Memtest sonuçlarının değerlendirmesi

Ceza yedim ve neden yedim anlamadım. @MayCrasH bizden fazlasiyla bilgili, söylediklerini harfiyen yap sorunun biter.
Tamamdır.
İşlemcinin 100 derece gibi rakamlara çıkması hiç normal değil gibime geliyor bu değerler gerçek mi acaba?
Şu ana kadar çıkmıştı hata xmpli yaptığımda,
15779088453551697594310.jpg
0 hata ile devam ediyor.
 
Son düzenleme:
Bu hataları alırken belleklerin 3200MHz hızında çalıştığı için çoğunluğu bellek hataları, arada bir kaç farklı aygıt hata vermiş fakat bellek hatası nedenli olabilir.
[Memory Device (Type 17) - Length 40 - Handle 0035h]
Physical Memory Array Handle 0027h
Memory Error Info Handle 0034h
Total Width 64 bits
Data Width 64 bits
Size 8192MB
Form Factor 09h - DIMM
Device Set [None]
Device Locator DIMM_B2
Bank Locator BANK 3
Memory Type 1ah - Specification Reserved
Type Detail 4080h - Synchronous
Speed 3200MHz
Manufacturer Corsair
Serial Number
Asset Tag Number [String Not Specified]
Part Number CMK16GX4M2E3200C16

Yeni hata alırsan gönder.
Kod:
STORE_DATA_STRUCTURE_CORRUPTION (1c7)
The store component detected a corruption in its data structures.
Arguments:
Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match.
Arg2: ffff888e949b5000, Chunk heap buffer whose hash didn't match.
Arg3: 00000000318aeb15, Expected buffer hash.
Arg4: a7f35770f9835d15, Page frame number of the corrupted page.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffff888e949b5000

BUGCHECK_P3: 318aeb15

BUGCHECK_P4: a7f35770f9835d15

BUGCHECK_STR:  0x1C7_0

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-01-2020 22:53:36.0976

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DEVICE_OBJECT: ffff888e00000000

LAST_CONTROL_TRANSFER:  from fffff8065975c785 to fffff806549c14e0

STACK_TEXT:
ffff848c`54525518 fffff806`5975c785 : 00000000`000001c7 00000000`00000000 ffff888e`949b5000 00000000`318aeb15 : nt!KeBugCheckEx
ffff848c`54525520 fffff806`5974dbd5 : a7f35770`f9835d15 00000000`000000d9 00000000`00000001 00000000`00000000 : rdyboost!SmHpBufferProtectEx+0xb3a1
ffff848c`54525570 fffff806`59753a62 : ffff888e`93166050 ffff888e`93166000 ffff888e`93167868 fffff806`00000000 : rdyboost!SmHpChunkHeapProtect+0x51
ffff848c`545255a0 fffff806`59755364 : 00000000`00000000 00000000`00000001 ffff888e`93166000 ffff888e`93166000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCleanup+0x32
ffff848c`54525600 fffff806`5974b7f3 : ffff888e`93166000 ffff888e`93167868 00000000`00000000 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StCleanup+0x24
ffff848c`54525630 fffff806`59755bb7 : 00000000`00000000 ffff888e`93166000 fffff806`59772650 ffff888e`93166000 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStCleanup+0xd3
ffff848c`545256b0 fffff806`5977cef4 : ffff888e`931ee010 ffff888e`931ee000 ffff888e`00000002 ffff888e`931ee000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmStoreMgrCallback+0x67
ffff848c`545256e0 fffff806`5974ab7b : fffff806`59772650 ffff848c`545257a0 fffff806`59772650 ffff888e`8ff4caf8 : rdyboost!SmKmCleanup+0xfc
ffff848c`54525710 fffff806`5977b350 : fffff806`59772650 00000000`00000000 fffff806`59772650 00000000`00000000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmCleanup+0x17
ffff848c`54525740 fffff806`5974220a : ffff888e`8ccdf070 00000000`00000000 00000000`00000000 ffff888e`99e70bb0 : rdyboost!SmdRBContextShutdown+0x11c
ffff848c`545257c0 fffff806`54831f79 : ffff888e`00000000 ffff888e`8ccdf070 ffff888e`8ccdf070 00000000`00000000 : rdyboost!SmdDispatchDeviceControl+0x12a
ffff848c`54525820 fffff806`54de95e5 : ffff848c`54525b80 ffff888e`8ccdf070 00000000`00000001 ffff888e`99e70bb0 : nt!IofCallDriver+0x59
ffff848c`54525860 fffff806`54de93f0 : ffff888e`00000000 00000000`00000000 ffff888e`99e70bb0 ffff848c`54525b80 : nt!IopSynchronousServiceTail+0x1a5
ffff848c`54525900 fffff806`54de87c6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffff848c`54525a20 fffff806`549d2d18 : 00000000`000003d0 ffff888e`967f86b0 ffffffff`ff8545ac 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffff848c`54525a90 00007ffd`fccbc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`19a7cff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fccbc1a4


THREAD_SHA1_HASH_MOD_FUNC:  ade035d9fa1aac25168c14438334e7385bdaf6b4

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  9545dd7c0bb7a3446b27abd542da4a0642e3ebb5

THREAD_SHA1_HASH_MOD:  b1d4afcedc5935b809e8cb8df2ad14dcf61482cc

FOLLOWUP_IP:
rdyboost!SmHpBufferProtectEx+b3a1
fffff806`5975c785 cc              int     3

FAULT_INSTR_CODE:  d38b4ccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  rdyboost!SmHpBufferProtectEx+b3a1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rdyboost

IMAGE_NAME:  rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b3a1

FAILURE_BUCKET_ID:  0x1C7_0_rdyboost!SmHpBufferProtectEx

BUCKET_ID:  0x1C7_0_rdyboost!SmHpBufferProtectEx

PRIMARY_PROBLEM_CLASS:  0x1C7_0_rdyboost!SmHpBufferProtectEx

TARGET_TIME:  2020-01-01T13:43:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2355

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1c7_0_rdyboost!smhpbufferprotectex

FAILURE_ID_HASH:  {e4df3e54-cb2b-19a5-89db-02ffa9120592}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000030, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  5222

BIOS_DATE:  10/14/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  TUF B350M-PLUS GAMING

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 30

TRAP_FRAME:  0000000000000000 -- (.trap 0x0)

EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x139

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-01-2020 22:53:42.0624

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff805333c9f5b to fffff805333c14e0

STACK_TEXT:
ffffa808`004fa818 fffff805`333c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffa808`004fa820 fffff805`36a03a37 : ffff8302`b81d35b0 ffffa808`004fab38 00000000`00001000 ffffc20a`00040000 : nt!guard_icall_bugcheck+0x1b
ffffa808`004fa850 fffff805`36a03022 : ffffa808`004fb4b0 00000000`00000000 ffffa808`004faa80 00000000`00000004 : Ntfs!ReadIndexBuffer+0x517
ffffa808`004fa900 fffff805`369e7a62 : 00000000`00000000 ffffae8f`47aa4578 ffff8302`baa16180 00000000`00000001 : Ntfs!FindFirstIndexEntry+0x182
ffffa808`004fa9c0 fffff805`369e6f09 : 00000000`00000038 00000000`00000038 ffffa808`004faf40 00000000`00000010 : Ntfs!NtfsUpdateFileNameInIndex+0x262
ffffa808`004fac40 fffff805`369e693f : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179
ffffa808`004fae20 fffff805`36a1caec : ffffa808`004fb4b0 00000000`00000000 ffffa808`004fb0d0 ffffa808`004fb070 : Ntfs!NtfsUpdateDuplicateInfo+0x18f
ffffa808`004fafc0 fffff805`36a1ab9d : 00000000`00000000 00000000`00000258 00000000`00000000 ffffa808`004fb480 : Ntfs!NtfsCommonCleanup+0x1adc
ffffa808`004fb410 fffff805`33231f79 : ffff8302`c33708b0 fffff805`35ee45a0 ffff8302`c13613f8 ffff8302`c12a4200 : Ntfs!NtfsFsdCleanup+0x1ad
ffffa808`004fb760 fffff805`35ee55de : ffff8302`c1361010 ffffa808`004fb840 ffff8302`c1361010 ffffa808`004fb850 : nt!IofCallDriver+0x59
ffffa808`004fb7a0 fffff805`35ee3f16 : ffffa808`004fb840 00000000`00000001 00000000`00000001 ffff8302`c12a42c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffa808`004fb820 fffff805`33231f79 : ffff8302`c3748960 fffff805`33231e5d ffff8302`b6e73080 fffff805`33860351 : FLTMGR!FltpDispatch+0xb6
ffffa808`004fb880 fffff805`337e42b8 : 00000000`00000000 ffff8302`c3748960 00000000`00000000 ffff8302`c1361010 : nt!IofCallDriver+0x59
ffffa808`004fb8c0 fffff805`337ec408 : 00000000`00000000 00000000`00000001 ffff8302`00000000 00000000`00007ffe : nt!IopCloseFile+0x188
ffffa808`004fb950 fffff805`337f174e : 00000000`00000234 00000013`bc1ff480 000001c0`67a2d440 000001c0`000000dc : nt!ObCloseHandleTableEntry+0x278
ffffa808`004fba90 fffff805`333d2d18 : ffff8302`c12e3080 000001c0`67b02de8 ffffa808`004fbb80 00000000`00000000 : nt!NtClose+0xde
ffffa808`004fbb00 00007ffb`ec47c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000013`bc1ff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ec47c2a4


THREAD_SHA1_HASH_MOD_FUNC:  b97645537eaa82deef66548b30b0909c4ab321e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  949b9fb21efa6fdbef598dc78b2f5db8b1e62940

THREAD_SHA1_HASH_MOD:  5b8c895baef0e5f7f654f3b184b1b65282436b44

FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff805`333c9f5b 90              nop

FAULT_INSTR_CODE:  ccccc390

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!guard_icall_bugcheck+1b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

PRIMARY_PROBLEM_CLASS:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

TARGET_TIME:  2020-01-01T13:41:15.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5d90

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck

FAILURE_ID_HASH:  {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}

Followup:     MachineOwner
---------
 
Şu an mavi ekran almıyorum,diğer mavi ekranlar 7.1 ve uygulamalı kulaklıktan kaynaklanıyor olabilir mi?
Bu hataları alırken belleklerin 3200MHz hızında çalıştığı için çoğunluğu bellek hataları, arada bir kaç farklı aygıt hata vermiş fakat bellek hatası nedenli olabilir.


Yeni hata alırsan gönder.
Kod:
STORE_DATA_STRUCTURE_CORRUPTION (1c7)
The store component detected a corruption in its data structures.
Arguments:
Arg1: 0000000000000000, A chunk heap buffer's hash doesn't match.
Arg2: ffff888e949b5000, Chunk heap buffer whose hash didn't match.
Arg3: 00000000318aeb15, Expected buffer hash.
Arg4: a7f35770f9835d15, Page frame number of the corrupted page.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: ffff888e949b5000

BUGCHECK_P3: 318aeb15

BUGCHECK_P4: a7f35770f9835d15

BUGCHECK_STR:  0x1C7_0

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  1

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-01-2020 22:53:36.0976

ANALYSIS_VERSION: 10.0.18362.1 x86fre

DEVICE_OBJECT: ffff888e00000000

LAST_CONTROL_TRANSFER:  from fffff8065975c785 to fffff806549c14e0

STACK_TEXT:
ffff848c`54525518 fffff806`5975c785 : 00000000`000001c7 00000000`00000000 ffff888e`949b5000 00000000`318aeb15 : nt!KeBugCheckEx
ffff848c`54525520 fffff806`5974dbd5 : a7f35770`f9835d15 00000000`000000d9 00000000`00000001 00000000`00000000 : rdyboost!SmHpBufferProtectEx+0xb3a1
ffff848c`54525570 fffff806`59753a62 : ffff888e`93166050 ffff888e`93166000 ffff888e`93167868 fffff806`00000000 : rdyboost!SmHpChunkHeapProtect+0x51
ffff848c`545255a0 fffff806`59755364 : 00000000`00000000 00000000`00000001 ffff888e`93166000 ffff888e`93166000 : rdyboost!ST_STORE<SMD_TRAITS>::StDmCleanup+0x32
ffff848c`54525600 fffff806`5974b7f3 : ffff888e`93166000 ffff888e`93167868 00000000`00000000 00000000`00000000 : rdyboost!ST_STORE<SMD_TRAITS>::StCleanup+0x24
ffff848c`54525630 fffff806`59755bb7 : 00000000`00000000 ffff888e`93166000 fffff806`59772650 ffff888e`93166000 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStCleanup+0xd3
ffff848c`545256b0 fffff806`5977cef4 : ffff888e`931ee010 ffff888e`931ee000 ffff888e`00000002 ffff888e`931ee000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmStoreMgrCallback+0x67
ffff848c`545256e0 fffff806`5974ab7b : fffff806`59772650 ffff848c`545257a0 fffff806`59772650 ffff888e`8ff4caf8 : rdyboost!SmKmCleanup+0xfc
ffff848c`54525710 fffff806`5977b350 : fffff806`59772650 00000000`00000000 fffff806`59772650 00000000`00000000 : rdyboost!SMKM_STORE_MGR<SMD_TRAITS>::SmCleanup+0x17
ffff848c`54525740 fffff806`5974220a : ffff888e`8ccdf070 00000000`00000000 00000000`00000000 ffff888e`99e70bb0 : rdyboost!SmdRBContextShutdown+0x11c
ffff848c`545257c0 fffff806`54831f79 : ffff888e`00000000 ffff888e`8ccdf070 ffff888e`8ccdf070 00000000`00000000 : rdyboost!SmdDispatchDeviceControl+0x12a
ffff848c`54525820 fffff806`54de95e5 : ffff848c`54525b80 ffff888e`8ccdf070 00000000`00000001 ffff888e`99e70bb0 : nt!IofCallDriver+0x59
ffff848c`54525860 fffff806`54de93f0 : ffff888e`00000000 00000000`00000000 ffff888e`99e70bb0 ffff848c`54525b80 : nt!IopSynchronousServiceTail+0x1a5
ffff848c`54525900 fffff806`54de87c6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffff848c`54525a20 fffff806`549d2d18 : 00000000`000003d0 ffff888e`967f86b0 ffffffff`ff8545ac 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
ffff848c`54525a90 00007ffd`fccbc1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000f3`19a7cff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`fccbc1a4


THREAD_SHA1_HASH_MOD_FUNC:  ade035d9fa1aac25168c14438334e7385bdaf6b4

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  9545dd7c0bb7a3446b27abd542da4a0642e3ebb5

THREAD_SHA1_HASH_MOD:  b1d4afcedc5935b809e8cb8df2ad14dcf61482cc

FOLLOWUP_IP:
rdyboost!SmHpBufferProtectEx+b3a1
fffff806`5975c785 cc              int     3

FAULT_INSTR_CODE:  d38b4ccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  rdyboost!SmHpBufferProtectEx+b3a1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rdyboost

IMAGE_NAME:  rdyboost.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b3a1

FAILURE_BUCKET_ID:  0x1C7_0_rdyboost!SmHpBufferProtectEx

BUCKET_ID:  0x1C7_0_rdyboost!SmHpBufferProtectEx

PRIMARY_PROBLEM_CLASS:  0x1C7_0_rdyboost!SmHpBufferProtectEx

TARGET_TIME:  2020-01-01T13:43:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2355

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1c7_0_rdyboost!smhpbufferprotectex

FAILURE_ID_HASH:  {e4df3e54-cb2b-19a5-89db-02ffa9120592}

Followup:     MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000030, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  5222

BIOS_DATE:  10/14/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  TUF B350M-PLUS GAMING

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  2

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 30

TRAP_FRAME:  0000000000000000 -- (.trap 0x0)

EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x139

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  01-01-2020 22:53:42.0624

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff805333c9f5b to fffff805333c14e0

STACK_TEXT:
ffffa808`004fa818 fffff805`333c9f5b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffa808`004fa820 fffff805`36a03a37 : ffff8302`b81d35b0 ffffa808`004fab38 00000000`00001000 ffffc20a`00040000 : nt!guard_icall_bugcheck+0x1b
ffffa808`004fa850 fffff805`36a03022 : ffffa808`004fb4b0 00000000`00000000 ffffa808`004faa80 00000000`00000004 : Ntfs!ReadIndexBuffer+0x517
ffffa808`004fa900 fffff805`369e7a62 : 00000000`00000000 ffffae8f`47aa4578 ffff8302`baa16180 00000000`00000001 : Ntfs!FindFirstIndexEntry+0x182
ffffa808`004fa9c0 fffff805`369e6f09 : 00000000`00000038 00000000`00000038 ffffa808`004faf40 00000000`00000010 : Ntfs!NtfsUpdateFileNameInIndex+0x262
ffffa808`004fac40 fffff805`369e693f : 00000000`00000000 00000000`00000000 00000000`00000010 00000000`00000000 : Ntfs!NtfsUpdateFileNameInParent+0x179
ffffa808`004fae20 fffff805`36a1caec : ffffa808`004fb4b0 00000000`00000000 ffffa808`004fb0d0 ffffa808`004fb070 : Ntfs!NtfsUpdateDuplicateInfo+0x18f
ffffa808`004fafc0 fffff805`36a1ab9d : 00000000`00000000 00000000`00000258 00000000`00000000 ffffa808`004fb480 : Ntfs!NtfsCommonCleanup+0x1adc
ffffa808`004fb410 fffff805`33231f79 : ffff8302`c33708b0 fffff805`35ee45a0 ffff8302`c13613f8 ffff8302`c12a4200 : Ntfs!NtfsFsdCleanup+0x1ad
ffffa808`004fb760 fffff805`35ee55de : ffff8302`c1361010 ffffa808`004fb840 ffff8302`c1361010 ffffa808`004fb850 : nt!IofCallDriver+0x59
ffffa808`004fb7a0 fffff805`35ee3f16 : ffffa808`004fb840 00000000`00000001 00000000`00000001 ffff8302`c12a42c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x15e
ffffa808`004fb820 fffff805`33231f79 : ffff8302`c3748960 fffff805`33231e5d ffff8302`b6e73080 fffff805`33860351 : FLTMGR!FltpDispatch+0xb6
ffffa808`004fb880 fffff805`337e42b8 : 00000000`00000000 ffff8302`c3748960 00000000`00000000 ffff8302`c1361010 : nt!IofCallDriver+0x59
ffffa808`004fb8c0 fffff805`337ec408 : 00000000`00000000 00000000`00000001 ffff8302`00000000 00000000`00007ffe : nt!IopCloseFile+0x188
ffffa808`004fb950 fffff805`337f174e : 00000000`00000234 00000013`bc1ff480 000001c0`67a2d440 000001c0`000000dc : nt!ObCloseHandleTableEntry+0x278
ffffa808`004fba90 fffff805`333d2d18 : ffff8302`c12e3080 000001c0`67b02de8 ffffa808`004fbb80 00000000`00000000 : nt!NtClose+0xde
ffffa808`004fbb00 00007ffb`ec47c2a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000013`bc1ff3c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`ec47c2a4


THREAD_SHA1_HASH_MOD_FUNC:  b97645537eaa82deef66548b30b0909c4ab321e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  949b9fb21efa6fdbef598dc78b2f5db8b1e62940

THREAD_SHA1_HASH_MOD:  5b8c895baef0e5f7f654f3b184b1b65282436b44

FOLLOWUP_IP:
nt!guard_icall_bugcheck+1b
fffff805`333c9f5b 90              nop

FAULT_INSTR_CODE:  ccccc390

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!guard_icall_bugcheck+1b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  12dcb470

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

PRIMARY_PROBLEM_CLASS:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

TARGET_TIME:  2020-01-01T13:41:15.000Z

OSBUILD:  18362

OSSERVICEPACK:  535

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1980-01-11 18:53:20

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5d90

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_0_legacy_gs_violation_nt!guard_icall_bugcheck

FAILURE_ID_HASH:  {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}

Followup:     MachineOwner
---------
Google Chrome'da gezerkende hay aksi hatası ve Chrome'un kapanması gibi sorunlar alıyodum şu anlık gözükmüyor,eğer işe yaramış ise büyük teşekkür borçluyum size.
@MayCrasH
 
Son düzenleme:
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı