KERNEL_SECURITY_CHECK_FAILURE Mavi Ekran Hatası

Vasc

Kilopat
Katılım
7 Ekim 2018
Mesajlar
1.667
Makaleler
1
Çözümler
6
Daha fazla  
Cinsiyet
Erkek
Bundan 1.5 ay önce Ocak ayında konu açmıştım yine aynı hatayı aldığım için. O günden bugüne kadar olmamıştı fakat son üç gündür sık sık almaya başladım. DMP dosyasının linkini bırakıyorum.

 
Çözüm
Ekran kartı sorunu gibi.

DDU ile ekran kartı sürücüsünü kaldırın ve güncel sürümü yükleyin.

Ek olarak BIOS'u da güncelleyin:

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff81897db8bae0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81897db8ba38, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B38

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.D0

BIOS_DATE:  12/21/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffff81897db8bae0

BUGCHECK_P3: ffff81897db8ba38

BUGCHECK_P4: 0

TRAP_FRAME:  ffff81897db8bae0 -- (.trap 0xffff81897db8bae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08f221db4a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444d547a9 rsp=ffff81897db8bc70 rbp=ffffc08f2224c7f0
 r8=ffffc08f2226c820  r9=7fff900582f78b60 r10=7ffffffffffffffc
r11=ffff81897db8be08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff804`44d547a9 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff81897db8ba38 -- (.exr 0xffff81897db8ba38)
ExceptionAddress: fffff80444d547a9 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-K01TCKK

ANALYSIS_SESSION_TIME:  03-03-2019 15:35:15.0381

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80437c72c69 to fffff80437c61440

STACK_TEXT:  
ffff8189`7db8b7b8 fffff804`37c72c69 : 00000000`00000139 00000000`00000003 ffff8189`7db8bae0 ffff8189`7db8ba38 : nt!KeBugCheckEx
ffff8189`7db8b7c0 fffff804`37c73010 : 00000000`00000000 00002b05`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8189`7db8b900 fffff804`37c71408 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8189`7db8bae0 fffff804`44d547a9 : 00000000`00000000 ffffe780`c9400000 00000000`00000000 ffffc08f`2224d010 : nt!KiRaiseSecurityCheckFailure+0x308
ffff8189`7db8bc70 fffff804`44dc6812 : ffffc08f`221e2970 ffffc08f`2226c550 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffff8189`7db8bcc0 fffff804`418885e2 : ffffc08f`1f2a7610 ffffc08f`221e2970 00000000`08000000 ffffc08f`2104f000 : dxgmms2!VidSchSubmitCommand+0xf2
ffff8189`7db8be10 fffff804`41888011 : ffffc08f`21020000 ffff8189`7db8cb80 ffff8189`7db8c8d0 ffff9005`83693790 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x442
ffff8189`7db8c5e0 fffff804`418887b1 : ffff8189`7db8cad8 00000000`00000001 ffff9005`82f78a90 000002c0`39542f50 : dxgkrnl!DxgkSubmitCommandInternal+0x4f1
ffff8189`7db8ca90 ffffba88`4e604eb1 : 00000000`00000102 ffffc08f`21bac080 000002c0`3b8ef9f0 00000000`00000820 : dxgkrnl!DxgkSubmitCommand+0x51
ffff8189`7db8cad0 fffff804`37c72685 : ffffc08f`21bac080 000000ce`c51fd908 ffff8189`7db8cad8 ffffc08f`22108ca0 : win32kbase!NtGdiDdDDISubmitCommand+0x11
ffff8189`7db8cb00 00007ffd`ea415a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ce`c51fc5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ea415a44


THREAD_SHA1_HASH_MOD_FUNC:  0fe0f3029cd17e32d571e8aecb94a381045b5a90

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5079661dfaa1992577e4ad767556abce4eaf95ae

THREAD_SHA1_HASH_MOD:  0a2432e5349934d33411ce17e0d5c315ef1f7af0

FOLLOWUP_IP:
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
fffff804`44d547a9 cd29            int     29h

FAULT_INSTR_CODE:  cccc29cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.55

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  79

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

TARGET_TIME:  2019-03-03T08:03:48.000Z

OSBUILD:  17763

OSSERVICEPACK:  316

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  65f3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_dxgmms2!vidschiinterlockedremoveheadlistifexist

FAILURE_ID_HASH:  {205f16eb-23f7-9cb6-6b18-dd9368af9984}

Followup:     MachineOwner
---------
Ekran kartı sorunu gibi.

DDU ile ekran kartı sürücüsünü kaldırın ve güncel sürümü yükleyin.

Ek olarak BIOS'u da güncelleyin:

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff81897db8bae0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81897db8ba38, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B38

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.D0

BIOS_DATE:  12/21/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffff81897db8bae0

BUGCHECK_P3: ffff81897db8ba38

BUGCHECK_P4: 0

TRAP_FRAME:  ffff81897db8bae0 -- (.trap 0xffff81897db8bae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08f221db4a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444d547a9 rsp=ffff81897db8bc70 rbp=ffffc08f2224c7f0
 r8=ffffc08f2226c820  r9=7fff900582f78b60 r10=7ffffffffffffffc
r11=ffff81897db8be08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff804`44d547a9 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff81897db8ba38 -- (.exr 0xffff81897db8ba38)
ExceptionAddress: fffff80444d547a9 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-K01TCKK

ANALYSIS_SESSION_TIME:  03-03-2019 15:35:15.0381

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80437c72c69 to fffff80437c61440

STACK_TEXT:  
ffff8189`7db8b7b8 fffff804`37c72c69 : 00000000`00000139 00000000`00000003 ffff8189`7db8bae0 ffff8189`7db8ba38 : nt!KeBugCheckEx
ffff8189`7db8b7c0 fffff804`37c73010 : 00000000`00000000 00002b05`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8189`7db8b900 fffff804`37c71408 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8189`7db8bae0 fffff804`44d547a9 : 00000000`00000000 ffffe780`c9400000 00000000`00000000 ffffc08f`2224d010 : nt!KiRaiseSecurityCheckFailure+0x308
ffff8189`7db8bc70 fffff804`44dc6812 : ffffc08f`221e2970 ffffc08f`2226c550 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffff8189`7db8bcc0 fffff804`418885e2 : ffffc08f`1f2a7610 ffffc08f`221e2970 00000000`08000000 ffffc08f`2104f000 : dxgmms2!VidSchSubmitCommand+0xf2
ffff8189`7db8be10 fffff804`41888011 : ffffc08f`21020000 ffff8189`7db8cb80 ffff8189`7db8c8d0 ffff9005`83693790 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x442
ffff8189`7db8c5e0 fffff804`418887b1 : ffff8189`7db8cad8 00000000`00000001 ffff9005`82f78a90 000002c0`39542f50 : dxgkrnl!DxgkSubmitCommandInternal+0x4f1
ffff8189`7db8ca90 ffffba88`4e604eb1 : 00000000`00000102 ffffc08f`21bac080 000002c0`3b8ef9f0 00000000`00000820 : dxgkrnl!DxgkSubmitCommand+0x51
ffff8189`7db8cad0 fffff804`37c72685 : ffffc08f`21bac080 000000ce`c51fd908 ffff8189`7db8cad8 ffffc08f`22108ca0 : win32kbase!NtGdiDdDDISubmitCommand+0x11
ffff8189`7db8cb00 00007ffd`ea415a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ce`c51fc5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ea415a44


THREAD_SHA1_HASH_MOD_FUNC:  0fe0f3029cd17e32d571e8aecb94a381045b5a90

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5079661dfaa1992577e4ad767556abce4eaf95ae

THREAD_SHA1_HASH_MOD:  0a2432e5349934d33411ce17e0d5c315ef1f7af0

FOLLOWUP_IP:
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
fffff804`44d547a9 cd29            int     29h

FAULT_INSTR_CODE:  cccc29cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.55

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  79

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

TARGET_TIME:  2019-03-03T08:03:48.000Z

OSBUILD:  17763

OSSERVICEPACK:  316

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  65f3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_dxgmms2!vidschiinterlockedremoveheadlistifexist

FAILURE_ID_HASH:  {205f16eb-23f7-9cb6-6b18-dd9368af9984}

Followup:     MachineOwner
---------
 
Çözüm
Ekran kartı sorunu gibi.

DDU ile ekran kartı sürücüsünü kaldırın ve güncel sürümü yükleyin.

Ek olarak BIOS'u da güncelleyin:

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff81897db8bae0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff81897db8ba38, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME:  MS-7B38

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  1.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  2.D0

BIOS_DATE:  12/21/2018

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd

BASEBOARD_PRODUCT:  B350M PRO-VD PLUS (MS-7B38)

BASEBOARD_VERSION:  1.0

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffff81897db8bae0

BUGCHECK_P3: ffff81897db8ba38

BUGCHECK_P4: 0

TRAP_FRAME:  ffff81897db8bae0 -- (.trap 0xffff81897db8bae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc08f221db4a8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444d547a9 rsp=ffff81897db8bc70 rbp=ffffc08f2224c7f0
r8=ffffc08f2226c820  r9=7fff900582f78b60 r10=7ffffffffffffffc
r11=ffff81897db8be08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff804`44d547a9 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff81897db8ba38 -- (.exr 0xffff81897db8ba38)
ExceptionAddress: fffff80444d547a9 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-K01TCKK

ANALYSIS_SESSION_TIME:  03-03-2019 15:35:15.0381

ANALYSIS_VERSION: 10.0.18317.1001 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80437c72c69 to fffff80437c61440

STACK_TEXT: 
ffff8189`7db8b7b8 fffff804`37c72c69 : 00000000`00000139 00000000`00000003 ffff8189`7db8bae0 ffff8189`7db8ba38 : nt!KeBugCheckEx
ffff8189`7db8b7c0 fffff804`37c73010 : 00000000`00000000 00002b05`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8189`7db8b900 fffff804`37c71408 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff8189`7db8bae0 fffff804`44d547a9 : 00000000`00000000 ffffe780`c9400000 00000000`00000000 ffffc08f`2224d010 : nt!KiRaiseSecurityCheckFailure+0x308
ffff8189`7db8bc70 fffff804`44dc6812 : ffffc08f`221e2970 ffffc08f`2226c550 00000000`00000000 00000000`00000000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffff8189`7db8bcc0 fffff804`418885e2 : ffffc08f`1f2a7610 ffffc08f`221e2970 00000000`08000000 ffffc08f`2104f000 : dxgmms2!VidSchSubmitCommand+0xf2
ffff8189`7db8be10 fffff804`41888011 : ffffc08f`21020000 ffff8189`7db8cb80 ffff8189`7db8c8d0 ffff9005`83693790 : dxgkrnl!DXGCONTEXT::SubmitCommand+0x442
ffff8189`7db8c5e0 fffff804`418887b1 : ffff8189`7db8cad8 00000000`00000001 ffff9005`82f78a90 000002c0`39542f50 : dxgkrnl!DxgkSubmitCommandInternal+0x4f1
ffff8189`7db8ca90 ffffba88`4e604eb1 : 00000000`00000102 ffffc08f`21bac080 000002c0`3b8ef9f0 00000000`00000820 : dxgkrnl!DxgkSubmitCommand+0x51
ffff8189`7db8cad0 fffff804`37c72685 : ffffc08f`21bac080 000000ce`c51fd908 ffff8189`7db8cad8 ffffc08f`22108ca0 : win32kbase!NtGdiDdDDISubmitCommand+0x11
ffff8189`7db8cb00 00007ffd`ea415a44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000ce`c51fc5b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ea415a44


THREAD_SHA1_HASH_MOD_FUNC:  0fe0f3029cd17e32d571e8aecb94a381045b5a90

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  5079661dfaa1992577e4ad767556abce4eaf95ae

THREAD_SHA1_HASH_MOD:  0a2432e5349934d33411ce17e0d5c315ef1f7af0

FOLLOWUP_IP:
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79
fffff804`44d547a9 cd29            int     29h

FAULT_INSTR_CODE:  cccc29cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.17763.55

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  79

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

TARGET_TIME:  2019-03-03T08:03:48.000Z

OSBUILD:  17763

OSSERVICEPACK:  316

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  65f3

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_dxgmms2!vidschiinterlockedremoveheadlistifexist

FAILURE_ID_HASH:  {205f16eb-23f7-9cb6-6b18-dd9368af9984}

Followup:     MachineOwner
---------
Hocam her iki dediğinizi de yaptım, sorun olup olmadığını nasıl kontrol edebilirim ?
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Yeni konular

Geri
Yukarı