Ryzen 5 1600 ve RX 590 oyun oynarken mavi ekran sorunu

catasoy3

Hectopat
Katılım
21 Ekim 2013
Mesajlar
37
Windows 10 2004 sürümünü kullanıyorum. Bilgisayarda genellikle yüksek grafikli oyunlar oynarken ya donup kalıyor ya kendini resetliyor ya da mavi ekran veriyor. Bazen kendini resetlediğinde SSD'yi görmemeye başlıyor sonra kendi kendine tekrar görmeye başlıyor anlam veremedim. SSD'yi çıkarıp sistemi harddiske kurup oyun oynamayı denedim yine aynı şeyleri yaşadım. Nadiren internette gezerken de bu sorunlarla karşılaşabiliyorum. Mavi ekran verdiğinde hep ayrı şeyler yazıp duruyor anlam veremedim. İsterseniz minidumpları sizlerle paylaşabilirim. Yardımcı olabilir misiniz?
 
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Memtest86 testi problemsiz biterse M.2 SSD'yi sistemden çıkar ve HDD üstüne sistemi kur.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0d54e2f750, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0d54e2f6a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  A320M-H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/28/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  A320M-H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdf0d54e2f750

BUGCHECK_P3: ffffdf0d54e2f6a8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffdf0d54e2f750 -- (.trap 0xffffdf0d54e2f750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc859bacf158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcc85a0fe1158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ec89fc0 rsp=ffffdf0d54e2f8e0 rbp=0000000000000000
 r8=0000000000000000  r9=ffffcc859bacf1c0 r10=ffffcc859db31700
r11=7fffcc859b089470 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiRemovePrcbWaitEntry+0xe8:
fffff801`1ec89fc0 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001

CPU_COUNT: c

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 12:48:43.0940

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8011edaf729 to fffff8011ed9d860

STACK_TEXT: 
ffffdf0d`54e2f428 fffff801`1edaf729 : 00000000`00000139 00000000`00000003 ffffdf0d`54e2f750 ffffdf0d`54e2f6a8 : nt!KeBugCheckEx
ffffdf0d`54e2f430 fffff801`1edafb50 : 00000000`00000272 00000000`00000001 00000000`00000001 fffff801`1ec3ddc4 : nt!KiBugCheckDispatch+0x69
ffffdf0d`54e2f570 fffff801`1edadee3 : ffffcc85`9db31080 ffffcc85`9be43578 00000000`00000001 fffff801`1ec69aef : nt!KiFastFailDispatch+0xd0
ffffdf0d`54e2f750 fffff801`1ec89fc0 : ffffa38b`ae9ae990 fffff801`1ec69abe ffffa38b`8e638c70 ffffdf0d`54e2fa80 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0d`54e2f8e0 fffff801`1ec89de9 : ffffdf0d`00000000 ffffcc85`9bacf080 ffffe380`4ad36180 ffffcc85`9b089310 : nt!KiRemovePrcbWaitEntry+0xe8
ffffdf0d`54e2f910 fffff801`1ec89d0b : ffffe380`4ad36180 ffffcc85`9bacf1c0 ffffa38b`ae9ae990 ffffcc85`9b089310 : nt!KiSignalThread+0x45
ffffdf0d`54e2f940 fffff801`1ec4ba14 : ffffcc85`9bacf508 00000000`00000000 00000000`00000000 fffff801`1efc7938 : nt!KiTryUnwaitThread+0x6b
ffffdf0d`54e2f990 fffff801`1ec4bd8a : ffffcc85`9bacf510 ffffa38b`00000001 00000000`00000000 00000000`00000001 : nt!KeReleaseSemaphoreEx+0xd0
ffffdf0d`54e2fa10 fffff801`1ec4bc70 : 00000000`00020002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpSignal+0x46
ffffdf0d`54e2fa50 fffff801`1efc702b : 00000000`00020002 ffffcc85`a05b82c0 ffffcc85`9b089310 ffffcc85`9db31508 : nt!AlpcpSignalAndWait+0x34
ffffdf0d`54e2fa90 fffff801`1efc6cf7 : ffffdf0d`54e2fb70 00000000`00020002 ffffcc85`a05b82c0 ffffdf0d`54e2fc90 : nt!AlpcpReceiveSynchronousReply+0x57
ffffdf0d`54e2faf0 fffff801`1f0746f9 : ffffcc85`9b089310 00000000`00020002 ffffdf0d`54e2ffa0 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x1a7
ffffdf0d`54e2fbf0 fffff801`1f20179f : 00000000`00000000 04d80000`00000000 022f0000`00000000 00000000`00000000 : nt!LpcSendWaitReceivePort+0x49
ffffdf0d`54e2fc50 fffff801`1f1a103d : ffffcc85`9b089310 ffffdf0d`54e30a58 ffffcc85`9b089310 ffffcc85`a05b82c0 : nt!DbgkpSendApiMessageLpc+0x7f
ffffdf0d`54e2ff70 fffff801`1ee05129 : ffffdf0d`54e30a58 ffffdf0d`54e30a58 ffffffff`ffffffff 00000234`7f005540 : nt!DbgkForwardException+0x10bd9d
ffffdf0d`54e300f0 fffff801`1edafb64 : 00000000`00000001 fffff801`1ec690db ffffcc85`9db31080 ffffcc85`9ba6e088 : nt!KiDispatchException+0x1384d9
ffffdf0d`54e30920 fffff801`1edadee3 : 00000234`0ac3ab70 ffffcc85`920cb3e0 ffffdf0d`54e30b18 ffffffff`ff355d00 : nt!KiFastFailDispatch+0xe4
ffffdf0d`54e30b00 00007ffc`10210db4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
0000007e`4e9fe180 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`10210db4


THREAD_SHA1_HASH_MOD_FUNC:  d90eb29bdb338700c49678c510492c81f63e72a6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  059c61829a639b071d9dc6749cabb2741e714236

THREAD_SHA1_HASH_MOD:  82d14546c43bd06881f781d6d197c4c7f7ceb9cb

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801`1edafb50 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  31cf0885

IMAGE_VERSION:  10.0.19041.153

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2020-04-04T01:56:00.000Z

OSBUILD:  19041

OSSERVICEPACK:  153

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1996-06-25 00:28:37

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  2e7e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffe601b03b8000, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe601b03b7f58, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  A320M-H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/28/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  A320M-H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 4

BUGCHECK_P2: ffffe601b03b8000

BUGCHECK_P3: ffffe601b03b7f58

BUGCHECK_P4: 0

TRAP_FRAME:  ffb0ae38e838c183 -- (.trap 0xffb0ae38e838c183)
Unable to read trap frame at ffb0ae38`e838c183

EXCEPTION_RECORD:  ccffe453b7e9e375 -- (.exr 0xccffe453b7e9e375)
Cannot read Exception record @ ccffe453b7e9e375

CPU_COUNT: c

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  steam.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_INCORRECT_STACK

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 12:48:46.0261

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  ffffe601b03b7cd8

LAST_CONTROL_TRANSFER:  from fffff804325af729 to fffff8043259d860

STACK_TEXT: 
ffffe601`b03b7cd8 fffff804`325af729 : 00000000`00000139 00000000`00000004 ffffe601`b03b8000 ffffe601`b03b7f58 : nt!KeBugCheckEx
ffffe601`b03b7ce0 fffff804`325afb50 : 0000013c`00000000 00000000`00000fff 00000000`00000000 000001c6`b9000000 : nt!KiBugCheckDispatch+0x69
ffffe601`b03b7e20 fffff804`325adee3 : fffff804`324ffa74 fffff804`322a2430 ffffe601`b03b87c0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe601`b03b8000 fffff804`325d6073 : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a7a36e90 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe601`b03b8190 fffff804`325d61bc : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a832cf80 e9e88b4c`00000002 : nt!RtlpGetStackLimitsEx+0x18dd53
ffffe601`b03b81c0 fffff804`324ccdd6 : ffff8c81`a832be98 ffffe601`b03b8e20 ffff8c81`a832be98 ffffd60d`76afc020 : nt!RtlDispatchException+0x18de6c
ffffe601`b03b88f0 fffff804`3259e6f2 : ccffe453`b7e9e375 48000004`38898b48 ffb0ae38`e838c183 e9000004`50838b48 : nt!KiDispatchException+0x186
ffffe601`b03b8fb0 fffff804`3259e6c0 : fffff804`325af865 00000000`00040202 fffff804`324824c8 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8c81`a832bd58 fffff804`325af865 : 00000000`00040202 fffff804`324824c8 00000000`00000001 fffff804`3249ee9d : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8c81`a832bd60 fffff804`325ab5a0 : ffffd60d`7ec47ba0 ffffd60d`7ec47b70 ffffd60d`83f2db10 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffff8c81`a832bf40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320


THREAD_SHA1_HASH_MOD_FUNC:  e737fbae702fb97094ad39b47d3b15c19fae2b06

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  423c208199439684a135aeec2f53e246e0c541fd

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff804`325afb50 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  31cf0885

IMAGE_VERSION:  10.0.19041.153

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

TARGET_TIME:  2020-04-10T11:48:39.000Z

OSBUILD:  19041

OSSERVICEPACK:  153

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1996-06-25 00:28:37

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  e58

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff888006309c30
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  A320M-H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/28/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  A320M-H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff888006309c30

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BUGCHECK_STR:  0x1a_41790

CPU_COUNT: c

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  DyingLightGame.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 12:48:49.0569

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8047e609187 to fffff8047e59d860

STACK_TEXT: 
ffff8688`381fcef8 fffff804`7e609187 : 00000000`0000001a 00000000`00041790 ffff8880`06309c30 00000000`00000000 : nt!KeBugCheckEx
ffff8688`381fcf00 fffff804`7e46d279 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x131417
ffff8688`381fcf40 fffff804`7e46c437 : fffff880`00a79ff8 ffffe702`18ee0700 00000000`00000000 00000000`00000200 : nt!MiDeleteVa+0x389
ffff8688`381fcfd0 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`400053c8 0a000002`10341867 : nt!MiWalkPageTablesRecursively+0x207
ffff8688`381fd030 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e200028 0a000000`33132867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd090 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e3f1000 0a000000`49809867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd0f0 fffff804`7e45e065 : ffffe702`18ee0700 fffff804`7e46cef0 ffff8688`381fd270 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd150 fffff804`7e452aca : 00000001`50ffffff 00000000`00000000 ffff8688`381fd2e0 ffffe702`18ee0700 : nt!MiWalkPageTables+0x1e5
ffff8688`381fd1e0 fffff804`7e452710 : ffffe702`1c5de080 ffffe702`18ee0550 00000000`00000001 fffff804`7e45445c : nt!MiDeletePagablePteRange+0x392
ffff8688`381fd650 fffff804`7e453f97 : 00000000`00000000 ffffe702`00000000 ffff8688`381fd729 ffffe702`1c5de000 : nt!MiDeleteVirtualAddresses+0x48
ffff8688`381fd6a0 fffff804`7e4d686f : 00000000`00000000 00000000`00000000 ffffe702`00000000 ffffe702`18ee0700 : nt!MiDeleteVad+0x22f
ffff8688`381fd790 fffff804`7e7cdb05 : 00000000`00000000 00000000`00000000 ffff8688`381fd8d9 00000001`4f000000 : nt!MiFreeVadRange+0xa3
ffff8688`381fd7f0 fffff804`7e7cd74b : ffff6e7f`16e5187b 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x385
ffff8688`381fd930 fffff804`7e5af178 : ffffe702`1c5de080 fffff804`7e493431 00000000`00000100 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
ffff8688`381fd990 fffff804`7e5a16c0 : fffff804`9085204e ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 : nt!KiSystemServiceCopyEnd+0x28
ffff8688`381fdb28 fffff804`9085204e : ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 fffff804`7e4fbd49 : nt!KiServiceLinkage
ffff8688`381fdb30 fffff804`907e39ae : 00000000`02000000 ffffd289`16f2fd80 ffffe702`18b83010 fffff804`907f40b5 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0xb6
ffff8688`381fdb80 fffff804`90851f5d : ffffd289`1553cb10 fffff804`908481cf 00000000`00000001 ffffd289`0359df20 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe
ffff8688`381fdbb0 fffff804`9084696d : ffffd289`0359df20 ffffe702`18b83010 ffffe702`18b83010 00000000`00000004 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d
ffff8688`381fdbf0 fffff804`90846874 : ffffd289`16f2fd80 ffffd289`0359df20 ffff8688`381fdc98 00000000`00000008 : dxgmms2!VIDMM_RECYCLE_BLOCK::CleanupFreeBlock+0x69
ffff8688`381fdc20 fffff804`908442d8 : ffffd289`0359df20 ffff8688`381fdcf0 ffffd289`0359df20 ffff8688`381fdcf0 : dxgmms2!VIDMM_RECYCLE_BLOCK::ShrinkOnTailRangeFree+0x30
ffff8688`381fdc70 fffff804`9084781a : 00000000`02000000 ffffd289`09878548 ffffd289`0359df20 ffffe702`18b83010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x128
ffff8688`381fdcc0 fffff804`90892e58 : ffffe702`00000000 ffffe702`18b83648 00000000`00000001 ffffd289`155262d8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffff8688`381fdd30 fffff804`90848fe1 : ffffe702`18b83540 ffffd289`15526b10 ffffe702`1d0afb10 ffffd289`05b2ecf0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceListsGlobally+0xd0
ffff8688`381fddc0 fffff804`90839bbb : ffffe702`1b18a510 00000000`00000001 ffffd289`094d1990 ffff8688`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211
ffff8688`381fde00 fffff804`908397e5 : ffffd289`09417de0 00000000`00000000 00000000`00000000 ffff8688`381fe100 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x33b
ffff8688`381fdfa0 fffff804`907d16fa : 00000000`00000000 ffffd289`09417de0 ffff8688`381fe130 ffffd289`00fd2000 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5
ffff8688`381fdff0 fffff804`8ad1a7a1 : 00000000`00000000 ffff8688`381fe130 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCloseAllocation+0x1a
ffff8688`381fe030 fffff804`8ad2548b : 00000000`00000000 fffff804`8ad254ee ffffd289`00fd2010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5
ffff8688`381fe1d0 fffff804`8ad2516c : ffffd289`00fd2010 ffffd289`00fd2100 00000000`00000000 ffffd289`00fd21f0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f
ffff8688`381fe230 fffff804`8ad25740 : ffffd289`00fd2010 ffffd289`0df0aa20 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148
ffff8688`381fe270 fffff804`8ad002d0 : 00000000`00000000 ffff8688`381fe3a0 ffffd289`00fd2010 ffffd289`00fd2010 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffff8688`381fe2a0 fffff804`8acfd955 : ffffd289`09417de0 00000000`00002c98 ffffd289`09417de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x494
ffff8688`381fe510 fffff804`8ac08ac7 : 00000000`00000000 ffffd289`09417de0 ffffe702`116f9780 fffff804`821703f3 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8688`381fe660 fffff804`7e79a7bf : 00000000`00000000 ffffe702`18ee0080 00000000`0000ff00 ffffe702`1c4bf0b0 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8688`381fe6c0 fffff804`7e765c40 : ffffe702`18ee0000 ffffe702`18ee0080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8688`381fe790 fffff804`7e79f686 : ffffe702`1c5de4b8 00000000`00000000 ffff8688`381fe980 00000000`00000000 : nt!PspExitProcess+0x70
ffff8688`381fe7c0 fffff804`7e8698e8 : fffff804`c0000005 00000000`00000f01 00000000`00000000 00000000`004f4000 : nt!PspExitThread+0x5b2
ffff8688`381fe8c0 fffff804`7e4cc591 : ffff8688`381fe980 fffff804`7e4657ca ffffe702`00000000 ffffe702`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8688`381fe900 fffff804`7e5a1e00 : 00000000`00000000 ffff8688`381fe9c0 ffff8688`381feb00 ffffe702`18843590 : nt!KiDeliverApc+0x451
ffff8688`381fe9c0 fffff804`7e5af21f : 00000000`00000000 00000000`00000000 ffff8688`381feb18 ffffffff`ffb3b4c0 : nt!KiInitiateUserApc+0x70
ffff8688`381feb00 00007ffc`d692ae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`4234faa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d692ae54


THREAD_SHA1_HASH_MOD_FUNC:  e85c7eda892443a805d1df51f9635857b01ee34c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1647b3bd2753078525fa9e47153febceb8f7b84b

THREAD_SHA1_HASH_MOD:  03bb7691005b7d6dc18a1b90bc2c2bb81c85dc92

FOLLOWUP_IP:
dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6
fffff804`9085204e 4863f8          movsxd  rdi,eax

FAULT_INSTR_CODE:  b8f86348

SYMBOL_STACK_INDEX:  10

SYMBOL_NAME:  dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.19041.1025

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b6

FAILURE_BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

PRIMARY_PROBLEM_CLASS:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

TARGET_TIME:  2020-04-12T21:28:53.000Z

OSBUILD:  19041

OSSERVICEPACK:  153

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  1996-06-25 00:28:37

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  5482

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41790_dxgmms2!vidmm_recycle_block::_vidmm_recycle_block

FAILURE_ID_HASH:  {80770e6d-f962-9e92-764d-b939dc653edf}

Followup:     MachineOwner
---------
 
Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Memtest86 testi problemsiz biterse M.2 SSD'yi sistemden çıkar ve HDD üstüne sistemi kur.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffdf0d54e2f750, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffdf0d54e2f6a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  A320M-H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/28/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  A320M-H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffdf0d54e2f750

BUGCHECK_P3: ffffdf0d54e2f6a8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffdf0d54e2f750 -- (.trap 0xffffdf0d54e2f750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc859bacf158 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffcc85a0fe1158 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011ec89fc0 rsp=ffffdf0d54e2f8e0 rbp=0000000000000000
r8=0000000000000000  r9=ffffcc859bacf1c0 r10=ffffcc859db31700
r11=7fffcc859b089470 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiRemovePrcbWaitEntry+0xe8:
fffff801`1ec89fc0 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  0000000000000001 -- (.exr 0x1)
Cannot read Exception record @ 0000000000000001

CPU_COUNT: c

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  chrome.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 12:48:43.0940

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8011edaf729 to fffff8011ed9d860

STACK_TEXT:
ffffdf0d`54e2f428 fffff801`1edaf729 : 00000000`00000139 00000000`00000003 ffffdf0d`54e2f750 ffffdf0d`54e2f6a8 : nt!KeBugCheckEx
ffffdf0d`54e2f430 fffff801`1edafb50 : 00000000`00000272 00000000`00000001 00000000`00000001 fffff801`1ec3ddc4 : nt!KiBugCheckDispatch+0x69
ffffdf0d`54e2f570 fffff801`1edadee3 : ffffcc85`9db31080 ffffcc85`9be43578 00000000`00000001 fffff801`1ec69aef : nt!KiFastFailDispatch+0xd0
ffffdf0d`54e2f750 fffff801`1ec89fc0 : ffffa38b`ae9ae990 fffff801`1ec69abe ffffa38b`8e638c70 ffffdf0d`54e2fa80 : nt!KiRaiseSecurityCheckFailure+0x323
ffffdf0d`54e2f8e0 fffff801`1ec89de9 : ffffdf0d`00000000 ffffcc85`9bacf080 ffffe380`4ad36180 ffffcc85`9b089310 : nt!KiRemovePrcbWaitEntry+0xe8
ffffdf0d`54e2f910 fffff801`1ec89d0b : ffffe380`4ad36180 ffffcc85`9bacf1c0 ffffa38b`ae9ae990 ffffcc85`9b089310 : nt!KiSignalThread+0x45
ffffdf0d`54e2f940 fffff801`1ec4ba14 : ffffcc85`9bacf508 00000000`00000000 00000000`00000000 fffff801`1efc7938 : nt!KiTryUnwaitThread+0x6b
ffffdf0d`54e2f990 fffff801`1ec4bd8a : ffffcc85`9bacf510 ffffa38b`00000001 00000000`00000000 00000000`00000001 : nt!KeReleaseSemaphoreEx+0xd0
ffffdf0d`54e2fa10 fffff801`1ec4bc70 : 00000000`00020002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpSignal+0x46
ffffdf0d`54e2fa50 fffff801`1efc702b : 00000000`00020002 ffffcc85`a05b82c0 ffffcc85`9b089310 ffffcc85`9db31508 : nt!AlpcpSignalAndWait+0x34
ffffdf0d`54e2fa90 fffff801`1efc6cf7 : ffffdf0d`54e2fb70 00000000`00020002 ffffcc85`a05b82c0 ffffdf0d`54e2fc90 : nt!AlpcpReceiveSynchronousReply+0x57
ffffdf0d`54e2faf0 fffff801`1f0746f9 : ffffcc85`9b089310 00000000`00020002 ffffdf0d`54e2ffa0 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x1a7
ffffdf0d`54e2fbf0 fffff801`1f20179f : 00000000`00000000 04d80000`00000000 022f0000`00000000 00000000`00000000 : nt!LpcSendWaitReceivePort+0x49
ffffdf0d`54e2fc50 fffff801`1f1a103d : ffffcc85`9b089310 ffffdf0d`54e30a58 ffffcc85`9b089310 ffffcc85`a05b82c0 : nt!DbgkpSendApiMessageLpc+0x7f
ffffdf0d`54e2ff70 fffff801`1ee05129 : ffffdf0d`54e30a58 ffffdf0d`54e30a58 ffffffff`ffffffff 00000234`7f005540 : nt!DbgkForwardException+0x10bd9d
ffffdf0d`54e300f0 fffff801`1edafb64 : 00000000`00000001 fffff801`1ec690db ffffcc85`9db31080 ffffcc85`9ba6e088 : nt!KiDispatchException+0x1384d9
ffffdf0d`54e30920 fffff801`1edadee3 : 00000234`0ac3ab70 ffffcc85`920cb3e0 ffffdf0d`54e30b18 ffffffff`ff355d00 : nt!KiFastFailDispatch+0xe4
ffffdf0d`54e30b00 00007ffc`10210db4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
0000007e`4e9fe180 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`10210db4


THREAD_SHA1_HASH_MOD_FUNC:  d90eb29bdb338700c49678c510492c81f63e72a6

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  059c61829a639b071d9dc6749cabb2741e714236

THREAD_SHA1_HASH_MOD:  82d14546c43bd06881f781d6d197c4c7f7ceb9cb

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff801`1edafb50 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  31cf0885

IMAGE_VERSION:  10.0.19041.153

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

TARGET_TIME:  2020-04-04T01:56:00.000Z

OSBUILD:  19041

OSSERVICEPACK:  153

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1996-06-25 00:28:37

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  2e7e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_nt!kifastfaildispatch

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffe601b03b8000, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe601b03b7f58, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  A320M-H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/28/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  A320M-H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 4

BUGCHECK_P2: ffffe601b03b8000

BUGCHECK_P3: ffffe601b03b7f58

BUGCHECK_P4: 0

TRAP_FRAME:  ffb0ae38e838c183 -- (.trap 0xffb0ae38e838c183)
Unable to read trap frame at ffb0ae38`e838c183

EXCEPTION_RECORD:  ccffe453b7e9e375 -- (.exr 0xccffe453b7e9e375)
Cannot read Exception record @ ccffe453b7e9e375

CPU_COUNT: c

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  steam.exe

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_INCORRECT_STACK

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 12:48:46.0261

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

BAD_STACK_POINTER:  ffffe601b03b7cd8

LAST_CONTROL_TRANSFER:  from fffff804325af729 to fffff8043259d860

STACK_TEXT:
ffffe601`b03b7cd8 fffff804`325af729 : 00000000`00000139 00000000`00000004 ffffe601`b03b8000 ffffe601`b03b7f58 : nt!KeBugCheckEx
ffffe601`b03b7ce0 fffff804`325afb50 : 0000013c`00000000 00000000`00000fff 00000000`00000000 000001c6`b9000000 : nt!KiBugCheckDispatch+0x69
ffffe601`b03b7e20 fffff804`325adee3 : fffff804`324ffa74 fffff804`322a2430 ffffe601`b03b87c0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe601`b03b8000 fffff804`325d6073 : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a7a36e90 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe601`b03b8190 fffff804`325d61bc : 00000000`00000000 ffffe601`b03b8700 ffff8c81`a832cf80 e9e88b4c`00000002 : nt!RtlpGetStackLimitsEx+0x18dd53
ffffe601`b03b81c0 fffff804`324ccdd6 : ffff8c81`a832be98 ffffe601`b03b8e20 ffff8c81`a832be98 ffffd60d`76afc020 : nt!RtlDispatchException+0x18de6c
ffffe601`b03b88f0 fffff804`3259e6f2 : ccffe453`b7e9e375 48000004`38898b48 ffb0ae38`e838c183 e9000004`50838b48 : nt!KiDispatchException+0x186
ffffe601`b03b8fb0 fffff804`3259e6c0 : fffff804`325af865 00000000`00040202 fffff804`324824c8 00000000`00000001 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffff8c81`a832bd58 fffff804`325af865 : 00000000`00040202 fffff804`324824c8 00000000`00000001 fffff804`3249ee9d : nt!KiExceptionDispatchOnExceptionStackContinue
ffff8c81`a832bd60 fffff804`325ab5a0 : ffffd60d`7ec47ba0 ffffd60d`7ec47b70 ffffd60d`83f2db10 00000000`00000000 : nt!KiExceptionDispatch+0x125
ffff8c81`a832bf40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x320


THREAD_SHA1_HASH_MOD_FUNC:  e737fbae702fb97094ad39b47d3b15c19fae2b06

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  423c208199439684a135aeec2f53e246e0c541fd

THREAD_SHA1_HASH_MOD:  b28610981796779b4ac02f58898fde25728a775c

FOLLOWUP_IP:
nt!KiFastFailDispatch+d0
fffff804`325afb50 c644242000      mov     byte ptr [rsp+20h],0

FAULT_INSTR_CODE:  202444c6

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  nt!KiFastFailDispatch+d0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  31cf0885

IMAGE_VERSION:  10.0.19041.153

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

PRIMARY_PROBLEM_CLASS:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

TARGET_TIME:  2020-04-10T11:48:39.000Z

OSBUILD:  19041

OSSERVICEPACK:  153

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1996-06-25 00:28:37

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  e58

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_missing_gsframe_stackptr_error_nt!kifastfaildispatch

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
    contains the address of the PFN for the corrupted page table page.
    On a 32 bit OS, parameter 2 contains a pointer to the number of used
    PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffff888006309c30
Arg3: 0000000000000000
Arg4: 0000000000000001

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  A320M-H

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F50

BIOS_DATE:  11/28/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  A320M-H-CF

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 41790

BUGCHECK_P2: ffff888006309c30

BUGCHECK_P3: 0

BUGCHECK_P4: 1

BUGCHECK_STR:  0x1a_41790

CPU_COUNT: c

CPU_MHZ: c7a

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  DyingLightGame.exe

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-ME9UFOB

ANALYSIS_SESSION_TIME:  04-13-2020 12:48:49.0569

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8047e609187 to fffff8047e59d860

STACK_TEXT:
ffff8688`381fcef8 fffff804`7e609187 : 00000000`0000001a 00000000`00041790 ffff8880`06309c30 00000000`00000000 : nt!KeBugCheckEx
ffff8688`381fcf00 fffff804`7e46d279 : 00000000`00000000 00000000`00000200 00000000`00000000 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x131417
ffff8688`381fcf40 fffff804`7e46c437 : fffff880`00a79ff8 ffffe702`18ee0700 00000000`00000000 00000000`00000200 : nt!MiDeleteVa+0x389
ffff8688`381fcfd0 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`400053c8 0a000002`10341867 : nt!MiWalkPageTablesRecursively+0x207
ffff8688`381fd030 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e200028 0a000000`33132867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd090 fffff804`7e46c5d1 : ffffe702`18ee0700 fffff804`7e46cef0 fffff8fc`7e3f1000 0a000000`49809867 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd0f0 fffff804`7e45e065 : ffffe702`18ee0700 fffff804`7e46cef0 ffff8688`381fd270 00000000`00000001 : nt!MiWalkPageTablesRecursively+0x3a1
ffff8688`381fd150 fffff804`7e452aca : 00000001`50ffffff 00000000`00000000 ffff8688`381fd2e0 ffffe702`18ee0700 : nt!MiWalkPageTables+0x1e5
ffff8688`381fd1e0 fffff804`7e452710 : ffffe702`1c5de080 ffffe702`18ee0550 00000000`00000001 fffff804`7e45445c : nt!MiDeletePagablePteRange+0x392
ffff8688`381fd650 fffff804`7e453f97 : 00000000`00000000 ffffe702`00000000 ffff8688`381fd729 ffffe702`1c5de000 : nt!MiDeleteVirtualAddresses+0x48
ffff8688`381fd6a0 fffff804`7e4d686f : 00000000`00000000 00000000`00000000 ffffe702`00000000 ffffe702`18ee0700 : nt!MiDeleteVad+0x22f
ffff8688`381fd790 fffff804`7e7cdb05 : 00000000`00000000 00000000`00000000 ffff8688`381fd8d9 00000001`4f000000 : nt!MiFreeVadRange+0xa3
ffff8688`381fd7f0 fffff804`7e7cd74b : ffff6e7f`16e5187b 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x385
ffff8688`381fd930 fffff804`7e5af178 : ffffe702`1c5de080 fffff804`7e493431 00000000`00000100 00000000`00000000 : nt!NtFreeVirtualMemory+0x8b
ffff8688`381fd990 fffff804`7e5a16c0 : fffff804`9085204e ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 : nt!KiSystemServiceCopyEnd+0x28
ffff8688`381fdb28 fffff804`9085204e : ffffd289`1553cb10 fffff804`907f3622 ffff8688`381fdcf0 fffff804`7e4fbd49 : nt!KiServiceLinkage
ffff8688`381fdb30 fffff804`907e39ae : 00000000`02000000 ffffd289`16f2fd80 ffffe702`18b83010 fffff804`907f40b5 : dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+0xb6
ffff8688`381fdb80 fffff804`90851f5d : ffffd289`1553cb10 fffff804`908481cf 00000000`00000001 ffffd289`0359df20 : dxgmms2!VIDMM_RECYCLE_BLOCK::`scalar deleting destructor'+0xe
ffff8688`381fdbb0 fffff804`9084696d : ffffd289`0359df20 ffffe702`18b83010 ffffe702`18b83010 00000000`00000004 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::DestroyRange+0x5d
ffff8688`381fdbf0 fffff804`90846874 : ffffd289`16f2fd80 ffffd289`0359df20 ffff8688`381fdc98 00000000`00000008 : dxgmms2!VIDMM_RECYCLE_BLOCK::CleanupFreeBlock+0x69
ffff8688`381fdc20 fffff804`908442d8 : ffffd289`0359df20 ffff8688`381fdcf0 ffffd289`0359df20 ffff8688`381fdcf0 : dxgmms2!VIDMM_RECYCLE_BLOCK::ShrinkOnTailRangeFree+0x30
ffff8688`381fdc70 fffff804`9084781a : 00000000`02000000 ffffd289`09878548 ffffd289`0359df20 ffffe702`18b83010 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x128
ffff8688`381fdcc0 fffff804`90892e58 : ffffe702`00000000 ffffe702`18b83648 00000000`00000001 ffffd289`155262d8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffff8688`381fdd30 fffff804`90848fe1 : ffffe702`18b83540 ffffd289`15526b10 ffffe702`1d0afb10 ffffd289`05b2ecf0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceListsGlobally+0xd0
ffff8688`381fddc0 fffff804`90839bbb : ffffe702`1b18a510 00000000`00000001 ffffd289`094d1990 ffff8688`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211
ffff8688`381fde00 fffff804`908397e5 : ffffd289`09417de0 00000000`00000000 00000000`00000000 ffff8688`381fe100 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x33b
ffff8688`381fdfa0 fffff804`907d16fa : 00000000`00000000 ffffd289`09417de0 ffff8688`381fe130 ffffd289`00fd2000 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5
ffff8688`381fdff0 fffff804`8ad1a7a1 : 00000000`00000000 ffff8688`381fe130 00000000`00000000 00000000`00000000 : dxgmms2!VidMmCloseAllocation+0x1a
ffff8688`381fe030 fffff804`8ad2548b : 00000000`00000000 fffff804`8ad254ee ffffd289`00fd2010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5
ffff8688`381fe1d0 fffff804`8ad2516c : ffffd289`00fd2010 ffffd289`00fd2100 00000000`00000000 ffffd289`00fd21f0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f
ffff8688`381fe230 fffff804`8ad25740 : ffffd289`00fd2010 ffffd289`0df0aa20 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148
ffff8688`381fe270 fffff804`8ad002d0 : 00000000`00000000 ffff8688`381fe3a0 ffffd289`00fd2010 ffffd289`00fd2010 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
ffff8688`381fe2a0 fffff804`8acfd955 : ffffd289`09417de0 00000000`00002c98 ffffd289`09417de0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0x494
ffff8688`381fe510 fffff804`8ac08ac7 : 00000000`00000000 ffffd289`09417de0 ffffe702`116f9780 fffff804`821703f3 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
ffff8688`381fe660 fffff804`7e79a7bf : 00000000`00000000 ffffe702`18ee0080 00000000`0000ff00 ffffe702`1c4bf0b0 : dxgkrnl!DxgkProcessNotify+0xf7
ffff8688`381fe6c0 fffff804`7e765c40 : ffffe702`18ee0000 ffffe702`18ee0080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
ffff8688`381fe790 fffff804`7e79f686 : ffffe702`1c5de4b8 00000000`00000000 ffff8688`381fe980 00000000`00000000 : nt!PspExitProcess+0x70
ffff8688`381fe7c0 fffff804`7e8698e8 : fffff804`c0000005 00000000`00000f01 00000000`00000000 00000000`004f4000 : nt!PspExitThread+0x5b2
ffff8688`381fe8c0 fffff804`7e4cc591 : ffff8688`381fe980 fffff804`7e4657ca ffffe702`00000000 ffffe702`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8688`381fe900 fffff804`7e5a1e00 : 00000000`00000000 ffff8688`381fe9c0 ffff8688`381feb00 ffffe702`18843590 : nt!KiDeliverApc+0x451
ffff8688`381fe9c0 fffff804`7e5af21f : 00000000`00000000 00000000`00000000 ffff8688`381feb18 ffffffff`ffb3b4c0 : nt!KiInitiateUserApc+0x70
ffff8688`381feb00 00007ffc`d692ae54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`4234faa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`d692ae54


THREAD_SHA1_HASH_MOD_FUNC:  e85c7eda892443a805d1df51f9635857b01ee34c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  1647b3bd2753078525fa9e47153febceb8f7b84b

THREAD_SHA1_HASH_MOD:  03bb7691005b7d6dc18a1b90bc2c2bb81c85dc92

FOLLOWUP_IP:
dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6
fffff804`9085204e 4863f8          movsxd  rdi,eax

FAULT_INSTR_CODE:  b8f86348

SYMBOL_STACK_INDEX:  10

SYMBOL_NAME:  dxgmms2!VIDMM_RECYCLE_BLOCK::~VIDMM_RECYCLE_BLOCK+b6

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.19041.1025

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  b6

FAILURE_BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

BUCKET_ID:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

PRIMARY_PROBLEM_CLASS:  0x1a_41790_dxgmms2!VIDMM_RECYCLE_BLOCK::_VIDMM_RECYCLE_BLOCK

TARGET_TIME:  2020-04-12T21:28:53.000Z

OSBUILD:  19041

OSSERVICEPACK:  153

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1996-06-25 00:28:37

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  5482

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41790_dxgmms2!vidmm_recycle_block::_vidmm_recycle_block

FAILURE_ID_HASH:  {80770e6d-f962-9e92-764d-b939dc653edf}

Followup:     MachineOwner
---------
Hemen Memtest86 testi yapıp geliyorum. Önceden M.2 SSD'yi çıkarıp HDD'ye kurmuştum sistemi yine aynı sorunlarla karşılaştım.

Memtest86 testi yaparken dondu sonra yeniden başlatıp tekrar teste girdim bu seferde ekran gitti ama kasa çalışmaya devam ediyordu.
 
Son düzenleme:
Var işlemcinin çalışma hızının yanında yazar, yol üst olması gerekiyor.

1586775089841.png
 

Geri
Yukarı