Sisteminizi ve minidump dosyalarını paylaşın lütfen.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0d54e2f750, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0d54e2f6a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: A320M-H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/28/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: A320M-H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffdf0d54e2f750
BUGCHECK_P3: ffffdf0d54e2f6a8
BUGCHECK_P4: 0
TRAP_FRAME: ffffdf0d54e2f750 -- (.trap 0xffffdf0d54e2f750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc859bacf158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcc85a0fe1158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ec89fc0 rsp=ffffdf0d54e2f8e0 rbp=0000000000000000
r8=0000000000000000 r9=ffffcc859bacf1c0 r10=ffffcc859db31700
r11=7fffcc859b089470 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiRemovePrcbWaitEntry+0xe8:
fffff801`1ec89fc0 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 12:48:43.0940
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8011edaf729 to fffff8011ed9d860
STACK_TEXT:
ffffdf0d`54e2f428 fffff801`1edaf729 : 00000000`00000139 00000000`00000003 ffffdf0d`54e2f750 ffffdf0d`54e2f6a8 : nt!KeBugCheckEx
ffffdf0d`54e2f430 fffff801`1edafb50 : 00000000`00000272 00000000`00000001 00000000`00000001 fffff801`1ec3ddc4 : nt!KiBugCheckDispatch+0x69
ffffdf0d`54e2f570 fffff801`1edadee3 : ffffcc85`9db31080 ffffcc85`9be43578 00000000`00000001 fffff801`1ec69aef : nt!KiFastFailDispatch+0xd0
ffffdf0d`54e2f750 fffff801`1ec89fc0 : ffffa38b`ae9ae990 fffff801`1ec69abe ffffa38b`8e638c70 ffffdf0d`54e2fa80 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0d`54e2f8e0 fffff801`1ec89de9 : ffffdf0d`00000000 ffffcc85`9bacf080 ffffe380`4ad36180 ffffcc85`9b089310 : nt!KiRemovePrcbWaitEntry+0xe8
ffffdf0d`54e2f910 fffff801`1ec89d0b : ffffe380`4ad36180 ffffcc85`9bacf1c0 ffffa38b`ae9ae990 ffffcc85`9b089310 : nt!KiSignalThread+0x45
ffffdf0d`54e2f940 fffff801`1ec4ba14 : ffffcc85`9bacf508 00000000`00000000 00000000`00000000 fffff801`1efc7938 : nt!KiTryUnwaitThread+0x6b
ffffdf0d`54e2f990 fffff801`1ec4bd8a : ffffcc85`9bacf510 ffffa38b`00000001 00000000`00000000 00000000`00000001 : nt!KeReleaseSemaphoreEx+0xd0
ffffdf0d`54e2fa10 fffff801`1ec4bc70 : 00000000`00020002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpSignal+0x46
ffffdf0d`54e2fa50 fffff801`1efc702b : 00000000`00020002 ffffcc85`a05b82c0 ffffcc85`9b089310 ffffcc85`9db31508 : nt!AlpcpSignalAndWait+0x34
ffffdf0d`54e2fa90 fffff801`1efc6cf7 : ffffdf0d`54e2fb70 00000000`00020002 ffffcc85`a05b82c0 ffffdf0d`54e2fc90 : nt!AlpcpReceiveSynchronousReply+0x57
ffffdf0d`54e2faf0 fffff801`1f0746f9 : ffffcc85`9b089310 00000000`00020002 ffffdf0d`54e2ffa0 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x1a7
ffffdf0d`54e2fbf0 fffff801`1f20179f : 00000000`00000000 04d80000`00000000 022f0000`00000000 00000000`00000000 : nt!LpcSendWaitReceivePort+0x49
ffffdf0d`54e2fc50 fffff801`1f1a103d : ffffcc85`9b089310 ffffdf0d`54e30a58 ffffcc85`9b089310 ffffcc85`a05b82c0 : nt!DbgkpSendApiMessageLpc+0x7f
ffffdf0d`54e2ff70 fffff801`1ee05129 : ffffdf0d`54e30a58 ffffdf0d`54e30a58 ffffffff`ffffffff 00000234`7f005540 : nt!DbgkForwardException+0x10bd9d
ffffdf0d`54e300f0 fffff801`1edafb64 : 00000000`00000001 fffff801`1ec690db ffffcc85`9db31080 ffffcc85`9ba6e088 : nt!KiDispatchException+0x1384d9
ffffdf0d`54e30920 fffff801`1edadee3 : 00000234`0ac3ab70 ffffcc85`920cb3e0 ffffdf0d`54e30b18 ffffffff`ff355d00 : nt!KiFastFailDispatch+0xe4
ffffdf0d`54e30b00 00007ffc`10210db4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
0000007e`4e9fe180 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`10210db4
THREAD_SHA1_HASH_MOD_FUNC: d90eb29bdb338700c49678c510492c81f63e72a6
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 059c61829a639b071d9dc6749cabb2741e714236
THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801`1edafb50 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 31cf0885
IMAGE_VERSION: 10.0.19041.153
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch
TARGET_TIME: 2020-04-04T01:56:00.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 2e7e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch
FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851}
Followup: MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffe601b03b8000, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe601b03b7f58, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: A320M-H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/28/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: A320M-H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 4
BUGCHECK_P2: ffffe601b03b8000
BUGCHECK_P3: ffffe601b03b7f58
BUGCHECK_P4: 0
TRAP_FRAME: ffb0ae38e838c183 -- (.trap 0xffb0ae38e838c183)
Unable to read trap frame at ffb0ae38`e838c183
EXCEPTION_RECORD: ccffe453b7e9e375 -- (.exr 0xccffe453b7e9e375)
Cannot read Exception record @ ccffe453b7e9e375
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x139
PROCESS_NAME: steam.exe
CURRENT_IRQL: 2
DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK
WATSON_BKT_EVENT: BEX
ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000004
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 12:48:46.0261
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
BAD_STACK_POINTER: ffffe601b03b7cd8
LAST_CONTROL_TRANSFER: from fffff804325af729 to fffff8043259d860
STACK_TEXT:
ffffe601`b03b7cd8 fffff804`325af729 : 00000000`00000139 00000000`00000004 ffffe601`b03b8000 ffffe601`b03b7f58 : nt!KeBugCheckEx
ffffe601`b03b7ce0 fffff804`325afb50 : 0000013c`00000000 00000000`00000fff 00000000`00000000 000001c6`b9000000 : nt!KiBugCheckDispatch+0x69
ffffe601`b03b7e20 fffff804`325adee3 : fffff804`324ffa74 fffff804`322a2430 ffffe601`b03b87c0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe601`b03b8000 fffff804`325d6073 : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a7a36e90 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe601`b03b8190 fffff804`325d61bc : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a832cf80 e9e88b4c`00000002 : nt!RtlpGetStackLimitsEx+0x18dd53
ffffe601`b03b81c0 fffff804`324ccdd6 : ffff8c81`a832be98 ffffe601`b03b8e20 ffff8c81`a832be98 ffffd60d`76afc020 : nt!RtlDispatchException+0x18de6c
ffffe601`b03b88f0 fffff804`3259e6f2 : ccffe453`b7e9e375 48000004`38898b48 ffb0ae38`e838c183 e9000004`50838b48 : nt!KiDispatchException+0x186
ffffe601`b03b8fb0 fffff804`3259e6c0 : fffff804`325af865 00000000`00040202 fffff804`324824c8 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8c81`a832bd58 fffff804`325af865 : 00000000`00040202 fffff804`324824c8 00000000`00000001 fffff804`3249ee9d : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8c81`a832bd60 fffff804`325ab5a0 : ffffd60d`7ec47ba0 ffffd60d`7ec47b70 ffffd60d`83f2db10 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffff8c81`a832bf40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320
THREAD_SHA1_HASH_MOD_FUNC: e737fbae702fb97094ad39b47d3b15c19fae2b06
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 423c208199439684a135aeec2f53e246e0c541fd
THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c
FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff804`325afb50 c644242000 mov byte ptr [rsp+20h],0
FAULT_INSTR_CODE: 202444c6
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiFastFailDispatch+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 31cf0885
IMAGE_VERSION: 10.0.19041.153
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d0
FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch
TARGET_TIME: 2020-04-10T11:48:39.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: e58
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch
FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff888006309c30
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: A320M-H
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F50
BIOS_DATE: 11/28/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: A320M-H-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 2
BUGCHECK_P1: 41790
BUGCHECK_P2: ffff888006309c30
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BUGCHECK_STR: 0x1a_41790
CPU_COUNT: c
CPU_MHZ: c7a
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: DyingLightGame.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-13-2020 12:48:49.0569
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8047e609187 to fffff8047e59d860
STACK_TEXT:
ffff8688`381fcef8 fffff804`7e609187 : 00000000`0000001a 00000000`00041790 ffff8880`06309c30 00000000`00000000 : nt!KeBugCheckEx
ffff8688`381fcf00 fffff804`7e46d279 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x131417
ffff8688`381fcf40 fffff804`7e46c437 : fffff880`00a79ff8 ffffe702`18ee0700 00000000`00000000 00000000`00000200 : nt!MiDeleteVa+0x389
ffff8688`381fcfd0 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`400053c8 0a000002`10341867 : nt!MiWalkPageTablesRecursively+0x207
ffff8688`381fd030 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e200028 0a000000`33132867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd090 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e3f1000 0a000000`49809867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd0f0 fffff804`7e45e065 : ffffe702`18ee0700 fffff804`7e46cef0 ffff8688`381fd270 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd150 fffff804`7e452aca : 00000001`50ffffff 00000000`00000000 ffff8688`381fd2e0 ffffe702`18ee0700 : nt!MiWalkPageTables+0x1e5
ffff8688`381fd1e0 fffff804`7e452710 : ffffe702`1c5de080 ffffe702`18ee0550 00000000`00000001 fffff804`7e45445c : nt!MiDeletePagablePteRange+0x392
ffff8688`381fd650 fffff804`7e453f97 : 00000000`00000000 ffffe702`00000000 ffff8688`381fd729 ffffe702`1c5de000 : nt!MiDeleteVirtualAddresses+0x48
ffff8688`381fd6a0 fffff804`7e4d686f : 00000000`00000000 00000000`00000000 ffffe702`00000000 ffffe702`18ee0700 : nt!MiDeleteVad+0x22f
ffff8688`381fd790 fffff804`7e7cdb05 : 00000000`00000000 00000000`00000000 ffff8688`381fd8d9 00000001`4f000000 : nt!MiFreeVadRange+0xa3
ffff8688`381fd7f0 fffff804`7e7cd74b : ffff6e7f`16e5187b 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x385
ffff8688`381fd930 fffff804`7e5af178 : ffffe702`1c5de080 fffff804`7e493431 00000000`00000100 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
ffff8688`381fd990 fffff804`7e5a16c0 : fffff804`9085204e ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 : nt!KiSystemServiceCopyEnd+0x28
ffff8688`381fdb28 fffff804`9085204e : ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 fffff804`7e4fbd49 : nt!KiServiceLinkage
ffff8688`381fdb30 fffff804`907e39ae : 00000000`02000000 ffffd289`16f2fd80 ffffe702`18b83010 fffff804`907f40b5 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0xb6
ffff8688`381fdb80 fffff804`90851f5d : ffffd289`1553cb10 fffff804`908481cf 00000000`00000001 ffffd289`0359df20 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe
ffff8688`381fdbb0 fffff804`9084696d : ffffd289`0359df20 ffffe702`18b83010 ffffe702`18b83010 00000000`00000004 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d
ffff8688`381fdbf0 fffff804`90846874 : ffffd289`16f2fd80 ffffd289`0359df20 ffff8688`381fdc98 00000000`00000008 : dxgmms2!VIDMM_RECYCLE_BLOCK::CleanupFreeBlock+0x69
ffff8688`381fdc20 fffff804`908442d8 : ffffd289`0359df20 ffff8688`381fdcf0 ffffd289`0359df20 ffff8688`381fdcf0 : dxgmms2!VIDMM_RECYCLE_BLOCK::ShrinkOnTailRangeFree+0x30
ffff8688`381fdc70 fffff804`9084781a : 00000000`02000000 ffffd289`09878548 ffffd289`0359df20 ffffe702`18b83010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x128
ffff8688`381fdcc0 fffff804`90892e58 : ffffe702`00000000 ffffe702`18b83648 00000000`00000001 ffffd289`155262d8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffff8688`381fdd30 fffff804`90848fe1 : ffffe702`18b83540 ffffd289`15526b10 ffffe702`1d0afb10 ffffd289`05b2ecf0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceListsGlobally+0xd0
ffff8688`381fddc0 fffff804`90839bbb : ffffe702`1b18a510 00000000`00000001 ffffd289`094d1990 ffff8688`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211
ffff8688`381fde00 fffff804`908397e5 : ffffd289`09417de0 00000000`00000000 00000000`00000000 ffff8688`381fe100 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x33b
ffff8688`381fdfa0 fffff804`907d16fa : 00000000`00000000 ffffd289`09417de0 ffff8688`381fe130 ffffd289`00fd2000 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5
ffff8688`381fdff0 fffff804`8ad1a7a1 : 00000000`00000000 ffff8688`381fe130 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCloseAllocation+0x1a
ffff8688`381fe030 fffff804`8ad2548b : 00000000`00000000 fffff804`8ad254ee ffffd289`00fd2010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5
ffff8688`381fe1d0 fffff804`8ad2516c : ffffd289`00fd2010 ffffd289`00fd2100 00000000`00000000 ffffd289`00fd21f0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f
ffff8688`381fe230 fffff804`8ad25740 : ffffd289`00fd2010 ffffd289`0df0aa20 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148
ffff8688`381fe270 fffff804`8ad002d0 : 00000000`00000000 ffff8688`381fe3a0 ffffd289`00fd2010 ffffd289`00fd2010 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffff8688`381fe2a0 fffff804`8acfd955 : ffffd289`09417de0 00000000`00002c98 ffffd289`09417de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x494
ffff8688`381fe510 fffff804`8ac08ac7 : 00000000`00000000 ffffd289`09417de0 ffffe702`116f9780 fffff804`821703f3 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8688`381fe660 fffff804`7e79a7bf : 00000000`00000000 ffffe702`18ee0080 00000000`0000ff00 ffffe702`1c4bf0b0 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8688`381fe6c0 fffff804`7e765c40 : ffffe702`18ee0000 ffffe702`18ee0080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8688`381fe790 fffff804`7e79f686 : ffffe702`1c5de4b8 00000000`00000000 ffff8688`381fe980 00000000`00000000 : nt!PspExitProcess+0x70
ffff8688`381fe7c0 fffff804`7e8698e8 : fffff804`c0000005 00000000`00000f01 00000000`00000000 00000000`004f4000 : nt!PspExitThread+0x5b2
ffff8688`381fe8c0 fffff804`7e4cc591 : ffff8688`381fe980 fffff804`7e4657ca ffffe702`00000000 ffffe702`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8688`381fe900 fffff804`7e5a1e00 : 00000000`00000000 ffff8688`381fe9c0 ffff8688`381feb00 ffffe702`18843590 : nt!KiDeliverApc+0x451
ffff8688`381fe9c0 fffff804`7e5af21f : 00000000`00000000 00000000`00000000 ffff8688`381feb18 ffffffff`ffb3b4c0 : nt!KiInitiateUserApc+0x70
ffff8688`381feb00 00007ffc`d692ae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`4234faa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d692ae54
THREAD_SHA1_HASH_MOD_FUNC: e85c7eda892443a805d1df51f9635857b01ee34c
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1647b3bd2753078525fa9e47153febceb8f7b84b
THREAD_SHA1_HASH_MOD: 03bb7691005b7d6dc18a1b90bc2c2bb81c85dc92
FOLLOWUP_IP:
dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6
fffff804`9085204e 4863f8 movsxd rdi,eax
FAULT_INSTR_CODE: b8f86348
SYMBOL_STACK_INDEX: 10
SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.19041.1025
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b6
FAILURE_BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
PRIMARY_PROBLEM_CLASS: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK
TARGET_TIME: 2020-04-12T21:28:53.000Z
OSBUILD: 19041
OSSERVICEPACK: 153
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1996-06-25 00:28:37
BUILDDATESTAMP_STR: 191206-1406
BUILDLAB_STR: vb_release
BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406
ANALYSIS_SESSION_ELAPSED_TIME: 5482
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41790_dxgmms2!vidmm_recycle_block::_vidmm_recycle_block
FAILURE_ID_HASH: {80770e6d-f962-9e92-764d-b939dc653edf}
Followup: MachineOwner
---------
Hemen Memtest86 testi yapıp geliyorum. Önceden M.2 SSD'yi çıkarıp HDD'ye kurmuştum sistemi yine aynı sorunlarla karşılaştım.Memtest86 testi yapar mısın?
Memtest86 testi problemsiz biterse M.2 SSD'yi sistemden çıkar ve HDD üstüne sistemi kur.
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: ffffdf0d54e2f750, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffdf0d54e2f6a8, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: A320M-H SYSTEM_SKU: Default string SYSTEM_VERSION: Default string BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F50 BIOS_DATE: 11/28/2019 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: A320M-H-CF BASEBOARD_VERSION: x.x DUMP_TYPE: 2 BUGCHECK_P1: 3 BUGCHECK_P2: ffffdf0d54e2f750 BUGCHECK_P3: ffffdf0d54e2f6a8 BUGCHECK_P4: 0 TRAP_FRAME: ffffdf0d54e2f750 -- (.trap 0xffffdf0d54e2f750) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffcc859bacf158 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffcc85a0fe1158 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8011ec89fc0 rsp=ffffdf0d54e2f8e0 rbp=0000000000000000 r8=0000000000000000 r9=ffffcc859bacf1c0 r10=ffffcc859db31700 r11=7fffcc859b089470 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po cy nt!KiRemovePrcbWaitEntry+0xe8: fffff801`1ec89fc0 cd29 int 29h Resetting default scope EXCEPTION_RECORD: 0000000000000001 -- (.exr 0x1) Cannot read Exception record @ 0000000000000001 CPU_COUNT: c CPU_MHZ: c7a CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: chrome.exe CURRENT_IRQL: 2 DEFAULT_BUCKET_ID: FAIL_FAST_CORRUPT_LIST_ENTRY ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB ANALYSIS_SESSION_TIME: 04-13-2020 12:48:43.0940 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff8011edaf729 to fffff8011ed9d860 STACK_TEXT: ffffdf0d`54e2f428 fffff801`1edaf729 : 00000000`00000139 00000000`00000003 ffffdf0d`54e2f750 ffffdf0d`54e2f6a8 : nt!KeBugCheckEx ffffdf0d`54e2f430 fffff801`1edafb50 : 00000000`00000272 00000000`00000001 00000000`00000001 fffff801`1ec3ddc4 : nt!KiBugCheckDispatch+0x69 ffffdf0d`54e2f570 fffff801`1edadee3 : ffffcc85`9db31080 ffffcc85`9be43578 00000000`00000001 fffff801`1ec69aef : nt!KiFastFailDispatch+0xd0 ffffdf0d`54e2f750 fffff801`1ec89fc0 : ffffa38b`ae9ae990 fffff801`1ec69abe ffffa38b`8e638c70 ffffdf0d`54e2fa80 : nt!KiRaiseSecurityCheckFailure+0x323 ffffdf0d`54e2f8e0 fffff801`1ec89de9 : ffffdf0d`00000000 ffffcc85`9bacf080 ffffe380`4ad36180 ffffcc85`9b089310 : nt!KiRemovePrcbWaitEntry+0xe8 ffffdf0d`54e2f910 fffff801`1ec89d0b : ffffe380`4ad36180 ffffcc85`9bacf1c0 ffffa38b`ae9ae990 ffffcc85`9b089310 : nt!KiSignalThread+0x45 ffffdf0d`54e2f940 fffff801`1ec4ba14 : ffffcc85`9bacf508 00000000`00000000 00000000`00000000 fffff801`1efc7938 : nt!KiTryUnwaitThread+0x6b ffffdf0d`54e2f990 fffff801`1ec4bd8a : ffffcc85`9bacf510 ffffa38b`00000001 00000000`00000000 00000000`00000001 : nt!KeReleaseSemaphoreEx+0xd0 ffffdf0d`54e2fa10 fffff801`1ec4bc70 : 00000000`00020002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpSignal+0x46 ffffdf0d`54e2fa50 fffff801`1efc702b : 00000000`00020002 ffffcc85`a05b82c0 ffffcc85`9b089310 ffffcc85`9db31508 : nt!AlpcpSignalAndWait+0x34 ffffdf0d`54e2fa90 fffff801`1efc6cf7 : ffffdf0d`54e2fb70 00000000`00020002 ffffcc85`a05b82c0 ffffdf0d`54e2fc90 : nt!AlpcpReceiveSynchronousReply+0x57 ffffdf0d`54e2faf0 fffff801`1f0746f9 : ffffcc85`9b089310 00000000`00020002 ffffdf0d`54e2ffa0 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x1a7 ffffdf0d`54e2fbf0 fffff801`1f20179f : 00000000`00000000 04d80000`00000000 022f0000`00000000 00000000`00000000 : nt!LpcSendWaitReceivePort+0x49 ffffdf0d`54e2fc50 fffff801`1f1a103d : ffffcc85`9b089310 ffffdf0d`54e30a58 ffffcc85`9b089310 ffffcc85`a05b82c0 : nt!DbgkpSendApiMessageLpc+0x7f ffffdf0d`54e2ff70 fffff801`1ee05129 : ffffdf0d`54e30a58 ffffdf0d`54e30a58 ffffffff`ffffffff 00000234`7f005540 : nt!DbgkForwardException+0x10bd9d ffffdf0d`54e300f0 fffff801`1edafb64 : 00000000`00000001 fffff801`1ec690db ffffcc85`9db31080 ffffcc85`9ba6e088 : nt!KiDispatchException+0x1384d9 ffffdf0d`54e30920 fffff801`1edadee3 : 00000234`0ac3ab70 ffffcc85`920cb3e0 ffffdf0d`54e30b18 ffffffff`ff355d00 : nt!KiFastFailDispatch+0xe4 ffffdf0d`54e30b00 00007ffc`10210db4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 0000007e`4e9fe180 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`10210db4 THREAD_SHA1_HASH_MOD_FUNC: d90eb29bdb338700c49678c510492c81f63e72a6 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 059c61829a639b071d9dc6749cabb2741e714236 THREAD_SHA1_HASH_MOD: 82d14546c43bd06881f781d6d197c4c7f7ceb9cb FOLLOWUP_IP: nt!KiFastFailDispatch+d0 fffff801`1edafb50 c644242000 mov byte ptr [rsp+20h],0 FAULT_INSTR_CODE: 202444c6 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiFastFailDispatch+d0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 31cf0885 IMAGE_VERSION: 10.0.19041.153 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: d0 FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch PRIMARY_PROBLEM_CLASS: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch TARGET_TIME: 2020-04-04T01:56:00.000Z OSBUILD: 19041 OSSERVICEPACK: 153 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1996-06-25 00:28:37 BUILDDATESTAMP_STR: 191206-1406 BUILDLAB_STR: vb_release BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406 ANALYSIS_SESSION_ELAPSED_TIME: 2e7e ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch FAILURE_ID_HASH: {3aede96a-54dd-40d6-d4cb-2a161a843851} Followup: MachineOwner --------- KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack extents for the thread. Arg2: ffffe601b03b8000, Address of the trap frame for the exception that caused the bugcheck Arg3: ffffe601b03b7f58, Address of the exception record for the exception that caused the bugcheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: A320M-H SYSTEM_SKU: Default string SYSTEM_VERSION: Default string BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F50 BIOS_DATE: 11/28/2019 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: A320M-H-CF BASEBOARD_VERSION: x.x DUMP_TYPE: 2 BUGCHECK_P1: 4 BUGCHECK_P2: ffffe601b03b8000 BUGCHECK_P3: ffffe601b03b7f58 BUGCHECK_P4: 0 TRAP_FRAME: ffb0ae38e838c183 -- (.trap 0xffb0ae38e838c183) Unable to read trap frame at ffb0ae38`e838c183 EXCEPTION_RECORD: ccffe453b7e9e375 -- (.exr 0xccffe453b7e9e375) Cannot read Exception record @ ccffe453b7e9e375 CPU_COUNT: c CPU_MHZ: c7a CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x139 PROCESS_NAME: steam.exe CURRENT_IRQL: 2 DEFAULT_BUCKET_ID: FAIL_FAST_INCORRECT_STACK WATSON_BKT_EVENT: BEX ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000004 ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB ANALYSIS_SESSION_TIME: 04-13-2020 12:48:46.0261 ANALYSIS_VERSION: 10.0.18362.1 amd64fre BAD_STACK_POINTER: ffffe601b03b7cd8 LAST_CONTROL_TRANSFER: from fffff804325af729 to fffff8043259d860 STACK_TEXT: ffffe601`b03b7cd8 fffff804`325af729 : 00000000`00000139 00000000`00000004 ffffe601`b03b8000 ffffe601`b03b7f58 : nt!KeBugCheckEx ffffe601`b03b7ce0 fffff804`325afb50 : 0000013c`00000000 00000000`00000fff 00000000`00000000 000001c6`b9000000 : nt!KiBugCheckDispatch+0x69 ffffe601`b03b7e20 fffff804`325adee3 : fffff804`324ffa74 fffff804`322a2430 ffffe601`b03b87c0 00000000`00000000 : nt!KiFastFailDispatch+0xd0 ffffe601`b03b8000 fffff804`325d6073 : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a7a36e90 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323 ffffe601`b03b8190 fffff804`325d61bc : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a832cf80 e9e88b4c`00000002 : nt!RtlpGetStackLimitsEx+0x18dd53 ffffe601`b03b81c0 fffff804`324ccdd6 : ffff8c81`a832be98 ffffe601`b03b8e20 ffff8c81`a832be98 ffffd60d`76afc020 : nt!RtlDispatchException+0x18de6c ffffe601`b03b88f0 fffff804`3259e6f2 : ccffe453`b7e9e375 48000004`38898b48 ffb0ae38`e838c183 e9000004`50838b48 : nt!KiDispatchException+0x186 ffffe601`b03b8fb0 fffff804`3259e6c0 : fffff804`325af865 00000000`00040202 fffff804`324824c8 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12 ffff8c81`a832bd58 fffff804`325af865 : 00000000`00040202 fffff804`324824c8 00000000`00000001 fffff804`3249ee9d : nt!KiExceptionDispatchOnExceptionStackContinue ffff8c81`a832bd60 fffff804`325ab5a0 : ffffd60d`7ec47ba0 ffffd60d`7ec47b70 ffffd60d`83f2db10 00000000`00000000 : nt!KiExceptionDispatch+0x125 ffff8c81`a832bf40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320 THREAD_SHA1_HASH_MOD_FUNC: e737fbae702fb97094ad39b47d3b15c19fae2b06 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 423c208199439684a135aeec2f53e246e0c541fd THREAD_SHA1_HASH_MOD: b28610981796779b4ac02f58898fde25728a775c FOLLOWUP_IP: nt!KiFastFailDispatch+d0 fffff804`325afb50 c644242000 mov byte ptr [rsp+20h],0 FAULT_INSTR_CODE: 202444c6 SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiFastFailDispatch+d0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 31cf0885 IMAGE_VERSION: 10.0.19041.153 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: d0 FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch PRIMARY_PROBLEM_CLASS: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch TARGET_TIME: 2020-04-10T11:48:39.000Z OSBUILD: 19041 OSSERVICEPACK: 153 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1996-06-25 00:28:37 BUILDDATESTAMP_STR: 191206-1406 BUILDLAB_STR: vb_release BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406 ANALYSIS_SESSION_ELAPSED_TIME: e58 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5} Followup: MachineOwner --------- MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2 contains the address of the PFN for the corrupted page table page. On a 32 bit OS, parameter 2 contains a pointer to the number of used PTEs, and parameter 3 contains the number of used PTEs. Arg2: ffff888006309c30 Arg3: 0000000000000000 Arg4: 0000000000000001 Debugging Details: ------------------ KEY_VALUES_STRING: 1 PROCESSES_ANALYSIS: 1 SERVICE_ANALYSIS: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 19041.1.amd64fre.vb_release.191206-1406 SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd. SYSTEM_PRODUCT_NAME: A320M-H SYSTEM_SKU: Default string SYSTEM_VERSION: Default string BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: F50 BIOS_DATE: 11/28/2019 BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd. BASEBOARD_PRODUCT: A320M-H-CF BASEBOARD_VERSION: x.x DUMP_TYPE: 2 BUGCHECK_P1: 41790 BUGCHECK_P2: ffff888006309c30 BUGCHECK_P3: 0 BUGCHECK_P4: 1 BUGCHECK_STR: 0x1a_41790 CPU_COUNT: c CPU_MHZ: c7a CPU_VENDOR: AuthenticAMD CPU_FAMILY: 17 CPU_MODEL: 8 CPU_STEPPING: 2 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT PROCESS_NAME: DyingLightGame.exe CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB ANALYSIS_SESSION_TIME: 04-13-2020 12:48:49.0569 ANALYSIS_VERSION: 10.0.18362.1 amd64fre LAST_CONTROL_TRANSFER: from fffff8047e609187 to fffff8047e59d860 STACK_TEXT: ffff8688`381fcef8 fffff804`7e609187 : 00000000`0000001a 00000000`00041790 ffff8880`06309c30 00000000`00000000 : nt!KeBugCheckEx ffff8688`381fcf00 fffff804`7e46d279 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x131417 ffff8688`381fcf40 fffff804`7e46c437 : fffff880`00a79ff8 ffffe702`18ee0700 00000000`00000000 00000000`00000200 : nt!MiDeleteVa+0x389 ffff8688`381fcfd0 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`400053c8 0a000002`10341867 : nt!MiWalkPageTablesRecursively+0x207 ffff8688`381fd030 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e200028 0a000000`33132867 : nt!MiWalkPageTablesRecursively+0x3a1 ffff8688`381fd090 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e3f1000 0a000000`49809867 : nt!MiWalkPageTablesRecursively+0x3a1 ffff8688`381fd0f0 fffff804`7e45e065 : ffffe702`18ee0700 fffff804`7e46cef0 ffff8688`381fd270 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x3a1 ffff8688`381fd150 fffff804`7e452aca : 00000001`50ffffff 00000000`00000000 ffff8688`381fd2e0 ffffe702`18ee0700 : nt!MiWalkPageTables+0x1e5 ffff8688`381fd1e0 fffff804`7e452710 : ffffe702`1c5de080 ffffe702`18ee0550 00000000`00000001 fffff804`7e45445c : nt!MiDeletePagablePteRange+0x392 ffff8688`381fd650 fffff804`7e453f97 : 00000000`00000000 ffffe702`00000000 ffff8688`381fd729 ffffe702`1c5de000 : nt!MiDeleteVirtualAddresses+0x48 ffff8688`381fd6a0 fffff804`7e4d686f : 00000000`00000000 00000000`00000000 ffffe702`00000000 ffffe702`18ee0700 : nt!MiDeleteVad+0x22f ffff8688`381fd790 fffff804`7e7cdb05 : 00000000`00000000 00000000`00000000 ffff8688`381fd8d9 00000001`4f000000 : nt!MiFreeVadRange+0xa3 ffff8688`381fd7f0 fffff804`7e7cd74b : ffff6e7f`16e5187b 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x385 ffff8688`381fd930 fffff804`7e5af178 : ffffe702`1c5de080 fffff804`7e493431 00000000`00000100 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b ffff8688`381fd990 fffff804`7e5a16c0 : fffff804`9085204e ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 : nt!KiSystemServiceCopyEnd+0x28 ffff8688`381fdb28 fffff804`9085204e : ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 fffff804`7e4fbd49 : nt!KiServiceLinkage ffff8688`381fdb30 fffff804`907e39ae : 00000000`02000000 ffffd289`16f2fd80 ffffe702`18b83010 fffff804`907f40b5 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0xb6 ffff8688`381fdb80 fffff804`90851f5d : ffffd289`1553cb10 fffff804`908481cf 00000000`00000001 ffffd289`0359df20 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe ffff8688`381fdbb0 fffff804`9084696d : ffffd289`0359df20 ffffe702`18b83010 ffffe702`18b83010 00000000`00000004 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d ffff8688`381fdbf0 fffff804`90846874 : ffffd289`16f2fd80 ffffd289`0359df20 ffff8688`381fdc98 00000000`00000008 : dxgmms2!VIDMM_RECYCLE_BLOCK::CleanupFreeBlock+0x69 ffff8688`381fdc20 fffff804`908442d8 : ffffd289`0359df20 ffff8688`381fdcf0 ffffd289`0359df20 ffff8688`381fdcf0 : dxgmms2!VIDMM_RECYCLE_BLOCK::ShrinkOnTailRangeFree+0x30 ffff8688`381fdc70 fffff804`9084781a : 00000000`02000000 ffffd289`09878548 ffffd289`0359df20 ffffe702`18b83010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x128 ffff8688`381fdcc0 fffff804`90892e58 : ffffe702`00000000 ffffe702`18b83648 00000000`00000001 ffffd289`155262d8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a ffff8688`381fdd30 fffff804`90848fe1 : ffffe702`18b83540 ffffd289`15526b10 ffffe702`1d0afb10 ffffd289`05b2ecf0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceListsGlobally+0xd0 ffff8688`381fddc0 fffff804`90839bbb : ffffe702`1b18a510 00000000`00000001 ffffd289`094d1990 ffff8688`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211 ffff8688`381fde00 fffff804`908397e5 : ffffd289`09417de0 00000000`00000000 00000000`00000000 ffff8688`381fe100 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x33b ffff8688`381fdfa0 fffff804`907d16fa : 00000000`00000000 ffffd289`09417de0 ffff8688`381fe130 ffffd289`00fd2000 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5 ffff8688`381fdff0 fffff804`8ad1a7a1 : 00000000`00000000 ffff8688`381fe130 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCloseAllocation+0x1a ffff8688`381fe030 fffff804`8ad2548b : 00000000`00000000 fffff804`8ad254ee ffffd289`00fd2010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5 ffff8688`381fe1d0 fffff804`8ad2516c : ffffd289`00fd2010 ffffd289`00fd2100 00000000`00000000 ffffd289`00fd21f0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f ffff8688`381fe230 fffff804`8ad25740 : ffffd289`00fd2010 ffffd289`0df0aa20 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148 ffff8688`381fe270 fffff804`8ad002d0 : 00000000`00000000 ffff8688`381fe3a0 ffffd289`00fd2010 ffffd289`00fd2010 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8 ffff8688`381fe2a0 fffff804`8acfd955 : ffffd289`09417de0 00000000`00002c98 ffffd289`09417de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x494 ffff8688`381fe510 fffff804`8ac08ac7 : 00000000`00000000 ffffd289`09417de0 ffffe702`116f9780 fffff804`821703f3 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105 ffff8688`381fe660 fffff804`7e79a7bf : 00000000`00000000 ffffe702`18ee0080 00000000`0000ff00 ffffe702`1c4bf0b0 : dxgkrnl!DxgkProcessNotify+0xf7 ffff8688`381fe6c0 fffff804`7e765c40 : ffffe702`18ee0000 ffffe702`18ee0080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213 ffff8688`381fe790 fffff804`7e79f686 : ffffe702`1c5de4b8 00000000`00000000 ffff8688`381fe980 00000000`00000000 : nt!PspExitProcess+0x70 ffff8688`381fe7c0 fffff804`7e8698e8 : fffff804`c0000005 00000000`00000f01 00000000`00000000 00000000`004f4000 : nt!PspExitThread+0x5b2 ffff8688`381fe8c0 fffff804`7e4cc591 : ffff8688`381fe980 fffff804`7e4657ca ffffe702`00000000 ffffe702`00000000 : nt!KiSchedulerApcTerminate+0x38 ffff8688`381fe900 fffff804`7e5a1e00 : 00000000`00000000 ffff8688`381fe9c0 ffff8688`381feb00 ffffe702`18843590 : nt!KiDeliverApc+0x451 ffff8688`381fe9c0 fffff804`7e5af21f : 00000000`00000000 00000000`00000000 ffff8688`381feb18 ffffffff`ffb3b4c0 : nt!KiInitiateUserApc+0x70 ffff8688`381feb00 00007ffc`d692ae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f 00000000`4234faa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d692ae54 THREAD_SHA1_HASH_MOD_FUNC: e85c7eda892443a805d1df51f9635857b01ee34c THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1647b3bd2753078525fa9e47153febceb8f7b84b THREAD_SHA1_HASH_MOD: 03bb7691005b7d6dc18a1b90bc2c2bb81c85dc92 FOLLOWUP_IP: dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6 fffff804`9085204e 4863f8 movsxd rdi,eax FAULT_INSTR_CODE: b8f86348 SYMBOL_STACK_INDEX: 10 SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms2 IMAGE_NAME: dxgmms2.sys DEBUG_FLR_IMAGE_TIMESTAMP: 0 IMAGE_VERSION: 10.0.19041.1025 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: b6 FAILURE_BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK PRIMARY_PROBLEM_CLASS: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK TARGET_TIME: 2020-04-12T21:28:53.000Z OSBUILD: 19041 OSSERVICEPACK: 153 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1996-06-25 00:28:37 BUILDDATESTAMP_STR: 191206-1406 BUILDLAB_STR: vb_release BUILDOSVER_STR: 10.0.19041.1.amd64fre.vb_release.191206-1406 ANALYSIS_SESSION_ELAPSED_TIME: 5482 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x1a_41790_dxgmms2!vidmm_recycle_block::_vidmm_recycle_block FAILURE_ID_HASH: {80770e6d-f962-9e92-764d-b939dc653edf} Followup: MachineOwner ---------
İşlemci sıcaklığı neydi?