Çözüm KERNEL_SECURITY_CHECK_FAILURE Mavi Ekran Hatası

Bu konu bir çözümü açıklamaktadır. Herhangi bir çözüm açıklanmadığını düşünüyorsanız konuyu rapor edebilirsiniz.

EzioAudit0re

Decapat
Katılım
16 Temmuz 2018
Mesajlar
39
Yaklaşık 7 aydır mavi ekran hatası alıyorum (Bilgisayarı ilk topladığımdan beri). RAM test yaptım bir sorun bulunamadı.
Bugün art arda 7-8 defa mavi ekran verdi bilgisayar. Minidump dosyalarını ekte belirttim. Yardımlarınızı rica ediyorum.
Minidump: Minidump - Google Drive
 
Son düzenleyen: Moderatör:
Kullandığın HDD veya SSD sıfır mı?
Bilgisayar parçalarını almadan önce uyumlu olduğuna baktınmı ? (örnek;mesela işlemci en fazla 2133 MHz RAM destekler sen 2666 MHz kullanıyorsun gibi)
Bilgisayarın tüm driverları kurulumu ?
BIOS Güncellemen var mı?
Birde Windows 10'da blue screen hatalarında açıklama verir. Açıklaması nedir?
 
Son düzenleyen: Moderatör:
Hocam işlemci 2400'e kadar destekliyor. Benim RAM 2666. Tüm driverler kurulu ve parçaları sıfır aldım. Genelde memory managament hatası alıyorum.
 
Son düzenleyen: Moderatör:
Öncelikle BIOS güncel değil, güncelleyin:

Support For B360M PRO-VD | Motherboard - The world leader in motherboard design | MSI Global

Hatalardan biri bellek diğeri ekran kartına işaret ediyor. Bellek testini Memtest ile yapın. Ekran kartını da Furmark ile stres testine sokun.

Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8056b4e11dd, Address of the instruction which caused the bugcheck
Arg3: fffffe060de25ed0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B53

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.50

BIOS_DATE:  10/11/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B360M PRO-VD (MS-7B53)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8056b4e11dd

BUGCHECK_P3: fffffe060de25ed0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!MiFindClearVadBitsAligned+51
fffff805`6b4e11dd 833900          cmp     dword ptr [rcx],0

CONTEXT:  fffffe060de25ed0 -- (.cxr 0xfffffe060de25ed0)
rax=0000000000000000 rbx=00000000ffffffff rcx=fffff627001f717c
rdx=0000000000000be0 rsi=0000000000000020 rdi=0000000000000000
rip=fffff8056b4e11dd rsp=fffffe060de268c8 rbp=0000000000010000
 r8=0000000000000020  r9=fffff627001f7000 r10=0000000000000020
r11=0000000000007fe0 r12=0000000000000000 r13=00007ffffffeffff
r14=00000000001f7000 r15=0000000000200000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MiFindClearVadBitsAligned+0x51:
fffff805`6b4e11dd 833900          cmp     dword ptr [rcx],0 ds:002b:fffff627`001f717c=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 4

CPU_MHZ: e10

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: b

CPU_MICROCODE: 6,9e,b,0 (F,M,S,R)  SIG: 9A'00000000 (cache) 9A'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME:  03-22-2019 13:13:52.0559

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8056b528e1f to fffff8056b4e11dd

STACK_TEXT:  
fffffe06`0de268c8 fffff805`6b528e1f : ffff9c03`e3494c18 00007df5`80610fff 00000000`0000001a 00000000`00000040 : nt!MiFindClearVadBitsAligned+0x51
fffffe06`0de268d0 fffff805`6b528b23 : 00000000`00000000 ffff9c03`e371c240 00000000`00200000 00000000`00000000 : nt!MiFindEmptyAddressRange+0x26f
fffffe06`0de26950 fffff805`6b48c55a : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00200000 : nt!MiSelectUserAddress+0x113
fffffe06`0de269f0 fffff805`6b4654e3 : 00000000`00000000 00000000`00200000 00000000`00000000 00000000`00000000 : nt!MiAllocateNewSubAllocatedRegion+0x132
fffffe06`0de26ac0 fffff805`6b4652db : 00000000`00000000 00000000`00001000 fffffe06`0de26cc0 ffff9c03`e3494cb0 : nt!MiAllocateFromSubAllocatedRegion+0x1cf
fffffe06`0de26b50 fffff805`6b48b4b0 : 00000000`00000000 00000000`00000002 fffffe06`0de26cd8 00000000`00000000 : nt!MiCreatePebOrTeb+0x43
fffffe06`0de26b80 fffff805`6b45abba : 00000000`000022be fffffe06`0de27270 00000000`000022b4 00000000`00000000 : nt!MmCreatePeb+0x140
fffffe06`0de26d50 fffff805`6b495a9a : 00000000`e248e000 fffffe06`0de27270 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0xfaa
fffffe06`0de271f0 fffff805`6b06c785 : 00000000`00000002 00000000`00000840 00000000`00000000 00000000`00000000 : nt!NtCreateUserProcess+0x62a
fffffe06`0de27990 00007ffd`b8440ec4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000020`8007dc08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`b8440ec4


THREAD_SHA1_HASH_MOD_FUNC:  64244941903d6b11890afb645282ba15d8e064ea

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6445527e2b2a36a4d9576ea9bb0715771fb5542b

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!MiFindClearVadBitsAligned+51
fffff805`6b4e11dd 833900          cmp     dword ptr [rcx],0

FAULT_INSTR_CODE:  74003983

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiFindClearVadBitsAligned+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.379

STACK_COMMAND:  .cxr 0xfffffe060de25ed0 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!MiFindClearVadBitsAligned

BUCKET_ID:  0x3B_c0000005_nt!MiFindClearVadBitsAligned

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_nt!MiFindClearVadBitsAligned

TARGET_TIME:  2019-03-22T08:24:40.000Z

OSBUILD:  17763

OSSERVICEPACK:  379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  4c9c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_nt!mifindclearvadbitsaligned

FAILURE_ID_HASH:  {19234236-3e39-016e-e6a1-cf7fd79b1cc0}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffee8e020a71d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffee8e020a7128, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B53

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.50

BIOS_DATE:  10/11/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B360M PRO-VD (MS-7B53)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffee8e020a71d0

BUGCHECK_P3: ffffee8e020a7128

BUGCHECK_P4: 0

TRAP_FRAME:  ffffee8e020a71d0 -- (.trap 0xffffee8e020a71d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffda8243387780 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffda823cbc6a90 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061e48e88a rsp=ffffee8e020a7360 rbp=ffffee8e020a73c0
 r8=ffffee8e020a7368  r9=0000000000000000 r10=7ffffffffffffffc
r11=ffffda824141c5a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po cy
dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+0x2fe06:
fffff806`1e48e88a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffee8e020a7128 -- (.exr 0xffffee8e020a7128)
ExceptionAddress: fffff8061e48e88a (dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+0x000000000002fe06)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 4

CPU_MHZ: e10

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: b

CPU_MICROCODE: 6,9e,b,0 (F,M,S,R)  SIG: 9A'00000000 (cache) 9A'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  0

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME:  03-22-2019 13:13:48.0942

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8060946cd69 to fffff8060945b5e0

STACK_TEXT:  
ffffee8e`020a6ea8 fffff806`0946cd69 : 00000000`00000139 00000000`00000003 ffffee8e`020a71d0 ffffee8e`020a7128 : nt!KeBugCheckEx
ffffee8e`020a6eb0 fffff806`0946d110 : ffffae89`ad3f7000 fffff80e`fc4e0b1b ffffae89`aba2e060 fffff806`0936c862 : nt!KiBugCheckDispatch+0x69
ffffee8e`020a6ff0 fffff806`0946b508 : 00000000`00000001 ffffae89`b0377820 ffffae89`b0377680 ffffae89`b02c9098 : nt!KiFastFailDispatch+0xd0
ffffee8e`020a71d0 fffff806`1e48e88a : ffffda82`3cbc6a10 fffff806`00000000 00000000`00000001 ffffee8e`020a7420 : nt!KiRaiseSecurityCheckFailure+0x308
ffffee8e`020a7360 fffff806`1e45e505 : ffffae89`b37eb310 fffff806`00000000 ffffae89`b03da000 ffffee8e`020a7698 : dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+0x2fe06
ffffee8e`020a73f0 fffff806`1e45e444 : ffffae89`b3876a90 ffffda82`433856e0 ffffee8e`020a7698 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::CommitAllocationList+0xa1
ffffee8e`020a7490 fffff806`1e401c1b : 00000000`00000000 ffffee8e`020a7a80 ffffda82`428d3890 fffff80e`fc4197e9 : dxgmms2!VIDMM_GLOBAL::MakeResident+0x7c
ffffee8e`020a74e0 fffff80e`fc512205 : 00000000`00000001 ffffee8e`020a7a80 000000ca`2f2cf368 ffffae89`b02b29e8 : dxgmms2!VidMmMakeResident+0x2b
ffffee8e`020a7530 fffff80e`fc511a7e : 00000000`00000000 ffffae89`00000001 ffffae89`b3ce9080 00000278`5a1d9678 : dxgkrnl!DxgkMakeResidentInternal+0x775
ffffee8e`020a79a0 ffff85dc`e6e0cdb1 : 00000000`00000000 ffffae89`b3e53360 00000000`00000000 00000000`00000574 : dxgkrnl!DxgkMakeResident+0xe
ffffee8e`020a79d0 fffff806`0946c785 : ffffae89`b3ce9080 00000000`00000000 00000000`00000000 ffffae89`b3e53960 : win32kbase!NtGdiDdDDIMakeResident+0x11
ffffee8e`020a7a00 00007ff9`640f4f44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ca`2f2cf0d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`640f4f44


THREAD_SHA1_HASH_MOD_FUNC:  371c7cbcffa3a2a6854bbb10b89553955e5e98cb

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d5c46c325e1909fcab18855350cfd43a84c7fc44

THREAD_SHA1_HASH_MOD:  9467ecd4197983d0d6a4bde46dbae25c6d9ac7ef

FOLLOWUP_IP:
dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+2fe06
fffff806`1e48e88a cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand+2fe06

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.134

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2fe06

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VIDMM_GLOBAL::QueueDeferredCommand

TARGET_TIME:  2019-03-22T08:13:48.000Z

OSBUILD:  17763

OSSERVICEPACK:  379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  1537a

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_dxgmms2!vidmm_global::queuedeferredcommand

FAILURE_ID_HASH:  {33a7badb-e81d-16aa-6699-bd05e5aee4c2}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: ffff96bfff36efd0
Arg3: 0000000253610025
Arg4: ffffd08de9d74020

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B53

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1.50

BIOS_DATE:  10/11/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B360M PRO-VD (MS-7B53)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 41201

BUGCHECK_P2: ffff96bfff36efd0

BUGCHECK_P3: 253610025

BUGCHECK_P4: ffffd08de9d74020

BUGCHECK_STR:  0x1a_41201

CPU_COUNT: 4

CPU_MHZ: e10

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 9e

CPU_STEPPING: b

CPU_MICROCODE: 6,9e,b,0 (F,M,S,R)  SIG: 9A'00000000 (cache) 9A'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  opera.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-HH6FM2D

ANALYSIS_SESSION_TIME:  03-22-2019 13:13:46.0072

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff807568ec638 to fffff807568665e0

STACK_TEXT:  
ffffac03`549af498 fffff807`568ec638 : 00000000`0000001a 00000000`00041201 ffff96bf`ff36efd0 00000002`53610025 : nt!KeBugCheckEx
ffffac03`549af4a0 fffff807`56796cee : ffffac03`549af610 00000002`53610025 ffffac03`549af610 00000000`00000001 : nt!MiGetPageProtection+0x154928
ffffac03`549af510 fffff807`567a7b1c : 00007ffe`6e00e000 00000000`01000000 ffffd08d`e89d33a0 fffff807`567c4a79 : nt!MiQueryAddressState+0x47e
ffffac03`549af710 fffff807`56d46d13 : ffffac03`549afa80 00000000`00000000 ffffac03`549af8c0 ffffac03`00000000 : nt!MiQueryAddressSpan+0xac
ffffac03`549af7a0 fffff807`56d467b5 : ffffa4e9`0cae0818 00000000`00000000 00000000`00000108 ffffac03`549afa80 : nt!MmQueryVirtualMemory+0x553
ffffac03`549af940 fffff807`56877785 : ffffd08d`dea91380 00000000`00000000 00000000`77566d4d ffffac03`549af900 : nt!NtQueryVirtualMemory+0x25
ffffac03`549af990 00007ffe`74bffad4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000002`66ddf2d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`74bffad4


THREAD_SHA1_HASH_MOD_FUNC:  daeab5d68ba3ecb3234b5b8938d47aee75235996

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1d56f65877d0a1e25ae4757718b560ab8f80659b

THREAD_SHA1_HASH_MOD:  30a3e915496deaace47137d5b90c3ecc03746bf6

FOLLOWUP_IP:
nt!MiGetPageProtection+154928
fffff807`568ec638 cc              int     3

FAULT_INSTR_CODE:  2e8948cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiGetPageProtection+154928

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.379

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  154928

FAILURE_BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection

BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection

PRIMARY_PROBLEM_CLASS:  0x1a_41201_nt!MiGetPageProtection

TARGET_TIME:  2019-03-22T08:08:52.000Z

OSBUILD:  17763

OSSERVICEPACK:  379

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  58ea

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41201_nt!migetpageprotection

FAILURE_ID_HASH:  {c1fe3b27-3ba8-d99e-656f-85f3d58dc669}

Followup:     MachineOwner
---------
 
Hocam Furmark test sonucu şöyle: GPU, OpenGL and OpenCL database

Hocam Memtest'te sonuç böyle.

518B86C0-76D3-4DB7-8475-0362B5757DD2.jpeg
 
Son düzenleyen: Moderatör:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı