KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80054a7c9b0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff80054a7c908, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 86180
Key : Analysis.Init.CPU.mSec
Value: 905
Key : Analysis.Init.Elapsed.mSec
Value: 2962
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122621-8281-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80054a7c9b0
BUGCHECK_P3: fffff80054a7c908
BUGCHECK_P4: 0
TRAP_FRAME: fffff80054a7c9b0 -- (.trap 0xfffff80054a7c9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48e98c51d00 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb48e98c56830 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004f530c4c rsp=fffff80054a7cb40 rbp=0000000000000001
r8=fffff80064560000 r9=0000000000000003 r10=00000000000000e0
r11=fffff80054a7cc00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
nt!ExInterlockedRemoveHeadList+0x8c:
fffff800`4f530c4c cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80054a7c908 -- (.exr 0xfffff80054a7c908)
ExceptionAddress: fffff8004f530c4c (nt!ExInterlockedRemoveHeadList+0x000000000000008c)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff800`54a7c688 fffff800`4f609069 : 00000000`00000139 00000000`00000003 fffff800`54a7c9b0 fffff800`54a7c908 : nt!KeBugCheckEx
fffff800`54a7c690 fffff800`4f609490 : ffffb48e`9fb84000 00000000`000dd7a3 ffffb48e`9fc06910 00000000`000dd7a3 : nt!KiBugCheckDispatch+0x69
fffff800`54a7c7d0 fffff800`4f607823 : 00000000`00000001 00000004`000dd7a3 00000000`00000004 fffff800`64745ab5 : nt!KiFastFailDispatch+0xd0
fffff800`54a7c9b0 fffff800`4f530c4c : 00000000`00000000 fffff800`00000000 ffffb48e`98c56820 ffffb48e`98c56830 : nt!KiRaiseSecurityCheckFailure+0x323
fffff800`54a7cb40 fffff800`645c872c : fffff800`54a7cbf0 fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 : nt!ExInterlockedRemoveHeadList+0x8c
fffff800`54a7cb70 fffff800`54a7cbf0 : fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 : amdkmdag+0x6872c
fffff800`54a7cb78 fffff800`54a7cc20 : fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae : 0xfffff800`54a7cbf0
fffff800`54a7cb80 fffff800`54a7cc50 : 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 : 0xfffff800`54a7cc20
fffff800`54a7cb88 00000000`00000000 : ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 00000000`00000008 : 0xfffff800`54a7cc50
SYMBOL_NAME: amdkmdag+6872c
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6872c
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_amdkmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c7ee0261-4e2c-7ca0-fdcc-d386e7e1e09d}
Followup: MachineOwner
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the BugCheck.
Arg2: fffff5c600304bf8
Arg3: 0000000000000010
Arg4: 00008a0000008a00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 50370
Key : Analysis.Init.CPU.mSec
Value: 811
Key : Analysis.Init.Elapsed.mSec
Value: 34853
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122621-7890-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 5100
BUGCHECK_P2: fffff5c600304bf8
BUGCHECK_P3: 10
BUGCHECK_P4: 8a0000008a00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
STACK_TEXT:
ffff880e`0f3e1538 fffff805`7d04709d : 00000000`0000001a 00000000`00005100 fffff5c6`00304bf8 00000000`00000010 : nt!KeBugCheckEx
ffff880e`0f3e1540 fffff805`7ce1b641 : 00000000`00000000 fffff805`7d84ed40 00000000`00000000 00000000`00000010 : nt!MiFlushTbAsNeeded+0x19439d
ffff880e`0f3e1680 fffff805`7cf491f1 : 00000000`00000019 00000000`00000000 00000000`00000000 00000000`00000010 : nt!MiReservePtes+0x2f1
ffff880e`0f3e1750 fffff805`7cf1a00d : 00000000`00000001 00000000`00000000 00000000`00000002 ffff880e`0f3e18b0 : nt!MiZeroLargePage+0xcd
ffff880e`0f3e1850 fffff805`7cea4f43 : 00000000`00298880 00000000`00000000 00000000`00000001 00000000`00000008 : nt!MiGetLargePage+0x2ad
ffff880e`0f3e19a0 fffff805`7cea27e8 : 00000000`00000001 ffff880e`0f3e1ce0 00000240`14077000 00000000`00000001 : nt!MiGetPageChain+0x253
ffff880e`0f3e1be0 fffff805`7cea1d38 : ffff880e`0f3e1d70 00000000`00e00000 00000000`00000001 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8
ffff880e`0f3e1d10 fffff805`7cea110d : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208
ffff880e`0f3e1e00 fffff805`7ce9f1f9 : 00000000`00000000 00000000`0000001c 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x22d
ffff880e`0f3e1f40 fffff805`7cf45bec : fffff5fa`fd7eb000 ffffa10c`73ed9740 fffff5fa`c0900500 00000240`14070000 : nt!MmAccessFault+0x189
ffff880e`0f3e20e0 fffff805`7ce4e6ec : 00000000`00000000 fffff581`200a03b8 ffff880e`0f3e2240 fffff5fa`fd7ebf58 : nt!MiFaultInProbeAddress+0xbc
ffff880e`0f3e2190 fffff805`7ce4da33 : 00000000`00000311 00000000`00000000 ffff880e`0f3e22b9 00000240`14077000 : nt!MiLockPageLeafPageTable+0x28c
ffff880e`0f3e2200 fffff805`7ce4d8c9 : 00000000`00000000 ffffcb8c`fec1d810 00000000`00100000 80000002`96afd86f : nt!MiProbeAndLockPages+0x153
ffff880e`0f3e2320 fffff805`8de31a98 : ffffa10c`00000000 00000000`00000000 00000000`00100000 ffffcb8c`f230ff90 : nt!MmProbeAndLockPages+0x29
ffff880e`0f3e2350 fffff805`8de31972 : ffffcb8c`f230ff90 ffffcb8c`f230ff90 00000000`00000f00 00000240`14070000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c
ffff880e`0f3e23b0 fffff805`8de33bb1 : ffffcb8c`ff09f160 ffffcb8c`fd5f2d80 ffffa10c`00000000 ffffa10c`64ddddb0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x10a
ffff880e`0f3e2430 fffff805`8de33a57 : ffffcb8c`f3927c10 00000000`00100000 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0xbd
ffff880e`0f3e2490 fffff805`8de341bb : ffffcb8c`f9ad8790 00000000`00000000 00000000`00000000 00000000`00100000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83
ffff880e`0f3e24f0 fffff805`8de3fca5 : ffffcb8c`f9ad8790 ffffcb8c`fd5f2d00 00000000`00000000 00000000`00049459 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProbeAndLockAllocation+0x7b
ffff880e`0f3e2570 fffff805`8de3ff08 : ffffcb8c`fd5f2d00 ffffa10c`64dddd00 ffffcb8c`00000000 ffffa10c`70dc7000 : dxgmms2!VIDMM_GLOBAL::ProbeAndLockAllocation+0x55
ffff880e`0f3e25c0 fffff805`8de40426 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc4
ffff880e`0f3e2680 fffff805`8de47ff0 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 ffffa10c`77b9ab10 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0xb6
ffff880e`0f3e26c0 fffff805`8de46425 : ffffcb8c`00000000 ffff880e`0f3e28e0 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1d0
ffff880e`0f3e27e0 fffff805`8de5c65e : 00000000`00000002 00000000`00989680 ffffcb8c`e36228d0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xe25
ffff880e`0f3e2a00 fffff805`8de66809 : ffffcb8c`e3622800 ffffa10c`7056c201 00000000`00000000 00000000`0590dd00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
ffff880e`0f3e2be0 fffff805`7cf55935 : ffffa10c`7056c280 fffff805`8de66800 ffffcb8c`e3622800 000f8067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff880e`0f3e2c10 fffff805`7cffe728 : fffff805`7a1be180 ffffa10c`7056c280 fffff805`7cf558e0 976b9cbb`5ce5dae7 : nt!PspSystemThreadStartup+0x55
ffff880e`0f3e2c60 00000000`00000000 : ffff880e`0f3e3000 ffff880e`0f3dd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Lock+6c
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1173
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6c
FAILURE_BUCKET_ID: 0x1a_5100_dxgmms2!VIDMM_MDL_RANGE::Lock
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cca71c59-2b14-3cf9-d49b-b00e8cf70f42}
Followup: MachineOwner
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80054a7c9b0, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff80054a7c908, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 86180
Key : Analysis.Init.CPU.mSec
Value: 905
Key : Analysis.Init.Elapsed.mSec
Value: 2962
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122621-8281-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff80054a7c9b0
BUGCHECK_P3: fffff80054a7c908
BUGCHECK_P4: 0
TRAP_FRAME: fffff80054a7c9b0 -- (.trap 0xfffff80054a7c9b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb48e98c51d00 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb48e98c56830 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004f530c4c rsp=fffff80054a7cb40 rbp=0000000000000001
r8=fffff80064560000 r9=0000000000000003 r10=00000000000000e0
r11=fffff80054a7cc00 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po cy
nt!ExInterlockedRemoveHeadList+0x8c:
fffff800`4f530c4c cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff80054a7c908 -- (.exr 0xfffff80054a7c908)
ExceptionAddress: fffff8004f530c4c (nt!ExInterlockedRemoveHeadList+0x000000000000008c)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff800`54a7c688 fffff800`4f609069 : 00000000`00000139 00000000`00000003 fffff800`54a7c9b0 fffff800`54a7c908 : nt!KeBugCheckEx
fffff800`54a7c690 fffff800`4f609490 : ffffb48e`9fb84000 00000000`000dd7a3 ffffb48e`9fc06910 00000000`000dd7a3 : nt!KiBugCheckDispatch+0x69
fffff800`54a7c7d0 fffff800`4f607823 : 00000000`00000001 00000004`000dd7a3 00000000`00000004 fffff800`64745ab5 : nt!KiFastFailDispatch+0xd0
fffff800`54a7c9b0 fffff800`4f530c4c : 00000000`00000000 fffff800`00000000 ffffb48e`98c56820 ffffb48e`98c56830 : nt!KiRaiseSecurityCheckFailure+0x323
fffff800`54a7cb40 fffff800`645c872c : fffff800`54a7cbf0 fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 : nt!ExInterlockedRemoveHeadList+0x8c
fffff800`54a7cb70 fffff800`54a7cbf0 : fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 : amdkmdag+0x6872c
fffff800`54a7cb78 fffff800`54a7cc20 : fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae : 0xfffff800`54a7cbf0
fffff800`54a7cb80 fffff800`54a7cc50 : 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 : 0xfffff800`54a7cc20
fffff800`54a7cb88 00000000`00000000 : ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 00000000`00000008 : 0xfffff800`54a7cc50
SYMBOL_NAME: amdkmdag+6872c
MODULE_NAME: amdkmdag
IMAGE_NAME: amdkmdag.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6872c
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_amdkmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c7ee0261-4e2c-7ca0-fdcc-d386e7e1e09d}
Followup: MachineOwner
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005100, The subtype of the BugCheck.
Arg2: fffff5c600304bf8
Arg3: 0000000000000010
Arg4: 00008a0000008a00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7124
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 50370
Key : Analysis.Init.CPU.mSec
Value: 811
Key : Analysis.Init.Elapsed.mSec
Value: 34853
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 122621-7890-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 5100
BUGCHECK_P2: fffff5c600304bf8
BUGCHECK_P3: 10
BUGCHECK_P4: 8a0000008a00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: msedge.exe
STACK_TEXT:
ffff880e`0f3e1538 fffff805`7d04709d : 00000000`0000001a 00000000`00005100 fffff5c6`00304bf8 00000000`00000010 : nt!KeBugCheckEx
ffff880e`0f3e1540 fffff805`7ce1b641 : 00000000`00000000 fffff805`7d84ed40 00000000`00000000 00000000`00000010 : nt!MiFlushTbAsNeeded+0x19439d
ffff880e`0f3e1680 fffff805`7cf491f1 : 00000000`00000019 00000000`00000000 00000000`00000000 00000000`00000010 : nt!MiReservePtes+0x2f1
ffff880e`0f3e1750 fffff805`7cf1a00d : 00000000`00000001 00000000`00000000 00000000`00000002 ffff880e`0f3e18b0 : nt!MiZeroLargePage+0xcd
ffff880e`0f3e1850 fffff805`7cea4f43 : 00000000`00298880 00000000`00000000 00000000`00000001 00000000`00000008 : nt!MiGetLargePage+0x2ad
ffff880e`0f3e19a0 fffff805`7cea27e8 : 00000000`00000001 ffff880e`0f3e1ce0 00000240`14077000 00000000`00000001 : nt!MiGetPageChain+0x253
ffff880e`0f3e1be0 fffff805`7cea1d38 : ffff880e`0f3e1d70 00000000`00e00000 00000000`00000001 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8
ffff880e`0f3e1d10 fffff805`7cea110d : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208
ffff880e`0f3e1e00 fffff805`7ce9f1f9 : 00000000`00000000 00000000`0000001c 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x22d
ffff880e`0f3e1f40 fffff805`7cf45bec : fffff5fa`fd7eb000 ffffa10c`73ed9740 fffff5fa`c0900500 00000240`14070000 : nt!MmAccessFault+0x189
ffff880e`0f3e20e0 fffff805`7ce4e6ec : 00000000`00000000 fffff581`200a03b8 ffff880e`0f3e2240 fffff5fa`fd7ebf58 : nt!MiFaultInProbeAddress+0xbc
ffff880e`0f3e2190 fffff805`7ce4da33 : 00000000`00000311 00000000`00000000 ffff880e`0f3e22b9 00000240`14077000 : nt!MiLockPageLeafPageTable+0x28c
ffff880e`0f3e2200 fffff805`7ce4d8c9 : 00000000`00000000 ffffcb8c`fec1d810 00000000`00100000 80000002`96afd86f : nt!MiProbeAndLockPages+0x153
ffff880e`0f3e2320 fffff805`8de31a98 : ffffa10c`00000000 00000000`00000000 00000000`00100000 ffffcb8c`f230ff90 : nt!MmProbeAndLockPages+0x29
ffff880e`0f3e2350 fffff805`8de31972 : ffffcb8c`f230ff90 ffffcb8c`f230ff90 00000000`00000f00 00000240`14070000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c
ffff880e`0f3e23b0 fffff805`8de33bb1 : ffffcb8c`ff09f160 ffffcb8c`fd5f2d80 ffffa10c`00000000 ffffa10c`64ddddb0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x10a
ffff880e`0f3e2430 fffff805`8de33a57 : ffffcb8c`f3927c10 00000000`00100000 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0xbd
ffff880e`0f3e2490 fffff805`8de341bb : ffffcb8c`f9ad8790 00000000`00000000 00000000`00000000 00000000`00100000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83
ffff880e`0f3e24f0 fffff805`8de3fca5 : ffffcb8c`f9ad8790 ffffcb8c`fd5f2d00 00000000`00000000 00000000`00049459 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProbeAndLockAllocation+0x7b
ffff880e`0f3e2570 fffff805`8de3ff08 : ffffcb8c`fd5f2d00 ffffa10c`64dddd00 ffffcb8c`00000000 ffffa10c`70dc7000 : dxgmms2!VIDMM_GLOBAL::ProbeAndLockAllocation+0x55
ffff880e`0f3e25c0 fffff805`8de40426 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc4
ffff880e`0f3e2680 fffff805`8de47ff0 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 ffffa10c`77b9ab10 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0xb6
ffff880e`0f3e26c0 fffff805`8de46425 : ffffcb8c`00000000 ffff880e`0f3e28e0 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1d0
ffff880e`0f3e27e0 fffff805`8de5c65e : 00000000`00000002 00000000`00989680 ffffcb8c`e36228d0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xe25
ffff880e`0f3e2a00 fffff805`8de66809 : ffffcb8c`e3622800 ffffa10c`7056c201 00000000`00000000 00000000`0590dd00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
ffff880e`0f3e2be0 fffff805`7cf55935 : ffffa10c`7056c280 fffff805`8de66800 ffffcb8c`e3622800 000f8067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff880e`0f3e2c10 fffff805`7cffe728 : fffff805`7a1be180 ffffa10c`7056c280 fffff805`7cf558e0 976b9cbb`5ce5dae7 : nt!PspSystemThreadStartup+0x55
ffff880e`0f3e2c60 00000000`00000000 : ffff880e`0f3e3000 ffff880e`0f3dd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Lock+6c
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.1173
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 6c
FAILURE_BUCKET_ID: 0x1a_5100_dxgmms2!VIDMM_MDL_RANGE::Lock
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cca71c59-2b14-3cf9-d49b-b00e8cf70f42}
Followup: MachineOwner
Raporlarınızı inceledim. Sanıyorum sorun grafik sürücünüzle ilgili. DDU yazılımı ile temizledikten sonra grafik sürücünüzü tekrar kurmanızı istiyorum.
DDU: DDU ile Sürücü Kaldırma Rehberi
Sürücü: https://www.amd.com/en/support/apu/...-processors-radeon-graphics/amd-ryzen-3-3250u
Lütfen "adrenalin 21.10.2 recommended (WHQL)" olan sürümü kurun. Windows 10 64-bit seçmeyi unutmayın.
BIOS'unuza güncelleme gelmiş dilerseniz onu da yapın.
Artı olarak "Bluetooth" sürücünüzü güncellemenizi de tavsiye ediyorum.
Bluetooth: https://dlcdnets.asus.com/pub/ASUS/...etooth_DCH_Realtek_Z_V1.8.1030.3002_20115.exe
SpeedFan yazılımını geçici bir süreliğine kaldırın.
Windows Update üzerinden tüm güncelleştirmeleri aldığınızdan emin olun.
Aşağıya paylaştığım rehberdeki adımları uygulayın.
Rehber: Rehber: Eksik ve bozuk SYS dosyalarını onarmak
Ağ sürücünüzü de güncelleyebilirsiniz.
Ağ: https://dlcdnets.asus.com/pub/ASUS/...essLan_DCH_Realtek_Z_V2024.0.10.124_20114.exe
Sorununuzun devamı halinde, oluşan güncel minidump dosyalarını paylaşın tekrardan analiz edelim. Umarım çözülür. Kolay gelsin.
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffff80054a7c9b0, Address of the trap frame for the exception that caused the BugCheck. Arg3: fffff80054a7c908, Address of the exception record for the exception that caused the BugCheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4296. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 86180. Key : Analysis.Init.CPU.mSec Value: 905. Key : Analysis.Init.Elapsed.mSec Value: 2962. Key : Analysis.Memory.CommitPeak.Mb Value: 77. Key : FailFast.Name Value: CORRUPT_LIST_ENTRY. Key : FailFast.Type Value: 3 Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 122621-8281-01.dmp BUGCHECK_CODE: 139. BUGCHECK_P1: 3 BUGCHECK_P2: fffff80054a7c9b0. BUGCHECK_P3: fffff80054a7c908. BUGCHECK_P4: 0 TRAP_FRAME: fffff80054a7c9b0 -- (.trap 0xfffff80054a7c9b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffb48e98c51d00 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffb48e98c56830 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8004f530c4c rsp=fffff80054a7cb40 rbp=0000000000000001 r8=fffff80064560000 r9=0000000000000003 r10=00000000000000e0 r11=fffff80054a7cc00 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di ng nz na po cy. nt!ExInterlockedRemoveHeadList+0x8c: fffff800`4f530c4c cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: fffff80054a7c908 -- (.exr 0xfffff80054a7c908) ExceptionAddress: fffff8004f530c4c (nt!ExInterlockedRemoveHeadList+0x000000000000008c) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1 Parameter[0]: 0000000000000003. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 0000000000000003. EXCEPTION_STR: 0xc0000409. STACK_TEXT: fffff800`54a7c688 fffff800`4f609069 : 00000000`00000139 00000000`00000003 fffff800`54a7c9b0 fffff800`54a7c908 : nt!KeBugCheckEx fffff800`54a7c690 fffff800`4f609490 : ffffb48e`9fb84000 00000000`000dd7a3 ffffb48e`9fc06910 00000000`000dd7a3 : nt!KiBugCheckDispatch+0x69 fffff800`54a7c7d0 fffff800`4f607823 : 00000000`00000001 00000004`000dd7a3 00000000`00000004 fffff800`64745ab5 : nt!KiFastFailDispatch+0xd0 fffff800`54a7c9b0 fffff800`4f530c4c : 00000000`00000000 fffff800`00000000 ffffb48e`98c56820 ffffb48e`98c56830 : nt!KiRaiseSecurityCheckFailure+0x323 fffff800`54a7cb40 fffff800`645c872c : fffff800`54a7cbf0 fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 : nt!ExInterlockedRemoveHeadList+0x8c fffff800`54a7cb70 fffff800`54a7cbf0 : fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 : amdkmdag+0x6872c fffff800`54a7cb78 fffff800`54a7cc20 : fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae : 0xfffff800`54a7cbf0 fffff800`54a7cb80 fffff800`54a7cc50 : 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 : 0xfffff800`54a7cc20 fffff800`54a7cb88 00000000`00000000 : ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 00000000`00000008 : 0xfffff800`54a7cc50 SYMBOL_NAME: amdkmdag+6872c MODULE_NAME: amdkmdag. IMAGE_NAME: amdkmdag.sys STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 6872c. FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_amdkmdag!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c7ee0261-4e2c-7ca0-fdcc-d386e7e1e09d} Followup: MachineOwner
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000005100, The subtype of the BugCheck. Arg2: fffff5c600304bf8. Arg3: 0000000000000010. Arg4: 00008a0000008a00. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7124. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 50370. Key : Analysis.Init.CPU.mSec Value: 811. Key : Analysis.Init.Elapsed.mSec Value: 34853. Key : Analysis.Memory.CommitPeak.Mb Value: 77. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 122621-7890-01.dmp BUGCHECK_CODE: 1a. BUGCHECK_P1: 5100. BUGCHECK_P2: fffff5c600304bf8. BUGCHECK_P3: 10. BUGCHECK_P4: 8a0000008a00. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe STACK_TEXT: ffff880e`0f3e1538 fffff805`7d04709d : 00000000`0000001a 00000000`00005100 fffff5c6`00304bf8 00000000`00000010 : nt!KeBugCheckEx ffff880e`0f3e1540 fffff805`7ce1b641 : 00000000`00000000 fffff805`7d84ed40 00000000`00000000 00000000`00000010 : nt!MiFlushTbAsNeeded+0x19439d ffff880e`0f3e1680 fffff805`7cf491f1 : 00000000`00000019 00000000`00000000 00000000`00000000 00000000`00000010 : nt!MiReservePtes+0x2f1 ffff880e`0f3e1750 fffff805`7cf1a00d : 00000000`00000001 00000000`00000000 00000000`00000002 ffff880e`0f3e18b0 : nt!MiZeroLargePage+0xcd ffff880e`0f3e1850 fffff805`7cea4f43 : 00000000`00298880 00000000`00000000 00000000`00000001 00000000`00000008 : nt!MiGetLargePage+0x2ad ffff880e`0f3e19a0 fffff805`7cea27e8 : 00000000`00000001 ffff880e`0f3e1ce0 00000240`14077000 00000000`00000001 : nt!MiGetPageChain+0x253 ffff880e`0f3e1be0 fffff805`7cea1d38 : ffff880e`0f3e1d70 00000000`00e00000 00000000`00000001 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8 ffff880e`0f3e1d10 fffff805`7cea110d : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208 ffff880e`0f3e1e00 fffff805`7ce9f1f9 : 00000000`00000000 00000000`0000001c 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x22d ffff880e`0f3e1f40 fffff805`7cf45bec : fffff5fa`fd7eb000 ffffa10c`73ed9740 fffff5fa`c0900500 00000240`14070000 : nt!MmAccessFault+0x189 ffff880e`0f3e20e0 fffff805`7ce4e6ec : 00000000`00000000 fffff581`200a03b8 ffff880e`0f3e2240 fffff5fa`fd7ebf58 : nt!MiFaultInProbeAddress+0xbc ffff880e`0f3e2190 fffff805`7ce4da33 : 00000000`00000311 00000000`00000000 ffff880e`0f3e22b9 00000240`14077000 : nt!MiLockPageLeafPageTable+0x28c ffff880e`0f3e2200 fffff805`7ce4d8c9 : 00000000`00000000 ffffcb8c`fec1d810 00000000`00100000 80000002`96afd86f : nt!MiProbeAndLockPages+0x153 ffff880e`0f3e2320 fffff805`8de31a98 : ffffa10c`00000000 00000000`00000000 00000000`00100000 ffffcb8c`f230ff90 : nt!MmProbeAndLockPages+0x29 ffff880e`0f3e2350 fffff805`8de31972 : ffffcb8c`f230ff90 ffffcb8c`f230ff90 00000000`00000f00 00000240`14070000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c ffff880e`0f3e23b0 fffff805`8de33bb1 : ffffcb8c`ff09f160 ffffcb8c`fd5f2d80 ffffa10c`00000000 ffffa10c`64ddddb0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x10a ffff880e`0f3e2430 fffff805`8de33a57 : ffffcb8c`f3927c10 00000000`00100000 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0xbd ffff880e`0f3e2490 fffff805`8de341bb : ffffcb8c`f9ad8790 00000000`00000000 00000000`00000000 00000000`00100000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83 ffff880e`0f3e24f0 fffff805`8de3fca5 : ffffcb8c`f9ad8790 ffffcb8c`fd5f2d00 00000000`00000000 00000000`00049459 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProbeAndLockAllocation+0x7b ffff880e`0f3e2570 fffff805`8de3ff08 : ffffcb8c`fd5f2d00 ffffa10c`64dddd00 ffffcb8c`00000000 ffffa10c`70dc7000 : dxgmms2!VIDMM_GLOBAL::ProbeAndLockAllocation+0x55 ffff880e`0f3e25c0 fffff805`8de40426 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc4 ffff880e`0f3e2680 fffff805`8de47ff0 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 ffffa10c`77b9ab10 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0xb6 ffff880e`0f3e26c0 fffff805`8de46425 : ffffcb8c`00000000 ffff880e`0f3e28e0 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1d0 ffff880e`0f3e27e0 fffff805`8de5c65e : 00000000`00000002 00000000`00989680 ffffcb8c`e36228d0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xe25 ffff880e`0f3e2a00 fffff805`8de66809 : ffffcb8c`e3622800 ffffa10c`7056c201 00000000`00000000 00000000`0590dd00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e ffff880e`0f3e2be0 fffff805`7cf55935 : ffffa10c`7056c280 fffff805`8de66800 ffffcb8c`e3622800 000f8067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9 ffff880e`0f3e2c10 fffff805`7cffe728 : fffff805`7a1be180 ffffa10c`7056c280 fffff805`7cf558e0 976b9cbb`5ce5dae7 : nt!PspSystemThreadStartup+0x55 ffff880e`0f3e2c60 00000000`00000000 : ffff880e`0f3e3000 ffff880e`0f3dd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Lock+6c MODULE_NAME: dxgmms2. IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.19041.1173 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 6c. FAILURE_BUCKET_ID: 0x1a_5100_dxgmms2!VIDMM_MDL_RANGE::Lock OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {cca71c59-2b14-3cf9-d49b-b00e8cf70f42} Followup: MachineOwner
Raporlarınızı inceledim. Sanıyorum sorun grafik sürücünüzle ilgili. DDU yazılımı ile temizledikten sonra grafik sürücünüzü tekrar kurmanızı istiyorum.
DDU: DDU ile Sürücü Kaldırma Rehberi
Sürücü: https://www.amd.com/en/support/apu/...-processors-radeon-graphics/amd-ryzen-3-3250u
Lütfen "adrenalin 21.10.2 recommended (WHQL)" olan sürümü kurun. Windows 10 64-bit seçmeyi unutmayın.
BIOS'unuza güncelleme gelmiş dilerseniz onu da yapın.
Artı olarak "Bluetooth" sürücünüzü güncellemenizi de tavsiye ediyorum.
Bluetooth: https://dlcdnets.asus.com/pub/ASUS/...etooth_DCH_Realtek_Z_V1.8.1030.3002_20115.exe
SpeedFan yazılımını geçici bir süreliğine kaldırın.
Windows Update üzerinden tüm güncelleştirmeleri aldığınızdan emin olun.
Aşağıya paylaştığım rehberdeki adımları uygulayın.
Rehber: Rehber: Eksik ve bozuk SYS dosyalarını onarmak
Ağ sürücünüzü de güncelleyebilirsiniz.
Ağ: https://dlcdnets.asus.com/pub/ASUS/...essLan_DCH_Realtek_Z_V2024.0.10.124_20114.exe
Sorununuzun devamı halinde, oluşan güncel minidump dosyalarını paylaşın tekrardan analiz edelim. Umarım çözülür. Kolay gelsin.
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffff80054a7c9b0, Address of the trap frame for the exception that caused the BugCheck. Arg3: fffff80054a7c908, Address of the exception record for the exception that caused the BugCheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4296. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 86180. Key : Analysis.Init.CPU.mSec Value: 905. Key : Analysis.Init.Elapsed.mSec Value: 2962. Key : Analysis.Memory.CommitPeak.Mb Value: 77. Key : FailFast.Name Value: CORRUPT_LIST_ENTRY. Key : FailFast.Type Value: 3 Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 122621-8281-01.dmp BUGCHECK_CODE: 139. BUGCHECK_P1: 3 BUGCHECK_P2: fffff80054a7c9b0. BUGCHECK_P3: fffff80054a7c908. BUGCHECK_P4: 0 TRAP_FRAME: fffff80054a7c9b0 -- (.trap 0xfffff80054a7c9b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffb48e98c51d00 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffb48e98c56830 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8004f530c4c rsp=fffff80054a7cb40 rbp=0000000000000001 r8=fffff80064560000 r9=0000000000000003 r10=00000000000000e0 r11=fffff80054a7cc00 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di ng nz na po cy. nt!ExInterlockedRemoveHeadList+0x8c: fffff800`4f530c4c cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: fffff80054a7c908 -- (.exr 0xfffff80054a7c908) ExceptionAddress: fffff8004f530c4c (nt!ExInterlockedRemoveHeadList+0x000000000000008c) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1 Parameter[0]: 0000000000000003. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 0000000000000003. EXCEPTION_STR: 0xc0000409. STACK_TEXT: fffff800`54a7c688 fffff800`4f609069 : 00000000`00000139 00000000`00000003 fffff800`54a7c9b0 fffff800`54a7c908 : nt!KeBugCheckEx fffff800`54a7c690 fffff800`4f609490 : ffffb48e`9fb84000 00000000`000dd7a3 ffffb48e`9fc06910 00000000`000dd7a3 : nt!KiBugCheckDispatch+0x69 fffff800`54a7c7d0 fffff800`4f607823 : 00000000`00000001 00000004`000dd7a3 00000000`00000004 fffff800`64745ab5 : nt!KiFastFailDispatch+0xd0 fffff800`54a7c9b0 fffff800`4f530c4c : 00000000`00000000 fffff800`00000000 ffffb48e`98c56820 ffffb48e`98c56830 : nt!KiRaiseSecurityCheckFailure+0x323 fffff800`54a7cb40 fffff800`645c872c : fffff800`54a7cbf0 fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 : nt!ExInterlockedRemoveHeadList+0x8c fffff800`54a7cb70 fffff800`54a7cbf0 : fffff800`54a7cc20 fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 : amdkmdag+0x6872c fffff800`54a7cb78 fffff800`54a7cc20 : fffff800`54a7cc50 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae : 0xfffff800`54a7cbf0 fffff800`54a7cb80 fffff800`54a7cc50 : 00000000`00000000 ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 : 0xfffff800`54a7cc20 fffff800`54a7cb88 00000000`00000000 : ffffb48e`98aef028 fffff800`646fbbae fffff800`54a7cc60 00000000`00000008 : 0xfffff800`54a7cc50 SYMBOL_NAME: amdkmdag+6872c MODULE_NAME: amdkmdag. IMAGE_NAME: amdkmdag.sys STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 6872c. FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_amdkmdag!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {c7ee0261-4e2c-7ca0-fdcc-d386e7e1e09d} Followup: MachineOwner
Kod:MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000005100, The subtype of the BugCheck. Arg2: fffff5c600304bf8. Arg3: 0000000000000010. Arg4: 00008a0000008a00. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7124. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 50370. Key : Analysis.Init.CPU.mSec Value: 811. Key : Analysis.Init.Elapsed.mSec Value: 34853. Key : Analysis.Memory.CommitPeak.Mb Value: 77. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 122621-7890-01.dmp BUGCHECK_CODE: 1a. BUGCHECK_P1: 5100. BUGCHECK_P2: fffff5c600304bf8. BUGCHECK_P3: 10. BUGCHECK_P4: 8a0000008a00. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe STACK_TEXT: ffff880e`0f3e1538 fffff805`7d04709d : 00000000`0000001a 00000000`00005100 fffff5c6`00304bf8 00000000`00000010 : nt!KeBugCheckEx ffff880e`0f3e1540 fffff805`7ce1b641 : 00000000`00000000 fffff805`7d84ed40 00000000`00000000 00000000`00000010 : nt!MiFlushTbAsNeeded+0x19439d ffff880e`0f3e1680 fffff805`7cf491f1 : 00000000`00000019 00000000`00000000 00000000`00000000 00000000`00000010 : nt!MiReservePtes+0x2f1 ffff880e`0f3e1750 fffff805`7cf1a00d : 00000000`00000001 00000000`00000000 00000000`00000002 ffff880e`0f3e18b0 : nt!MiZeroLargePage+0xcd ffff880e`0f3e1850 fffff805`7cea4f43 : 00000000`00298880 00000000`00000000 00000000`00000001 00000000`00000008 : nt!MiGetLargePage+0x2ad ffff880e`0f3e19a0 fffff805`7cea27e8 : 00000000`00000001 ffff880e`0f3e1ce0 00000240`14077000 00000000`00000001 : nt!MiGetPageChain+0x253 ffff880e`0f3e1be0 fffff805`7cea1d38 : ffff880e`0f3e1d70 00000000`00e00000 00000000`00000001 00000000`00000000 : nt!MiResolvePrivateZeroFault+0x6e8 ffff880e`0f3e1d10 fffff805`7cea110d : 00000000`c0000016 00000000`00000002 00000000`00000000 00000000`00000002 : nt!MiResolveDemandZeroFault+0x208 ffff880e`0f3e1e00 fffff805`7ce9f1f9 : 00000000`00000000 00000000`0000001c 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x22d ffff880e`0f3e1f40 fffff805`7cf45bec : fffff5fa`fd7eb000 ffffa10c`73ed9740 fffff5fa`c0900500 00000240`14070000 : nt!MmAccessFault+0x189 ffff880e`0f3e20e0 fffff805`7ce4e6ec : 00000000`00000000 fffff581`200a03b8 ffff880e`0f3e2240 fffff5fa`fd7ebf58 : nt!MiFaultInProbeAddress+0xbc ffff880e`0f3e2190 fffff805`7ce4da33 : 00000000`00000311 00000000`00000000 ffff880e`0f3e22b9 00000240`14077000 : nt!MiLockPageLeafPageTable+0x28c ffff880e`0f3e2200 fffff805`7ce4d8c9 : 00000000`00000000 ffffcb8c`fec1d810 00000000`00100000 80000002`96afd86f : nt!MiProbeAndLockPages+0x153 ffff880e`0f3e2320 fffff805`8de31a98 : ffffa10c`00000000 00000000`00000000 00000000`00100000 ffffcb8c`f230ff90 : nt!MmProbeAndLockPages+0x29 ffff880e`0f3e2350 fffff805`8de31972 : ffffcb8c`f230ff90 ffffcb8c`f230ff90 00000000`00000f00 00000240`14070000 : dxgmms2!VIDMM_MDL_RANGE::Lock+0x6c ffff880e`0f3e23b0 fffff805`8de33bb1 : ffffcb8c`ff09f160 ffffcb8c`fd5f2d80 ffffa10c`00000000 ffffa10c`64ddddb0 : dxgmms2!VIDMM_RECYCLE_HEAP_PHYSICAL_VIEW::LockRange+0x10a ffff880e`0f3e2430 fffff805`8de33a57 : ffffcb8c`f3927c10 00000000`00100000 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_RECYCLE_RANGE::Lock+0xbd ffff880e`0f3e2490 fffff805`8de341bb : ffffcb8c`f9ad8790 00000000`00000000 00000000`00000000 00000000`00100000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Lock+0x83 ffff880e`0f3e24f0 fffff805`8de3fca5 : ffffcb8c`f9ad8790 ffffcb8c`fd5f2d00 00000000`00000000 00000000`00049459 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProbeAndLockAllocation+0x7b ffff880e`0f3e2570 fffff805`8de3ff08 : ffffcb8c`fd5f2d00 ffffa10c`64dddd00 ffffcb8c`00000000 ffffa10c`70dc7000 : dxgmms2!VIDMM_GLOBAL::ProbeAndLockAllocation+0x55 ffff880e`0f3e25c0 fffff805`8de40426 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 : dxgmms2!VIDMM_SEGMENT::LockAllocationBackingStore+0xc4 ffff880e`0f3e2680 fffff805`8de47ff0 : ffffcb8c`fd5f2d80 ffffcb8c`fd5f2d80 00000000`00000000 ffffa10c`77b9ab10 : dxgmms2!VIDMM_SYSMEM_SEGMENT::CommitResource+0xb6 ffff880e`0f3e26c0 fffff805`8de46425 : ffffcb8c`00000000 ffff880e`0f3e28e0 00000000`00000000 ffffcb8c`fd5f2d80 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1d0 ffff880e`0f3e27e0 fffff805`8de5c65e : 00000000`00000002 00000000`00989680 ffffcb8c`e36228d0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xe25 ffff880e`0f3e2a00 fffff805`8de66809 : ffffcb8c`e3622800 ffffa10c`7056c201 00000000`00000000 00000000`0590dd00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e ffff880e`0f3e2be0 fffff805`7cf55935 : ffffa10c`7056c280 fffff805`8de66800 ffffcb8c`e3622800 000f8067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9 ffff880e`0f3e2c10 fffff805`7cffe728 : fffff805`7a1be180 ffffa10c`7056c280 fffff805`7cf558e0 976b9cbb`5ce5dae7 : nt!PspSystemThreadStartup+0x55 ffff880e`0f3e2c60 00000000`00000000 : ffff880e`0f3e3000 ffff880e`0f3dd000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: dxgmms2!VIDMM_MDL_RANGE::Lock+6c MODULE_NAME: dxgmms2. IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.19041.1173 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 6c. FAILURE_BUCKET_ID: 0x1a_5100_dxgmms2!VIDMM_MDL_RANGE::Lock OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {cca71c59-2b14-3cf9-d49b-b00e8cf70f42} Followup: MachineOwner