Çözüldü System Service Exception Mavi Ekran Hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Burak Temelkaya

Kilopat
Katılım
13 Ekim 2016
Mesajlar
1.157
Makaleler
1
Çözümler
5
Yer
İstanbul
Daha fazla  
Sistem Özellikleri
İŞLEMCİ: AMD Ryzen 5 7600
İŞLEMCİ SOĞUTUCU: Cooler Master Hyper 212 Spectrum Rainbow LED 120mm Hava Soğutucu
ANAKART: MSI Pro B650M-A WiFi AM5
EKRAN KARTI: MSI Radeon RX 6800 Gaming Z Trio 16G V1 16GB
RAM: Kingston Fury Beast 16 + 8 GB 6000MHz CL40 DDR5 Ram
SSD: Samsung 980 1TB + Kingston KC3000 2TB
KASA: VENTO Neptune VG07F RGB Siyah Mid Tower Gaming Kasa
PSU: FSP Hyper Pro H3-650 650W 80+ Bronze
Cinsiyet
Erkek
Meslek
Yazılım Geliştirici
Başka konularda gördüğüm kadarıyla MiniDump dosyalarını istiyorsunuz, dosyalarımı paylaşıyorum. Neyden dolayı mavi ekran hatası verdiğini bulursanız sevinirim.
 
Çözüm
Bellekleriniz arızalı galiba Memtest86 testi yapın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff94, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff807106565f6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.356 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffffffff94

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff807106565f6

WRITE_ADDRESS: fffff807057723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffff94

CURRENT_IRQL:  2

FAULTING_IP:
ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+86
fffff807`106565f6 00488b          add     byte ptr [rax-75h],cl

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

BAD_PAGES_DETECTED: 1

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:18:02.0615

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff900a0e284f0 -- (.trap 0xfffff900a0e284f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000009 rbx=0000000000000000 rcx=0000657bbb033f98
rdx=ffff9a8447825010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807106565f6 rsp=fffff900a0e28680 rbp=0000000000000009
 r8=ffff9a844ebd5170  r9=0000657bb87fb958 r10=0000fffff8071065
r11=ffffacf9fc200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+0x86:
fffff807`106565f6 00488b          add     byte ptr [rax-75h],cl ds:ffffffff`ffffff94=??
Resetting default scope

MISALIGNED_IP:
ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+86
fffff807`106565f6 00488b          add     byte ptr [rax-75h],cl

LAST_CONTROL_TRANSFER:  from fffff807053d2ee9 to fffff807053c10a0

STACK_TEXT: 
fffff900`a0e283a8 fffff807`053d2ee9 : 00000000`0000000a ffffffff`ffffff94 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff900`a0e283b0 fffff807`053cf22b : 00000000`00001001 00000000`00000fff 00000000`00000d4e 00000000`00000030 : nt!KiBugCheckDispatch+0x69
fffff900`a0e284f0 fffff807`106565f6 : ffff9a84`581207d0 ffff9a84`4abe8290 00000000`00000000 ffff9a84`47743c70 : nt!KiPageFault+0x46b
fffff900`a0e28680 fffff807`10655b95 : 00000000`00000000 00000000`00000009 ffff9a84`4ebd5170 00000000`00000000 : ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+0x86
fffff900`a0e28730 fffff807`10646038 : 0000657b`bb033f98 ffff9a84`47825010 ffff9a84`47825488 0000657b`bb033f98 : ucx01000!Urb_USBPORTStyle_ProcessURB+0x361
fffff900`a0e28790 fffff807`075aacad : ffff9a84`47825010 00000000`00000000 00000000`0000000f 00000000`00000168 : ucx01000!RootHub_Pdo_EvtInternalDeviceControlIrpPreprocessCallback+0x278
fffff900`a0e28820 fffff807`05231f39 : ffff9a84`47825010 ffff9a84`470c5e00 00000000`00220003 ffff9a84`470c5e00 : Wdf01000!FxDevice::DispatchWithLock+0x1ed [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffff900`a0e28880 fffff807`076f14ad : ffff9a84`470c5e00 ffff9a84`47825010 ffff9a84`41c08480 fffff807`00000030 : nt!IofCallDriver+0x59
fffff900`a0e288c0 fffff807`076f10d7 : ffff9a84`440c0010 00000000`00000007 ffff9a84`47825488 00000000`00000030 : ACPI!ACPIIrpDispatchDeviceControl+0xad
fffff900`a0e28900 fffff807`05231f39 : 00000000`00000007 00000000`00000000 fffff900`a0e28a29 ffff9a84`443b2ba0 : ACPI!ACPIDispatchIrp+0xc7
fffff900`a0e28980 fffff807`12577314 : 00000000`000000d0 00000000`00000000 00000000`00000001 ffff9a84`47806878 : nt!IofCallDriver+0x59
fffff900`a0e289c0 fffff807`075aacad : ffff9a84`47825010 ffff9a84`47825010 ffff9a84`47825010 ffff9a84`44fe7750 : UsbHub3!HUBPDO_EvtDeviceWdmIrpPreprocess+0x11c4
fffff900`a0e28a90 fffff807`05231f39 : ffff9a84`47825010 ffff9a84`476fbe20 ffff9a84`4ebd5170 ffff9a84`476fbe20 : Wdf01000!FxDevice::DispatchWithLock+0x1ed [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffff900`a0e28af0 fffff807`076f14ad : ffff9a84`476fbe20 ffff9a84`47825010 00000000`00066835 00000000`00000040 : nt!IofCallDriver+0x59
fffff900`a0e28b30 fffff807`076f10d7 : ffff9a84`440c1010 00000000`00000007 ffff9a84`478254d0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0xad
fffff900`a0e28b70 fffff807`05231f39 : 00000000`00000007 ffff9a84`47825010 fffff900`a0e28cf9 00000000`00000001 : ACPI!ACPIDispatchIrp+0xc7
fffff900`a0e28bf0 fffff807`108f1dc4 : 00000000`00000000 ffff9a84`47825010 fffff900`a0e28cf9 00000000`00000001 : nt!IofCallDriver+0x59
fffff900`a0e28c30 fffff807`108f19b6 : 00000000`00000009 00000000`00000200 ffff9a84`47806878 fffff807`0556e06d : usbccgp!DispatchPdoUrb+0x2b4
fffff900`a0e28d60 fffff807`108f12a8 : ffff9a84`47825010 ffff9a84`47809680 ffff9a84`47809688 00000000`00000000 : usbccgp!DispatchPdoInternalDeviceControl+0x1c6
fffff900`a0e28dd0 fffff807`05231f39 : ffff9a84`47809530 00000000`00000001 00000000`00000000 fffff900`00000000 : usbccgp!USBC_Dispatch+0x298
fffff900`a0e28ea0 fffff807`109313d0 : 00000000`00000000 fffff900`a0e28fe0 00000000`00000000 fffff807`00000000 : nt!IofCallDriver+0x59
fffff900`a0e28ee0 fffff807`109595de : ffff9a84`00000000 ffff9a84`4780b6a0 ffff9a84`4780b6a0 fffff807`10974000 : hidusb!HumInternalIoctl+0x3c0
fffff900`a0e291d0 fffff807`1095a9ec : ffff9a84`4780b6a0 fffff900`a0e29399 fffff807`1096e1e0 00000000`00000009 : HIDCLASS!HidpSubmitInterruptRead+0x1ae
fffff900`a0e29250 fffff807`05247799 : ffff9a84`47825010 ffff9a84`47825010 fffff900`a0e29301 ffff9a84`47825400 : HIDCLASS!HidpInterruptReadComplete+0x57c
fffff900`a0e292f0 fffff807`05247667 : ffff9a84`4bb3db20 fffff807`105e8f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x119
fffff900`a0e29400 fffff807`075a83fd : 00000000`00000000 ffff9a84`4abe8290 00000000`00000002 fffff807`105d9700 : nt!IofCompleteRequest+0x17
fffff900`a0e29430 fffff807`075a7ecb : ffff9a84`4abe8402 fffff900`a0e29551 ffff9a84`47825010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x22d [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff900`a0e294c0 fffff807`105e7e7f : 00000000`ffffff02 ffff9a84`4abe8290 ffff9a84`47804a80 ffff9a84`47804a80 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff900`a0e29520 fffff807`105e5cf4 : ffff9a84`4abe8430 ffff9a84`47804ae0 ffff9a84`4abe84c0 fffff900`a0e297f8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x19b
fffff900`a0e29580 fffff807`105e4460 : ffffacf9`fc200000 fffff807`05301946 00000000`00000000 fffff807`073b208d : USBXHCI!Bulk_ProcessTransferEventWithED1+0x464
fffff900`a0e29640 fffff807`105d98d2 : 00000000`00000000 00000000`00000000 00000000`018001c0 fffff900`a0e29770 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff900`a0e29670 fffff807`105cba4f : 00000000`0000002b fffff900`a0e29761 ffff9a84`4706d920 fffff807`105b34b9 : USBXHCI!TR_TransferEventHandler+0x16
fffff900`a0e296a0 fffff807`105ec2be : fffff900`a0e297f8 fffff900`a0e297c8 00000000`00000000 fffff900`a0e297d0 : USBXHCI!Endpoint_TransferEventHandler+0x167
fffff900`a0e29720 fffff807`105cea3c : ffff9a84`44a6d620 fffff900`a0e29819 00000000`00000000 ffff9a84`470ae1a0 : USBXHCI!UsbDevice_TransferEventHandler+0xa6
fffff900`a0e29780 fffff807`105cf55c : 00000000`00000000 00000000`00000001 00000000`00000000 ffff9a84`44a6d420 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578
fffff900`a0e29880 fffff807`075a26ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff900`a0e298b0 fffff807`0526b065 : ffffbd01`824e7180 00000000`00000001 fffff900`a0e298a8 fffff807`0522280c : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9c [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff900`a0e298f0 fffff807`0526a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff900`a0e29a30 fffff807`053c4be4 : ffffffff`00000000 ffffbd01`824e7180 ffffbd01`824f8240 ffff9a84`4d5c6080 : nt!KiRetireDpcList+0x1ef
fffff900`a0e29c60 00000000`00000000 : fffff900`a0e2a000 fffff900`a0e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


CHKIMG_EXTENSION: !chkimg -lo 50 -d !ucx01000
    fffff8071065666f - ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+ff
    [ 06:86 ]
1 error : !ucx01000 (fffff8071065666f)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-09-19T19:34:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.356

ANALYSIS_SESSION_ELAPSED_TIME:  f275

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

 *** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 00000000000000cc, Address of the instruction which caused the bugcheck
Arg3: fffff6053f052cf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.449 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: cc

BUGCHECK_P3: fffff6053f052cf0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
00000000`000000cc ??              ???

CONTEXT:  fffff6053f052cf0 -- (.cxr 0xfffff6053f052cf0)
rax=0000000000000001 rbx=0000000000000001 rcx=0000000000040010
rdx=0000000000040010 rsi=ffff9bbb855d67e0 rdi=ffff9bbb84379010
rip=00000000000000cc rsp=fffff6053f0536e8 rbp=fffff6053f0537f0
 r8=ffff9bbb86a0c010  r9=00000000000000de r10=fffff8075b9018c0
r11=ffff9bbb84379010 r12=ffff9bbb844d2b00 r13=00000000000003bc
r14=00000000000001c8 r15=ffff9bbb808e0000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
00000000`000000cc ??              ???
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  steamwebhelper

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:19:05.0904

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from ffff9b9d3705867c to 00000000000000cc

STACK_TEXT: 
fffff605`3f0536e8 ffff9b9d`3705867c : ffff9bbb`844d7000 ffff9bbb`80911000 00000000`00000000 00000000`00000076 : 0xcc
fffff605`3f0536f0 ffff9b9d`371004fb : 0000001d`e90feaf0 00000000`00000001 fffff605`3f053a99 ffff9b9d`370cb94e : win32kfull!NtGdiBitBltInternal+0xd4c
fffff605`3f053a20 fffff807`5b9d2d18 : 3f800000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiBitBlt+0x5b
fffff605`3f053a90 00007ffd`47ef11a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001d`e90fe928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`47ef11a4


THREAD_SHA1_HASH_MOD_FUNC:  670d79681f0fd9a3e0080ae7550a6d0a34550263

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0122063a3e44b71936a1443fe1e5c2791c010530

THREAD_SHA1_HASH_MOD:  136701d13e4a364d33459c1674fd03c4bb31651c

FOLLOWUP_IP:
win32kfull!NtGdiBitBltInternal+d4c
ffff9b9d`3705867c 85c0            test    eax,eax

FAULT_INSTR_CODE:  840fc085

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  win32kfull!NtGdiBitBltInternal+d4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  3d49b616

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .cxr 0xfffff6053f052cf0 ; kb

BUCKET_ID_FUNC_OFFSET:  d4c

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!NtGdiBitBltInternal

BUCKET_ID:  0x3B_c0000005_win32kfull!NtGdiBitBltInternal

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_win32kfull!NtGdiBitBltInternal

TARGET_TIME:  2019-10-26T20:19:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  449

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-01-12 16:55:39

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.449

ANALYSIS_SESSION_ELAPSED_TIME:  17ce

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_win32kfull!ntgdibitbltinternal

FAILURE_ID_HASH:  {098b7638-fc20-2636-3ef7-7da30132449d}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8016d98b5af, Address of the instruction which caused the bugcheck
Arg3: ffffc98ec94985b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.418 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8016d98b5af

BUGCHECK_P3: ffffc98ec94985b0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+51f
fffff801`6d98b5af 698bcd488b4078e8e58c imul ecx,dword ptr [rbx+408B48CDh],8CE5E878h

CONTEXT:  ffffc98ec94985b0 -- (.cxr 0xffffc98ec94985b0)
rax=fffff8016d9e7780 rbx=0000000000000000 rcx=ffffcc02082f4cb0
rdx=ffffcc02082f4cb8 rsi=ffffcc01ff869460 rdi=ffffc98ec9499080
rip=fffff8016d98b5af rsp=ffffc98ec9498fa0 rbp=ffffc98ec94990a0
 r8=ffffcc02072bc0e0  r9=ffffc98ec9498fe0 r10=0000fffff8016d99
r11=ffffd5f9aa600000 r12=0000000000000004 r13=ffffcc02082f4cb0
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+0x51f:
fffff801`6d98b5af 698bcd488b4078e8e58c imul ecx,dword ptr [rbx+408B48CDh],8CE5E878h ds:002b:00000000`408b48cd=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:19:00.0358

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8016d98afea to fffff8016d98b5af

STACK_TEXT: 
ffffc98e`c9498fa0 fffff801`6d98afea : ffffcc02`039bda60 ffffcc01`00000000 ffffcc02`039bda60 00000000`00000000 : dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+0x51f
ffffc98e`c94998d0 fffff801`6d99a429 : 00000000`00000000 ffffa10e`71b2c3e0 ffffcc01`ff869460 fffff801`6d98ffe3 : dxgkrnl!CTokenManager::ProcessTokens+0x18a
ffffc98e`c9499990 fffff801`6d98ff1c : 00000000`00000000 ffffc98e`c9499b80 ffffcc01`ff869460 fffff801`5f8177d6 : dxgkrnl!CTokenManager::TokenThread+0x79
ffffc98e`c94999e0 fffff801`5f3d2b18 : ffffa10e`7e391080 00000000`00000000 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1cc
ffffc98e`c9499b00 00007ffd`19f87de4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000032`aa3ffb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`19f87de4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgkrnl
    fffff8016d98b5af - dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+51f
    [ 49:69 ]
1 error : !dxgkrnl (fffff8016d98b5af)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffffc98ec94985b0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-10-20T15:06:49.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.418

ANALYSIS_SESSION_ELAPSED_TIME:  6a26

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8056bc32b99, Address of the instruction which caused the bugcheck
Arg3: ffffd481a8d35930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.329 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff8056bc32b99

BUGCHECK_P3: ffffd481a8d35930

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
nt!ExAllocateHeapPool+4d9
fffff805`6bc32b99 8d              ???

CONTEXT:  ffffd481a8d35930 -- (.cxr 0xffffd481a8d35930)
rax=0000000000000000 rbx=00000000000011c0 rcx=ffffd481a8d0f180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff848fe0a02000
rip=fffff8056bc32b99 rsp=fffff88e612bbc40 rbp=fffff88e612bbd40
 r8=0f0f0f0f0f0f0f0f  r9=0000000000000000 r10=0000000000000039
r11=0101010101010101 r12=0000000000000000 r13=0000000000000000
r14=00000000000011c0 r15=000000004b677844
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExAllocateHeapPool+0x4d9:
fffff805`6bc32b99 8d              ???
Resetting default scope

BUGCHECK_STR:  0x3B_c000001d

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  ImmortalRednec

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:20:26.0494

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  ffffd481a8d34ff8

LAST_CONTROL_TRANSFER:  from fffff8056bf6e06d to fffff8056bc32b99

STACK_TEXT: 
fffff88e`612bbc40 fffff805`6bf6e06d : ffff848f`00000200 00000000`00000000 00000000`00000000 00000000`000011c0 : nt!ExAllocateHeapPool+0x4d9
fffff88e`612bbd80 fffff805`75ce9395 : ffff848f`e7279c90 fffff88e`612bcb80 fffff88e`612bc900 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
fffff88e`612bbdd0 fffff805`75df0267 : fffff88e`612bc100 ffff848f`e7279c90 00000000`08000000 00000000`00000000 : dxgkrnl!operator new+0x31
fffff88e`612bbe00 fffff805`75defe67 : ffff958c`cc6d7de0 fffff88e`612bc900 fffff88e`612bc900 ffff958c`cc6d7de0 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x247
fffff88e`612bc5d0 fffff805`75df063a : fffff805`6bb766c0 fffff805`6bdc7e9f ffff958c`d1b622f0 00000000`0df1ea20 : dxgkrnl!DxgkSubmitCommandInternal+0x557
fffff88e`612bcac0 fffff805`6bdd2918 : ffff848f`eb267080 00000000`040b5000 00000000`00000000 ffff848f`ea7cf660 : dxgkrnl!DxgkSubmitCommand+0x5a
fffff88e`612bcb00 00007ffc`4d0b5a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0df1e958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`4d0b5a44


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8056bc32b99 - nt!ExAllocateHeapPool+4d9
    [ 85:8d ]
1 error : !nt (fffff8056bc32b99)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffffd481a8d35930 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-09-09T21:12:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  329

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2016-04-22 18:00:30

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.329

ANALYSIS_SESSION_ELAPSED_TIME:  4854

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
Bellekleriniz arızalı galiba Memtest86 testi yapın.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff94, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff807106565f6, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.356 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffffffff94

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff807106565f6

WRITE_ADDRESS: fffff807057723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 ffffffffffffff94

CURRENT_IRQL:  2

FAULTING_IP:
ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+86
fffff807`106565f6 00488b          add     byte ptr [rax-75h],cl

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  AV

PROCESS_NAME:  System

BAD_PAGES_DETECTED: 1

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:18:02.0615

ANALYSIS_VERSION: 10.0.18362.1 x86fre

TRAP_FRAME:  fffff900a0e284f0 -- (.trap 0xfffff900a0e284f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000009 rbx=0000000000000000 rcx=0000657bbb033f98
rdx=ffff9a8447825010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807106565f6 rsp=fffff900a0e28680 rbp=0000000000000009
 r8=ffff9a844ebd5170  r9=0000657bb87fb958 r10=0000fffff8071065
r11=ffffacf9fc200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+0x86:
fffff807`106565f6 00488b          add     byte ptr [rax-75h],cl ds:ffffffff`ffffff94=??
Resetting default scope

MISALIGNED_IP:
ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+86
fffff807`106565f6 00488b          add     byte ptr [rax-75h],cl

LAST_CONTROL_TRANSFER:  from fffff807053d2ee9 to fffff807053c10a0

STACK_TEXT: 
fffff900`a0e283a8 fffff807`053d2ee9 : 00000000`0000000a ffffffff`ffffff94 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff900`a0e283b0 fffff807`053cf22b : 00000000`00001001 00000000`00000fff 00000000`00000d4e 00000000`00000030 : nt!KiBugCheckDispatch+0x69
fffff900`a0e284f0 fffff807`106565f6 : ffff9a84`581207d0 ffff9a84`4abe8290 00000000`00000000 ffff9a84`47743c70 : nt!KiPageFault+0x46b
fffff900`a0e28680 fffff807`10655b95 : 00000000`00000000 00000000`00000009 ffff9a84`4ebd5170 00000000`00000000 : ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+0x86
fffff900`a0e28730 fffff807`10646038 : 0000657b`bb033f98 ffff9a84`47825010 ffff9a84`47825488 0000657b`bb033f98 : ucx01000!Urb_USBPORTStyle_ProcessURB+0x361
fffff900`a0e28790 fffff807`075aacad : ffff9a84`47825010 00000000`00000000 00000000`0000000f 00000000`00000168 : ucx01000!RootHub_Pdo_EvtInternalDeviceControlIrpPreprocessCallback+0x278
fffff900`a0e28820 fffff807`05231f39 : ffff9a84`47825010 ffff9a84`470c5e00 00000000`00220003 ffff9a84`470c5e00 : Wdf01000!FxDevice::DispatchWithLock+0x1ed [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffff900`a0e28880 fffff807`076f14ad : ffff9a84`470c5e00 ffff9a84`47825010 ffff9a84`41c08480 fffff807`00000030 : nt!IofCallDriver+0x59
fffff900`a0e288c0 fffff807`076f10d7 : ffff9a84`440c0010 00000000`00000007 ffff9a84`47825488 00000000`00000030 : ACPI!ACPIIrpDispatchDeviceControl+0xad
fffff900`a0e28900 fffff807`05231f39 : 00000000`00000007 00000000`00000000 fffff900`a0e28a29 ffff9a84`443b2ba0 : ACPI!ACPIDispatchIrp+0xc7
fffff900`a0e28980 fffff807`12577314 : 00000000`000000d0 00000000`00000000 00000000`00000001 ffff9a84`47806878 : nt!IofCallDriver+0x59
fffff900`a0e289c0 fffff807`075aacad : ffff9a84`47825010 ffff9a84`47825010 ffff9a84`47825010 ffff9a84`44fe7750 : UsbHub3!HUBPDO_EvtDeviceWdmIrpPreprocess+0x11c4
fffff900`a0e28a90 fffff807`05231f39 : ffff9a84`47825010 ffff9a84`476fbe20 ffff9a84`4ebd5170 ffff9a84`476fbe20 : Wdf01000!FxDevice::DispatchWithLock+0x1ed [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1430]
fffff900`a0e28af0 fffff807`076f14ad : ffff9a84`476fbe20 ffff9a84`47825010 00000000`00066835 00000000`00000040 : nt!IofCallDriver+0x59
fffff900`a0e28b30 fffff807`076f10d7 : ffff9a84`440c1010 00000000`00000007 ffff9a84`478254d0 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0xad
fffff900`a0e28b70 fffff807`05231f39 : 00000000`00000007 ffff9a84`47825010 fffff900`a0e28cf9 00000000`00000001 : ACPI!ACPIDispatchIrp+0xc7
fffff900`a0e28bf0 fffff807`108f1dc4 : 00000000`00000000 ffff9a84`47825010 fffff900`a0e28cf9 00000000`00000001 : nt!IofCallDriver+0x59
fffff900`a0e28c30 fffff807`108f19b6 : 00000000`00000009 00000000`00000200 ffff9a84`47806878 fffff807`0556e06d : usbccgp!DispatchPdoUrb+0x2b4
fffff900`a0e28d60 fffff807`108f12a8 : ffff9a84`47825010 ffff9a84`47809680 ffff9a84`47809688 00000000`00000000 : usbccgp!DispatchPdoInternalDeviceControl+0x1c6
fffff900`a0e28dd0 fffff807`05231f39 : ffff9a84`47809530 00000000`00000001 00000000`00000000 fffff900`00000000 : usbccgp!USBC_Dispatch+0x298
fffff900`a0e28ea0 fffff807`109313d0 : 00000000`00000000 fffff900`a0e28fe0 00000000`00000000 fffff807`00000000 : nt!IofCallDriver+0x59
fffff900`a0e28ee0 fffff807`109595de : ffff9a84`00000000 ffff9a84`4780b6a0 ffff9a84`4780b6a0 fffff807`10974000 : hidusb!HumInternalIoctl+0x3c0
fffff900`a0e291d0 fffff807`1095a9ec : ffff9a84`4780b6a0 fffff900`a0e29399 fffff807`1096e1e0 00000000`00000009 : HIDCLASS!HidpSubmitInterruptRead+0x1ae
fffff900`a0e29250 fffff807`05247799 : ffff9a84`47825010 ffff9a84`47825010 fffff900`a0e29301 ffff9a84`47825400 : HIDCLASS!HidpInterruptReadComplete+0x57c
fffff900`a0e292f0 fffff807`05247667 : ffff9a84`4bb3db20 fffff807`105e8f00 00000000`00000001 00000000`00000001 : nt!IopfCompleteRequest+0x119
fffff900`a0e29400 fffff807`075a83fd : 00000000`00000000 ffff9a84`4abe8290 00000000`00000002 fffff807`105d9700 : nt!IofCompleteRequest+0x17
fffff900`a0e29430 fffff807`075a7ecb : ffff9a84`4abe8402 fffff900`a0e29551 ffff9a84`47825010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x22d [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff900`a0e294c0 fffff807`105e7e7f : 00000000`ffffff02 ffff9a84`4abe8290 ffff9a84`47804a80 ffff9a84`47804a80 : Wdf01000!imp_WdfRequestComplete+0x8b [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff900`a0e29520 fffff807`105e5cf4 : ffff9a84`4abe8430 ffff9a84`47804ae0 ffff9a84`4abe84c0 fffff900`a0e297f8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0x19b
fffff900`a0e29580 fffff807`105e4460 : ffffacf9`fc200000 fffff807`05301946 00000000`00000000 fffff807`073b208d : USBXHCI!Bulk_ProcessTransferEventWithED1+0x464
fffff900`a0e29640 fffff807`105d98d2 : 00000000`00000000 00000000`00000000 00000000`018001c0 fffff900`a0e29770 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff900`a0e29670 fffff807`105cba4f : 00000000`0000002b fffff900`a0e29761 ffff9a84`4706d920 fffff807`105b34b9 : USBXHCI!TR_TransferEventHandler+0x16
fffff900`a0e296a0 fffff807`105ec2be : fffff900`a0e297f8 fffff900`a0e297c8 00000000`00000000 fffff900`a0e297d0 : USBXHCI!Endpoint_TransferEventHandler+0x167
fffff900`a0e29720 fffff807`105cea3c : ffff9a84`44a6d620 fffff900`a0e29819 00000000`00000000 ffff9a84`470ae1a0 : USBXHCI!UsbDevice_TransferEventHandler+0xa6
fffff900`a0e29780 fffff807`105cf55c : 00000000`00000000 00000000`00000001 00000000`00000000 ffff9a84`44a6d420 : USBXHCI!Interrupter_DeferredWorkProcessor+0x578
fffff900`a0e29880 fffff807`075a26ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff900`a0e298b0 fffff807`0526b065 : ffffbd01`824e7180 00000000`00000001 fffff900`a0e298a8 fffff807`0522280c : Wdf01000!FxInterrupt::_InterruptDpcThunk+0x9c [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff900`a0e298f0 fffff807`0526a6bf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x305
fffff900`a0e29a30 fffff807`053c4be4 : ffffffff`00000000 ffffbd01`824e7180 ffffbd01`824f8240 ffff9a84`4d5c6080 : nt!KiRetireDpcList+0x1ef
fffff900`a0e29c60 00000000`00000000 : fffff900`a0e2a000 fffff900`a0e24000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x84


CHKIMG_EXTENSION: !chkimg -lo 50 -d !ucx01000
    fffff8071065666f - ucx01000!UrbHandler_USBPORTStyle_Legacy_BulkOrInterruptTransfer+ff
    [ 06:86 ]
1 error : !ucx01000 (fffff8071065666f)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-09-19T19:34:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  356

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.356

ANALYSIS_SESSION_ELAPSED_TIME:  f275

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

 *** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 00000000000000cc, Address of the instruction which caused the bugcheck
Arg3: fffff6053f052cf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.449 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: cc

BUGCHECK_P3: fffff6053f052cf0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
+0
00000000`000000cc ??              ???

CONTEXT:  fffff6053f052cf0 -- (.cxr 0xfffff6053f052cf0)
rax=0000000000000001 rbx=0000000000000001 rcx=0000000000040010
rdx=0000000000040010 rsi=ffff9bbb855d67e0 rdi=ffff9bbb84379010
rip=00000000000000cc rsp=fffff6053f0536e8 rbp=fffff6053f0537f0
 r8=ffff9bbb86a0c010  r9=00000000000000de r10=fffff8075b9018c0
r11=ffff9bbb84379010 r12=ffff9bbb844d2b00 r13=00000000000003bc
r14=00000000000001c8 r15=ffff9bbb808e0000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
00000000`000000cc ??              ???
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  steamwebhelper

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:19:05.0904

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from ffff9b9d3705867c to 00000000000000cc

STACK_TEXT: 
fffff605`3f0536e8 ffff9b9d`3705867c : ffff9bbb`844d7000 ffff9bbb`80911000 00000000`00000000 00000000`00000076 : 0xcc
fffff605`3f0536f0 ffff9b9d`371004fb : 0000001d`e90feaf0 00000000`00000001 fffff605`3f053a99 ffff9b9d`370cb94e : win32kfull!NtGdiBitBltInternal+0xd4c
fffff605`3f053a20 fffff807`5b9d2d18 : 3f800000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!NtGdiBitBlt+0x5b
fffff605`3f053a90 00007ffd`47ef11a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001d`e90fe928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`47ef11a4


THREAD_SHA1_HASH_MOD_FUNC:  670d79681f0fd9a3e0080ae7550a6d0a34550263

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  0122063a3e44b71936a1443fe1e5c2791c010530

THREAD_SHA1_HASH_MOD:  136701d13e4a364d33459c1674fd03c4bb31651c

FOLLOWUP_IP:
win32kfull!NtGdiBitBltInternal+d4c
ffff9b9d`3705867c 85c0            test    eax,eax

FAULT_INSTR_CODE:  840fc085

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  win32kfull!NtGdiBitBltInternal+d4c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  3d49b616

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .cxr 0xfffff6053f052cf0 ; kb

BUCKET_ID_FUNC_OFFSET:  d4c

FAILURE_BUCKET_ID:  0x3B_c0000005_win32kfull!NtGdiBitBltInternal

BUCKET_ID:  0x3B_c0000005_win32kfull!NtGdiBitBltInternal

PRIMARY_PROBLEM_CLASS:  0x3B_c0000005_win32kfull!NtGdiBitBltInternal

TARGET_TIME:  2019-10-26T20:19:17.000Z

OSBUILD:  18362

OSSERVICEPACK:  449

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2011-01-12 16:55:39

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.449

ANALYSIS_SESSION_ELAPSED_TIME:  17ce

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_c0000005_win32kfull!ntgdibitbltinternal

FAILURE_ID_HASH:  {098b7638-fc20-2636-3ef7-7da30132449d}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8016d98b5af, Address of the instruction which caused the bugcheck
Arg3: ffffc98ec94985b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.418 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8016d98b5af

BUGCHECK_P3: ffffc98ec94985b0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+51f
fffff801`6d98b5af 698bcd488b4078e8e58c imul ecx,dword ptr [rbx+408B48CDh],8CE5E878h

CONTEXT:  ffffc98ec94985b0 -- (.cxr 0xffffc98ec94985b0)
rax=fffff8016d9e7780 rbx=0000000000000000 rcx=ffffcc02082f4cb0
rdx=ffffcc02082f4cb8 rsi=ffffcc01ff869460 rdi=ffffc98ec9499080
rip=fffff8016d98b5af rsp=ffffc98ec9498fa0 rbp=ffffc98ec94990a0
 r8=ffffcc02072bc0e0  r9=ffffc98ec9498fe0 r10=0000fffff8016d99
r11=ffffd5f9aa600000 r12=0000000000000004 r13=ffffcc02082f4cb0
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+0x51f:
fffff801`6d98b5af 698bcd488b4078e8e58c imul ecx,dword ptr [rbx+408B48CDh],8CE5E878h ds:002b:00000000`408b48cd=????????
Resetting default scope

BUGCHECK_STR:  0x3B_c0000005

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:19:00.0358

ANALYSIS_VERSION: 10.0.18362.1 x86fre

LAST_CONTROL_TRANSFER:  from fffff8016d98afea to fffff8016d98b5af

STACK_TEXT: 
ffffc98e`c9498fa0 fffff801`6d98afea : ffffcc02`039bda60 ffffcc01`00000000 ffffcc02`039bda60 00000000`00000000 : dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+0x51f
ffffc98e`c94998d0 fffff801`6d99a429 : 00000000`00000000 ffffa10e`71b2c3e0 ffffcc01`ff869460 fffff801`6d98ffe3 : dxgkrnl!CTokenManager::ProcessTokens+0x18a
ffffc98e`c9499990 fffff801`6d98ff1c : 00000000`00000000 ffffc98e`c9499b80 ffffcc01`ff869460 fffff801`5f8177d6 : dxgkrnl!CTokenManager::TokenThread+0x79
ffffc98e`c94999e0 fffff801`5f3d2b18 : ffffa10e`7e391080 00000000`00000000 00000000`00000020 00000000`00000000 : dxgkrnl!NtTokenManagerThread+0x1cc
ffffc98e`c9499b00 00007ffd`19f87de4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000032`aa3ffb28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`19f87de4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgkrnl
    fffff8016d98b5af - dxgkrnl!CTokenManager::ProcessDxgkAdapterTokens+51f
    [ 49:69 ]
1 error : !dxgkrnl (fffff8016d98b5af)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffffc98ec94985b0 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-10-20T15:06:49.000Z

OSBUILD:  18362

OSSERVICEPACK:  418

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.418

ANALYSIS_SESSION_ELAPSED_TIME:  6a26

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------


*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8056bc32b99, Address of the instruction which caused the bugcheck
Arg3: ffffd481a8d35930, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.329 (WinBuild.160101.0800)

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff8056bc32b99

BUGCHECK_P3: ffffd481a8d35930

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc000001d - <Unable to get error code text>

FAULTING_IP:
nt!ExAllocateHeapPool+4d9
fffff805`6bc32b99 8d              ???

CONTEXT:  ffffd481a8d35930 -- (.cxr 0xffffd481a8d35930)
rax=0000000000000000 rbx=00000000000011c0 rcx=ffffd481a8d0f180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff848fe0a02000
rip=fffff8056bc32b99 rsp=fffff88e612bbc40 rbp=fffff88e612bbd40
 r8=0f0f0f0f0f0f0f0f  r9=0000000000000000 r10=0000000000000039
r11=0101010101010101 r12=0000000000000000 r13=0000000000000000
r14=00000000000011c0 r15=000000004b677844
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!ExAllocateHeapPool+0x4d9:
fffff805`6bc32b99 8d              ???
Resetting default scope

BUGCHECK_STR:  0x3B_c000001d

CPU_COUNT: 8

CPU_MHZ: e74

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

PROCESS_NAME:  ImmortalRednec

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-18V31A3

ANALYSIS_SESSION_TIME:  10-27-2019 00:20:26.0494

ANALYSIS_VERSION: 10.0.18362.1 x86fre

BAD_STACK_POINTER:  ffffd481a8d34ff8

LAST_CONTROL_TRANSFER:  from fffff8056bf6e06d to fffff8056bc32b99

STACK_TEXT: 
fffff88e`612bbc40 fffff805`6bf6e06d : ffff848f`00000200 00000000`00000000 00000000`00000000 00000000`000011c0 : nt!ExAllocateHeapPool+0x4d9
fffff88e`612bbd80 fffff805`75ce9395 : ffff848f`e7279c90 fffff88e`612bcb80 fffff88e`612bc900 00000000`00000000 : nt!ExAllocatePoolWithTag+0x5d
fffff88e`612bbdd0 fffff805`75df0267 : fffff88e`612bc100 ffff848f`e7279c90 00000000`08000000 00000000`00000000 : dxgkrnl!operator new+0x31
fffff88e`612bbe00 fffff805`75defe67 : ffff958c`cc6d7de0 fffff88e`612bc900 fffff88e`612bc900 ffff958c`cc6d7de0 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x247
fffff88e`612bc5d0 fffff805`75df063a : fffff805`6bb766c0 fffff805`6bdc7e9f ffff958c`d1b622f0 00000000`0df1ea20 : dxgkrnl!DxgkSubmitCommandInternal+0x557
fffff88e`612bcac0 fffff805`6bdd2918 : ffff848f`eb267080 00000000`040b5000 00000000`00000000 ffff848f`ea7cf660 : dxgkrnl!DxgkSubmitCommand+0x5a
fffff88e`612bcb00 00007ffc`4d0b5a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0df1e958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`4d0b5a44


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8056bc32b99 - nt!ExAllocateHeapPool+4d9
    [ 85:8d ]
1 error : !nt (fffff8056bc32b99)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xffffd481a8d35930 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

PRIMARY_PROBLEM_CLASS:  MEMORY_CORRUPTION_ONE_BIT

TARGET_TIME:  2019-09-09T21:12:11.000Z

OSBUILD:  18362

OSSERVICEPACK:  329

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  2016-04-22 18:00:30

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.329

ANALYSIS_SESSION_ELAPSED_TIME:  4854

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_one_bit

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------
 
Çözüm
Sürekli olarak bu hatayı vermiyor arada veriyor, yinede testi yaparım.
Memtest', bitirdim 1 tane hata veriyor acaba bu hatayı RAM'leri OC yaptığım için verme ihtimali var mıdır ?
@MayCrasH @Recep Baltaş
 

Dosya Ekleri

  • 20191027_073005.jpg
    20191027_073005.jpg
    660,4 KB · Görüntüleme: 45
Son düzenleme:
Olabilir birde XMP kapalı deneyin.
RAM'e 2400 MHZ 14 16 16 16 38 1.2 V ayarını verdiğimde error 0'dı, galiba OC yüzünden mavi ekran veriyordu. OC ayarımda 16 18 18 18 39 1.2 V. Birde RAM'de OC varken şu uyarıyı veriyordu; RAM may be vuinerable to high frequency row hammer.
 

Dosya Ekleri

  • 20191027_111944.jpg
    20191027_111944.jpg
    644,7 KB · Görüntüleme: 54

Dosya Ekleri

  • cpu z memory.png
    cpu z memory.png
    10,7 KB · Görüntüleme: 46
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni mesajlar

Geri
Yukarı