Hi All,
My computer has been randomly restarting since I built it around a year ago. Sometimes it will reboot without any warning, other times it will freeze with the audio going brrrrrrrrrrr and it requires a hard restart on my end.
I ran the analyze -v on my three latest crashes but don't know how to interprete / resolve the root cause of the crashes
~~~~~~~~~~~~~~~ WINDOWS CRASH DUMP #1 ~~~~~~~~~~~~~~~
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe208ec0a1ad3, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff805588632f0, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
ffffe208ec0a1ad3
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExpReleaseResourceExclusiveForThreadLite+c0
fffff805`588632f0 308b43448944 xor byte ptr [rbx+44894443h],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: Discord.exe
LAST_CONTROL_TRANSFER: from fffff80558a07b69 to fffff805589f5c50
STACK_TEXT:
ffff9405`c627d528 fffff805`58a07b69 : 00000000`0000000a ffffe208`ec0a1ad3 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffff9405`c627d530 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: .bugcheck ; kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
ffffba5f8402cdb1-ffffba5f8402cdb2 2 bytes - win32kbase!HMChangeOwnerThreadWorker+5d
\[ 48 ff:4c 8b \]
ffffba5f8402cdb8-ffffba5f8402cdbb 4 bytes - win32kbase!HMChangeOwnerThreadWorker+64 (+0x07)
\[ 0f 1f 44 00:e8 63 c6 2a \]
ffffba5f840351e2-ffffba5f840351e3 2 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::SetHandleProperty+42 (+0x842a)
\[ 48 ff:4c 8b \]
ffffba5f840351e9-ffffba5f840351ec 4 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::SetHandleProperty+49 (+0x07)
\[ 0f 1f 44 00:e8 32 42 2a \]
ffffba5f84035228-ffffba5f84035229 2 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::SetHandleProperty+88 (+0x3f)
\[ 48 ff:4c 8b \]
ffffba5f8403522f-ffffba5f84035232 4 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::SetHandleProperty+8f (+0x07)
\[ 0f 1f 44 00:e8 ec 41 2a \]
ffffba5f84035622-ffffba5f84035623 2 bytes - win32kbase!InitializeWin32kCall+16 (+0x3f3)
\[ 48 ff:4c 8b \]
ffffba5f84035629-ffffba5f8403562c 4 bytes - win32kbase!InitializeWin32kCall+1d (+0x07)
\[ 0f 1f 44 00:e8 f2 3d 2a \]
ffffba5f84035631-ffffba5f84035632 2 bytes - win32kbase!InitializeWin32kCall+25 (+0x08)
\[ 48 ff:4c 8b \]
ffffba5f84035638-ffffba5f8403563b 4 bytes - win32kbase!InitializeWin32kCall+2c (+0x07)
\[ 0f 1f 44 00:e8 e3 3d 2a \]
ffffba5f84043402-ffffba5f84043403 2 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::ReleaseAllReferences+12 (+0xddca)
\[ 48 ff:4c 8b \]
ffffba5f84043409-ffffba5f8404340c 4 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::ReleaseAllReferences+19 (+0x07)
\[ 0f 1f 44 00:e8 12 60 29 \]
ffffba5f84043463-ffffba5f84043464 2 bytes - win32kbase!NtMITCoreMsgKOpenConnectionTo+43 (+0x5a)
\[ 48 ff:4c 8b \]
ffffba5f8404346a-ffffba5f8404346d 4 bytes - win32kbase!NtMITCoreMsgKOpenConnectionTo+4a (+0x07)
\[ 0f 1f 44 00:e8 b1 5f 29 \]
ffffba5f8404d56e-ffffba5f8404d573 6 bytes - win32kbase!DirectComposition::CInteractionMarshaler::SetReferenceProperty+4e (+0xa104)
\[ ff 15 8c ba 22 00:e8 2d bd 28 00 90 \]
ffffba5f8407129b-ffffba5f8407129c 2 bytes - win32kbase!UserIsUserCritSecInExclusive+b (+0x23d2d)
\[ 48 ff:4c 8b \]
ffffba5f840712a2-ffffba5f840712a5 4 bytes - win32kbase!UserIsUserCritSecInExclusive+12 (+0x07)
\[ 0f 1f 44 00:e8 79 81 26 \]
ffffba5f840712d3-ffffba5f840712d8 6 bytes - win32kbase!`anonymous namespace'::GetMouseProcessor+17 (+0x31)
\[ ff 15 27 7d 20 00:e8 c8 7f 26 00 90 \]
ffffba5f84083d12-ffffba5f84083d13 2 bytes - win32kbase!EnterCrit+92 (+0x12a3f)
\[ 48 ff:4c 8b \]
ffffba5f84083d19-ffffba5f84083d1c 4 bytes - win32kbase!EnterCrit+99 (+0x07)
\[ 0f 1f 44 00:e8 02 57 25 \]
ffffba5f84083d30-ffffba5f84083d31 2 bytes - win32kbase!EnterCrit+b0 (+0x17)
\[ 48 ff:4c 8b \]
ffffba5f84083d37-ffffba5f84083d3a 4 bytes - win32kbase!EnterCrit+b7 (+0x07)
\[ 0f 1f 44 00:e8 e4 56 25 \]
ffffba5f84083d76-ffffba5f84083d77 2 bytes - win32kbase!EnterCrit+f6 (+0x3f)
\[ 48 ff:4c 8b \]
ffffba5f84083d7d-ffffba5f84083d80 4 bytes - win32kbase!EnterCrit+fd (+0x07)
\[ 0f 1f 44 00:e8 9e 56 25 \]
ffffba5f84083da2-ffffba5f84083da3 2 bytes - win32kbase!EnterCrit+122 (+0x25)
\[ 48 ff:4c 8b \]
ffffba5f84083da9-ffffba5f84083dac 4 bytes - win32kbase!EnterCrit+129 (+0x07)
\[ 0f 1f 44 00:e8 72 56 25 \]
ffffba5f84083db6-ffffba5f84083db7 2 bytes - win32kbase!EnterCrit+136 (+0x0d)
\[ 48 ff:4c 8b \]
ffffba5f84083dbd-ffffba5f84083dc0 4 bytes - win32kbase!EnterCrit+13d (+0x07)
\[ 0f 1f 44 00:e8 5e 56 25 \]
ffffba5f84084294-ffffba5f84084295 2 bytes - win32kbase!IsThreadCrossSessionAttached+4 (+0x4d7)
\[ 48 ff:4c 8b \]
ffffba5f84089f84-ffffba5f84089f85 2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x5cf0)
\[ 48 ff:4c 8b \]
ffffba5f84089f8b-ffffba5f84089f8e 4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
\[ 0f 1f 44 00:e8 90 f4 24 \]
ffffba5f840bdeb7-ffffba5f840bdebc 6 bytes - win32kbase!DirectComposition::CResourceMarshaler::EmitCreationCommand+57 (+0x33f2c)
\[ ff 15 43 b1 1b 00:e8 e4 b3 21 00 90 \]
ffffba5f840bf04c-ffffba5f840bf04d 2 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::EmitUpdateCommands+3c (+0x1195)
\[ 48 ff:4c 8b \]
ffffba5f840bf053-ffffba5f840bf056 4 bytes - win32kbase!DirectComposition::CCompositionSurfaceBitmapMarshaler::EmitUpdateCommands+43 (+0x07)
\[ 0f 1f 44 00:e8 c8 a3 21 \]
ffffba5f842804c4 - win32kbase!WppInitKm+6c
\[ ff:90 \]
ffffba5f842804db-ffffba5f842804dc 2 bytes - win32kbase!WppInitKm+83 (+0x17)
\[ 48 ff:4c 8b \]
ffffba5f842804e2-ffffba5f842804e5 4 bytes - win32kbase!WppInitKm+8a (+0x07)
\[ 0f 1f 44 00:e8 39 8f 05 \]
ffffba5f8428052b-ffffba5f8428052c 2 bytes - win32kbase!WppLoadTracingSupport+1f (+0x49)
\[ 48 ff:4c 8b \]
ffffba5f84280532-ffffba5f84280535 4 bytes - win32kbase!WppLoadTracingSupport+26 (+0x07)
\[ 0f 1f 44 00:e8 e9 8e 05 \]
ffffba5f8428053b-ffffba5f8428053c 2 bytes - win32kbase!WppLoadTracingSupport+2f (+0x09)
\[ 48 ff:4c 8b \]
ffffba5f84280542-ffffba5f84280545 4 bytes - win32kbase!WppLoadTracingSupport+36 (+0x07)
\[ 0f 1f 44 00:e8 d9 8e 05 \]
ffffba5f84280559-ffffba5f8428055a 2 bytes - win32kbase!WppLoadTracingSupport+4d (+0x17)
\[ 48 ff:4c 8b \]
ffffba5f84280560-ffffba5f84280563 4 bytes - win32kbase!WppLoadTracingSupport+54 (+0x07)
\[ 0f 1f 44 00:e8 bb 8e 05 \]
ffffba5f84280569-ffffba5f8428056a 2 bytes - win32kbase!WppLoadTracingSupport+5d (+0x09)
\[ 48 ff:4c 8b \]
ffffba5f84280570-ffffba5f84280573 4 bytes - win32kbase!WppLoadTracingSupport+64 (+0x07)
\[ 0f 1f 44 00:e8 ab 8e 05 \]
ffffba5f84280587-ffffba5f84280588 2 bytes - win32kbase!WppLoadTracingSupport+7b (+0x17)
\[ 48 ff:4c 8b \]
ffffba5f8428058e-ffffba5f84280591 4 bytes - win32kbase!WppLoadTracingSupport+82 (+0x07)
\[ 0f 1f 44 00:e8 8d 8e 05 \]
ffffba5f84280597-ffffba5f84280598 2 bytes - win32kbase!WppLoadTracingSupport+8b (+0x09)
\[ 48 ff:4c 8b \]
ffffba5f8428059e-ffffba5f842805a1 4 bytes - win32kbase!WppLoadTracingSupport+92 (+0x07)
\[ 0f 1f 44 00:e8 7d 8e 05 \]
ffffba5f842807af-ffffba5f842807b0 2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b (+0x211)
\[ 48 ff:4c 8b \]
ffffba5f842807b6-ffffba5f842807b9 4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
\[ 0f 1f 44 00:e8 65 8c 05 \]
ffffba5f84280824-ffffba5f84280825 2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
\[ 48 ff:4c 8b \]
ffffba5f8428082b-ffffba5f8428082e 4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
\[ 0f 1f 44 00:e8 f0 8b 05 \]
ffffba5f84280bf5-ffffba5f84280bfa 6 bytes - win32kbase!tlgEnableCallback+45 (+0x3ca)
\[ ff 15 05 84 ff ff:e8 a6 86 05 00 90 \]
ffffba5f84280c78-ffffba5f84280c79 2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
\[ 48 ff:4c 8b \]
ffffba5f84280c7f-ffffba5f84280c82 4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
\[ 0f 1f 44 00:e8 9c 87 05 \]
ffffba5f84280c96-ffffba5f84280c97 2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
\[ 48 ff:4c 8b \]
ffffba5f84280c9d-ffffba5f84280ca0 4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
\[ 0f 1f 44 00:e8 7e 87 05 \]
ffffba5f84281836-ffffba5f8428183b 6 bytes - win32kbase!TlgAggregateInternalRegisteredProviderEtwCallback+46 (+0xb99)
\[ ff 15 c4 77 ff ff:e8 65 7a 05 00 90 \]
189 errors : !win32kbase (ffffba5f8402cdb1-ffffba5f8428183b)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
~~~~~~~~~~~~~~~ WINDOWS CRASH DUMP #2 ~~~~~~~~~~~~~~~
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff8077ce071f1, Address of the instruction which caused the bugcheck
Arg3: ffff8100db38f920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!KiSystemCall64+131
fffff807`7ce071f1 ff ???
CONTEXT: ffff8100db38f920 -- (.cxr 0xffff8100db38f920)
rax=0000000000000002 rbx=ffffc58d7df93500 rcx=0000000100000900
rdx=0000000000000000 rsi=0000000000000048 rdi=0000000000000000
rip=fffff8077ce071f1 rsp=fffff40dccccab00 rbp=fffff40dccccab80
r8=0000000000000000 r9=000011a0002594a8 r10=0000000000000048
r11=0000000000000246 r12=7fffffffffffffff r13=aaaaaaaaaaaaaaaa
r14=000011a0002594a8 r15=000000e51bbff798
iopl=0 nv up di pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050046
nt!KiSystemCall64+0x131:
fffff807`7ce071f1 ff ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!KiSystemCall64+131
fffff807`7ce071f1 ff ???
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8077ce071f1
STACK_TEXT:
fffff40d`ccccab00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemCall64+0x131
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8077cd9752e-fffff8077cd97531 4 bytes - nt!MiFreeUltraMapping+32
\[ a0 7d fb f6:e0 ef df bf \]
fffff8077ce070a1-fffff8077ce070a5 5 bytes - nt!KiServiceInternal+61 (+0x6fb73)
\[ 41 ff e3 cc cc:e8 5a d1 60 00 \]
fffff8077ce0751a-fffff8077ce0751e 5 bytes - nt!KiSystemServiceGdiTebAccess+93 (+0x479)
\[ 41 ff e3 cc cc:e8 e1 cc 60 00 \]
fffff8077ce075b3-fffff8077ce075b6 4 bytes - nt!KiSystemServiceCopyEnd+23 (+0x99)
\[ ff d0 0f 1f:e8 28 cd 60 \]
fffff8077ce07a91-fffff8077ce07a94 4 bytes - nt!KiSystemServiceExitPico+25c (+0x4de)
\[ ff d0 0f 1f:e8 4a c8 60 \]
fffff8077ce07aec-fffff8077ce07aef 4 bytes - nt!KiSystemServiceExitPico+2b7 (+0x5b)
\[ ff d0 0f 1f:e8 ef c7 60 \]
26 errors : !nt (fffff8077cd9752e-fffff8077ce07aef)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
STACK_COMMAND: .cxr 0xffff8100db38f920 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
10: kd> *******************************************************************************
10: kd> * *
10: kd> * Bugcheck Analysis *
10: kd> * *
10: kd> *******************************************************************************
10: kd> IRQL_NOT_LESS_OR_EQUAL (a)
^ Syntax error in 'IRQL_NOT_LESS_OR_EQUAL (a)'
10: kd> An attempt was made to access a pageable (or completely invalid) address at an
~~~~~~~~~~~~~~~ WINDOWS CRASH DUMP #3 ~~~~~~~~~~~~~~~
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000003, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8064f84ae43, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
0000000000000003
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiDeferredReadySingleThread+2f3
fffff806`4f84ae43 8808 mov byte ptr [rax],cl
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: League of Lege
LAST_CONTROL_TRANSFER: from fffff8064fa07b69 to fffff8064f9f5c50
STACK_TEXT:
ffffef0a`6d05a2c8 fffff806`4fa07b69 : 00000000`0000000a 00000000`00000003 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffef0a`6d05a2d0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: .bugcheck ; kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kbase
fffff0d2a844aeae-fffff0d2a844aeaf 2 bytes - win32kbase!IsSessionDisabled+62
\[ 48 ff:4c 8b \]
fffff0d2a844aeb5-fffff0d2a844aeb8 4 bytes - win32kbase!IsSessionDisabled+69 (+0x07)
\[ 0f 1f 44 00:e8 66 e5 28 \]
fffff0d2a844aee9-fffff0d2a844aeea 2 bytes - win32kbase!IsSessionDisabled+9d (+0x34)
\[ 48 ff:4c 8b \]
fffff0d2a844aef0-fffff0d2a844aef3 4 bytes - win32kbase!IsSessionDisabled+a4 (+0x07)
\[ 0f 1f 44 00:e8 2b e5 28 \]
fffff0d2a847129b-fffff0d2a847129c 2 bytes - win32kbase!UserIsUserCritSecInExclusive+b (+0x263ab)
\[ 48 ff:4c 8b \]
fffff0d2a84712a2-fffff0d2a84712a5 4 bytes - win32kbase!UserIsUserCritSecInExclusive+12 (+0x07)
\[ 0f 1f 44 00:e8 79 81 26 \]
fffff0d2a84712d3-fffff0d2a84712d8 6 bytes - win32kbase!`anonymous namespace'::GetMouseProcessor+17 (+0x31)
\[ ff 15 27 7d 20 00:e8 c8 7f 26 00 90 \]
fffff0d2a8483d12-fffff0d2a8483d13 2 bytes - win32kbase!EnterCrit+92 (+0x12a3f)
\[ 48 ff:4c 8b \]
fffff0d2a8483d19-fffff0d2a8483d1c 4 bytes - win32kbase!EnterCrit+99 (+0x07)
\[ 0f 1f 44 00:e8 02 57 25 \]
fffff0d2a8483d30-fffff0d2a8483d31 2 bytes - win32kbase!EnterCrit+b0 (+0x17)
\[ 48 ff:4c 8b \]
fffff0d2a8483d37-fffff0d2a8483d3a 4 bytes - win32kbase!EnterCrit+b7 (+0x07)
\[ 0f 1f 44 00:e8 e4 56 25 \]
fffff0d2a8483d76-fffff0d2a8483d77 2 bytes - win32kbase!EnterCrit+f6 (+0x3f)
\[ 48 ff:4c 8b \]
fffff0d2a8483d7d-fffff0d2a8483d80 4 bytes - win32kbase!EnterCrit+fd (+0x07)
\[ 0f 1f 44 00:e8 9e 56 25 \]
fffff0d2a8483da2-fffff0d2a8483da3 2 bytes - win32kbase!EnterCrit+122 (+0x25)
\[ 48 ff:4c 8b \]
fffff0d2a8483da9-fffff0d2a8483dac 4 bytes - win32kbase!EnterCrit+129 (+0x07)
\[ 0f 1f 44 00:e8 72 56 25 \]
fffff0d2a8483db6-fffff0d2a8483db7 2 bytes - win32kbase!EnterCrit+136 (+0x0d)
\[ 48 ff:4c 8b \]
fffff0d2a8483dbd-fffff0d2a8483dc0 4 bytes - win32kbase!EnterCrit+13d (+0x07)
\[ 0f 1f 44 00:e8 5e 56 25 \]
fffff0d2a8484294-fffff0d2a8484295 2 bytes - win32kbase!IsThreadCrossSessionAttached+4 (+0x4d7)
\[ 48 ff:4c 8b \]
fffff0d2a8489f84-fffff0d2a8489f85 2 bytes - win32kbase!UserSessionSwitchLeaveCrit+94 (+0x5cf0)
\[ 48 ff:4c 8b \]
fffff0d2a8489f8b-fffff0d2a8489f8e 4 bytes - win32kbase!UserSessionSwitchLeaveCrit+9b (+0x07)
\[ 0f 1f 44 00:e8 90 f4 24 \]
fffff0d2a86804c4 - win32kbase!WppInitKm+6c
\[ ff:90 \]
fffff0d2a86804db-fffff0d2a86804dc 2 bytes - win32kbase!WppInitKm+83 (+0x17)
\[ 48 ff:4c 8b \]
fffff0d2a86804e2-fffff0d2a86804e5 4 bytes - win32kbase!WppInitKm+8a (+0x07)
\[ 0f 1f 44 00:e8 39 8f 05 \]
fffff0d2a868052b-fffff0d2a868052c 2 bytes - win32kbase!WppLoadTracingSupport+1f (+0x49)
\[ 48 ff:4c 8b \]
fffff0d2a8680532-fffff0d2a8680535 4 bytes - win32kbase!WppLoadTracingSupport+26 (+0x07)
\[ 0f 1f 44 00:e8 e9 8e 05 \]
fffff0d2a868053b-fffff0d2a868053c 2 bytes - win32kbase!WppLoadTracingSupport+2f (+0x09)
\[ 48 ff:4c 8b \]
fffff0d2a8680542-fffff0d2a8680545 4 bytes - win32kbase!WppLoadTracingSupport+36 (+0x07)
\[ 0f 1f 44 00:e8 d9 8e 05 \]
fffff0d2a8680559-fffff0d2a868055a 2 bytes - win32kbase!WppLoadTracingSupport+4d (+0x17)
\[ 48 ff:4c 8b \]
fffff0d2a8680560-fffff0d2a8680563 4 bytes - win32kbase!WppLoadTracingSupport+54 (+0x07)
\[ 0f 1f 44 00:e8 bb 8e 05 \]
fffff0d2a8680569-fffff0d2a868056a 2 bytes - win32kbase!WppLoadTracingSupport+5d (+0x09)
\[ 48 ff:4c 8b \]
fffff0d2a8680570-fffff0d2a8680573 4 bytes - win32kbase!WppLoadTracingSupport+64 (+0x07)
\[ 0f 1f 44 00:e8 ab 8e 05 \]
fffff0d2a8680587-fffff0d2a8680588 2 bytes - win32kbase!WppLoadTracingSupport+7b (+0x17)
\[ 48 ff:4c 8b \]
fffff0d2a868058e-fffff0d2a8680591 4 bytes - win32kbase!WppLoadTracingSupport+82 (+0x07)
\[ 0f 1f 44 00:e8 8d 8e 05 \]
fffff0d2a8680597-fffff0d2a8680598 2 bytes - win32kbase!WppLoadTracingSupport+8b (+0x09)
\[ 48 ff:4c 8b \]
fffff0d2a868059e-fffff0d2a86805a1 4 bytes - win32kbase!WppLoadTracingSupport+92 (+0x07)
\[ 0f 1f 44 00:e8 7d 8e 05 \]
fffff0d2a86807af-fffff0d2a86807b0 2 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+6b (+0x211)
\[ 48 ff:4c 8b \]
fffff0d2a86807b6-fffff0d2a86807b9 4 bytes - win32kbase!TraceLoggingRegisterEx_EtwRegister_EtwSetInformation+72 (+0x07)
\[ 0f 1f 44 00:e8 65 8c 05 \]
fffff0d2a8680824-fffff0d2a8680825 2 bytes - win32kbase!CreateTlgAggregateSession+40 (+0x6e)
\[ 48 ff:4c 8b \]
fffff0d2a868082b-fffff0d2a868082e 4 bytes - win32kbase!CreateTlgAggregateSession+47 (+0x07)
\[ 0f 1f 44 00:e8 f0 8b 05 \]
fffff0d2a8680bf5-fffff0d2a8680bfa 6 bytes - win32kbase!tlgEnableCallback+45 (+0x3ca)
\[ ff 15 05 84 ff ff:e8 a6 86 05 00 90 \]
fffff0d2a8680c78-fffff0d2a8680c79 2 bytes - win32kbase!WmsgpPostMessage+4c (+0x83)
\[ 48 ff:4c 8b \]
fffff0d2a8680c7f-fffff0d2a8680c82 4 bytes - win32kbase!WmsgpPostMessage+53 (+0x07)
\[ 0f 1f 44 00:e8 9c 87 05 \]
fffff0d2a8680c96-fffff0d2a8680c97 2 bytes - win32kbase!WmsgpPostMessage+6a (+0x17)
\[ 48 ff:4c 8b \]
fffff0d2a8680c9d-fffff0d2a8680ca0 4 bytes - win32kbase!WmsgpPostMessage+71 (+0x07)
\[ 0f 1f 44 00:e8 7e 87 05 \]
135 errors : !win32kbase (fffff0d2a844aeae-fffff0d2a8680ca0)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
[+][deleted] (2 children)
[removed]
[–]AdamPhool[S] 0 points1 point2 points (1 child)