Metin2 oynarken KERNEL_SECURITY_CHECK_FAILURE (139) mavi ekran hatası

BeyÖmer

Zeptopat
Katılım
14 Şubat 2026
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
Merhaba arkadaşlar, bilgisayarımda Metin2 oynarken bu hatayı alıyorum. DDU ile ekran kartını silip geri yükledim, düzelmedi. Bilgisayara format da attım düzelmedi. Aşağıya minidump dosyasının analiz edilmiş halini bırakıyorum, yardım eder mısıniz?

Kod:
Bugcheck Analysis *
* *
***************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf033b2af390, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffdf033b2af2e8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 1484.

 Key : Analysis.Elapsed.mSec
 Value: 18162.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 1

 Key : Analysis.IO.Write.Mb
 Value: 1

 Key : Analysis.Init.CPU.mSec
 Value: 625.

 Key : Analysis.Init.Elapsed.mSec
 Value: 24529.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 91.

 Key : Analysis.Version.DbgEng
 Value: 10.0.29507.1001

 Key : Analysis.Version.Description
 Value: 10.2511.5.1 amd64fre.

 Key : Analysis.Version.Ext
 Value: 1.2511.5.1

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x139.

 Key : Bugcheck.Code.TargetModel
 Value: 0x139.

 Key : Dump.Attributes.AsUlong
 Value: 0x21008.

 Key : Dump.Attributes.DiagDataWrittenToHeader
 Value: 1

 Key : Dump.Attributes.ErrorCode
 Value: 0x0.

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : Dump.Attributes.LastLine
 Value: Dump completed successfully.

 Key : Dump.Attributes.ProgressPercentage
 Value: 0

 Key : FailFast.Name
 Value: CORRUPT_LIST_ENTRY.

 Key : FailFast.Type
 Value: 3

 Key : Failure.Bucket
 Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad

 Key : Failure.Exception.Code
 Value: 0xc0000409.

 Key : Failure.Exception.Record
 Value: 0xffffdf033b2af2e8.

 Key : Failure.Hash
 Value: {ed5e39b6-1654-8c70-b89a-e53845af0b01}

 Key : WER.System.BIOSRevision
 Value: 5.27.0.0

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdf033b2af390.

BUGCHECK_P3: ffffdf033b2af2e8.

BUGCHECK_P4: 0

FILE_IN_CAB: 022126-22687-01.dmp

DUMP_FILE_ATTRIBUTES: 0x21008.
 Kernel Generated Triage Dump.

FAULTING_THREAD: ffffce0d37918180.

TRAP_FRAME: ffffdf033b2af390 -- (.trap 0xffffdf033b2af390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffce0d51ca3e60 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffce0d51ca3ee0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806a3e9b6ce rsp=ffffdf033b2af520 rbp=ffffb6834b232b20
 r8=ffffce0d51ca3e60 r9=ffffb6833753be08 r10=0000000000000001
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da:
fffff806`a3e9b6ce cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffffdf033b2af2e8 -- (.exr 0xffffdf033b2af2e8)
ExceptionAddress: fffff806a3e9b6ce (dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x00000000000001da)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001.
NumberParameters: 1
 Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1 (!blackboxwinlogon)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffffdf03`3b2af068 fffff806`ef6be5e9 : 00000000`00000139 00000000`00000003 ffffdf03`3b2af390 ffffdf03`3b2af2e8 : nt!KeBugCheckEx
ffffdf03`3b2af070 fffff806`ef6bebf2 : 00000000`00000001 fffff806`9d6d7c1e ffffd673`d84ae665 fffff806`ef2528ef : nt!KiBugCheckDispatch+0x69
ffffdf03`3b2af1b0 fffff806`ef6bc828 : 00008005`01264000 ffffdf03`3b2af4b0 ffffce0d`38d16000 fffff806`a3eecc9d : nt!KiFastFailDispatch+0xb2
ffffdf03`3b2af390 fffff806`a3e9b6ce : ffffb683`5421a668 ffffb683`4b232b20 ffffb683`41b71c80 ffffb683`4b228800 : nt!KiRaiseSecurityCheckFailure+0x368
ffffdf03`3b2af520 fffff806`a3e99a7c : ffffb683`5421a668 ffffb683`4b232b20 ffffb683`3ee2a930 ffffb683`38782860 : dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da
ffffdf03`3b2af560 fffff806`a3ed7ff2 : 00000000`00000100 ffffb683`41b71c80 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeListWithFix+0x258
ffffdf03`3b2af640 fffff806`a3f11a2d : 00000000`00000000 ffffdf03`3b2af8b0 00000000`00000000 ffffdf03`3b2afa78 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeList+0x4f2
ffffdf03`3b2af700 fffff806`a3ee08e8 : ffffdf03`3b2afa78 ffffdf03`3b2afa78 ffffdf03`3b2af8b0 ffffb683`54357ae0 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0x24d
ffffdf03`3b2af7b0 fffff806`a3edfb15 : ffffb683`48280d50 ffffb683`379cd410 ffffb683`2c5b9000 ffffb683`379cd410 : dxgmms2!VIDMM_GLOBAL:rocessDeferredCommand+0xa00
ffffdf03`3b2af9b0 fffff806`a3ef1571 : ffffb683`2c5b9000 ffffdf03`3b2afac9 fffff806`a3e5e490 ffffce0d`38d1fc20 : dxgmms2!VidMmSubmitPacket+0xb5
ffffdf03`3b2afa10 fffff806`ef48966a : ffffce0d`37918101 fffff806`a3ef0e00 ffffe281`4e2a2100 066fe47f`bd9bbf02 : dxgmms2!VidMmWorkerThreadProc+0x681
ffffdf03`3b2afb30 fffff806`ef6ab774 : ffffe281`4e2a2180 ffffce0d`37918180 fffff806`ef489610 002d0033`00350034 : nt!PspSystemThreadStartup+0x5a
ffffdf03`3b2afb80 00000000`00000000 : ffffdf03`3b2b0000 ffffdf03`3b2a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+1da

MODULE_NAME: dxgmms2.

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.26100.7705

STACK_COMMAND: .process /r /p 0xffffce0d11730040; .thread 0xffffce0d37918180 ; kb.

BUCKET_ID_FUNC_OFFSET: 1da.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ed5e39b6-1654-8c70-b89a-e53845af0b01}

Followup: MachineOwner

sisitem ASUS ROG STRİX G16 İNTEL İ7 13650HX 1TB SSD 16+16 RAM RTX4070 NVİDİA W11 PRO
 
Son düzenleme:
dmp dosyasının kendisini paylaşın.
 
dmp dosyasının kendisini paylaşın.
022126-22687-01.dmp burda dosya linikini burakıyorum
 
DDU ile ekran kartı sürücüsünü tekrar kaldırın. Son sürüm değil, eski sürüm bir NVIDIA sürücüsü kurun. Son sürüm eski oyunlarda sorun çıkartıyor şu anda.

ROG Strix G614JU_G614JU - 4070 için:

Vanguard kaldırın. Ekran kartı sürücüsünü yükleyip bilgisayarı yeniden başlatıktan sonra Vanguard tekrar kurabilirsiniz.
 

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı