Far Cry 5 Crash sorunu

İşletim sistemi
Windows 10

DwiinKodaav

Kilopat
Katılım
28 Haziran 2018
Mesajlar
29
Daha fazla  
Cinsiyet
Erkek
Yeni topladığım sistemimle Far Cry 5'i kaldığım yerden bitirmek için oynamaya başladım. Oyun açılıyor sorun yok fakat 2 kere Cedar Lake üzerindeyken kapandı (1 tanesi mavi ekrana sebep oldu), 1 kere de Dükkana girince oldu. Başka oyunlarda sorun oluyor mu diye bir de Far Cry New Dawn'a bakayım dedim ama 1 saat oynadıktan sonra hiçbir sorun olmadı. Sorunun İşlemcinin sıcaklığından kaynaklandığını düşünmüştüm (80 derece seyrediyor) fakat New Dawn da böyle bir sorun yaşamamam garip geldi. Sizce sorun nedir?
 
Son düzenleyen: Moderatör:
Oyun orijinal mi? Mavi ekran verdiyse minidump dosyalarının oluşmuş olması lazım.
 
Evet oyun Orjinal Steam üzerinden oynuyorum
 
RAM testi yapıp sonucu paylaşın.


Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd300a7036220, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd300a7036178, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2562

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 4656

Key : Analysis.Memory.CommitPeak.Mb
Value: 74

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: 19h1_release

Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z

Key : WER.OS.Version
Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd300a7036220

BUGCHECK_P3: ffffd300a7036178

BUGCHECK_P4: 0

TRAP_FRAME:  ffffd300a7036220 -- (.trap 0xffffd300a7036220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc3026d6e2590 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc3026326c4d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053d5f6727 rsp=ffffd300a70363b0 rbp=ffffd300a7036500
r8=ffffd300a70363b8 r9=0000000000000001 r10=7ffffffffffffffc
r11=ffffd300a7036340 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!DelistKeyBodyFromKCB+0xc7:
fffff805`3d5f6727 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD:  ffffd300a7036178 -- (.exr 0xffffd300a7036178)
ExceptionAddress: fffff8053d5f6727 (nt!DelistKeyBodyFromKCB+0x00000000000000c7)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: upc.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffd300`a7035ef8 fffff805`3d1d30e9 : 00000000`00000139 00000000`00000003 ffffd300`a7036220 ffffd300`a7036178 : nt!KeBugCheckEx
ffffd300`a7035f00 fffff805`3d1d3510 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd300`a7036040 fffff805`3d1d18a5 : ffffc302`5eeebe10 fffff805`3d5ee730 ffffd403`f7d0c3a0 fffff805`3d039d9d : nt!KiFastFailDispatch+0xd0
ffffd300`a7036220 fffff805`3d5f6727 : ffffc302`6326c4a0 ffffc302`00000000 ffffd300`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffd300`a70363b0 fffff805`3d5f5fd5 : ffffc302`6d6e2570 00000000`00000000 00000000`00000000 01000000`00100000 : nt!DelistKeyBodyFromKCB+0xc7
ffffd300`a70363e0 fffff805`3d5f94c0 : 00000000`00000000 ffffd403`e8b3ba60 ffffd403`e8b3ba60 ffffc302`6d6e2540 : nt!CmpDeleteKeyObject+0x125
ffffd300`a7036470 fffff805`3d03a969 : 00000000`00000000 00000000`00000000 ffffd300`a70365f9 ffffc302`6d6e2570 : nt!ObpRemoveObjectRoutine+0x80
ffffd300`a70364d0 fffff805`3d5ec267 : 00000000`ffff8003 ffffc302`6d6e2540 ffffc302`6d6e2540 ffffd403`f3d7c510 : nt!ObfDereferenceObjectWithTag+0xc9
ffffd300`a7036510 fffff805`3d6379e5 : 00000000`0000ffc0 00000000`0000ffc0 00000000`00000004 00000000`00000000 : nt!ObCloseHandleTableEntry+0x2c7
ffffd300`a7036650 fffff805`3d637681 : 00000000`00000000 ffffd403`f7d0c080 ffffffff`ffffff01 ffffd403`f7f597c0 : nt!ExSweepHandleTable+0xd5
ffffd300`a7036700 fffff805`3d637ba9 : ffffffff`ffffffff ffffd403`f7f594c0 ffffd300`a7036750 ffffd403`00000000 : nt!ObKillProcess+0x35
ffffd300`a7036730 fffff805`3d65e1c3 : ffffd403`f7f594c0 ffffc302`6bd027b0 ffffd300`a7036959 00000000`00000000 : nt!PspRundownSingleProcess+0x131
ffffd300`a70367b0 fffff805`3d6cb973 : 00000000`40010004 00000000`0fa8b601 00000000`00272000 00008000`00000bb8 : nt!PspExitThread+0x60b
ffffd300`a70368c0 fffff805`3d03e511 : 00000000`00008000 fffff805`3d074f31 00000000`00000010 00000000`00040246 : nt!KiSchedulerApcTerminate+0x33
ffffd300`a7036900 fffff805`3d1c57a0 : 00000000`00000001 ffffd300`a70369c0 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x481
ffffd300`a70369c0 fffff805`3d1cf496 : ffffd403`f7d0c080 00000000`00000000 00000000`00272000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffd300`a7036b00 00000000`0fa8b660 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x4d6
00000000`0019f8b4 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfa8b660


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.418

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner


PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc).  If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000002c5e0d, page frame number
Arg3: 0000000000000002, current page state
Arg4: 020002c0002c5e0e, 0

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2609

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7138

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  4e

BUGCHECK_P1: 99

BUGCHECK_P2: 2c5e0d

BUGCHECK_P3: 2

BUGCHECK_P4: 20002c0002c5e0e

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  FarCry5.exe

STACK_TEXT: 
ffffab05`04d40ac8 fffff804`3bff77a0     : 00000000`0000004e 00000000`00000099 00000000`002c5e0d 00000000`00000002 : nt!KeBugCheckEx
ffffab05`04d40ad0 fffff804`3be77ac7     : 00000000`00000003 ffffab05`04d41220 ffffab05`04d41220 ffffab05`04d41170 : nt!MiDeletePteRun+0x1b8740
ffffab05`04d40cf0 fffff804`3be735e2     : ffffe10f`c7118580 ffff8281`0de56000 00000000`00004000 00000000`00000000 : nt!MiDeleteVaTail+0x77
ffffab05`04d40d20 fffff804`3be73771     : ffffab05`04d41170 ffff82c1`4086f2a8 00000000`00000000 0a000003`a78a4867 : nt!MiWalkPageTablesRecursively+0x512
ffffab05`04d40de0 fffff804`3be73771     : ffffab05`04d41170 ffff82c1`60a04378 00000000`00000000 0a000000`4876e867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffab05`04d40ea0 fffff804`3be73771     : ffffab05`04d41170 ffff82c1`60b05020 ffff82c1`00000000 0a000003`f8202867 : nt!MiWalkPageTablesRecursively+0x6a1
ffffab05`04d40f60 fffff804`3be72efc     : ffffab05`04d41170 ffffcaa4`40000000 ffffcaa4`00000000 ffffe10f`c7118580 : nt!MiWalkPageTablesRecursively+0x6a1
ffffab05`04d41020 fffff804`3be71368     : ffffab05`04d41170 00000000`00000002 00000000`00000001 fffff804`00000000 : nt!MiWalkPageTables+0x36c
ffffab05`04d41120 fffff804`3be7f4c0     : ffffffff`ffffffff ffffe10f`c71183f8 00000002`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffffab05`04d414c0 fffff804`3c3dd4bd     : ffffe10f`c85ab0c0 00000000`00000000 ffffe10f`c898ae70 ffffe10f`c85ab0c0 : nt!MiDeleteVad+0x860
ffffab05`04d41680 fffff804`3c3dca0f     : ffffe10f`c8a68060 ffffe10f`c8a68060 ffffe10f`c7118080 fffff804`3c26a440 : nt!MiCleanVad+0x4d
ffffab05`04d416b0 fffff804`3c46d6b9     : ffffffff`00000000 ffffffff`ffffffff ffffab05`04d41901 ffffe10f`c7118080 : nt!MmCleanProcessAddressSpace+0x137
ffffab05`04d41730 fffff804`3c426673     : ffffe10f`c7118080 ffff9705`c96f0060 ffffab05`04d41959 00000000`00000000 : nt!PspRundownSingleProcess+0x139
ffffab05`04d417b0 fffff804`3c423f23     : 00000000`00000003 ffffcc01`46524101 000000fc`b7090000 00000000`00000000 : nt!PspExitThread+0x60b
ffffab05`04d418c0 fffff804`3bea6441     : ffffe10f`c85ab0c0 ffffe10f`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffab05`04d41900 fffff804`3bfc6920     : 00000000`21a10001 ffffab05`04d419c0 00000000`00000000 fffff804`00000000 : nt!KiDeliverApc+0x481
ffffab05`04d419c0 fffff804`3bfd3cbf     : ffffe10f`c85ab0c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffab05`04d41b00 00007ffd`1549c0f4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000fc`bb3ff748 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`1549c0f4


SYMBOL_NAME:  nt!MiDeletePteRun+1b8740

MODULE_NAME: nt

IMAGE_VERSION:  10.0.18362.959

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1b8740

FAILURE_BUCKET_ID:  0x4E_99_nt!MiDeletePteRun

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {826a8dfe-b402-47c5-bb75-e9ab5230289f}

Followup:     MachineOwner
 
 
Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…