Çözüldü Mavi ekran hatası IRQL_NOT_LESS_OR_EQUAL

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

timeishammy

Hectopat
Katılım
28 Kasım 2016
Mesajlar
73
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Merhaba arkadaşlar,

Detroit Become Human, oyununu açılır açılmaz mavi ekran hatası alıyorum. Bu hafta Gears 5 oynarken de oldu. Hatalar ise "kernel Security check failure" ve "driver IRQL_NOT_LESS_OR_EQUAL". İnternetteki çözümleri denedim, fakat oyun açılmıyor. Minidump dosyalarını upload ettim. Yardımcı olabilir misiniz acaba sorun nedir?

 
Minidump'a göre senin hatan ntoskrnl.exe'den kaynaklanıyor.

Bu yeterli bir bilgi değil. Söz konusu Exe dosyası zaten işletim sistemi çekirdeği. Kullanıcı da güncel bir Windows kullandığına göre çekirdeğin mavi ekrana sebep olması düşük bir ihtimal.
 
Doğru diyorsunuz Recep Bey. Lakin donanım ve yazılımlar her ne kadar güncel de olsa, o kadar hassaslaştılar ki, en ufak şeyden bile hata almak mümkün hale geldi.

Bu yeterli bir bilgi değil. Söz konusu Exe dosyası zaten işletim sistemi çekirdeği. Kullanıcı da güncel bir Windows kullandığına göre çekirdeğin mavi ekrana sebep olması düşük bir ihtimal.
 
Dosyalarınızı analiz ettim. Ekran kartı kaynaklı gibi sorun. Overclock varsa kaldırın. Yoksa kartın GPU frekansını kısmanız gerekebilir. OCCT ile kartı test edebilirsiniz.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa28b72b8c870, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa28b72b8c7c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffa28b72b8c870

BUGCHECK_P3: ffffa28b72b8c7c8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa28b72b8c870 -- (.trap 0xffffa28b72b8c870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff910b2c8c8be0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80116bc4c49 rsp=ffffa28b72b8ca00 rbp=ffff910b2eb269a0
 r8=0000000000000000  r9=0000000000000000 r10=fffff8010fa3ee40
r11=ffffa28b72b8cb50 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff801`16bc4c49 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa28b72b8c7c8 -- (.exr 0xffffa28b72b8c7c8)
ExceptionAddress: fffff80116bc4c49 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffa28b`72b8c548 fffff801`0fbd32e9 : 00000000`00000139 00000000`00000003 ffffa28b`72b8c870 ffffa28b`72b8c7c8 : nt!KeBugCheckEx
ffffa28b`72b8c550 fffff801`0fbd3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa28b`72b8c690 fffff801`0fbd1aa5 : 00000000`00000005 fffff801`0fa68aeb ffffa28b`00000002 00000000`00000004 : nt!KiFastFailDispatch+0xd0
ffffa28b`72b8c870 fffff801`16bc4c49 : 00000000`00000000 ffff910b`2c852000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffa28b`72b8ca00 fffff801`16c390e9 : fffff780`00000320 ffff910b`2c852000 ffff910b`2eb269a0 ffff910b`2c852000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffffa28b`72b8ca50 fffff801`16c49aad : ffff910b`30dca400 00000000`00000000 ffff910b`2c8c6000 ffff910b`2eb269a0 : dxgmms2!VidSchiSubmitRenderVirtualCommand+0xf9
ffffa28b`72b8cb80 fffff801`16c4994a : ffff910b`2c852400 fffff801`16c49880 ffff910b`2c852000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x14d
ffffa28b`72b8cbd0 fffff801`0fb2a7a5 : ffff910b`2c8cd680 fffff801`00000001 ffff910b`2c852000 00000067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffa28b`72b8cc10 fffff801`0fbc8b2a : fffff801`0b75d180 ffff910b`2c8cd680 fffff801`0fb2a750 48c48b48`ccc35f20 : nt!PspSystemThreadStartup+0x55
ffffa28b`72b8cc60 00000000`00000000 : ffffa28b`72b8d000 ffffa28b`72b87000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  79

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {205f16eb-23f7-9cb6-6b18-dd9368af9984}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff806873abc35, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 28

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 8

BUGCHECK_P2: 6

BUGCHECK_P3: 0

BUGCHECK_P4: fffff806873abc35

READ_ADDRESS: fffff80682d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80682c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80682c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000008

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff830c6dcd8700 -- (.trap 0xffff830c6dcd8700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe6856d407710 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000000e rsi=0000000000000000 rdi=0000000000000000
rip=fffff806873abc35 rsp=ffff830c6dcd8890 rbp=ffffe6856fdca1f0
 r8=0000000000000000  r9=000000000000342c r10=0000000164e5c398
r11=ffff767ffe000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgmms2!VidSchiUpdateContextRunningTimeAtISR+0xf5:
fffff806`873abc35 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT: 
ffff830c`6dcd85b8 fffff806`829d32e9 : 00000000`0000000a 00000000`00000008 00000000`00000006 00000000`00000000 : nt!KeBugCheckEx
ffff830c`6dcd85c0 fffff806`829cf62b : ffff830c`6dcd8880 ffffe685`6d0f4040 ffff830c`6dcd8750 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff830c`6dcd8700 fffff806`873abc35 : ffffe685`6fdca1f0 00000000`00989680 ffff830c`6dcd8940 ffffe685`6b638000 : nt!KiPageFault+0x46b
ffff830c`6dcd8890 fffff806`873abb03 : 00000000`00989680 00000000`00000000 ffff830c`6dcd8a58 ffff830c`6dcd8a60 : dxgmms2!VidSchiUpdateContextRunningTimeAtISR+0xf5
ffff830c`6dcd8920 fffff806`829c2738 : ffffe685`6b0a7180 ffffe685`6d0f4180 00000001`64c31862 ffff830c`6dcd89f8 : dxgmms2!VidSchiUpdateNodeRunningTimeAtISR+0x43
ffff830c`6dcd8970 fffff806`8541485c : ffffe685`697f6070 fffff806`873abac0 ffff830c`6dcd8a58 00000000`00000000 : nt!KeSynchronizeExecution+0x48
ffff830c`6dcd89b0 fffff806`873a8963 : ffffe685`6b638000 ffffe685`6b638000 ffffe685`6bd03000 00000000`00000001 : dxgkrnl!DpSynchronizeExecution+0xac
ffff830c`6dcd8a00 fffff806`873a85c9 : ffffe685`6b638000 00000000`00000000 00000000`00989680 00000000`00989680 : dxgmms2!VidSchiSelectContext+0x163
ffff830c`6dcd8ac0 fffff806`87429990 : ffffe685`649a1000 ffffe685`6b638000 ffffe685`649a1010 ffffe685`702cb9b0 : dxgmms2!VidSchiScheduleCommandToRun+0x109
ffff830c`6dcd8b80 fffff806`8742994a : ffffe685`6b638400 fffff806`87429880 ffffe685`6b638000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x30
ffff830c`6dcd8bd0 fffff806`8292a7a5 : ffffe685`6d0f4040 fffff806`00000001 ffffe685`6b638000 ffff830c`00000001 : dxgmms2!VidSchiWorkerThread+0xca
ffff830c`6dcd8c10 fffff806`829c8b2a : ffff8680`03a95180 ffffe685`6d0f4040 fffff806`8292a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff830c`6dcd8c60 00000000`00000000 : ffff830c`6dcd9000 ffff830c`6dcd3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VidSchiUpdateContextRunningTimeAtISR+f5

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  f5

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiUpdateContextRunningTimeAtISR

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e2cc56d6-64ba-1cdf-63aa-4e8d4febdfb0}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80229805e6a, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 9

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80229805e6a

READ_ADDRESS: fffff80229d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80229c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80229c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000008

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Gears5.exe

TRAP_FRAME:  ffff9a8b8fb05c20 -- (.trap 0xffff9a8b8fb05c20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffff9a8b8fb05de0
rdx=ffff9a8b8d2b5310 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80229805e6a rsp=ffff9a8b8fb05db0 rbp=ffff9a8b8fb05e50
 r8=0000000000000001  r9=0000000000000000 r10=fffff178bc5e2000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0x2a:
fffff802`29805e6a 488b4308        mov     rax,qword ptr [rbx+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT: 
ffff9a8b`8fb05ad8 fffff802`299d32e9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9a8b`8fb05ae0 fffff802`299cf62b : 00000000`00000004 ffcd45c7`d82f8404 00000000`00040206 fffff802`29828830 : nt!KiBugCheckDispatch+0x69
ffff9a8b`8fb05c20 fffff802`29805e6a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`298b13d5 : nt!KiPageFault+0x46b
ffff9a8b`8fb05db0 fffff802`298afdd9 : ffff9100`00000001 00000000`00000000 00000000`0040bb72 00000000`00000040 : nt!KxWaitForLockOwnerShip+0x2a
ffff9a8b`8fb05de0 fffff802`298aed08 : 1a000000`9c7bc867 00000000`00000000 80000002`5d24d867 00000000`00000000 : nt!MiRemoveWsle+0x539
ffff9a8b`8fb05e90 fffff802`298ac9e7 : 00000000`00000000 fffff100`f6ed6d40 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x528
ffff9a8b`8fb05fa0 fffff802`298acea1 : ffff9a8b`8fb063f0 fffff178`807b76b0 00000000`00000000 0a000000`9c7bc867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff9a8b`8fb06060 fffff802`298acea1 : ffff9a8b`8fb063f0 fffff178`bc403db8 00000000`00000000 0a000003`7370b867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9a8b`8fb06120 fffff802`298acea1 : ffff9a8b`8fb063f0 fffff178`bc5e2018 fffff178`00000000 0a000003`92bb4867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9a8b`8fb061e0 fffff802`298ac62c : ffff9a8b`8fb063f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9a8b`8fb062a0 fffff802`298aaa98 : ffff9a8b`8fb063f0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff9a8b`8fb063a0 fffff802`298b8bf0 : ffffffff`ffffffff ffffe10e`27daa438 ffffe10e`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff9a8b`8fb06740 fffff802`298591da : 00000000`1eddae2f ffffe10e`16be9580 00000000`00000000 fffff802`298b3bca : nt!MiDeleteVad+0x860
ffff9a8b`8fb06900 fffff802`29e5b820 : 00000000`00000000 00000000`00000000 ffff9a8b`8fb06a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffff9a8b`8fb06960 fffff802`29e5b45b : 00000000`00000000 0000003b`aa9ac9d8 ffff20d1`a9317642 000001ed`00000004 : nt!MmFreeVirtualMemory+0x390
ffff9a8b`8fb06aa0 fffff802`299d2d18 : ffffe10e`16be9580 ffff9a8b`8fb06b80 000001ed`87eb8de0 ffffe10e`22088ae0 : nt!NtFreeVirtualMemory+0x8b
ffff9a8b`8fb06b00 00007ff9`1f3bc484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003b`aa9ae818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`1f3bc484


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+2a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a

FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93}

Followup:     MachineOwner
---------
 
Dosyalarınızı analiz ettim. Ekran kartı kaynaklı gibi sorun. Overclock varsa kaldırın. Yoksa kartın GPU frekansını kısmanız gerekebilir. OCCT ile kartı test edebilirsiniz.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffa28b72b8c870, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa28b72b8c7c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 12

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffa28b72b8c870

BUGCHECK_P3: ffffa28b72b8c7c8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa28b72b8c870 -- (.trap 0xffffa28b72b8c870)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff910b2c8c8be0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80116bc4c49 rsp=ffffa28b72b8ca00 rbp=ffff910b2eb269a0
r8=0000000000000000  r9=0000000000000000 r10=fffff8010fa3ee40
r11=ffffa28b72b8cb50 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79:
fffff801`16bc4c49 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa28b72b8c7c8 -- (.exr 0xffffa28b72b8c7c8)
ExceptionAddress: fffff80116bc4c49 (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x0000000000000079)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffa28b`72b8c548 fffff801`0fbd32e9 : 00000000`00000139 00000000`00000003 ffffa28b`72b8c870 ffffa28b`72b8c7c8 : nt!KeBugCheckEx
ffffa28b`72b8c550 fffff801`0fbd3710 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa28b`72b8c690 fffff801`0fbd1aa5 : 00000000`00000005 fffff801`0fa68aeb ffffa28b`00000002 00000000`00000004 : nt!KiFastFailDispatch+0xd0
ffffa28b`72b8c870 fffff801`16bc4c49 : 00000000`00000000 ffff910b`2c852000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffa28b`72b8ca00 fffff801`16c390e9 : fffff780`00000320 ffff910b`2c852000 ffff910b`2eb269a0 ffff910b`2c852000 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x79
ffffa28b`72b8ca50 fffff801`16c49aad : ffff910b`30dca400 00000000`00000000 ffff910b`2c8c6000 ffff910b`2eb269a0 : dxgmms2!VidSchiSubmitRenderVirtualCommand+0xf9
ffffa28b`72b8cb80 fffff801`16c4994a : ffff910b`2c852400 fffff801`16c49880 ffff910b`2c852000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x14d
ffffa28b`72b8cbd0 fffff801`0fb2a7a5 : ffff910b`2c8cd680 fffff801`00000001 ffff910b`2c852000 00000067`b4bbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffffa28b`72b8cc10 fffff801`0fbc8b2a : fffff801`0b75d180 ffff910b`2c8cd680 fffff801`0fb2a750 48c48b48`ccc35f20 : nt!PspSystemThreadStartup+0x55
ffffa28b`72b8cc60 00000000`00000000 : ffffa28b`72b8d000 ffffa28b`72b87000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+79

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  79

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {205f16eb-23f7-9cb6-6b18-dd9368af9984}

Followup:     MachineOwner
---------

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff806873abc35, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 4

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 28

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 79

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  d1

BUGCHECK_P1: 8

BUGCHECK_P2: 6

BUGCHECK_P3: 0

BUGCHECK_P4: fffff806873abc35

READ_ADDRESS: fffff80682d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80682c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80682c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff830c6dcd8700 -- (.trap 0xffff830c6dcd8700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe6856d407710 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000000e rsi=0000000000000000 rdi=0000000000000000
rip=fffff806873abc35 rsp=ffff830c6dcd8890 rbp=ffffe6856fdca1f0
r8=0000000000000000  r9=000000000000342c r10=0000000164e5c398
r11=ffff767ffe000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgmms2!VidSchiUpdateContextRunningTimeAtISR+0xf5:
fffff806`873abc35 488b5108        mov     rdx,qword ptr [rcx+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffff830c`6dcd85b8 fffff806`829d32e9 : 00000000`0000000a 00000000`00000008 00000000`00000006 00000000`00000000 : nt!KeBugCheckEx
ffff830c`6dcd85c0 fffff806`829cf62b : ffff830c`6dcd8880 ffffe685`6d0f4040 ffff830c`6dcd8750 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff830c`6dcd8700 fffff806`873abc35 : ffffe685`6fdca1f0 00000000`00989680 ffff830c`6dcd8940 ffffe685`6b638000 : nt!KiPageFault+0x46b
ffff830c`6dcd8890 fffff806`873abb03 : 00000000`00989680 00000000`00000000 ffff830c`6dcd8a58 ffff830c`6dcd8a60 : dxgmms2!VidSchiUpdateContextRunningTimeAtISR+0xf5
ffff830c`6dcd8920 fffff806`829c2738 : ffffe685`6b0a7180 ffffe685`6d0f4180 00000001`64c31862 ffff830c`6dcd89f8 : dxgmms2!VidSchiUpdateNodeRunningTimeAtISR+0x43
ffff830c`6dcd8970 fffff806`8541485c : ffffe685`697f6070 fffff806`873abac0 ffff830c`6dcd8a58 00000000`00000000 : nt!KeSynchronizeExecution+0x48
ffff830c`6dcd89b0 fffff806`873a8963 : ffffe685`6b638000 ffffe685`6b638000 ffffe685`6bd03000 00000000`00000001 : dxgkrnl!DpSynchronizeExecution+0xac
ffff830c`6dcd8a00 fffff806`873a85c9 : ffffe685`6b638000 00000000`00000000 00000000`00989680 00000000`00989680 : dxgmms2!VidSchiSelectContext+0x163
ffff830c`6dcd8ac0 fffff806`87429990 : ffffe685`649a1000 ffffe685`6b638000 ffffe685`649a1010 ffffe685`702cb9b0 : dxgmms2!VidSchiScheduleCommandToRun+0x109
ffff830c`6dcd8b80 fffff806`8742994a : ffffe685`6b638400 fffff806`87429880 ffffe685`6b638000 00000000`00000000 : dxgmms2!VidSchiRun_PriorityTable+0x30
ffff830c`6dcd8bd0 fffff806`8292a7a5 : ffffe685`6d0f4040 fffff806`00000001 ffffe685`6b638000 ffff830c`00000001 : dxgmms2!VidSchiWorkerThread+0xca
ffff830c`6dcd8c10 fffff806`829c8b2a : ffff8680`03a95180 ffffe685`6d0f4040 fffff806`8292a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff830c`6dcd8c60 00000000`00000000 : ffff830c`6dcd9000 ffff830c`6dcd3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


SYMBOL_NAME:  dxgmms2!VidSchiUpdateContextRunningTimeAtISR+f5

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  f5

FAILURE_BUCKET_ID:  AV_dxgmms2!VidSchiUpdateContextRunningTimeAtISR

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e2cc56d6-64ba-1cdf-63aa-4e8d4febdfb0}

Followup:     MachineOwner
---------

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80229805e6a, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-1IBQR0U

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 9

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 72

    Key  : Analysis.System
    Value: CreateObject


ADDITIONAL_XML: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 8

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80229805e6a

READ_ADDRESS: fffff80229d733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80229c2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80229c2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000008

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Gears5.exe

TRAP_FRAME:  ffff9a8b8fb05c20 -- (.trap 0xffff9a8b8fb05c20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffff9a8b8fb05de0
rdx=ffff9a8b8d2b5310 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80229805e6a rsp=ffff9a8b8fb05db0 rbp=ffff9a8b8fb05e50
r8=0000000000000001  r9=0000000000000000 r10=fffff178bc5e2000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0x2a:
fffff802`29805e6a 488b4308        mov     rax,qword ptr [rbx+8] ds:00000000`00000008=????????????????
Resetting default scope

STACK_TEXT:
ffff9a8b`8fb05ad8 fffff802`299d32e9 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff9a8b`8fb05ae0 fffff802`299cf62b : 00000000`00000004 ffcd45c7`d82f8404 00000000`00040206 fffff802`29828830 : nt!KiBugCheckDispatch+0x69
ffff9a8b`8fb05c20 fffff802`29805e6a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff802`298b13d5 : nt!KiPageFault+0x46b
ffff9a8b`8fb05db0 fffff802`298afdd9 : ffff9100`00000001 00000000`00000000 00000000`0040bb72 00000000`00000040 : nt!KxWaitForLockOwnerShip+0x2a
ffff9a8b`8fb05de0 fffff802`298aed08 : 1a000000`9c7bc867 00000000`00000000 80000002`5d24d867 00000000`00000000 : nt!MiRemoveWsle+0x539
ffff9a8b`8fb05e90 fffff802`298ac9e7 : 00000000`00000000 fffff100`f6ed6d40 00000000`00000000 00000000`00000000 : nt!MiDeleteVa+0x528
ffff9a8b`8fb05fa0 fffff802`298acea1 : ffff9a8b`8fb063f0 fffff178`807b76b0 00000000`00000000 0a000000`9c7bc867 : nt!MiWalkPageTablesRecursively+0x1e7
ffff9a8b`8fb06060 fffff802`298acea1 : ffff9a8b`8fb063f0 fffff178`bc403db8 00000000`00000000 0a000003`7370b867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9a8b`8fb06120 fffff802`298acea1 : ffff9a8b`8fb063f0 fffff178`bc5e2018 fffff178`00000000 0a000003`92bb4867 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9a8b`8fb061e0 fffff802`298ac62c : ffff9a8b`8fb063f0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffff9a8b`8fb062a0 fffff802`298aaa98 : ffff9a8b`8fb063f0 00000000`00000002 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffff9a8b`8fb063a0 fffff802`298b8bf0 : ffffffff`ffffffff ffffe10e`27daa438 ffffe10e`00000001 00000000`00000000 : nt!MiDeletePagablePteRange+0x268
ffff9a8b`8fb06740 fffff802`298591da : 00000000`1eddae2f ffffe10e`16be9580 00000000`00000000 fffff802`298b3bca : nt!MiDeleteVad+0x860
ffff9a8b`8fb06900 fffff802`29e5b820 : 00000000`00000000 00000000`00000000 ffff9a8b`8fb06a60 ffffffff`ffffffff : nt!MiFreeVadRange+0x9e
ffff9a8b`8fb06960 fffff802`29e5b45b : 00000000`00000000 0000003b`aa9ac9d8 ffff20d1`a9317642 000001ed`00000004 : nt!MmFreeVirtualMemory+0x390
ffff9a8b`8fb06aa0 fffff802`299d2d18 : ffffe10e`16be9580 ffff9a8b`8fb06b80 000001ed`87eb8de0 ffffe10e`22088ae0 : nt!NtFreeVirtualMemory+0x8b
ffff9a8b`8fb06b00 00007ff9`1f3bc484 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003b`aa9ae818 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`1f3bc484


SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+2a

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.535

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2a

FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93}

Followup:     MachineOwner
---------
Teşekkür ederim Recep bey, test ettireyim hemen.
Benim ekran kartım NVIDIA RTX 2060. OCCT ile ilgili foruma baktım riskli olabileceği söyleniyor. Herhangi bir risk mevcut mu? Ekran kartını alalı 5 ay oldu. Bir de NVIDIA için OCCT programını nasıl kullanmam gerekiyor? Forumda AMD ekran kartı için gördüm.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı