RTX 5070 sistem mavi ekran hatası veriyor

trzeta82

Centipat
Katılım
29 Kasım 2023
Mesajlar
114
Daha fazla  
Cinsiyet
Erkek
RAM
5600 Mhx Twinmos
Ekran kartı
RTX 5070
Anakart
B650 Gaming Plus Wi-Fi
İşlemci
Ryzen 5 9600X
Sistemi alalı 1 ay oldu ETS 2 oynarken ilk defa mavi ekran hatası aldım dump dosyasını paylaşıyorum yardımcı olursanız sevinirim.

Kod:
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
..........................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000001f`766fc018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
*******************************************************************************
*
Bugcheck Analysis                                    *
*

*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff828ecb60ef80, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff828ecb60eed8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 781

    Key  : Analysis.Elapsed.mSec
    Value: 783

    Key  : Analysis.IO.Other.Mb
    Value: 19

    Key  : Analysis.IO.Read.Mb
    Value: 1

    Key  : Analysis.IO.Write.Mb
    Value: 38

    Key  : Analysis.Init.CPU.mSec
    Value: 812

    Key  : Analysis.Init.Elapsed.mSec
    Value: 43859

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 122

    Key  : Analysis.Version.DbgEng
    Value: 10.0.27829.1001

    Key  : Analysis.Version.Description
    Value: 10.2503.24.01 amd64fre

    Key  : Analysis.Version.Ext
    Value: 1.2503.24.1

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139

    Key  : Bugcheck.Code.TargetModel
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 0x21808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0x0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : Failure.Bucket
    Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!CTokenManager::ReleaseFlipManagerTokensToFrame

    Key  : Failure.Exception.Code
    Value: 0xc0000409

    Key  : Failure.Exception.Record
    Value: 0xffff828ecb60eed8

    Key  : Failure.Hash
    Value: {1525b8cc-c868-2f52-835b-125462327a5b}

    Key  : Hypervisor.Enlightenments.ValueHex
    Value: 0x7497cf94

    Key  : Hypervisor.Flags.AnyHypervisorPresent
    Value: 1

    Key  : Hypervisor.Flags.ApicEnlightened
    Value: 1

    Key  : Hypervisor.Flags.ApicVirtualizationAvailable
    Value: 0

    Key  : Hypervisor.Flags.AsyncMemoryHint
    Value: 0

    Key  : Hypervisor.Flags.CoreSchedulerRequested
    Value: 0

    Key  : Hypervisor.Flags.CpuManager
    Value: 1

    Key  : Hypervisor.Flags.DeprecateAutoEoi
    Value: 0

    Key  : Hypervisor.Flags.DynamicCpuDisabled
    Value: 1

    Key  : Hypervisor.Flags.Epf
    Value: 0

    Key  : Hypervisor.Flags.ExtendedProcessorMasks
    Value: 1

    Key  : Hypervisor.Flags.HardwareMbecAvailable
    Value: 1

    Key  : Hypervisor.Flags.MaxBankNumber
    Value: 0

    Key  : Hypervisor.Flags.MemoryZeroingControl
    Value: 0

    Key  : Hypervisor.Flags.NoExtendedRangeFlush
    Value: 0

    Key  : Hypervisor.Flags.NoNonArchCoreSharing
    Value: 1

    Key  : Hypervisor.Flags.Phase0InitDone
    Value: 1

    Key  : Hypervisor.Flags.PowerSchedulerQos
    Value: 0

    Key  : Hypervisor.Flags.RootScheduler
    Value: 0

    Key  : Hypervisor.Flags.SynicAvailable
    Value: 1

    Key  : Hypervisor.Flags.UseQpcBias
    Value: 0

    Key  : Hypervisor.Flags.Value
    Value: 38408431

    Key  : Hypervisor.Flags.ValueHex
    Value: 0x24a10ef

    Key  : Hypervisor.Flags.VpAssistPage
    Value: 1

    Key  : Hypervisor.Flags.VsmAvailable
    Value: 1

    Key  : Hypervisor.RootFlags.AccessStats
    Value: 1

    Key  : Hypervisor.RootFlags.CrashdumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.CreateVirtualProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.DisableHyperthreading
    Value: 0

    Key  : Hypervisor.RootFlags.HostTimelineSync
    Value: 1

    Key  : Hypervisor.RootFlags.HypervisorDebuggingEnabled
    Value: 0

    Key  : Hypervisor.RootFlags.IsHyperV
    Value: 1

    Key  : Hypervisor.RootFlags.LivedumpEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.MapDeviceInterrupt
    Value: 1

    Key  : Hypervisor.RootFlags.MceEnlightened
    Value: 1

    Key  : Hypervisor.RootFlags.Nested
    Value: 0

    Key  : Hypervisor.RootFlags.StartLogicalProcessor
    Value: 1

    Key  : Hypervisor.RootFlags.Value
    Value: 1015

    Key  : Hypervisor.RootFlags.ValueHex
    Value: 0x3f7


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff828ecb60ef80

BUGCHECK_P3: ffff828ecb60eed8

BUGCHECK_P4: 0

FILE_IN_CAB:  052025-14093-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x21808
  Kernel Generated Triage Dump

FAULTING_THREAD:  ffffe6853ac29080

TRAP_FRAME:  ffff828ecb60ef80 -- (.trap 0xffff828ecb60ef80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe6853ac29080 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044a1832ac rsp=ffff828ecb60f110 rbp=ffff828ecb60f150
 r8=0000000000000000  r9=0000000000000001 r10=fffff804b841f920
r11=ffffe6853ac29080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
dxgkrnl!CTokenManager::ReleaseFlipManagerTokensToFrame+0x270:
fffff804`4a1832ac cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff828ecb60eed8 -- (.exr 0xffff828ecb60eed8)
ExceptionAddress: fffff8044a1832ac (dxgkrnl!CTokenManager::ReleaseFlipManagerTokensToFrame+0x0000000000000270)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffff828e`cb60ec58 fffff804`b88b8fe9     : 00000000`00000139 00000000`00000003 ffff828e`cb60ef80 ffff828e`cb60eed8 : nt!KeBugCheckEx
ffff828e`cb60ec60 fffff804`b88b95f2     : 00000000`00000001 00000000`00000000 ffff0260`f29cbef6 fffff804`9c1617f8 : nt!KiBugCheckDispatch+0x69
ffff828e`cb60eda0 fffff804`b88b7228     : 00000000`00000000 fffff804`9433bf2d ffffad08`a5f4be10 ffff828e`cb60f060 : nt!KiFastFailDispatch+0xb2
ffff828e`cb60ef80 fffff804`4a1832ac     : ffffad08`a7560e00 ffffad08`a3a263e0 ffffad08`acf35bb0 fffff804`4a197ce9 : nt!KiRaiseSecurityCheckFailure+0x368
ffff828e`cb60f110 fffff804`4a1c04ed     : ffffad08`ab2058f0 ffffad08`a7560e00 ffffad08`a17dcd30 ffffad08`acf35b68 : dxgkrnl!CTokenManager::ReleaseFlipManagerTokensToFrame+0x270
ffff828e`cb60f180 fffff804`9449b017     : ffffad08`acf35aa0 ffffad08`a17dcd30 ffffad08`b97c5000 ffff828e`cb60f360 : dxgkrnl!CTokenManager::ReleaseToFrame+0x3cd
ffff828e`cb60f200 fffff804`9449aafa     : ffffad08`a17dcd30 ffffad08`ab7dd110 00000000`00000000 00000000`c000000d : win32kbase!DirectComposition::CConnection::BeginFrame+0x293
ffff828e`cb60f260 fffff804`4a062149     : 00000058`00000000 000001a9`9514b3b8 0000001f`768ffb50 00000000`00000004 : win32kbase!NtDCompositionBeginFrame+0x24a
ffff828e`cb60f430 fffff804`b88b8658     : ffffe685`3ac29080 000001a9`9514b3b8 ffffe685`3ac29080 00000000`00000000 : win32k!NtDCompositionBeginFrame+0x49
ffff828e`cb60f460 00007ffb`b09a3534     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001f`768ff9e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b09a3534


SYMBOL_NAME:  dxgkrnl!CTokenManager::ReleaseFlipManagerTokensToFrame+270

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.26100.4061

STACK_COMMAND: .process /r /p 0xffffe685162ad080; .thread 0xffffe6853ac29080 ; kb

BUCKET_ID_FUNC_OFFSET:  270

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgkrnl!CTokenManager::ReleaseFlipManagerTokensToFrame

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1525b8cc-c868-2f52-835b-125462327a5b}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
Merhaba. Minidump dosyalarını burayla paylaşır mısınız? Daha isabetli öneriler sunabiliriz.
 
Merhaba. Minidump dosyalarını burayla paylaşır mısınız? Daha isabetli öneriler sunabiliriz.

Paylastigim kod minidump dosyasi.
 
BIOS update et.
Sonra BIOS'a tekrar gir ve optimize defaults save et.
Bu şekilde ekran kartını sil.
Sonra bunu yükle.
SteelSeries araçlarını test amaçlı sil.

Memtest86 ile bellek testi yap ve sonuçları yolla.
 

Technopat Haberler

Yeni konular

Geri
Yukarı