PROCESS_NAME: System

BAD_PAGES_DETECTED: 2f

ANALYSIS_SESSION_HOST: DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME: 05-21-2019 15:11:53.0630

ANALYSIS_VERSION: 10.0.18869.1002 amd64fre

TRAP_FRAME:  ffffd00053fad1b0 -- (.trap 0xffffd00053fad1b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000006 rbx=0000000000000000 rcx=ffffd00046d3aec0
rdx=5555555555555555 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803a29194a7 rsp=ffffd00053fad340 rbp=ffffd00053fad440
r8=ffffd00046d35180 r9=0000000000000004 r10=0000000000000001
r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiIpiSendRequest+0x2a7:
fffff803`a29194a7 088d793848d1 or byte ptr [rbp-2EB7C787h],cl ss:0018:ffffd000`25430cb9=??
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff803a29cc4e9 to fffff803a29c09a0

STACK_TEXT:
ffffd000`53fad068 fffff803`a29cc4e9 : 00000000`0000000a ffffd000`25430cb9 00000000`0000000c 00000000`00000001 : nt!KeBugCheckEx
ffffd000`53fad070 fffff803`a29cad3a : 00000000`00000001 f8011538`e0000002 ffff83c1`90ca9300 00000000`00000001 : nt!KiBugCheckDispatch+0x69
ffffd000`53fad1b0 fffff803`a29194a7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`53fad340 fffff803`a2917db7 : 00000000`00000000 fffff803`a291c527 00000000`00000000 fffff803`a29206f9 : nt!KiIpiSendRequest+0x2a7
ffffd000`53fad550 fffff803`a291aa06 : 00000000`00000000 55a00000`6f608001 ffffd000`53fad780 00000000`00000000 : nt!KeFlushSingleTb+0x203
ffffd000`53fad680 fffff803`a291e0e0 : ffffd000`53fadc20 fffffa80`01e4b0f0 00000000`06000000 ffffd000`53fadc40 : nt!MiStealPage+0x1266
ffffd000`53fadb20 fffff803`a2a787be : ffffffff`ffffffff 00000000`00000001 ffffd000`53fadc40 fffffa80`ffffffff : nt!MiClaimPhysicalRun+0x1e4
ffffd000`53fadba0 fffff803`a2e7875c : ffffe001`00000000 ffffe001`c0000709 00000000`00000000 00000000`00000000 : nt!MiScrubNode+0xfa
ffffd000`53fadc20 fffff803`a290c38c : fffff803`a2e7871c ffffe001`1a44e880 ffffe001`1ca53320 ffffe001`1a44e880 : nt!MiScrubMemoryWorker+0x40
ffffd000`53fadc90 fffff803`a2971c70 : 00000000`00000000 ffffe001`1a44e880 00000000`00000080 ffffe001`1a44e880 : nt!ExpWorkerThread+0x28c
ffffd000`53fadd40 fffff803`a29c6fc6 : fffff803`a2b73180 ffffe001`1a44e880 ffffe001`1b4be880 00000000`000001dc : nt!PspSystemThreadStartup+0x58
ffffd000`53fadda0 00000000`00000000 : ffffd000`53fae000 ffffd000`53fa8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt
2 errors : !nt (fffff803a29194a7-fffff803a29195a7)
fffff803a29194a0 55 55 55 55 55 55 55 *08 8d 79 38 48 d1 e8 48 23 UUUUUUU..y8H..H#
...
fffff803a29195a0 c3 41 8b c4 e9 35 fe *bf ff 48 8b 54 24 48 48 8b .A...5...H.T$HH.

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME: memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MEMORY_CORRUPTOR: STRIDE

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_STRIDE

BUCKET_ID: MEMORY_CORRUPTION_STRIDE

PRIMARY_PROBLEM_CLASS: MEMORY_CORRUPTION_STRIDE

TARGET_TIME: 2019-05-18T21:09:01.000Z

OSBUILD: 9600

OSSERVICEPACK: 17415

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 8.1

OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2014-10-29 03:38:48

BUILDDATESTAMP_STR: 141028-1500

BUILDLAB_STR: winblue_r4

BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500

ANALYSIS_SESSION_ELAPSED_TIME: 25ce

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:memory_corruption_stride

FAILURE_ID_HASH: {574dbc1b-92cb-fb09-cb7a-cacc1bb2c511}

Followup: memory_corruption
---------

*** Memory manager detected 47 instance(s) of page corruption, target is likely to have memory corruption.
 
Screenshot_2.pngScreenshot_3.png

Sorunum RAM kaynaklı değilmiş. Ayrıca başlıkta yazan hata dışında irql not less or equal hatası da bazen karşıma çıkıyor. Bu hatayı dün ilk kez verdi mesela. Ondan önce bu hatayı vermiyordu.
 
Memdisk.jpg

Test sonucumu paylaşıyorum. RAM arızası görünmüyor. Test sonucuma göre
Tekrar mavi ekran hatası aldım. Minidump dosyasını paylaşıyorum. Bilgisayar boştayken alıyorum bu hatayı her gün 1 kere mutlaka alıyorum. Oyun oynarken internette gezerken herhangi bir sorunum yok. Ama bilgisayarı boşta bırakınca mavi ekran hatası veriyor

Memdisk.jpg
 
Son düzenleyen: Moderatör:
RAM ile bence pek alakalı değil. Deomon tools kaldır. ATI ekran kartını güncelle.
Windows update ile güncellemeleri kontrol et. IObit araçlarını kaldır ve kullanma. Bu araçları kullandığın için format atsan iyi olur. RAM'i sök ve slotları ve RAM'i temizle. Sonra RAM'i doğru olarak tak ve BIOS'a gir optimize defaults save yapıp çık.
 
@claus Söylediğin işlemleri yaptım. Sorunum çözüldü. Driver booster"imiş sorunum kaynağı. O programla sadece ses ve oyun yazılımlarını kurdum ekran kartımı kendim güncelledim sorunum çözüldü. Yardımları için sayın @Recep Baltaş ve @MF @claus çok teşekkür ediyorum.
 
Çözüm
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı