Sürekli mavi ekran hataları

  • Konuyu başlatan Skyrx
  • Başlangıç Tarihi
  • Mesaj 76
  • Görüntüleme 4B

Skyrx

Kilopat
Katılım
18 Kasım 2015
Mesajlar
98
Daha fazla  
Cinsiyet
Erkek
Yeni bilgisayarda sürekli mavi ekran hatası yiyorum. Temiz format attım ama genede aynı yardımcı olabilecek var mı?
 
Dosyaları paylaşın, yardımcı olalım.
 
Sistem özellikleriniz nedir hocam? Ayrıca minidump dosyalarınızı paylaşırsanız, arkadaşlar yardımcı olacaktır.

 
Sistem açılırken mavi ekran hatası alıyorsanız güvenli moda giriş yapıp DMP dosyalarınızı paylaşın.


 
Memtest86 ile bellek testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Ağ kartı sürücünüzü güncelleyin.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff858d929102a0, Virtual address for the attempted execute.
Arg2: 8a000002016009e3, PTE contents.
Arg3: fffff805232714a0, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'msquic' and 'dump_storpor' overlap

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xFC

PROCESS_NAME:  MicrosoftEdgeC

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF80523271FB0

TRAP_FRAME:  fffff805232714a0 -- (.trap 0xfffff805232714a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff858d95f342d0
rdx=ffff858d952acd60 rsi=0000000000000000 rdi=0000000000000000
rip=ffff858d929102a0 rsp=fffff80523271630 rbp=0000000000000000
 r8=ffff858d952acd60  r9=0000000000000001 r10=fffff80522818a30
r11=ffff858d95787c70 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffff858d`929102a0 0000            add     byte ptr [rax],al ds:00000000`00000000=00
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8051e88c562 to fffff8051e7dda20

STACK_TEXT: 
fffff805`23271268 fffff805`1e88c562 : 00000000`000000fc ffff858d`929102a0 8a000002`016009e3 fffff805`232714a0 : nt!KeBugCheckEx
fffff805`23271270 fffff805`1e887489 : 00000000`00000011 00000000`00000003 00000000`00000000 fffff805`232713c0 : nt!MiCheckSystemNxFault+0x145a06
fffff805`232712b0 fffff805`1e612dcf : 00000000`00000000 00000000`00000011 fffff805`23271520 00000000`00000000 : nt!MiRaisedIrqlFault+0x14bc35
fffff805`23271300 fffff805`1e7ebb1e : 00000000`00000000 00000000`00000005 ffff858d`95f342d0 ffff858d`95f342d0 : nt!MmAccessFault+0x4ef
fffff805`232714a0 ffff858d`929102a0 : ffff858d`95f342d0 00000000`00000000 fffff805`232716b9 ffff858d`00000000 : nt!KiPageFault+0x35e
fffff805`23271630 ffff858d`95f342d0 : 00000000`00000000 fffff805`232716b9 ffff858d`00000000 fffff805`229801b0 : 0xffff858d`929102a0
fffff805`23271638 00000000`00000000 : fffff805`232716b9 ffff858d`00000000 fffff805`229801b0 fffff805`228046ae : 0xffff858d`95f342d0


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32k
    ffff819ed7b471ad - win32k!NtUserPeekMessage+29
    [ 00:90 ]
    ffff819ed7b471cc-ffff819ed7b471d1  6 bytes - win32k!NtUserPerMonitorDPIPhysicalToLogicalPoint+10 (+0x1f)
    [ ff 15 8e d7 06 00:e8 cf 30 09 00 90 ]
    ffff819ed7b471f0-ffff819ed7b471f5  6 bytes - win32k!NtUserPhysicalToLogicalDpiPointForWindow+10 (+0x24)
    [ ff 15 6a d7 06 00:e8 ab 30 09 00 90 ]
    ffff819ed7b47214-ffff819ed7b47219  6 bytes - win32k!NtUserPhysicalToLogicalPoint+10 (+0x24)
    [ ff 15 46 d7 06 00:e8 87 30 09 00 90 ]
    ffff819ed7b47238-ffff819ed7b4723d  6 bytes - win32k!NtUserPostMessage+10 (+0x24)
    [ ff 15 22 d7 06 00:e8 63 30 09 00 90 ]
    ffff819ed7b4725c-ffff819ed7b47261  6 bytes - win32k!NtUserPostThreadMessage+10 (+0x24)
    [ ff 15 fe d6 06 00:e8 3f 30 09 00 90 ]
    ffff819ed7b47280-ffff819ed7b47285  6 bytes - win32k!NtUserPrintWindow+10 (+0x24)
    [ ff 15 da d6 06 00:e8 1b 30 09 00 90 ]
    ffff819ed7b472a4-ffff819ed7b472a9  6 bytes - win32k!NtUserProcessConnect+10 (+0x24)
    [ ff 15 b6 d6 06 00:e8 f7 2f 09 00 90 ]
43 errors : !win32k (ffff819ed7b471ad-ffff819ed7b472a9)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff978334d43ae0, Virtual address for the attempted execute.
Arg2: 8a000002018009e3, PTE contents.
Arg3: fffff8007326a260, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'dump_dumpfve' and 'dump_storpor' overlap

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xFC

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF80073271FB0

TRAP_FRAME:  fffff8007326a260 -- (.trap 0xfffff8007326a260)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000000f rbx=0000000000000000 rcx=ffff9783346da080
rdx=ffff9783346da030 rsi=0000000000000000 rdi=0000000000000000
rip=ffff978334d43ae0 rsp=fffff8007326a3f0 rbp=ffff9783371a4640
 r8=0000000000000008  r9=0000000000000001 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ffff9783`34d43ae0 a0592c378397fffff0 mov   al,byte ptr [F0FFFF9783372C59h] ds:f0ffff97`83372c59=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8006cc8c562 to fffff8006cbdda20

STACK_TEXT: 
fffff800`7326a028 fffff800`6cc8c562 : 00000000`000000fc ffff9783`34d43ae0 8a000002`018009e3 fffff800`7326a260 : nt!KeBugCheckEx
fffff800`7326a030 fffff800`6cc87489 : 00000000`00000011 00000000`00000003 00000000`00000000 fffff800`7326a180 : nt!MiCheckSystemNxFault+0x145a06
fffff800`7326a070 fffff800`6ca12dcf : 00000000`00000000 00000000`00000011 fffff800`7326a2e0 00000000`00000000 : nt!MiRaisedIrqlFault+0x14bc35
fffff800`7326a0c0 fffff800`6cbebb1e : ffff1825`01b71264 00000000`00000000 fffff800`7326a478 00000000`00000000 : nt!MmAccessFault+0x4ef
fffff800`7326a260 ffff9783`34d43ae0 : 00000000`00000001 fffff800`00000008 fffff800`73260800 00000000`00000008 : nt!KiPageFault+0x35e
fffff800`7326a3f0 00000000`00000001 : fffff800`00000008 fffff800`73260800 00000000`00000008 00000000`00000000 : 0xffff9783`34d43ae0
fffff800`7326a3f8 fffff800`00000008 : fffff800`73260800 00000000`00000008 00000000`00000000 00000000`00000000 : 0x1
fffff800`7326a400 fffff800`73260800 : 00000000`00000008 00000000`00000000 00000000`00000000 00000001`00000000 : 0xfffff800`00000008
fffff800`7326a408 00000000`00000008 : 00000000`00000000 00000000`00000000 00000001`00000000 ffff9783`34faeb40 : 0xfffff800`73260800
fffff800`7326a410 00000000`00000000 : 00000000`00000000 00000001`00000000 ffff9783`34faeb40 ffff9783`34d43010 : 0x8


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8006cb84f1e-fffff8006cb84f21  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:00 34 68 d0 ]
    fffff8006cbdf598-fffff8006cbdf599  2 bytes - nt!KiInterruptDispatch+b8 (+0x5a67a)
    [ 48 ff:4c 8b ]
    fffff8006cbdf59f-fffff8006cbdf5a2  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 7c 4e 64 ]
    fffff8006cc87492-fffff8006cc87493  2 bytes - nt!MiRaisedIrqlFault+14bc3e (+0xa7ef3)
    [ 80 f6:00 d0 ]
    fffff8006cc874a4-fffff8006cc874a5  2 bytes - nt!MiRaisedIrqlFault+14bc50 (+0x12)
    [ ff f6:7f d0 ]
14 errors : !nt (fffff8006cb84f1e-fffff8006cc874a5)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80220d494d5, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 000000000000000a

CURRENT_IRQL:  2

FAULTING_IP:
tcpip!IppPacketizeDatagrams+235
fffff802`20d494d5 f6410a05        test    byte ptr [rcx+0Ah],5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF80221671FB0

TRAP_FRAME:  fffff80221668820 -- (.trap 0xfffff80221668820)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000c0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80220d494d5 rsp=fffff802216689b0 rbp=fffff80221668a79
 r8=0000000000000000  r9=0000000000000000 r10=ffffe78f0a0ce728
r11=ffffe78f0a0ce83c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
tcpip!IppPacketizeDatagrams+0x235:
fffff802`20d494d5 f6410a05        test    byte ptr [rcx+0Ah],5 ds:00000000`0000000a=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8021b5ef929 to fffff8021b5dda20

STACK_TEXT: 
fffff802`216686d8 fffff802`1b5ef929 : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff802`216686e0 fffff802`1b5ebc29 : ffffe78f`095bc010 ffffe78f`095bc010 fffff802`21668840 ffffe78f`067f8010 : nt!KiBugCheckDispatch+0x69
fffff802`21668820 fffff802`20d494d5 : ffffe78f`061498e8 00000000`00000000 00000000`00000000 00000000`0000bf8e : nt!KiPageFault+0x469
fffff802`216689b0 fffff802`20d481d8 : ffffe78f`061499c8 00000000`00000007 00000000`0000ff00 ffffe78f`061498e8 : tcpip!IppPacketizeDatagrams+0x235
fffff802`21668ae0 fffff802`20d47d20 : 00000000`00000100 00000000`0000ffff fffff802`20f0a230 ffffe78f`095bc010 : tcpip!IppSendDatagramsCommon+0x498
fffff802`21668c60 fffff802`20d4d21c : ffffe78f`09df5a20 fffff802`21668da0 00000000`00000030 ffffe78f`0a0ce83c : tcpip!IpNlpSendDatagrams+0x40
fffff802`21668ca0 fffff802`20d63a21 : ffffe78f`093e1670 ffffe78f`09df5a20 fffff802`216691d0 ffffe78f`0616b000 : tcpip!TcpTcbHeaderSend+0x6ec
fffff802`21668f50 fffff802`20d5052e : 00000000`00000000 fffff802`20d48204 ffffe78f`061499c8 00000000`00000007 : tcpip!TcpTcbCarefulDatagram+0x18d1
fffff802`216693a0 fffff802`20d4f9c4 : ffffe78f`0616b000 ffffe78f`0616b000 00000000`06c180c0 ffffe78f`06108e70 : tcpip!TcpTcbReceive+0x30e
fffff802`216695f0 fffff802`20d4ed68 : 00000000`00021171 fffff802`20f0fc00 00000000`ddd8fb31 fffff802`20f0a598 : tcpip!TcpMatchReceive+0x204
fffff802`216698a0 fffff802`20d80692 : ffffe78f`03afbae0 00000000`00005000 00000000`00000000 ffffe78f`0616b001 : tcpip!TcpReceive+0x358
fffff802`21669990 fffff802`20d4a6c0 : ffffe78f`06db09f0 00000000`00000000 00000000`00000000 ffffe78f`03a721e0 : tcpip!TcpNlClientReceiveDatagrams+0x22
fffff802`216699d0 fffff802`20d4adfb : 00000000`00000001 00000000`00000000 00000000`00000000 ffffe78f`0616b000 : tcpip!IppProcessDeliverList+0xc0
fffff802`21669ab0 fffff802`20d4747f : fffff802`20f0a230 ffffe78f`061ba8e0 ffffe78f`0616b000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
fffff802`21669bb0 fffff802`20d4713c : ffffe78f`06999240 ffffe78f`06db09f0 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
fffff802`21669cd0 fffff802`20d8764f : ffffe78f`06db09f0 00000000`00000000 fffff802`21669da1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
fffff802`21669d00 fffff802`20d86c4c : 00000000`00000001 ffffe78f`06af3100 fffff802`20d79390 fffff802`2166a0dc : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f
fffff802`21669e00 fffff802`1b4371f8 : ffffe78f`061b0e40 00000000`00000002 fffff802`1bf26600 fffff802`2166a0f8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff802`21669f50 fffff802`1b43716d : fffff802`20d86ad0 fffff802`2166a0f8 ffffe78f`03bfe2a0 fffff802`20ed3e04 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff802`21669fc0 fffff802`20d78f2d : 00000000`00000014 fffff802`20de86f0 ffffe78f`06db0b70 fffff802`2100142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff802`2166a000 fffff802`20d7860d : 00000000`00000001 fffff802`2166a160 ffffe78f`06af3190 fffff802`2166a170 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff802`2166a060 fffff802`20a91eb0 : ffffe78f`064f9921 00000000`00000001 ffffe78f`068d0070 fffff802`2166a470 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff802`2166a310 fffff802`20a91ccb : ffffe78f`0695ca20 fffff802`00000001 fffff802`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff802`2166a3f0 fffff802`20a97ef0 : ffffe78f`06c171a0 ffffe78f`06db0901 ffffe78f`06c171a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff802`2166a470 fffff802`20acdcf3 : ffffe78f`06db09f0 fffff802`2166a541 00000000`00000000 ffffe78f`06e789c0 : ndis!ndisCallReceiveHandler+0x60
fffff802`2166a4c0 fffff802`20a94a94 : 00000000`000021d3 00000000`00000001 ffffe78f`06c171a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff802`2166a590 fffff802`2a4061d8 : ffffe78f`06caf000 ffffe78f`06caf000 00000000`00000000 ffffe78f`06caf5f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff802`2166a620 fffff802`2a3f25a8 : 00000000`00000000 fffff802`1b4ccc01 00000079`00000400 fffff802`2166a798 : rt640x64!MpHandleRecvIntPriVLanJumbo+0x2c4
fffff802`2166a710 fffff802`20a97886 : 00000000`ffffffff ffffe78f`06e18010 ffffe78f`06e6d158 00000000`00000000 : rt640x64!MPHandleMessageInterrupt+0x398
fffff802`2166a780 fffff802`1b43a69e : fffff802`199e2240 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisInterruptDpc+0x196
fffff802`2166a860 fffff802`1b439984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff802`2166a9d0 fffff802`1b5e158e : 00000000`00000000 fffff802`199df180 fffff802`1bf26600 ffffe78f`06240040 : nt!KiRetireDpcList+0x1f4
fffff802`2166ac60 00000000`00000000 : fffff802`2166b000 fffff802`21665000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8021b584f1f-fffff8021b584f21  3 bytes - nt!MiFreeUltraMapping+33
    [ 7d fb f6:7f ff fe ]
3 errors : !nt (fffff8021b584f1f-fffff8021b584f21)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT_LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit_large

FAILURE_ID_HASH:  {31545515-196b-fab5-2300-9ce714226f43}

Followup: memory_corruption
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000dc, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046923a4b3, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000000000

CURRENT_IRQL:  2

FAULTING_IP:
nt!KiExecuteAllDpcs+123
fffff804`6923a4b3 498b06          mov     rax,qword ptr [r14]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF8046EA71FB0

TRAP_FRAME:  fffff8046ea6a6d0 -- (.trap 0xfffff8046ea6a6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046923a4b3 rsp=fffff8046ea6a860 rbp=fffff8046ea6a960
 r8=00000000ffffffed  r9=0000000000000000 r10=0000000000000000
r11=fffff8046ea6ab10 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!KiExecuteAllDpcs+0x123:
fffff804`6923a4b3 498b06          mov     rax,qword ptr [r14] ds:00000000`00000000=0000000000000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff804693ef929 to fffff804693dda20

STACK_TEXT: 
fffff804`6ea6a588 fffff804`693ef929 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`000000dc : nt!KeBugCheckEx
fffff804`6ea6a590 fffff804`693ebc29 : 00000000`00000000 fffff804`6def6791 ffff928a`7ddca438 fffff804`6ea6a750 : nt!KiBugCheckDispatch+0x69
fffff804`6ea6a6d0 fffff804`6923a4b3 : fffff804`66dd2240 ffff928a`78e30000 fffff804`00000000 00000000`00000002 : nt!KiPageFault+0x469
fffff804`6ea6a860 fffff804`69239984 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x123
fffff804`6ea6a9d0 fffff804`693e158e : 00000000`00000000 fffff804`66dcf180 fffff804`69d26600 ffff928a`7ac20040 : nt!KiRetireDpcList+0x1f4
fffff804`6ea6ac60 00000000`00000000 : fffff804`6ea6b000 fffff804`6ea65000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80469384f1e-fffff80469384f21  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:c0 a0 41 83 ]
    fffff804693df598-fffff804693df599  2 bytes - nt!KiInterruptDispatch+b8 (+0x5a67a)
    [ 48 ff:4c 8b ]
    fffff804693df59f-fffff804693df5a2  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 7c 4e 64 ]
10 errors : !nt (fffff80469384f1e-fffff804693df5a2)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9f810485f010, Virtual address for the attempted execute.
Arg2: 8a000002016009e3, PTE contents.
Arg3: fffff8031306a2e0, (reserved)
Arg4: 0000000000000003, (reserved)

Debugging Details:
------------------


OVERLAPPED_MODULE: Address regions for 'wanarp' and 'dump_storpor' overlap

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0xFC

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

DPC_STACK_BASE:  FFFFF80313071FB0

TRAP_FRAME:  fffff8031306a2e0 -- (.trap 0xfffff8031306a2e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff9f810485f010 rsp=fffff8031306a470 rbp=fffff80312a811a0
 r8=fffff80312573048  r9=0000000000000000 r10=0000000000000001
r11=ffff9f8102cf9a41 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffff9f81`0485f010 30aa911203f8    xor     byte ptr [rdx-7FCED6Fh],ch ds:ffffffff`f8031291=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8031048c562 to fffff803103dda20

STACK_TEXT: 
fffff803`1306a0a8 fffff803`1048c562 : 00000000`000000fc ffff9f81`0485f010 8a000002`016009e3 fffff803`1306a2e0 : nt!KeBugCheckEx
fffff803`1306a0b0 fffff803`10487489 : 00000000`00000011 00000000`00000003 00000000`00000000 fffff803`1306a200 : nt!MiCheckSystemNxFault+0x145a06
fffff803`1306a0f0 fffff803`10212dcf : fffff803`1c981168 00000000`00000011 fffff803`1306a360 00000000`00000000 : nt!MiRaisedIrqlFault+0x14bc35
fffff803`1306a140 fffff803`103ebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x4ef
fffff803`1306a2e0 ffff9f81`0485f010 : 00000000`00000001 ffff9f81`04640780 ffff9f81`0484b010 00000000`00000001 : nt!KiPageFault+0x35e
fffff803`1306a470 00000000`00000001 : ffff9f81`04640780 ffff9f81`0484b010 00000000`00000001 ffff9f81`00000001 : 0xffff9f81`0485f010
fffff803`1306a478 ffff9f81`04640780 : ffff9f81`0484b010 00000000`00000001 ffff9f81`00000001 ffff9f81`047af240 : 0x1
fffff803`1306a480 ffff9f81`0484b010 : 00000000`00000001 ffff9f81`00000001 ffff9f81`047af240 00000000`00000000 : 0xffff9f81`04640780
fffff803`1306a488 00000000`00000001 : ffff9f81`00000001 ffff9f81`047af240 00000000`00000000 fffff803`12492b40 : 0xffff9f81`0484b010
fffff803`1306a490 ffff9f81`00000001 : ffff9f81`047af240 00000000`00000000 fffff803`12492b40 ffff9f81`04761c70 : 0x1
fffff803`1306a498 ffff9f81`047af240 : 00000000`00000000 fffff803`12492b40 ffff9f81`04761c70 fffff803`124cdc5c : 0xffff9f81`00000001
fffff803`1306a4a0 00000000`00000000 : fffff803`12492b40 ffff9f81`04761c70 fffff803`124cdc5c ffff9f81`048519c0 : 0xffff9f81`047af240


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff80310384f1e-fffff80310384f21  4 bytes - nt!MiFreeUltraMapping+32
    [ a0 7d fb f6:c0 bd 7b f7 ]
    fffff803103df598-fffff803103df599  2 bytes - nt!KiInterruptDispatch+b8 (+0x5a67a)
    [ 48 ff:4c 8b ]
    fffff803103df59f-fffff803103df5a2  4 bytes - nt!KiInterruptDispatch+bf (+0x07)
    [ 0f 1f 44 00:e8 7c 4e 64 ]
    fffff80310487492-fffff80310487493  2 bytes - nt!MiRaisedIrqlFault+14bc3e (+0xa7ef3)
    [ 80 f6:00 f7 ]
    fffff803104874a4-fffff803104874a5  2 bytes - nt!MiRaisedIrqlFault+14bc50 (+0x12)
    [ ff f6:7f f7 ]
14 errors : !nt (fffff80310384f1e-fffff803104874a5)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
 
Son düzenleme:

Yeni konular

Geri
Yukarı