Çözüldü Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

ahmetecemis_51

Decapat
Katılım
1 Aralık 2019
Mesajlar
822
Makaleler
1
Sürekli mavi ekran almaktayım, 2 adet minidump dosayasını gönderiyorum.
Format attığım için eski minidump dosyaları gitmiş o yüzden onları atamadım.
Şimdiden teşekkürler.
 
DDU ile ekran kartı sürücüsünü kaldırıp güncelini yükleyin. Core temp kaldırın. Sorun devam ederse Memtest86 ile bellek testi yapınız.
Kod:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff8061db82980, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80641a29280, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 fffff8061db82980

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiInsertTimerTable+d0
fffff806`41a29280 4c8b42f8        mov     r8,qword ptr [rdx-8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  svchost.exe

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  ffffaa098d9b07b0 -- (.trap 0xffffaa098d9b07b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000100 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8061db82988 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80641a29280 rsp=ffffaa098d9b0940 rbp=00000003039870fc
 r8=0000000000000000  r9=fffff80641800000 r10=fffff8063db7eac0
r11=ffffaa098d9b0a00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiInsertTimerTable+0xd0:
fffff806`41a29280 4c8b42f8        mov     r8,qword ptr [rdx-8] ds:fffff806`1db82980=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80641bef929 to fffff80641bdda20

STACK_TEXT: 
ffffaa09`8d9b0668 fffff806`41bef929 : 00000000`0000000a fffff806`1db82980 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffaa09`8d9b0670 fffff806`41bebc29 : ffff9605`032de080 ffffaa09`8d9b0800 00000000`00000000 fffff806`41be47a6 : nt!KiBugCheckDispatch+0x69
ffffaa09`8d9b07b0 fffff806`41a29280 : 00000000`00000000 00000000`63c80180 00000000`00000000 fffff806`41be4866 : nt!KiPageFault+0x469
ffffaa09`8d9b0940 fffff806`41a2751d : ffff9605`00e39080 00001f80`0000000a ffffaa09`8d9b0b00 ffff9605`00000000 : nt!KiInsertTimerTable+0xd0
ffffaa09`8d9b09c0 fffff806`41a31e4e : 00000000`000000e6 00000000`00000000 ffffe400`63c8e001 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffffaa09`8d9b0a60 fffff806`41e0b050 : ffffaa09`8d9b0e20 00000000`00000001 ffff9605`01982d10 fffff806`41d25a38 : nt!KeWaitForMultipleObjects+0x2be
ffffaa09`8d9b0b70 fffff5e2`81d9fb72 : 00000000`000186a0 00000000`00030d40 fffff594`8073fa10 ffff9604`fc23b1f0 : nt!ObWaitForMultipleObjects+0x2f0
ffffaa09`8d9b1070 fffff5e2`81cf979e : 0000009b`00000001 fffff594`8073fa10 00000000`00007530 00000000`00001cff : win32kfull!xxxMsgWaitForMultipleObjectsEx+0xde
ffffaa09`8d9b1120 fffff5e2`81456fcf : 00007ffb`fcb70000 0000009b`5117faa0 00000000`00007530 00000000`00001cff : win32kfull!NtUserMsgWaitForMultipleObjectsEx+0x3fe
ffffaa09`8d9b1a50 fffff806`41bef378 : 000001bd`17957840 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!NtUserMsgWaitForMultipleObjectsEx+0x1f
ffffaa09`8d9b1a90 00007ffc`208aa104 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000009b`5117f988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`208aa104


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    fffff5e28101c469-fffff5e28101c46e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 49 7b 26 00:e8 32 8e 2c 00 90 ]
    fffff5e28101c482-fffff5e28101c487  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 30 7b 26 00:e8 19 8e 2c 00 90 ]
    fffff5e28101c4cb-fffff5e28101c4cc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    fffff5e28101c4d2-fffff5e28101c4d5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 49 8f 2c ]
    fffff5e28101c513-fffff5e28101c518  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 9f 7a 26 00:e8 88 8d 2c 00 90 ]
    fffff5e28101c53f-fffff5e28101c544  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 73 7a 26 00:e8 5c 8d 2c 00 90 ]
    fffff5e28102ad84-fffff5e28102ad85  2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0xe845)
    [ 48 ff:4c 8b ]
    fffff5e28102ad8b-fffff5e28102ad8e  4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
    [ 0f 1f 44 00:e8 90 a6 2b ]
    fffff5e28128b167-fffff5e28128b168  2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b
    [ 48 ff:4c 8b ]
    fffff5e28128b16e-fffff5e28128b171  4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
    [ 0f 1f 44 00:e8 ad a2 05 ]
    fffff5e28128b1dc-fffff5e28128b1dd  2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
    [ 48 ff:4c 8b ]
    fffff5e28128b1e3-fffff5e28128b1e6  4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
    [ 0f 1f 44 00:e8 38 a2 05 ]
    fffff5e28128b545-fffff5e28128b54a  6 bytes - win32kbase!tlgEnableCallback+45 (+0x362)
    [ ff 15 6d 8a ff ff:e8 56 9d 05 00 90 ]
    fffff5e28128b5c8-fffff5e28128b5c9  2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
    [ 48 ff:4c 8b ]
    fffff5e28128b5cf-fffff5e28128b5d2  4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
    [ 0f 1f 44 00:e8 4c 9e 05 ]
    fffff5e28128b5e6-fffff5e28128b5e7  2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
    [ 48 ff:4c 8b ]
    fffff5e28128b5ed-fffff5e28128b5f0  4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
    [ 0f 1f 44 00:e8 2e 9e 05 ]
    fffff5e28128c2c9-fffff5e28128c2ca  2 bytes - win32kbase!TlgAggregateInternalProviderCallback+19 (+0xcdc)
    [ 48 ff:4c 8b ]
    fffff5e28128c2d0-fffff5e28128c2d3  4 bytes - win32kbase!TlgAggregateInternalProviderCallback+20 (+0x07)
    [ 0f 1f 44 00:e8 4b 91 05 ]
    fffff5e28128c2ff-fffff5e28128c300  2 bytes - win32kbase!TlgAggregateInternalProviderCallback+4f (+0x2f)
    [ 48 ff:4c 8b ]
    fffff5e28128c306-fffff5e28128c309  4 bytes - win32kbase!TlgAggregateInternalProviderCallback+56 (+0x07)
    [ 0f 1f 44 00:e8 15 91 05 ]
    fffff5e28128c366-fffff5e28128c36b  6 bytes - win32kbase!TlgAggregateInternalRegisteredProviderEtwCallback+46 (+0x60)
    [ ff 15 4c 7c ff ff:e8 35 8f 05 00 90 ]
84 errors : !win32kbase (fffff5e28101c469-fffff5e28128c36b)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: ffff91287702d401, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000000000

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx adresindeki y nerge, 0x%08lx bellek adresine ba

FAULTING_IP:
win32kbase!ThreadUnlock1+51
ffff9128`7702d401 488b01          mov     rax,qword ptr [rcx]

BUGCHECK_STR:  0x1E_c0000005_R

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  Core Temp.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

EXCEPTION_RECORD:  ffffad01d85e97f0 -- (.exr 0xffffad01d85e97f0)
ExceptionAddress: 0000000042000000
   ExceptionCode: 00000000
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  ffffad01d85e9770 -- (.trap 0xffffad01d85e9770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc309a964e0a0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff91287702d401 rsp=ffffad01d85e9908 rbp=ffffad01d85e99d9
 r8=0000000000000001  r9=0000000000000000 r10=fffff8023f718620
r11=ffffad01d85e9898 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
win32kbase!ThreadUnlock1+0x51:
ffff9128`7702d401 488b01          mov     rax,qword ptr [rcx] ds:00000000`00000000=0000000000000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8023f82edf9 to fffff8023f7dda20

STACK_TEXT: 
ffffad01`d85e8ec8 fffff802`3f82edf9 : 00000000`0000001e ffffffff`c0000005 ffff9128`7702d401 00000000`00000000 : nt!KeBugCheckEx
ffffad01`d85e8ed0 fffff802`3f7efa6c : ffffad01`d85e97f0 00000000`00001000 ffffad01`d85e9770 ffff8000`00000000 : nt!KiDispatchException+0x1b3d59
ffffad01`d85e9590 fffff802`3f7ebc03 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x12c
ffffad01`d85e9770 ffff9128`7702d401 : ffff9154`40697620 ffff9154`00000001 00000000`00000000 ffffad01`d85e9898 : nt!KiPageFault+0x443
ffffad01`d85e9908 ffff9128`774866b6 : ffff9154`40626230 ffff9154`40697620 ffff9154`40697620 ffffc309`a67b6b70 : win32kbase!ThreadUnlock1+0x51
ffffad01`d85e9938 00000000`00000001 : ffff9154`00000440 00000000`000302c2 00000000`0000badf 00000000`00000000 : win32kfull!_PostTransformableMessageExtended+0xe8386
ffffad01`d85e9a38 ffff9154`00000440 : 00000000`000302c2 00000000`0000badf 00000000`00000000 00000000`00000001 : 0x1
ffffad01`d85e9a40 00000000`000302c2 : 00000000`0000badf 00000000`00000000 00000000`00000001 00000000`00000005 : 0xffff9154`00000440
ffffad01`d85e9a48 00000000`0000badf : 00000000`00000000 00000000`00000001 00000000`00000005 fffff802`000002b1 : 0x302c2
ffffad01`d85e9a50 00000000`00000000 : 00000000`00000001 00000000`00000005 fffff802`000002b1 ffffad01`00000000 : 0xbadf


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
    ffff91287701c469-ffff91287701c46e  6 bytes - win32kbase!Win32FreePool+19
    [ ff 15 49 7b 26 00:e8 32 8e 2c 00 90 ]
    ffff91287701c482-ffff91287701c487  6 bytes - win32kbase!Win32FreePool+32 (+0x19)
    [ ff 15 30 7b 26 00:e8 19 8e 2c 00 90 ]
    ffff91287701c4cb-ffff91287701c4cc  2 bytes - win32kbase!AllocAce+2b (+0x49)
    [ 48 ff:4c 8b ]
    ffff91287701c4d2-ffff91287701c4d5  4 bytes - win32kbase!AllocAce+32 (+0x07)
    [ 0f 1f 44 00:e8 49 8f 2c ]
    ffff91287701c513-ffff91287701c518  6 bytes - win32kbase!AllocAce+73 (+0x41)
    [ ff 15 9f 7a 26 00:e8 88 8d 2c 00 90 ]
    ffff91287701c53f-ffff91287701c544  6 bytes - win32kbase!AllocAce+9f (+0x2c)
    [ ff 15 73 7a 26 00:e8 5c 8d 2c 00 90 ]
    ffff91287702d150-ffff91287702d151  2 bytes - win32kbase!W32GetThreadWin32Thread+14 (+0x10c11)
    [ 48 ff:4c 8b ]
    ffff91287702d157-ffff91287702d15a  4 bytes - win32kbase!W32GetThreadWin32Thread+1b (+0x07)
    [ 0f 1f 44 00:e8 c4 82 2b ]
    ffff91287702d167-ffff91287702d168  2 bytes - win32kbase!W32GetThreadWin32Thread+2b (+0x10)
    [ 48 ff:4c 8b ]
    ffff91287702d16e-ffff91287702d171  4 bytes - win32kbase!W32GetThreadWin32Thread+32 (+0x07)
    [ 0f 1f 44 00:e8 ad 82 2b ]
    ffff91287702d3ca-ffff91287702d3cb  2 bytes - win32kbase!ThreadUnlock1+1a (+0x25c)
    [ 48 ff:4c 8b ]
    ffff91287702d3d1-ffff91287702d3d4  4 bytes - win32kbase!ThreadUnlock1+21 (+0x07)
    [ 0f 1f 44 00:e8 4a 80 2b ]
    ffff91287702d3e1-ffff91287702d3e2  2 bytes - win32kbase!ThreadUnlock1+31 (+0x10)
    [ 48 ff:4c 8b ]
    ffff91287702d3e8-ffff91287702d3eb  4 bytes - win32kbase!ThreadUnlock1+38 (+0x07)
    [ 0f 1f 44 00:e8 33 80 2b ]
    ffff91287702d4f3-ffff91287702d4f4  2 bytes - win32kbase!EnterCrit+33 (+0x10b)
    [ 48 ff:4c 8b ]
    ffff91287702d4fa-ffff91287702d4fd  4 bytes - win32kbase!EnterCrit+3a (+0x07)
    [ 0f 1f 44 00:e8 21 7f 2b ]
    ffff91287702d509-ffff91287702d50a  2 bytes - win32kbase!EnterCrit+49 (+0x0f)
    [ 48 ff:4c 8b ]
    ffff91287702d510-ffff91287702d513  4 bytes - win32kbase!EnterCrit+50 (+0x07)
    [ 0f 1f 44 00:e8 0b 7f 2b ]
    ffff91287702d53e-ffff91287702d53f  2 bytes - win32kbase!EnterCrit+7e (+0x2e)
    [ 48 ff:4c 8b ]
    ffff91287702d545-ffff91287702d548  4 bytes - win32kbase!EnterCrit+85 (+0x07)
    [ 0f 1f 44 00:e8 d6 7e 2b ]
    ffff91287702d552-ffff91287702d553  2 bytes - win32kbase!EnterCrit+92 (+0x0d)
    [ 48 ff:4c 8b ]
    ffff91287702d559-ffff91287702d55c  4 bytes - win32kbase!EnterCrit+99 (+0x07)
    [ 0f 1f 44 00:e8 c2 7e 2b ]
    ffff91287702d570-ffff91287702d571  2 bytes - win32kbase!EnterCrit+b0 (+0x17)
    [ 48 ff:4c 8b ]
    ffff91287702d577-ffff91287702d57a  4 bytes - win32kbase!EnterCrit+b7 (+0x07)
    [ 0f 1f 44 00:e8 a4 7e 2b ]
    ffff91287702d5b6-ffff91287702d5b7  2 bytes - win32kbase!EnterCrit+f6 (+0x3f)
    [ 48 ff:4c 8b ]
    ffff91287702d5bd-ffff91287702d5c0  4 bytes - win32kbase!EnterCrit+fd (+0x07)
    [ 0f 1f 44 00:e8 5e 7e 2b ]
    ffff91287702d5e2-ffff91287702d5e3  2 bytes - win32kbase!EnterCrit+122 (+0x25)
    [ 48 ff:4c 8b ]
    ffff91287702d5e9-ffff91287702d5ec  4 bytes - win32kbase!EnterCrit+129 (+0x07)
    [ 0f 1f 44 00:e8 32 7e 2b ]
    ffff91287702d5f6-ffff91287702d5f7  2 bytes - win32kbase!EnterCrit+136 (+0x0d)
    [ 48 ff:4c 8b ]
    ffff91287702d5fd-ffff91287702d600  4 bytes - win32kbase!EnterCrit+13d (+0x07)
    [ 0f 1f 44 00:e8 1e 7e 2b ]
    ffff91287702d65f-ffff91287702d660  2 bytes - win32kbase!EnterCrit+19f (+0x62)
    [ 48 ff:4c 8b ]
    ffff91287702d666-ffff91287702d669  4 bytes - win32kbase!EnterCrit+1a6 (+0x07)
    [ 0f 1f 44 00:e8 b5 7d 2b ]
    ffff91287702d676-ffff91287702d677  2 bytes - win32kbase!EnterCrit+1b6 (+0x10)
    [ 48 ff:4c 8b ]
    ffff91287702d67d-ffff91287702d680  4 bytes - win32kbase!EnterCrit+1bd (+0x07)
    [ 0f 1f 44 00:e8 9e 7d 2b ]
    ffff91287702d695-ffff91287702d696  2 bytes - win32kbase!EnterCrit+1d5 (+0x18)
    [ 48 ff:4c 8b ]
    ffff91287702d69c-ffff91287702d69f  4 bytes - win32kbase!EnterCrit+1dc (+0x07)
    [ 0f 1f 44 00:e8 7f 7d 2b ]
    ffff91287702d6f1-ffff91287702d6f2  2 bytes - win32kbase!EnterCrit+231 (+0x55)
    [ 48 ff:4c 8b ]
    ffff91287702d6f8-ffff91287702d6fb  4 bytes - win32kbase!EnterCrit+238 (+0x07)
    [ 0f 1f 44 00:e8 23 7d 2b ]
    ffff91287702d700-ffff91287702d701  2 bytes - win32kbase!EnterCrit+240 (+0x08)
    [ 48 ff:4c 8b ]
    ffff91287702d707-ffff91287702d70a  4 bytes - win32kbase!EnterCrit+247 (+0x07)
    [ 0f 1f 44 00:e8 14 7d 2b ]
    ffff91287702d70e-ffff91287702d70f  2 bytes - win32kbase!EnterCrit+24e (+0x07)
    [ 48 ff:4c 8b ]
    ffff91287702d715-ffff91287702d718  4 bytes - win32kbase!EnterCrit+255 (+0x07)
    [ 0f 1f 44 00:e8 06 7d 2b ]
    ffff91287702d71d-ffff91287702d71e  2 bytes - win32kbase!EnterCrit+25d (+0x08)
    [ 48 ff:4c 8b ]
    ffff91287702d724-ffff91287702d727  4 bytes - win32kbase!EnterCrit+264 (+0x07)
    [ 0f 1f 44 00:e8 f7 7c 2b ]
    ffff91287702d763-ffff91287702d764  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+23 (+0x3f)
    [ 48 ff:4c 8b ]
    ffff91287702d76a-ffff91287702d76d  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+2a (+0x07)
    [ 0f 1f 44 00:e8 b1 7c 2b ]
    ffff91287702d7ad-ffff91287702d7ae  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+6d (+0x43)
    [ 48 ff:4c 8b ]
    ffff91287702d7b4-ffff91287702d7b7  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+74 (+0x07)
    [ 0f 1f 44 00:e8 67 7c 2b ]
    ffff91287702d8d6-ffff91287702d8d7  2 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+196 (+0x122)
    [ 48 ff:4c 8b ]
    ffff91287702d8dd-ffff91287702d8e0  4 bytes - win32kbase!EtwTraceAcquiredExclusiveUserCrit+19d (+0x07)
    [ 0f 1f 44 00:e8 3e 7b 2b ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view  entire output.
234 errors : !win32kbase (ffff91287701c469-ffff91287702dff9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı