Çözüldü Windows 10 KERNEL_SECURITY_CHECK_FAILURE hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

İbrahim26

Kilopat
Katılım
22 Şubat 2014
Mesajlar
125
Çözümler
1
PAGE FAULT IN NONPAGED AREA, KERNEL SECURITY CHECK FAILURE, SYSTEM SERVICE EXCEPTION ve daha nicesi. Yaklaşık olarak günde 2 ya da 3 kez düzenli mavi ekran alıyorum. Bir aydır çözebilmiş değilim.

Minidump dosyası linki; Desktop.rar
 
Son düzenleyen: Moderatör:
Çözüm
Recep hocam XMP kapalı şekilde daha önceden denemiştim ve hata almaya devam ediyordum bir kez daha XMP kapalı şekilde test edeceğim. XMP profili kapalı iken sorunlar devam ederse bir de tek slot RAM ile deneyeceğim. RAM'ler İtopya indiriminden alındı tek tek gelmişlerdi ama kontrol ettiğimde seri numaralarına kadar aynılar.

BIOS güncellemesini en kısa sürede yapmaya çalışacağım.

Son durum; Windows aracılığı ile arızalı RAM tespiti yapmaya çalıştım bir sorun çıkmadı. 2x8 şeklinde 16 GB RAM ile herhangi bir oyuna girdiğimde bir hata vermeden oyunlar birkaç dakika içerisinde kapanıyordu ve birçok mavi ekran hatası alıyordum. Sonrasında tek slot RAM ile test ettiğimde oyunu 3 saat kadar açık tuttum bir sorunla karşılaşmadım ve şimdilik bir mavi ekran hatası da almadım. Muhtemelen sorun RAM'lerden kaynaklanıyormuş.

Sırasıyla anakart üzerindeki RAM slotlarını ve RAM'leri test ettim ikisi de sorunsuz fakat aynı anda kullandığım zaman mavi ekran ve oyunların hata vermeden kapanmasına neden oluyorlar.
Sentinel sonuçları HD Tune testi sonuçlandığında paylaşacağım harddisk önceki bilgisayarımda kullandığım bir harddisk.

HDTune HDD.jpg
HDTune SSD.jpg



Tekrardan DDU ile ekran kartı sürücüsünü kaldırıp tekrardan yükleyeceğim akşama test yapıp sonuçları buradan paylaşırım.
 
Son düzenleyen: Moderatör:
RAM'leriniz Kit mi? Eski konunuza bakacak olursak Kit. XMP kapatıp deneyin ilk iş. BIOS güncellemesi yaptınız mı? Bakın BIOS güncellemesi önemli AMD sistemlerde.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff810b5ddcd270, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff810b5ddcd1c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5750

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 29187

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff810b5ddcd270

BUGCHECK_P3: ffff810b5ddcd1c8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff810b5ddcd270 -- (.trap 0xffff810b5ddcd270)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffac0737b9cf58 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffac0732710248 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80330a50bca rsp=ffff810b5ddcd400 rbp=ffffac0737b9cea8
 r8=ffffac0737b9cf00  r9=0000000000000068 r10=fffff80330a6b4a0
r11=fffff80330a40000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
FLTMGR!FltpPerformPostCallbacksWorker+0xb7ca:
fffff803`30a50bca cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffff810b5ddcd1c8 -- (.exr 0xffff810b5ddcd1c8)
ExceptionAddress: fffff80330a50bca (FLTMGR!FltpPerformPostCallbacksWorker+0x000000000000b7ca)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  witcher3.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffff810b`5ddccf48 fffff803`33c06569     : 00000000`00000139 00000000`00000003 ffff810b`5ddcd270 ffff810b`5ddcd1c8 : nt!KeBugCheckEx
ffff810b`5ddccf50 fffff803`33c06990     : ffff810b`5ddcd1d0 fffff803`33eedc5e 00000000`00000000 fffff803`36947690 : nt!KiBugCheckDispatch+0x69
ffff810b`5ddcd090 fffff803`33c04d23     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff810b`5ddcd270 fffff803`30a50bca     : ffffac07`37b9cdc0 fffff803`33ae606b 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff810b`5ddcd400 fffff803`30a45018     : ffffac07`37b9cd00 00000000`00000000 ffffac07`3bec4240 00000000`00000000 : FLTMGR!FltpPerformPostCallbacksWorker+0xb7ca
ffff810b`5ddcd4d0 fffff803`30a443bc     : ffff810b`5ddc8000 ffff810b`5ddce000 00000000`00000000 00000000`00000000 : FLTMGR!FltpPassThroughCompletionWorker+0xf8
ffff810b`5ddcd570 fffff803`33ac310e     : ffffac07`00000000 ffffac07`3c711d10 0003e4f8`d5dfffff 00000000`39fc59ff : FLTMGR!FltpPassThroughCompletion+0xc
ffff810b`5ddcd5a0 fffff803`33ac2fd7     : 00000000`00000001 00000000`00000002 ffffac07`3c711d10 ffffac07`3c711d10 : nt!IopfCompleteRequest+0x11e
ffff810b`5ddcd690 fffff803`4003c871     : ffffac07`2fa808f0 00000000`00000000 00000000`00000000 ffffac07`3c711e28 : nt!IofCompleteRequest+0x17
ffff810b`5ddcd6c0 fffff803`33acd805     : ffffac07`37b9cdc0 fffff803`30a44b46 ffff810b`5ddce000 ffff810b`5ddc8000 : Npfs!NpFsdFileSystemControl+0x51
ffff810b`5ddcd6f0 fffff803`30a46ccf     : 00000000`3f800000 00000000`00000000 00000000`00000000 ffff810b`5ddcda78 : nt!IofCallDriver+0x55
ffff810b`5ddcd730 fffff803`30a7caf4     : ffff810b`5ddcd7c0 00000000`00000000 00000000`000000e0 fffff803`33eefe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff810b`5ddcd7a0 fffff803`33acd805     : ffffac07`0000000a ffffac07`3c711d10 00000000`00000002 00000000`00000001 : FLTMGR!FltpFsControl+0x104
ffff810b`5ddcd800 fffff803`33ec2528     : ffff810b`5ddcdb80 ffffac07`3c711d10 00000000`00000001 ffffac07`3bec4240 : nt!IofCallDriver+0x55
ffff810b`5ddcd840 fffff803`33ec1df5     : 00000000`0011400c ffff810b`5ddcdb80 00000000`00000005 ffff810b`5ddcdb80 : nt!IopSynchronousServiceTail+0x1a8
ffff810b`5ddcd8e0 fffff803`33e6c486     : 00000000`00000000 00000000`000012b0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x5e5
ffff810b`5ddcda20 fffff803`33c05fb8     : ffffac07`373b6080 0000003f`6fbff868 ffff810b`5ddcdaa8 0000003f`6fbff978 : nt!NtFsControlFile+0x56
ffff810b`5ddcda90 00007fff`28dcc4b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000003f`6fbff848 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`28dcc4b4


SYMBOL_NAME:  Npfs!NpFsdFileSystemControl+51

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

IMAGE_VERSION:  10.0.19041.1030

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_Npfs!NpFsdFileSystemControl

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d50e5470-2472-23d7-f7b0-8ee2529694de}

Followup:     MachineOwner
---------

8: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.2, DMIVersion 0, Size=2376]
BiosMajorRelease = 5
BiosMinorRelease = 14
BiosVendor = American Megatrends Inc.
BiosVersion = F50
BiosReleaseDate = 11/27/2019
SystemManufacturer = Gigabyte Technology Co., Ltd.
SystemProductName = B450 AORUS M
SystemFamily = Default string
SystemVersion = Default string
SystemSKU = Default string
BaseBoardManufacturer = Gigabyte Technology Co., Ltd.
BaseBoardProduct = B450 AORUS M
BaseBoardVersion = x.x
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffce9c9e112938, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: ffffd023652de446, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 46822

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  50

BUGCHECK_P1: ffffce9c9e112938

BUGCHECK_P2: 0

BUGCHECK_P3: ffffd023652de446

BUGCHECK_P4: 2

READ_ADDRESS: fffff80078efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80078e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80078e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 ffffce9c9e112938

MM_INTERNAL_CODE:  2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  ffffef8155763fd0 -- (.trap 0xffffef8155763fd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000049085b8949dc rbx=0000000000000000 rcx=ffffffff80003c70
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd023652de446 rsp=ffffef8155764160 rbp=ffffd0236522cc50
 r8=0000000000000001  r9=0000000000000001 r10=49085b8949dc8b4c
r11=ffffc57b92a00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac pe cy
ffffd023`652de446 490fa303        bt      qword ptr [r11],rax ds:ffffc57b`92a00000=????????????????
Resetting default scope

STACK_TEXT: 
ffffef81`55763d28 fffff800`78679a57     : 00000000`00000050 ffffce9c`9e112938 00000000`00000000 ffffef81`55763fd0 : nt!KeBugCheckEx
ffffef81`55763d30 fffff800`784ea580     : ffff8000`00000000 00000000`00000000 ffffef81`55764050 00000000`00000000 : nt!MiSystemFault+0x171627
ffffef81`55763e30 fffff800`7860265e     : ffffbe06`91254c40 ffffd023`6524c0c0 ffffbe06`90fe4108 fffff800`7860278c : nt!MmAccessFault+0x400
ffffef81`55763fd0 ffffd023`652de446     : 00000000`00000000 ffffbe06`90e66080 ffffef81`55764180 ffffd023`65182807 : nt!KiPageFault+0x35e
ffffef81`55764160 00000000`00000000     : ffffbe06`90e66080 ffffef81`55764180 ffffd023`65182807 ffffbe06`91254c40 : 0xffffd023`652de446


SYMBOL_NAME:  nt!MiSystemFault+171627

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  171627

FAILURE_BUCKET_ID:  AV_R_INVALID_nt!MiSystemFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {624e8a06-dc22-13e9-d8b0-4e137ca36c13}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: 00000000001f0001, Address of the instruction which caused the bugcheck
Arg3: ffffc9842a908f30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5765

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 8756

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: 1f0001

BUGCHECK_P3: ffffc9842a908f30

BUGCHECK_P4: 0

CONTEXT:  ffffc9842a908f30 -- (.cxr 0xffffc9842a908f30)
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8a8ed2d99ce0
rdx=ffff9b8cda3f09d0 rsi=0000000000000064 rdi=ffff8a8ed2d99ce0
rip=00000000001f0001 rsp=ffffc9842a909930 rbp=000000002d346e00
 r8=ffff9b8cda3f09d0  r9=7fff9b8cdf194ad0 r10=fffff8077c6ebc00
r11=ffff9b8cdf194ab0 r12=0000000000001000 r13=ffff8a8e00000000
r14=ffff9b8cdf194ae0 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050286
00000000`001f0001 ??              ???
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  avp.exe

STACK_TEXT: 
ffffc984`2a908628 fffff807`7be06469     : 00000000`0000003b 00000000`c0000005 00000000`001f0001 ffffc984`2a908f30 : nt!KeBugCheckEx
ffffc984`2a908630 fffff807`7be058bc     : ffffc984`2a908dd0 fffff807`7bae3868 ffffc984`2a908820 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc984`2a908770 fffff807`7bdfd402     : fffff807`7be05840 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceHandler+0x7c
ffffc984`2a9087b0 fffff807`7bc52d97     : ffffc984`2a908d20 00000000`00000000 ffffc984`2a909a90 fffff807`7be05eb8 : nt!RtlpExecuteHandlerForException+0x12
ffffc984`2a9087e0 fffff807`7bc519a6     : ffffc984`2a9096f8 ffffc984`2a909430 ffffc984`2a9096f8 ffff8a8e`d2d99ce0 : nt!RtlDispatchException+0x297
ffffc984`2a908f00 fffff807`7be065ac     : 00000000`00001000 ffffc984`2a9097a0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
ffffc984`2a9095c0 fffff807`7be02743     : 00000000`00000600 fffff807`7bcd492c 00000000`00000000 00000000`00000011 : nt!KiExceptionDispatch+0x12c
ffffc984`2a9097a0 00000000`001f0001     : ffff8a8e`d2d99ce0 ffff9b8c`df194ae0 ffff9b8c`daa82ca0 00000000`00000000 : nt!KiPageFault+0x443
ffffc984`2a909930 ffff8a8e`d2d99ce0     : ffff9b8c`df194ae0 ffff9b8c`daa82ca0 00000000`00000000 ffff8a8e`d26a9aa0 : 0x1f0001
ffffc984`2a909938 ffff9b8c`df194ae0     : ffff9b8c`daa82ca0 00000000`00000000 ffff8a8e`d26a9aa0 00000000`00000000 : 0xffff8a8e`d2d99ce0
ffffc984`2a909940 ffff9b8c`daa82ca0     : 00000000`00000000 ffff8a8e`d26a9aa0 00000000`00000000 0001007c`c0020000 : 0xffff9b8c`df194ae0
ffffc984`2a909948 00000000`00000000     : ffff8a8e`d26a9aa0 00000000`00000000 0001007c`c0020000 00000000`00010000 : 0xffff9b8c`daa82ca0


SYMBOL_NAME:  nt!KiSystemServiceHandler+7c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.546

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  7c

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!KiSystemServiceHandler

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {d011f1c6-81ea-e5f8-2759-49ec2e253107}

Followup:     MachineOwner
---------

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: ffffd3cd7e05ef82, Address of the instruction which caused the bugcheck
Arg3: ffff8208a4140f40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32kfull.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5483

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 17447

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: ffffd3cd7e05ef82

BUGCHECK_P3: ffff8208a4140f40

BUGCHECK_P4: 0

CONTEXT:  ffff8208a4140f40 -- (.cxr 0xffff8208a4140f40)
rax=0000000000000000 rbx=ffffd3cd7e216ea0 rcx=ffffd38501298860
rdx=000000004a01077a rsi=ffffd38506951c00 rdi=000000004a01077a
rip=ffffd3cd7e05ef82 rsp=ffff8208a4141940 rbp=0000000000000000
 r8=000000000000501a  r9=0000000000000000 r10=0000ffffd3cd7e2f
r11=ffffb0795ae00000 r12=000000c3d6bfe780 r13=ffffd38500605e68
r14=ffffd3cd7e216ec0 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
win32kbase!ReleaseCacheDC+0x142:
ffffd3cd`7e05ef82 85c0            test    eax,eax
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT: 
ffff8208`a4141940 ffffd3cd`7e064721     : 00000000`00000020 00000000`00000000 00000000`4a01077a ffffd385`00605e68 : win32kbase!ReleaseCacheDC+0x142
ffff8208`a4141a00 ffffd3cd`7edde459     : 00000000`00cc0020 ffff990d`10d9e080 0000028c`baad93a0 00000000`00000020 : win32kbase!NtUserReleaseDC+0x161
ffff8208`a4141ad0 fffff801`4c4058b8     : 00000000`00000001 ffff8208`a4141b80 ffff8208`00000000 ffffd3cd`7eddd880 : win32k!NtUserReleaseDC+0x15
ffff8208`a4141b00 00007fff`4f0fa5c4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000c3`d6bfe718 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`4f0fa5c4


CHKIMG_EXTENSION: !chkimg -lo 50 -d !win32kfull
    ffffd3cd7e37f790-ffffd3cd7e37f7ac  29 bytes - win32kfull!DC::vClearRendering+70
    [ 8b 46 74 a8 01 0f 84 68:48 81 c4 08 02 00 00 41 ]
    ffffd3cd7e37f7b9-ffffd3cd7e37f7bc  4 bytes - win32kfull!DC::vClearRendering+99 (+0x29)
    [ 48 8d 4e 18:fd ff ff 8b ]
    ffffd3cd7e37f7c9-ffffd3cd7e37f7cd  5 bytes - win32kfull!DC::vClearRendering+a9 (+0x10)
    [ 48 8d 8e 10 01:ff e9 a0 da 0f ]
    ffffd3cd7e37f7cf - win32kfull!DC::vClearRendering+af (+0x06)
    [ 00:41 ]
    ffffd3cd7e37f7dc-ffffd3cd7e37f7fb  32 bytes - win32kfull!DC::vClearRendering+bc (+0x0d)
    [ 83 ae 44 01 00 00 01 0f:00 41 8b 09 89 4b 4c 41 ]
    ffffd3cd7e37f808-ffffd3cd7e37f812  11 bytes - win32kfull!DC::vClearRendering+e8 (+0x2c)
    [ 84 c0 0f 85 e3 da 0f 00:00 e8 12 6c 32 00 48 8b ]
    ffffd3cd7e37f81f-ffffd3cd7e37f82a  12 bytes - win32kfull!DC::vClearRendering+ff (+0x17)
    [ 65 4c 8b 24 25 88 01 00:00 00 00 48 8b 12 4c 8b ]
    ffffd3cd7e37f837-ffffd3cd7e37f841  11 bytes - win32kfull!DC::vClearRendering+117 (+0x18)
    [ 84 c0 0f 85 f9 da 0f 00:00 e9 a9 fa ff ff 65 48 ]
    ffffd3cd7e37f84e-ffffd3cd7e37f862  21 bytes - win32kfull!DC::vClearRendering+12e (+0x17)
    [ 48 85 c0 0f 84 21 db 0f:74 12 39 70 68 0f 85 a1 ]
    ffffd3cd7e37f864-ffffd3cd7e37f871  14 bytes - win32kfull!DC::vClearRendering+144 (+0x16)
    [ 7d 68 44 8b 65 6c 4c 89:0d e7 6c 2d 00 48 8b 09 ]
    ffffd3cd7e37f873-ffffd3cd7e37f884  18 bytes - win32kfull!DC::vClearRendering+153 (+0x0f)
    [ 00 02 0f 85 0b db 0f 00:e8 a8 6b 32 00 48 8b 15 ]
    ffffd3cd7e37f886-ffffd3cd7e37f88f  10 bytes - win32kfull!DC::vClearRendering+166 (+0x13)
    [ 48 85 ed 74 07 89 7d 68:41 b8 05 00 00 00 48 8b ]
    ffffd3cd7e38206f-ffffd3cd7e382097  41 bytes - win32kfull!RFONTOBJ::bInit+b7f (+0x27e9)
    [ e0 1c 73 0c 0f ba e1 1c:48 81 c4 d8 02 00 00 5f ]
    ffffd3cd7e382099-ffffd3cd7e3820bc  36 bytes - win32kfull!RFONTOBJ::bInit+ba9 (+0x2a)
    [ ff ff e9 b5 c3 0f 00 48:03 00 00 0f 45 ca 49 8d ]
    ffffd3cd7e3820c0-ffffd3cd7e3820e6  39 bytes - win32kfull!RFONTOBJ::bInit+bd0 (+0x27)
    [ 41 0f ba e0 1c 73 10 0f:00 4c 89 6d 00 48 8d 4d ]
    ffffd3cd7e3820e8-ffffd3cd7e3820e9  2 bytes - win32kfull!RFONTOBJ::bInit+bf8 (+0x28)
    [ 75 99:33 d2 ]
    ffffd3cd7e3820eb - win32kfull!RFONTOBJ::bInit+bfb (+0x03)
    [ 8b:8d ]
    ffffd3cd7e3820ed-ffffd3cd7e3820f1  5 bytes - win32kfull!RFONTOBJ::bInit+bfd (+0x02)
    [ 78 48 2b 8a 88:50 41 b8 44 01 ]
    ffffd3cd7e3820f4-ffffd3cd7e382102  15 bytes - win32kfull!RFONTOBJ::bInit+c04 (+0x07)
    [ 00 75 0e 48 8b 8d 80 00:e8 47 59 0c 00 0f b6 45 ]
    ffffd3cd7e382105-ffffd3cd7e382120  28 bytes - win32kfull!RFONTOBJ::bInit+c15 (+0x11)
    [ 48 85 c9 0f 85 75 ff ff:0f 10 45 b4 0f 11 45 54 ]
    ffffd3cd7e382124-ffffd3cd7e382127  4 bytes - win32kfull!RFONTOBJ::bInit+c34 (+0x1f)
    [ 48 8d 4d c0:45 85 ed 0f ]
    ffffd3cd7e382134-ffffd3cd7e38216e  59 bytes - win32kfull!RFONTOBJ::bInit+c44 (+0x10)
    [ 85 c0 0f 84 47 ff ff ff:0f 86 fa 00 00 00 8b 45 ]
    ffffd3cd7e3870b3-ffffd3cd7e3870d4  34 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+53 (+0x4f7f)
    [ 00 00 48 89 8b 08 02 00:48 81 c4 d8 04 00 00 41 ]
    ffffd3cd7e3870d6-ffffd3cd7e3870e8  19 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+76 (+0x23)
    [ 00 89 8b a8 02 00 00 44:49 8d 5e 4c 41 bd 01 00 ]
    ffffd3cd7e3870ea-ffffd3cd7e3870f5  12 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+8a (+0x14)
    [ 00 48 89 8b 38 03 00 00:45 33 ff 66 44 39 2b 0f ]
    ffffd3cd7e3870f7-ffffd3cd7e387138  66 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+97 (+0x0d)
    [ 00 44 89 b3 68 03 00 00:41 8b 46 58 41 84 c5 0f ]
    ffffd3cd7e38713b-ffffd3cd7e387184  74 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+db (+0x44)
    [ 48 89 8b 10 01 00 00 48:8b 4d 00 48 83 65 98 00 ]
    ffffd3cd7e387186-ffffd3cd7e38718e  9 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+126 (+0x4b)
    [ 5d 41 5c 5f 5b 5d c3 cc:8b 4a 04 41 03 cc 89 4d ]
    ffffd3cd7e387190-ffffd3cd7e38719c  13 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+130 (+0x0a)
    [ 01 48 8d 51 28 89 45 07:85 70 04 00 00 4d 8b cf ]
    ffffd3cd7e38719e-ffffd3cd7e3871a0  3 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+13e (+0x0e)
    [ 41 04 89:ce 48 8b ]
    ffffd3cd7e3871a2-ffffd3cd7e3871b2  17 bytes - win32kfull!ENUMUNDERLAYS::ENUMUNDERLAYS+142 (+0x04)
    [ 0b 41 8b 41 08 89 45 0f:e8 48 89 54 24 48 48 8b ]
    ffffd3cd7e389cae-ffffd3cd7e389cb3  6 bytes - win32kfull!NtGdiDrawStreamInternal+24e (+0x2b0c)
    [ d7 45 03 b8 fc 03:48 81 c4 88 00 00 ]
    ffffd3cd7e389cb5-ffffd3cd7e389d02  78 bytes - win32kfull!NtGdiDrawStreamInternal+255 (+0x07)
    [ 00 44 89 7d d3 45 03 b0:41 5f 41 5e 41 5d 41 5c ]
    ffffd3cd7e389d04-ffffd3cd7e389d38  53 bytes - win32kfull!NtGdiDrawStreamInternal+2a4 (+0x4f)
    [ 3b cd 0f 87 21 02 00 00:34 00 00 e9 15 ff ff ff ]
    ffffd3cd7e389d3a-ffffd3cd7e389d46  13 bytes - win32kfull!NtGdiDrawStreamInternal+2da (+0x36)
    [ 80 49 63 cb 48 03 ca 49:00 e8 d8 c7 00 00 48 85 ]
    ffffd3cd7e389d49-ffffd3cd7e389d50  8 bytes - win32kfull!NtGdiDrawStreamInternal+2e9 (+0x0f)
    [ ff 49 3b c8 0f 87 da 01:65 48 8b 0c 25 88 01 00 ]
    ffffd3cd7e389d52-ffffd3cd7e389d6b  26 bytes - win32kfull!NtGdiDrawStreamInternal+2f2 (+0x09)
    [ 00 8b 4c 24 50 44 03 d1:e8 c1 c7 00 00 48 39 98 ]
    ffffd3cd7e389d6d-ffffd3cd7e389d86  26 bytes - win32kfull!NtGdiDrawStreamInternal+30d (+0x1b)
    [ 00 41 3b f8 0f 8c 7f 02:e8 a6 c7 00 00 39 58 68 ]
    ffffd3cd7e389d89-ffffd3cd7e389d8d  5 bytes - win32kfull!NtGdiDrawStreamInternal+329 (+0x1c)
    [ 8b 88 e8 03 00:48 8b 88 18 01 ]
    ffffd3cd7e389d8f-ffffd3cd7e389dad  31 bytes - win32kfull!NtGdiDrawStreamInternal+32f (+0x06)
    [ 41 3b ca 0f 8f 1b 02 00:00 44 85 79 14 0f 84 51 ]
    ffffd3cd7e5d2b60-ffffd3cd7e5d2b61  2 bytes - win32kfull!CVisRgnTrackerProp::`vftable'
    [ 00 e7:a0 df ]
    ffffd3cd7e5d2b68-ffffd3cd7e5d2b69  2 bytes - win32kfull!CVisRgnTrackerProp::`vftable'+8 (+0x08)
    [ 70 9e:50 93 ]
    ffffd3cd7e5d2b70-ffffd3cd7e5d2b71  2 bytes - win32kfull!CoreWindowProp::`vftable' (+0x08)
    [ 50 7e:30 73 ]
    ffffd3cd7e5d2b78-ffffd3cd7e5d2b79  2 bytes - win32kfull!CoreWindowProp::`vftable'+8 (+0x08)
    [ 90 9e:70 93 ]
    ffffd3cd7e5d2b80-ffffd3cd7e5d2b81  2 bytes - win32kfull!CLegacyRotationMgr::`vftable' (+0x08)
    [ f0 ac:d0 a1 ]
    ffffd3cd7e5d2b88-ffffd3cd7e5d2b89  2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+8 (+0x08)
    [ 40 6b:90 62 ]
    ffffd3cd7e5d2b90-ffffd3cd7e5d2b91  2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+10 (+0x08)
    [ a0 6c:f0 63 ]
    ffffd3cd7e5d2b98-ffffd3cd7e5d2b99  2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+18 (+0x08)
    [ 50 ac:30 a1 ]
    ffffd3cd7e5d2ba0-ffffd3cd7e5d2ba1  2 bytes - win32kfull!CLegacyRotationMgr::`vftable'+20 (+0x08)
    [ f0 ab:d0 a0 ]
    ffffd3cd7e5d2ba9 - win32kfull!CLegacyRotationMgr::`vftable'+29 (+0x09)
    [ 23:24 ]
    ffffd3cd7e5d2bb1 - win32kfull!CLegacyRotationMgr::`vftable'+31 (+0x08)
    [ 22:23 ]
    ffffd3cd7e5d2bb9 - win32kfull!CLegacyRotationMgr::`vftable'+39 (+0x08)
    [ 1d:1e ]
    ffffd3cd7e5d2bc1 - win32kfull!CLegacyRotationMgr::`vftable'+41 (+0x08)
    [ 1b:1c ]
    ffffd3cd7e5d2bc8-ffffd3cd7e5d2bc9  2 bytes - win32kfull!CPushLock::`vftable' (+0x07)
    [ e0 9c:c0 91 ]
    ffffd3cd7e5d2bd0-ffffd3cd7e5d2bd1  2 bytes - win32kfull!CSwapChainProp::`vftable' (+0x08)
    [ c0 df:90 e0 ]
    ffffd3cd7e5d2bd8-ffffd3cd7e5d2bd9  2 bytes - win32kfull!CSwapChainProp::`vftable'+8 (+0x08)
    [ 80 9e:60 93 ]
    ffffd3cd7e5d2be0 - win32kfull!InkDevice::`vftable' (+0x08)
    [ 10:a0 ]
    ffffd3cd7e5d2be8 - win32kfull!InkDevice::`vftable'+8 (+0x08)
    [ 60:f0 ]
    ffffd3cd7e5d2bf0-ffffd3cd7e5d2bf1  2 bytes - win32kfull!InkDevice::`vftable'+10 (+0x08)
    [ c0 46:50 47 ]
    ffffd3cd7e5d2bf8-ffffd3cd7e5d2bf9  2 bytes - win32kfull!InkDevice::`vftable'+18 (+0x08)
    [ 10 80:f0 74 ]
    ffffd3cd7e5d2c00-ffffd3cd7e5d2c01  2 bytes - win32kfull!InkDevice::`vftable'+20 (+0x08)
    [ b0 85:30 7b ]
    ffffd3cd7e5d2c08-ffffd3cd7e5d2c09  2 bytes - win32kfull!InkDevice::`vftable'+28 (+0x08)
    [ f0 6d:80 6e ]
    ffffd3cd7e5d2c10-ffffd3cd7e5d2c11  2 bytes - win32kfull!InkDevice::`vftable' (+0x08)
    [ f0 fc:80 fd ]
    ffffd3cd7e5d2c18-ffffd3cd7e5d2c19  2 bytes - win32kfull!InkDevice::`vftable'+8 (+0x08)
    [ d0 5e:60 5f ]
    ffffd3cd7e5d2c20 - win32kfull!InkDevice::`vftable'+10 (+0x08)
    [ 60:f0 ]
    ffffd3cd7e5d2c28 - win32kfull!InkDevice::`vftable'+18 (+0x08)
    [ 20:f0 ]
    ffffd3cd7e5d2c30-ffffd3cd7e5d2c31  2 bytes - win32kfull!InkDevice::`vftable'+20 (+0x08)
    [ e0 42:b0 43 ]
    ffffd3cd7e5d2c38-ffffd3cd7e5d2c39  2 bytes - win32kfull!InkDevice::`vftable'+28 (+0x08)
    [ c0 56:50 57 ]
    ffffd3cd7e5d2c40 - win32kfull!CPhysicalMonitorHandle::`vftable' (+0x08)
    [ 40:d0 ]
    ffffd3cd7e5d2c48-ffffd3cd7e5d2c49  2 bytes - win32kfull!CPhysicalMonitorHandle::`vftable'+8 (+0x08)
    [ 80 22:10 23 ]
    ffffd3cd7e5d2c50-ffffd3cd7e5d2c51  2 bytes - win32kfull!CPhysicalMonitorHandle::`vftable'+10 (+0x08)
    [ 60 4b:40 40 ]
944 errors : !win32kfull (ffffd3cd7e37f790-ffffd3cd7e5d2c51)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  LARGE

STACK_COMMAND:  .cxr 0xffff8208a4140f40 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup:     memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80517d28b44, Address of the instruction which caused the bugcheck
Arg3: ffffb3077beec920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6233

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 31402

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80517d28b44

BUGCHECK_P3: ffffb3077beec920

BUGCHECK_P4: 0

CONTEXT:  ffffb3077beec920 -- (.cxr 0xffffb3077beec920)
rax=ffffcc02a9be5000 rbx=0000000000a3522c rcx=ffffa30045dc0180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffcc02b0aea5b0
rip=fffff80517d28b44 rsp=ffffb3077beed320 rbp=ffffb3077beed420
 r8=000000000003ffff  r9=ffffb705dbc68b70 r10=fffff8050875a7d0
r11=0000000000000011 r12=0000000000000001 r13=ffffcc02aea90000
r14=ffffcc02ad744010 r15=ffffcc02afb20970
iopl=0         nv up ei ng nz ac pe cy
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050293
dxgmms2!VidSchSignalSyncObjectsFromGpu+0x624:
fffff805`17d28b44 8390090000a820  adc     dword ptr [rax-57FFFFF7h],20h ds:002b:ffffcc02`51be5009=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  dwm.exe

MISALIGNED_IP:
dxgmms2!VidSchSignalSyncObjectsFromGpu+624
fffff805`17d28b44 8390090000a820  adc     dword ptr [rax-57FFFFF7h],20h

STACK_TEXT: 
ffffb307`7beed320 fffff805`15f2e821     : 00000000`00000000 ffffb307`7beed678 00000000`00000000 ffffb307`7beed6d8 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x624
ffffb307`7beed560 fffff805`15f2cd02     : 000000d3`9fb7f080 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!SignalSynchronizationObjectInternal+0xcf1
ffffb307`7beed990 fffff805`088058b8     : ffffcc02`ae15a080 ffffcc02`ae15a080 00000241`c1fde9a8 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObjectFromGpu2+0x652
ffffb307`7beedb00 00007fff`e46b5ac4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000d3`9fb7eff8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e46b5ac4


SYMBOL_NAME:  dxgmms2!VidSchSignalSyncObjectsFromGpu+624

IMAGE_NAME:  hardware

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xffffb3077beec920 ; kb

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  IP_MISALIGNED_dxgmms2.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a65b547c-5865-921a-16f5-26d09f946d5e}

Followup:     MachineOwner
---------

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8066aa6b010, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8066aa6af68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7046

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 76301

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8066aa6b010

BUGCHECK_P3: fffff8066aa6af68

BUGCHECK_P4: 0

TRAP_FRAME:  fffff8066aa6b010 -- (.trap 0xfffff8066aa6b010)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa982b8fa8b90 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806754bc686 rsp=fffff8066aa6b1a0 rbp=fffff8066aa6b2a0
 r8=ffffa982b0c45c40  r9=0000000000000000 r10=0000000000000002
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz ac po cy
dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x11f66:
fffff806`754bc686 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff8066aa6af68 -- (.exr 0xfffff8066aa6af68)
ExceptionAddress: fffff806754bc686 (dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x0000000000011f66)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff806`6aa6ace8 fffff806`66e06469     : 00000000`00000139 00000000`00000003 fffff806`6aa6b010 fffff806`6aa6af68 : nt!KeBugCheckEx
fffff806`6aa6acf0 fffff806`66e06890     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000007 : nt!KiBugCheckDispatch+0x69
fffff806`6aa6ae30 fffff806`66e04c23     : fffff806`6aa6b0a0 00000000`00000004 fffff806`6aa6b0a8 00000000`00000004 : nt!KiFastFailDispatch+0xd0
fffff806`6aa6b010 fffff806`754bc686     : 00000000`00000000 fffff806`6aa6b2a0 ffffa982`b6b18000 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0x323
fffff806`6aa6b1a0 fffff806`754aa37c     : ffffa982`b6a4f602 fffff806`00000000 ffffa982`00000000 ffffa982`00000000 : dxgmms2!VidSchiProcessCompletedQueuePacketInternal+0x11f66
fffff806`6aa6b340 fffff806`754a7635     : ffffa982`b6b1ad02 ffffa982`b6a4f6c0 fffff806`6aa6b501 00000000`00000000 : dxgmms2!VidSchiProcessDpcCompletedPacket+0x70c
fffff806`6aa6b4a0 fffff806`744739e1     : fffff806`6aa6b599 00000000`00000000 fffff806`6aa6bb20 0000085b`dc78e0ee : dxgmms2!VidSchDdiNotifyDpc+0x225
fffff806`6aa6b550 fffff806`76eba02b     : ffffa982`b09bc030 00000000`00000000 ffffa982`b09bc030 ffffa982`b0b7e000 : dxgkrnl!DxgNotifyDpcCB+0x91
fffff806`6aa6b600 ffffa982`b09bc030     : 00000000`00000000 ffffa982`b09bc030 ffffa982`b0b7e000 fffff806`76eb9fbe : nvlddmkm+0x9a02b
fffff806`6aa6b608 00000000`00000000     : ffffa982`b09bc030 ffffa982`b0b7e000 fffff806`76eb9fbe ffffa982`b0b7e000 : 0xffffa982`b09bc030


SYMBOL_NAME:  dxgmms2!VidSchiProcessCompletedQueuePacketInternal+11f66

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.1124

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  11f66

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiProcessCompletedQueuePacketInternal

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {6f3692d4-31b7-23c3-ec9b-e0d590ce5987}

Followup:     MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff80670514402, Address of the instruction which caused the bugcheck
Arg3: fffff901a20ec4f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 19641

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c000001d

BUGCHECK_P2: fffff80670514402

BUGCHECK_P3: fffff901a20ec4f0

BUGCHECK_P4: 0

CONTEXT:  fffff901a20ec4f0 -- (.cxr 0xfffff901a20ec4f0)
rax=0000000000000001 rbx=0000000000000000 rcx=ffffa68107b28180
rdx=0000000000000000 rsi=0000000000000006 rdi=ffffdb80037b55e0
rip=fffff80670514402 rsp=fffff901a20ecef0 rbp=fffff901a20ecff0
 r8=cfffffffffffffff  r9=ffff9349a580bd40 r10=fffff80670e527c0
r11=ffff9349a4d26fff r12=7fffffffffffffff r13=0000000000000000
r14=fffff901a20ed200 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!MiMakeSystemCacheRangeValid+0x962:
fffff806`70514402 0f84ec000000    je      nt!MiMakeSystemCacheRangeValid+0xa54 (fffff806`705144f4) [br=1]
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

STACK_TEXT: 
fffff901`a20ecef0 fffff806`705182ea     : 00000000`003a9e64 00000000`00000000 00000000`0012aaf4 00000000`00000000 : nt!MiMakeSystemCacheRangeValid+0x962
fffff901`a20ed100 fffff806`705159cf     : 00000000`00000000 00000000`00000000 00000000`00001000 ffff8281`11ea32a0 : nt!MmCheckCachedPageStates+0x1e4a
fffff901`a20ed2d0 fffff806`708e0c80     : 00000000`00000000 00000000`00000000 00000000`00000001 fffff901`a20ed3e0 : nt!CcFetchDataForRead+0x8f
fffff901`a20ed330 fffff806`70515769     : ffff8281`0cb982e0 00000000`00000000 00000000`00040000 fffff806`70416501 : nt!CcMapAndCopyFromCache+0xe0
fffff901`a20ed3d0 fffff806`721936bf     : ffffb80b`00000000 ffffb80b`00000000 ffffb80b`00000040 ffffb80b`00000000 : nt!CcCopyReadEx+0x139
fffff901`a20ed480 fffff806`7219511f     : ffffb80b`44d39d90 fffff901`a20ed720 00000000`00000003 ffffb80b`44d39ba0 : Ntfs!NtfsCachedRead+0x177
fffff901`a20ed4f0 fffff806`721940cc     : ffff8281`0947a798 ffff8281`0bdb42a0 ffff8281`00000001 ffff828f`00000040 : Ntfs!NtfsCommonRead+0xe1f
fffff901`a20ed6f0 fffff806`704d1f35     : ffff8281`0f8e1010 ffff8281`0bdb42a0 ffff8281`0bdb42a0 ffff828f`fc3c9d60 : Ntfs!NtfsFsdRead+0x1fc
fffff901`a20ed7c0 fffff806`6c0d6ccf     : 00000000`00000001 00000000`6c655346 00000000`00000030 00000000`000009f4 : nt!IofCallDriver+0x55
fffff901`a20ed800 fffff806`6c0d48d3     : fffff901`a20ed890 00000000`00000000 8281126a`c9a00000 fffff806`708d4b41 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffff901`a20ed870 fffff806`704d1f35     : ffff8281`0bdb42a0 00000000`00000000 fffff901`a20edb80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
fffff901`a20ed8d0 fffff806`708a6fb8     : 00000000`00000000 ffff8281`126ac9d0 00000000`00000001 ffff828f`faefee01 : nt!IofCallDriver+0x55
fffff901`a20ed910 fffff806`708aa1f9     : ffff8281`00000000 fffff901`a20edb80 00000000`00000000 fffff901`a20edb80 : nt!IopSynchronousServiceTail+0x1a8
fffff901`a20ed9b0 fffff806`706058b8     : 00000000`00000b20 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
fffff901`a20eda90 00007ffd`6750be84     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000cc`123fcae8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6750be84


SYMBOL_NAME:  nt!MiMakeSystemCacheRangeValid+962

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.508

STACK_COMMAND:  .cxr 0xfffff901a20ec4f0 ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  962

FAILURE_BUCKET_ID:  0x3B_c000001d_nt!MiMakeSystemCacheRangeValid

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {fdcc85ec-c15d-c657-d7ac-651df8832082}

Followup:     MachineOwner
---------
 
Son düzenleme:
Recep hocam XMP kapalı şekilde daha önceden denemiştim ve hata almaya devam ediyordum bir kez daha XMP kapalı şekilde test edeceğim. XMP profili kapalı iken sorunlar devam ederse bir de tek slot RAM ile deneyeceğim. RAM'ler İtopya indiriminden alındı tek tek gelmişlerdi ama kontrol ettiğimde seri numaralarına kadar aynılar.

BIOS güncellemesini en kısa sürede yapmaya çalışacağım.

Son durum; Windows aracılığı ile arızalı RAM tespiti yapmaya çalıştım bir sorun çıkmadı. 2x8 şeklinde 16 GB RAM ile herhangi bir oyuna girdiğimde bir hata vermeden oyunlar birkaç dakika içerisinde kapanıyordu ve birçok mavi ekran hatası alıyordum. Sonrasında tek slot RAM ile test ettiğimde oyunu 3 saat kadar açık tuttum bir sorunla karşılaşmadım ve şimdilik bir mavi ekran hatası da almadım. Muhtemelen sorun RAM'lerden kaynaklanıyormuş.

Sırasıyla anakart üzerindeki RAM slotlarını ve RAM'leri test ettim ikisi de sorunsuz fakat aynı anda kullandığım zaman mavi ekran ve oyunların hata vermeden kapanmasına neden oluyorlar.
 
Son düzenleyen: Moderatör:
Çözüm
Recep hocam XMP kapalı şekilde daha önceden denemiştim ve hata almaya devam ediyordum bir kez daha XMP kapalı şekilde test edeceğim. XMP profili kapalı iken sorunlar devam ederse bir de tek slot RAM ile deneyeceğim. RAM'ler İtopya indiriminden alındı tek tek gelmişlerdi ama kontrol ettiğimde seri numaralarına kadar aynılar.

BIOS güncellemesini en kısa sürede yapmaya çalışacağım.

Son durum; Windows aracılığı ile arızalı RAM tespiti yapmaya çalıştım bir sorun çıkmadı. 2x8 şeklinde 16 GB RAM ile herhangi bir oyuna girdiğimde bir hata vermeden oyunlar birkaç dakika içerisinde kapanıyordu ve birçok mavi ekran hatası alıyordum. Sonrasında tek slot RAM ile test ettiğimde oyunu 3 saat kadar açık tuttum bir sorunla karşılaşmadım ve şimdilik bir mavi ekran hatası da almadım. Muhtemelen sorun RAM'lerden kaynaklanıyormuş.

Sırasıyla anakart üzerindeki RAM slotlarını ve RAM'leri test ettim ikisi de sorunsuz fakat aynı anda kullandığım zaman mavi ekran ve oyunların hata vermeden kapanmasına neden oluyorlar.

Sorununuz ne durumda acaba?
 
@Sercan Baydar sürekli eski mavi ekran konularına yazıp duruyorsun. Sence de kendi konunu açmanın vakti gelmedi mi?
 
@Sercan Baydar sürekli eski mavi ekran konularına yazıp duruyorsun. Sence de kendi konunu açmanın vakti gelmedi mi?

Benim sorun değişkenlik gösteriyor uyguladığım Case'lere göre. Şu an mavi ekran almıyorum ama bu seferde BF5'de hatasız masaüstüne atma ve aw snap chorome STATUS_BREAKPOINT hatası alıyorum. Asıl amacım BF5 ve Chrome'daki o hatayı bulma. RAM bu sorunlara çözüm olmuyor, Memtest hatası da çıkmıyor. Yani konu açsam ilk 1 2 gün aylardır benim zaten yapmış olduğum işlemleri önerecekler, aylardır süren döngüme tekrar gireceğim :D hafta içi çalışıyorum boş vakit lazım. Ama sanırım artık geldi çattı, haftaya cuma günü konuyu açacağım artık :). Son yaptığım ayarlar ve BIOS, ekran kartı driver vb. birkaç şeylerle bu hafta bir kullanıp son halini bir göreyim sistemin. Teşekkürler ilgin için.
 
Son düzenleme:
Durum
Mesaj gönderimine kapalı.

Yeni konular

Geri
Yukarı