Mavi ekran
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffb80db3385390, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffb80db33852e8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2078
Key : Analysis.Elapsed.mSec
Value: 6012
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 984
Key : Analysis.Init.Elapsed.mSec
Value: 40529
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.Version.DbgEng
Value: 10.0.29507.1001
Key : Analysis.Version.Description
Value: 10.2511.5.1 amd64fre
Key : Analysis.Version.Ext
Value: 1.2511.5.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad
Key : Failure.Exception.Code
Value: 0xc0000409
Key : Failure.Exception.Record
Value: 0xffffb80db33852e8
Key : Failure.Hash
Value: {ed5e39b6-1654-8c70-b89a-e53845af0b01}
Key : WER.System.BIOSRevision
Value: 5.24.0.0
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffffb80db3385390
BUGCHECK_P3: ffffb80db33852e8
BUGCHECK_P4: 0
FILE_IN_CAB: 020326-10156-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffbc0c72387180
TRAP_FRAME: ffffb80db3385390 -- (.trap 0xffffb80db3385390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffbc0c7e214360 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffbc0c7e2143e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8079ecab74e rsp=ffffb80db3385520 rbp=ffffdf8088322cc0
r8=ffffbc0c7e214360 r9=ffffdf809b6c5da8 r10=0000000000000003
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da:
fffff807`9ecab74e cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffb80db33852e8 -- (.exr 0xffffb80db33852e8)
ExceptionAddress: fffff8079ecab74e (dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x00000000000001da)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffffb80db3385068 fffff807ec4b60e9 : 0000000000000139 0000000000000003 ffffb80db3385390 ffffb80db33852e8 : nt!KeBugCheckEx
ffffb80db3385070 fffff807ec4b66f2 : 0000000000000001 fffff80799f9703e 0000000000000000 ffffb80db33853c0 : nt!KiBugCheckDispatch+0x69
ffffb80db33851b0 fffff807ec4b4328 : 00008005012d0000 ffffb80db33854b0 ffffbc0c74e36000 fffff8079ecfdc39 : nt!KiFastFailDispatch+0xb2
ffffb80db3385390 fffff8079ecab74e : ffffdf80a29a6988 ffffdf8088322cc0 ffffdf808648f560 ffffdf8086358420 : nt!KiRaiseSecurityCheckFailure+0x368
ffffb80db3385520 fffff8079eca9ae6 : ffffdf80a29a6988 ffffdf8088322cc0 0000000000000000 ffffdf80a2992f20 : dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da
ffffb80db3385560 fffff8079ece86c5 : 0000000000000100 ffffdf808648f560 0000000000000000 0000000000000000 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeListWithFix+0x272
ffffb80db3385640 fffff8079ed2232d : 0000000000000000 ffffb80db33858b0 0000000000000000 ffffb80db3385a78 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeList+0x50d
ffffb80db3385700 fffff8079ecf1840 : ffffb80db3385a78 ffffb80db3385a78 ffffb80db33858b0 ffffdf8095f7a8b0 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0x24d
ffffb80db33857b0 fffff8079ecf0a45 : ffffbc0c74e36000 ffffdf808b3bc790 ffffdf807955a000 ffffdf808b3bc790 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xa0c
ffffb80db33859b0 fffff8079ed021ef : ffffdf808b3bc790 ffffb80db3385ac9 fffff8079ec6e5dc ffffbc0c74e3fc20 : dxgmms2!VidMmSubmitPacket+0xb5
ffffb80db3385a10 fffff807ec28c4da : ffffbc0c72387101 fffff8079ed01b00 ffff8700eef60100 066fe47fbd9bbf01 : dxgmms2!VidMmWorkerThreadProc+0x69f
ffffb80db3385b30 fffff807ec4a32d4 : ffff8700eef60180 ffffbc0c72387180 fffff807ec28c480 002e0074006e0065 : nt!PspSystemThreadStartup+0x5a
ffffb80db3385b80 0000000000000000 : ffffb80db3386000 ffffb80db337f000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+1da
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.26100.7623
STACK_COMMAND: .process /r /p 0xffffbc0c5c6ba040; .thread 0xffffbc0c72387180 ; kb
BUCKET_ID_FUNC_OFFSET: 1da
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ed5e39b6-1654-8c70-b89a-e53845af0b01}
Followup: MachineOwner