KERNEL_SECURITY_CHECK_FAILURE mavi ekran

  • Konuyu başlatan NNB
  • Başlangıç Tarihi
  • Mesaj 4
  • Görüntüleme 921

NNB

Hectopat
Katılım
5 Eylül 2016
Mesajlar
2
Rainbow Six Siege açılırken sürekli mavi ekran hatası alıyorum.
Kernel Security ile alakalı izlemediğim video kalmadı ama bu sorunu da çözemedim.
DMP dosyası yapmaya çalıştım, cevap bekliyorum.
 
Son düzenleyen: Moderatör:
BIOS güncelle.

Battleye yazılımını kaldır ve tekrar yükle.

Zemana ZAM AntiMalware, Corsair, Logitech, CPU-Z yazılımlarını kaldır.

Belleği sonradan sen mi yükselttin yoksa bu şekilde mi aldın?

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc0051ac923b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc0051ac92308, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for BEDaisy.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.657 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  ASUSTeK COMPUTER INC.

SYSTEM_PRODUCT_NAME:  X550JX

SYSTEM_SKU:  ASUS-NotebookSKU

SYSTEM_VERSION:  1.0     

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  X550JX.208

BIOS_DATE:  10/17/2015

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  X550JX

BASEBOARD_VERSION:  1.0     

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc0051ac923b0

BUGCHECK_P3: ffffc0051ac92308

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc0051ac923b0 -- (.trap 0xffffc0051ac923b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9a8f170d0338 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80580e48b10 rsp=ffffc0051ac92540 rbp=ffff9a8f11d39080
r8=0000000000000001  r9=0000000000000002 r10=ffff9a8f0f5fc300
r11=ffffc28066680180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x160:
fffff805`80e48b10 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc0051ac92308 -- (.exr 0xffffc0051ac92308)
ExceptionAddress: fffff80580e48b10 (nt!KiExitDispatcher+0x0000000000000160)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 8

CPU_MHZ: a22

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 25'00000000 (cache) 25'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-05-2020 00:41:55.0422

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80580fd33e9 to fffff80580fc1510

STACK_TEXT:
ffffc005`1ac92088 fffff805`80fd33e9 : 00000000`00000139 00000000`00000003 ffffc005`1ac923b0 ffffc005`1ac92308 : nt!KeBugCheckEx
ffffc005`1ac92090 fffff805`80fd3810 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc005`1ac921d0 fffff805`80fd1ba5 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc005`1ac92520 : nt!KiFastFailDispatch+0xd0
ffffc005`1ac923b0 fffff805`80e48b10 : 00000000`00000000 ffffc005`1ac925e1 ffffc280`66680180 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffc005`1ac92540 fffff805`80ea54cd : ffff9a8f`170d0330 00000000`00000200 ffffc280`66680101 fffff805`8116f06d : nt!KiExitDispatcher+0x160
ffffc005`1ac925a0 fffff805`7fbb0064 : 00000000`00000200 ffff9a8f`1d9c2578 00000000`00000088 ffff9a8f`00000002 : nt!KeInsertQueueApc+0x14d
ffffc005`1ac92640 00000000`00000200 : ffff9a8f`1d9c2578 00000000`00000088 ffff9a8f`00000002 00000000`00000000 : BEDaisy+0x2d0064
ffffc005`1ac92648 ffff9a8f`1d9c2578 : 00000000`00000088 ffff9a8f`00000002 00000000`00000000 00000000`00000000 : 0x200
ffffc005`1ac92650 00000000`00000088 : ffff9a8f`00000002 00000000`00000000 00000000`00000000 fffff48e`dca60f00 : 0xffff9a8f`1d9c2578
ffffc005`1ac92658 ffff9a8f`00000002 : 00000000`00000000 00000000`00000000 fffff48e`dca60f00 00000000`00000000 : 0x88
ffffc005`1ac92660 00000000`00000000 : 00000000`00000000 fffff48e`dca60f00 00000000`00000000 00000000`00000001 : 0xffff9a8f`00000002


THREAD_SHA1_HASH_MOD_FUNC:  b61d566806c3900e9d82f26f996154d545d8a932

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fca4a2c9edc5b93556e4b2fb148f6720c6f965b3

THREAD_SHA1_HASH_MOD:  0079172978a7673b45090780b1c9d2221d299a5f

FOLLOWUP_IP:
BEDaisy+2d0064
fffff805`7fbb0064 ??              ???

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  BEDaisy+2d0064

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: BEDaisy

IMAGE_NAME:  BEDaisy.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5e4c812d

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2d0064

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function

TARGET_TIME:  2020-03-04T21:30:52.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.657

ANALYSIS_SESSION_ELAPSED_TIME:  a5e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_bedaisy!unknown_function

FAILURE_ID_HASH:  {59d8eb10-b2e4-7df6-f6a5-49968226dbb8}

Followup:     MachineOwner
---------
 
BIOS güncelle.

Battleye yazılımını kaldır ve tekrar yükle.

Zemana ZAM AntiMalware, Corsair, Logitech, CPU-Z yazılımlarını kaldır.

Belleği sonradan sen mi yükselttin yoksa bu şekilde mi aldın?

Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffc0051ac923b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc0051ac92308, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for BEDaisy.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10.0.18362.657 (WinBuild.160101.0800)

SYSTEM_MANUFACTURER:  ASUSTeK COMPUTER INC.

SYSTEM_PRODUCT_NAME:  X550JX

SYSTEM_SKU:  ASUS-NotebookSKU

SYSTEM_VERSION:  1.0    

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  X550JX.208

BIOS_DATE:  10/17/2015

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  X550JX

BASEBOARD_VERSION:  1.0    

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffc0051ac923b0

BUGCHECK_P3: ffffc0051ac92308

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc0051ac923b0 -- (.trap 0xffffc0051ac923b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff9a8f170d0338 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80580e48b10 rsp=ffffc0051ac92540 rbp=ffff9a8f11d39080
r8=0000000000000001  r9=0000000000000002 r10=ffff9a8f0f5fc300
r11=ffffc28066680180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x160:
fffff805`80e48b10 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc0051ac92308 -- (.exr 0xffffc0051ac92308)
ExceptionAddress: fffff80580e48b10 (nt!KiExitDispatcher+0x0000000000000160)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 8

CPU_MHZ: a22

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

CPU_MICROCODE: 6,3c,3,0 (F,M,S,R)  SIG: 25'00000000 (cache) 25'00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-BKJR0DQ

ANALYSIS_SESSION_TIME:  03-05-2020 00:41:55.0422

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80580fd33e9 to fffff80580fc1510

STACK_TEXT:
ffffc005`1ac92088 fffff805`80fd33e9 : 00000000`00000139 00000000`00000003 ffffc005`1ac923b0 ffffc005`1ac92308 : nt!KeBugCheckEx
ffffc005`1ac92090 fffff805`80fd3810 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffc005`1ac921d0 fffff805`80fd1ba5 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc005`1ac92520 : nt!KiFastFailDispatch+0xd0
ffffc005`1ac923b0 fffff805`80e48b10 : 00000000`00000000 ffffc005`1ac925e1 ffffc280`66680180 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffc005`1ac92540 fffff805`80ea54cd : ffff9a8f`170d0330 00000000`00000200 ffffc280`66680101 fffff805`8116f06d : nt!KiExitDispatcher+0x160
ffffc005`1ac925a0 fffff805`7fbb0064 : 00000000`00000200 ffff9a8f`1d9c2578 00000000`00000088 ffff9a8f`00000002 : nt!KeInsertQueueApc+0x14d
ffffc005`1ac92640 00000000`00000200 : ffff9a8f`1d9c2578 00000000`00000088 ffff9a8f`00000002 00000000`00000000 : BEDaisy+0x2d0064
ffffc005`1ac92648 ffff9a8f`1d9c2578 : 00000000`00000088 ffff9a8f`00000002 00000000`00000000 00000000`00000000 : 0x200
ffffc005`1ac92650 00000000`00000088 : ffff9a8f`00000002 00000000`00000000 00000000`00000000 fffff48e`dca60f00 : 0xffff9a8f`1d9c2578
ffffc005`1ac92658 ffff9a8f`00000002 : 00000000`00000000 00000000`00000000 fffff48e`dca60f00 00000000`00000000 : 0x88
ffffc005`1ac92660 00000000`00000000 : 00000000`00000000 fffff48e`dca60f00 00000000`00000000 00000000`00000001 : 0xffff9a8f`00000002


THREAD_SHA1_HASH_MOD_FUNC:  b61d566806c3900e9d82f26f996154d545d8a932

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  fca4a2c9edc5b93556e4b2fb148f6720c6f965b3

THREAD_SHA1_HASH_MOD:  0079172978a7673b45090780b1c9d2221d299a5f

FOLLOWUP_IP:
BEDaisy+2d0064
fffff805`7fbb0064 ??              ???

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  BEDaisy+2d0064

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: BEDaisy

IMAGE_NAME:  BEDaisy.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5e4c812d

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2d0064

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_BEDaisy!unknown_function

TARGET_TIME:  2020-03-04T21:30:52.000Z

OSBUILD:  18362

OSSERVICEPACK:  657

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2005-04-23 04:40:32

BUILDDATESTAMP_STR:  160101.0800

BUILDLAB_STR:  WinBuild

BUILDOSVER_STR:  10.0.18362.657

ANALYSIS_SESSION_ELAPSED_TIME:  a5e

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_bedaisy!unknown_function

FAILURE_ID_HASH:  {59d8eb10-b2e4-7df6-f6a5-49968226dbb8}

Followup:     MachineOwner
---------

Tam olarak bir sorunu bilemesem de "BEDaisy" yazısı her yerde, bunu biraz araştırınca Battleye ortaya çıkıyor. Sizin yazdığınız sorun da Battleye'miş. Bir tık ucundan yakalamış oldum mu? Tahtınızda gözüm yok ama biraz olsun sizin yükünüzü hafifletmiş olurum :) Hangi program ile açıyordunuz dump'ları?
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı