Merhaba arkadaşlar, bilgisayarımda Metin2 oynarken bu hatayı alıyorum. DDU ile ekran kartını silip geri yükledim, düzelmedi. Bilgisayara format da attım düzelmedi. Aşağıya minidump dosyasının analiz edilmiş halini bırakıyorum, yardım eder mısıniz?
sisitem ASUS ROG STRİX G16 İNTEL İ7 13650HX 1TB SSD 16+16 RAM RTX4070 NVİDİA W11 PRO
Kod:
Bugcheck Analysis *
* *
***************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf033b2af390, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffdf033b2af2e8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1484.
Key : Analysis.Elapsed.mSec
Value: 18162.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 625.
Key : Analysis.Init.Elapsed.mSec
Value: 24529.
Key : Analysis.Memory.CommitPeak.Mb
Value: 91.
Key : Analysis.Version.DbgEng
Value: 10.0.29507.1001
Key : Analysis.Version.Description
Value: 10.2511.5.1 amd64fre.
Key : Analysis.Version.Ext
Value: 1.2511.5.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x139.
Key : Bugcheck.Code.TargetModel
Value: 0x139.
Key : Dump.Attributes.AsUlong
Value: 0x21008.
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0.
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad
Key : Failure.Exception.Code
Value: 0xc0000409.
Key : Failure.Exception.Record
Value: 0xffffdf033b2af2e8.
Key : Failure.Hash
Value: {ed5e39b6-1654-8c70-b89a-e53845af0b01}
Key : WER.System.BIOSRevision
Value: 5.27.0.0
BUGCHECK_CODE: 139.
BUGCHECK_P1: 3
BUGCHECK_P2: ffffdf033b2af390.
BUGCHECK_P3: ffffdf033b2af2e8.
BUGCHECK_P4: 0
FILE_IN_CAB: 022126-22687-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008.
Kernel Generated Triage Dump.
FAULTING_THREAD: ffffce0d37918180.
TRAP_FRAME: ffffdf033b2af390 -- (.trap 0xffffdf033b2af390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffce0d51ca3e60 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffce0d51ca3ee0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806a3e9b6ce rsp=ffffdf033b2af520 rbp=ffffb6834b232b20
r8=ffffce0d51ca3e60 r9=ffffb6833753be08 r10=0000000000000001
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc.
dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da:
fffff806`a3e9b6ce cd29 int 29h.
Resetting default scope.
EXCEPTION_RECORD: ffffdf033b2af2e8 -- (.exr 0xffffdf033b2af2e8)
ExceptionAddress: fffff806a3e9b6ce (dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x00000000000001da)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409.
EXCEPTION_PARAMETER1: 0000000000000003.
EXCEPTION_STR: 0xc0000409.
STACK_TEXT:
ffffdf03`3b2af068 fffff806`ef6be5e9 : 00000000`00000139 00000000`00000003 ffffdf03`3b2af390 ffffdf03`3b2af2e8 : nt!KeBugCheckEx
ffffdf03`3b2af070 fffff806`ef6bebf2 : 00000000`00000001 fffff806`9d6d7c1e ffffd673`d84ae665 fffff806`ef2528ef : nt!KiBugCheckDispatch+0x69
ffffdf03`3b2af1b0 fffff806`ef6bc828 : 00008005`01264000 ffffdf03`3b2af4b0 ffffce0d`38d16000 fffff806`a3eecc9d : nt!KiFastFailDispatch+0xb2
ffffdf03`3b2af390 fffff806`a3e9b6ce : ffffb683`5421a668 ffffb683`4b232b20 ffffb683`41b71c80 ffffb683`4b228800 : nt!KiRaiseSecurityCheckFailure+0x368
ffffdf03`3b2af520 fffff806`a3e99a7c : ffffb683`5421a668 ffffb683`4b232b20 ffffb683`3ee2a930 ffffb683`38782860 : dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da
ffffdf03`3b2af560 fffff806`a3ed7ff2 : 00000000`00000100 ffffb683`41b71c80 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeListWithFix+0x258
ffffdf03`3b2af640 fffff806`a3f11a2d : 00000000`00000000 ffffdf03`3b2af8b0 00000000`00000000 ffffdf03`3b2afa78 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeList+0x4f2
ffffdf03`3b2af700 fffff806`a3ee08e8 : ffffdf03`3b2afa78 ffffdf03`3b2afa78 ffffdf03`3b2af8b0 ffffb683`54357ae0 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0x24d
ffffdf03`3b2af7b0 fffff806`a3edfb15 : ffffb683`48280d50 ffffb683`379cd410 ffffb683`2c5b9000 ffffb683`379cd410 : dxgmms2!VIDMM_GLOBAL:rocessDeferredCommand+0xa00
ffffdf03`3b2af9b0 fffff806`a3ef1571 : ffffb683`2c5b9000 ffffdf03`3b2afac9 fffff806`a3e5e490 ffffce0d`38d1fc20 : dxgmms2!VidMmSubmitPacket+0xb5
ffffdf03`3b2afa10 fffff806`ef48966a : ffffce0d`37918101 fffff806`a3ef0e00 ffffe281`4e2a2100 066fe47f`bd9bbf02 : dxgmms2!VidMmWorkerThreadProc+0x681
ffffdf03`3b2afb30 fffff806`ef6ab774 : ffffe281`4e2a2180 ffffce0d`37918180 fffff806`ef489610 002d0033`00350034 : nt!PspSystemThreadStartup+0x5a
ffffdf03`3b2afb80 00000000`00000000 : ffffdf03`3b2b0000 ffffdf03`3b2a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+1da
MODULE_NAME: dxgmms2.
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.26100.7705
STACK_COMMAND: .process /r /p 0xffffce0d11730040; .thread 0xffffce0d37918180 ; kb.
BUCKET_ID_FUNC_OFFSET: 1da.
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {ed5e39b6-1654-8c70-b89a-e53845af0b01}
Followup: MachineOwner
sisitem ASUS ROG STRİX G16 İNTEL İ7 13650HX 1TB SSD 16+16 RAM RTX4070 NVİDİA W11 PRO
Son düzenleme: