DRIVER_IRQL_NOT_LESS_OR_EQUAL mavi ekran hatası

İşletim sistemi
Windows 11

Semre57

Megapat
Katılım
2 Haziran 2017
Mesajlar
368
Daha fazla  
Cinsiyet
Erkek
RAM
Gskill RipjawsV 8GB 3200MHz
SSD veya HDD modeli
Kioxia Exceria 500GB
Ekran kartı
MSI Ventus 2X OC RTX 3060
Anakart
MSI H610M-B Pro
İşlemci
i5 12400F
Merhaba dostlar, benim kullandığım sistem 1 sene önce bugün akşam saatlerinde satışa çıkmıştı, kullandığım günden beri mavi ekran hatalarıyla uğraşıyordum. Konu geçmişime bakarsanız çok sayıda mavi ekran hatası konusu açtığımı görebilirsiniz. Neyse, sorunun 1 adet RAM kaynaklı olduğunu bulup çözmüştüm. 1x8 sağlam RAM ile kullanıyorum sistemi uzun zamandır. Temiz format da atmıştım tek RAM'e geçince, epeyi uzun süredir bir hata almıyordum.

Geçtiğimiz hafta 18 Ağustos'ta oyun oynarken ve bu sabah henüz Windows şifre giriş ekranına iken mavi ekran hatası aldım. Yine nereden başladı bu hatalar çözemedim. Diğer RAM'e de bir şey mi oldu acaba, zira GTA 5 oynuyorum son zamanlarda RAM yetmiyor, droplar falan yiyorum. Onun dışında yine son zamanlarda henüz masaüstünde iken bile saçma sapan gereksiz kasıyor bilgisayar hiçbir yük yokken.

Yine şunu da eklemem gerekiyor ki kullandığım SSD Kioxia Exceria 500GB, kendimi yazılımı üzerinden son zamanlarda sürekli sıcaklık uyarısı veriyor. Bu kasılmaların ve belki mavi ekran hatasının kaynağı o da olabilir. Zamanında test yapmıştım temizdi SSD. Eğer gerekiyorsa tekrar yaparım.

18.08.2023 ve 25.08.2023 tarihli iki adet minidumpı paylaşıyorum;


İndirmeden incelemek isteyenler için ise analiz edilmiş şekilde Spoiler'a ekledim:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
 # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of.
 the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff91ec4ec818a0.
Arg3: 0000000600000000.
Arg4: 0000000000000000.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 530.

 Key : Analysis.Elapsed.mSec
 Value: 2352.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 108.

 Key : Analysis.Init.Elapsed.mSec
 Value: 7304.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 97.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x1a.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.DiagDataWrittenToHeader
 Value: 1

 Key : Dump.Attributes.ErrorCode
 Value: 0

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : Dump.Attributes.LastLine
 Value: Dump completed successfully.

 Key : Dump.Attributes.ProgressPercentage
 Value: 0

 Key : Failure.Bucket
 Value: 0x1a_41792_nt!MiDeleteVa

 Key : Failure.Hash
 Value: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

 Key : MemoryManagement.PFN
 Value: 600000.

BUGCHECK_CODE: 1a.

BUGCHECK_P1: 41792.

BUGCHECK_P2: ffff91ec4ec818a0.

BUGCHECK_P3: 600000000.

BUGCHECK_P4: 0

FILE_IN_CAB: 18.08.2023.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: msedge.exe

STACK_TEXT:
ffffee0d`b7236a68 fffff805`7c698ebe : 00000000`0000001a 00000000`00041792 ffff91ec`4ec818a0 00000006`00000000 : nt!KeBugCheckEx
ffffee0d`b7236a70 fffff805`7c455e46 : ffff800d`adb99740 ffff91ec`4ec81ff8 ffff671e`8a932133 ffff800d`adb99740 : nt!MiDeleteVa+0x24a0be
ffffee0d`b7236b60 fffff805`7c45620a : ffffee0d`b7236f40 ffff800d`adb99740 ffff91c8`00000000 ffffee0d`b7236f90 : nt!MiWalkPageTablesRecursively+0x266
ffffee0d`b7236bf0 fffff805`7c45620a : ffffee0d`00000000 ffff800d`adb99740 ffff91c8`00000000 ffffee0d`b7236fa0 : nt!MiWalkPageTablesRecursively+0x62a
ffffee0d`b7236c80 fffff805`7c45620a : ffffee0d`b7236f40 ffff800d`adb99740 ffff91c8`00000000 ffffee0d`b7236fb0 : nt!MiWalkPageTablesRecursively+0x62a
ffffee0d`b7236d10 fffff805`7c46d5c1 : 00000000`00000000 ffff800d`adb99740 00000000`00000000 ffffee0d`b7236fc0 : nt!MiWalkPageTablesRecursively+0x62a
ffffee0d`b7236da0 fffff805`7c44ed62 : ffffee0d`b7236f40 ffffba81`00000001 00000000`00000002 ffffba81`00000000 : nt!MiWalkPageTables+0x371
ffffee0d`b7236ea0 fffff805`7c90b571 : 00000000`00000000 ffff800d`adb99508 ffff800d`adb990c0 fffff805`7c645fe5 : nt!MiDeletePagablePteRange+0x3c2
ffffee0d`b72371b0 fffff805`7c4b8ddf : ffff800d`adb990c0 ffffee0d`b72372b9 00000000`7ffed000 ffffba81`00000000 : nt!MiDeleteVadBitmap+0x9d
ffffee0d`b7237250 fffff805`7c909740 : ffff800d`adb990c0 ffff800d`adb99800 ffff800d`adb99508 ffff800d`adb99740 : nt!MiDeleteFinalPageTables+0xcb
ffffee0d`b7237320 fffff805`7c99aa0e : ffff800d`adb990c0 00000000`ffffffff ffff800d`adb99508 ffff800d`b26b0080 : nt!MmDeleteProcessAddressSpace+0x64
ffffee0d`b7237370 fffff805`7c9b27ce : ffffffff`ffffffff ffff800d`adb99090 ffffba81`37ad7b40 ffff800d`adb99090 : nt!PspProcessDelete+0x15e
ffffee0d`b7237410 fffff805`7c41fd27 : 00000000`00000000 00000000`00000000 ffffba81`37ad7b40 ffff800d`adb990c0 : nt!ObpRemoveObjectRoutine+0x7e
ffffee0d`b7237470 fffff805`7c8aebfd : 00000000`ffff8001 00000000`00000001 00000000`00007fff 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc7
ffffee0d`b72374b0 fffff805`7c8aea68 : 00000000`000000a0 fffff805`7ccae4c0 ffffba81`3b815230 00000000`0000000b : nt!ObCloseHandleTableEntry+0x109
ffffee0d`b7237570 fffff805`7c909199 : 00000000`00000000 ffff800d`a647d4d8 ffffffff`ffffff01 00000000`00000001 : nt!ExSweepHandleTable+0xd8
ffffee0d`b7237620 fffff805`7c908add : ffffffff`ffffffff ffff800d`a647d080 ffffba81`37f5c1a0 fffff805`7c9dfd84 : nt!ObKillProcess+0x35
ffffee0d`b7237650 fffff805`7c9a7de2 : ffff800d`a647d080 ffffba81`37b68630 ffffee0d`b7237879 00000000`00000000 : nt!PspRundownSingleProcess+0xb9
ffffee0d`b72376e0 fffff805`7c94e2e8 : ffff800d`00000001 00000000`00000001 ffff800d`b26b00f4 00000000`01020000 : nt!PspExitThread+0x64e
ffffee0d`b72377e0 fffff805`7c523e3d : ffffffff`ffffffff ffffee0d`b7237890 ffffba81`37f5c1b0 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffee0d`b7237820 fffff805`7c6373f0 : 00000000`00000001 ffffee0d`b72378e0 00000000`00000000 fffff805`00000011 : nt!KiDeliverApc+0x47d
ffffee0d`b72378e0 fffff805`7c64608f : ffff800d`b26b0080 00000000`0801f838 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffee0d`b7237a20 00000000`77df1cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`07f1eab8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77df1cf3.

SYMBOL_NAME: nt!MiDeleteVa+24a0be

MODULE_NAME: nt.

IMAGE_VERSION: 10.0.22621.2134

STACK_COMMAND: .cxr; .ecxr ; kb.

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 24a0be.

FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup: MachineOwner.
---------
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an.
interrupt request level (IRQL) that is too high. This is usually.
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffff810be19df540, memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg4: fffff80739b81c01, address which referenced memory.

Debugging Details:
------------------

*** WARNING: Check Image - Checksum mismatch - Dump: 0xcab69, File: 0xd46ee - C:\ProgramData\Dbg\sym\Wdf01000.sys\20CA8670c7000\Wdf01000.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 703.

 Key : Analysis.Elapsed.mSec
 Value: 1608.

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 78.

 Key : Analysis.Init.Elapsed.mSec
 Value: 5854.

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 114.

 Key : Bugcheck.Code.LegacyAPI
 Value: 0xd1.

 Key : Dump.Attributes.AsUlong
 Value: 1008.

 Key : Dump.Attributes.DiagDataWrittenToHeader
 Value: 1

 Key : Dump.Attributes.ErrorCode
 Value: 0

 Key : Dump.Attributes.KernelGeneratedTriageDump
 Value: 1

 Key : Dump.Attributes.LastLine
 Value: Dump completed successfully.

 Key : Dump.Attributes.ProgressPercentage
 Value: 0

 Key : Failure.Bucket
 Value: AV_tpm!TpmEvtIoDeviceControl

 Key : Failure.Hash
 Value: {2f091424-8d28-d65d-fc17-92619a1a2c05}

BUGCHECK_CODE: d1.

BUGCHECK_P1: ffff810be19df540.

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80739b81c01.

FILE_IN_CAB: 25.08.2023.dmp

DUMP_FILE_ATTRIBUTES: 0x1008.
 Kernel Generated Triage Dump.

READ_ADDRESS: fffff80736d1c468: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
 ffff810be19df540.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

PROCESS_NAME: svchost.exe

TRAP_FRAME: ffffee0a2faf6fb0 -- (.trap 0xffffee0a2faf6fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff810be19df550 rbx=0000000000000000 rcx=ffff818bbfe191b0
rdx=ffff818be71ac250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80739b81c01 rsp=ffffee0a2faf7140 rbp=ffff818bcb032dd0
 r8=ffff818bcb032dd0 r9=ffffee0a2faf7210 r10=fffff807362852c0
r11=ffffee0a2faf7260 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy.
Wdf01000!FxFileObject::_GetFileObjectFromWdm+0xeb65:
fffff807`39b81c01 483968f0 cmp qword ptr [rax-10h],rbp ds:ffff810b`e19df540=????????????????
Resetting default scope.

STACK_TEXT:
ffffee0a`2faf6e68 fffff807`364468a9 : 00000000`0000000a ffff810b`e19df540 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffee0a`2faf6e70 fffff807`36441f34 : 00000000`00000001 fffff807`3677d14b 00000000`00000000 ffffee0a`2faf7320 : nt!KiBugCheckDispatch+0x69
ffffee0a`2faf6fb0 fffff807`39b81c01 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x474
ffffee0a`2faf7140 fffff807`39b73058 : ffff818b`bfd0bd00 00000000`00000000 ffff818b`cefb1af0 ffff818b`bfe19020 : Wdf01000!FxFileObject::_GetFileObjectFromWdm+0xeb65 [minkernel\wdf\framework\shared\core\fxfileobject.cpp @ 377]
ffffee0a`2faf71c0 fffff807`39b72fcc : fffff807`00000001 ffff818b`bfd0bd00 00000000`00000000 ffff818b`ccae5000 : Wdf01000!FxRequest::GetFileObject+0x60 [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 2470]
ffffee0a`2faf7200 fffff807`39e55feb : 00000000`00001000 ffff818b`cefb1af0 ffff818b`cefb1af0 00000000`00000000 : Wdf01000!imp_WdfRequestGetFileObject+0x4c [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 2672]
ffffee0a`2faf7250 fffff807`39b7525b : 00000000`00000000 00000000`00000000 00000000`00000000 fffff807`00000000 : tpm!TpmEvtIoDeviceControl+0x1fb
ffffee0a`2faf73e0 fffff807`39b74f06 : ffff818b`bfe1a800 00000000`00000000 ffff818b`bfd0bd00 ffff818b`bfe1a820 : Wdf01000!FxIoQueue::DispatchRequestToDriver+0x16b [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 3325]
ffffee0a`2faf7450 fffff807`39b74817 : 00000000`00000001 00000000`00000000 00000000`00000000 ffff818b`bfe1a820 : Wdf01000!FxIoQueue::DispatchEvents+0x216 [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 3125]
ffffee0a`2faf74d0 fffff807`39b742ce : ffffb901`1c051000 ffff818b`c8218d00 00000000`00000001 ffff818b`cefb1af0 : Wdf01000!FxPkgIo::DispatchStep1+0x537 [minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 324]
ffffee0a`2faf75a0 fffff807`39b77b41 : ffff818b`c8218de0 00000000`00000001 00000000`00000001 00000000`0000060c : Wdf01000!FxPkgIo::Dispatch+0x5e [minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 119]
ffffee0a`2faf7600 fffff807`3621f5f5 : ffff818b`c8218de0 ffff818b`c8218de0 ffffee0a`2faf76f1 00000000`00000002 : Wdf01000!FxDevice::DispatchWithLock+0x81 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1446]
ffffee0a`2faf7650 fffff807`366c5200 : ffff818b`c8218de0 00000000`00000002 ffff818b`cb032dd0 ffff818b`cb032dd0 : nt!IofCallDriver+0x55
ffffee0a`2faf7690 fffff807`366c6c37 : ffff818b`c8218de0 00000000`00000001 ffffee0a`2faf7a05 ffff818b`cb032dd0 : nt!IopSynchronousServiceTail+0x1d0
ffffee0a`2faf7740 fffff807`366c6516 : 00000000`00000000 ffffee0a`2faf7aa0 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x707
ffffee0a`2faf7940 fffff807`36445fe5 : ffff818b`d3dd0040 00000064`08afd308 ffffee0a`2faf79c8 00000000`0000000e : nt!NtDeviceIoControlFile+0x56
ffffee0a`2faf79b0 00007ffc`93e6ee34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000064`08afd2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`93e6ee34

SYMBOL_NAME: tpm!TpmEvtIoDeviceControl+1fb

MODULE_NAME: tpm.

IMAGE_NAME: tpm.sys

IMAGE_VERSION: 10.0.22621.1690

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 1fb.

FAILURE_BUCKET_ID: AV_tpm!TpmEvtIoDeviceControl

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {2f091424-8d28-d65d-fc17-92619a1a2c05}

Followup: MachineOwner.
---------
 
Son düzenleyen: Moderatör:
Memtest86 ile ramleri test edin.
O testi çokça yaptım 1 ram bozuk olduğunu o şekil anladım zaten aylar önce, 1 tanesi ise sağlam çıktı. Ben de aylardır 1x8 kullanıyorum sistemi diğerini garantiye vereceğim ama üşendim hep. Zamanla o da bozulmuş mudur? Çünkü hep RAM kullanımı son seviyede geziyor malum 8GB yetmiyor. Kısaca dual channel değil single channel şu an.

Yine iyice kafayı yedi sorunu çözmüştüm uzun süredir yoktur bir sorun ama tekrar nüksetti.

26 Ağustos'ta ve az önce bilgisayarı açıp şifreyi girer girmez mavi ekran aldım.

Konuyu tekrar güncelliyorum 2 adet minidump daha ekliyorum.


Bu linkten 4 adet minidump ulaşabilirsiniz.
 
RAM'iniz bozulmuş olabilir bence kontrol etmenizde fayda var memtest86 ile tekrar ram testi yapın.
 
RAM'iniz bozulmuş olabilir bence kontrol etmenizde fayda var memtest86 ile tekrar ram testi yapın.
Bu akşam yapıp atacağım

Az önce bilgisayarı açar açmaz masaüstüne gelmeden Kernel Security Check Failure hatası aldım, rami test edeceğim sonrasına bakarız artık.

*BIOS'u da güncelledim, teste geçiyorum.

@as_not_found Hocam XMP açık bir şekilde güncel Memtest86 ile RAM'i test ettim sorun bulmadı, gece bir de XMP kapalı şekilde test ederim. Bugün aldığım yeni hatayı da spoilera ekliyorum bakabilirseniz sevinirim.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd4069d9d2640, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd4069d9d2598, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 702

    Key  : Analysis.Elapsed.mSec
    Value: 5945

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 125585

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 97

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : Failure.Bucket
    Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

    Key  : Failure.Hash
    Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd4069d9d2640

BUGCHECK_P3: ffffd4069d9d2598

BUGCHECK_P4: 0

FILE_IN_CAB:  090223-9062-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

TRAP_FRAME:  ffffd4069d9d2640 -- (.trap 0xffffd4069d9d2640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff83848429b758 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd4069d9d29a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031235a891 rsp=ffffd4069d9d27d0 rbp=ffffd4069d9d28d0
 r8=0000000000000b83  r9=0000000000000003 r10=0000000000000000
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiProcessWorkingSets+0x751:
fffff803`1235a891 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd4069d9d2598 -- (.exr 0xffffd4069d9d2598)
ExceptionAddress: fffff8031235a891 (nt!MiProcessWorkingSets+0x0000000000000751)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffd406`9d9d2318 fffff803`124468a9     : 00000000`00000139 00000000`00000003 ffffd406`9d9d2640 ffffd406`9d9d2598 : nt!KeBugCheckEx
ffffd406`9d9d2320 fffff803`12446e32     : 00000000`00000008 fffff803`122502d0 fffff803`12215dd0 ffffd406`9d9d22d0 : nt!KiBugCheckDispatch+0x69
ffffd406`9d9d2460 fffff803`12444c06     : 00000000`00000000 fffff803`1232b79e fffff803`12c64e60 fffff803`12369fa6 : nt!KiFastFailDispatch+0xb2
ffffd406`9d9d2640 fffff803`1235a891     : ffffd406`9d9d28d0 ffff8384`702b9700 ffffd406`00000400 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffd406`9d9d27d0 fffff803`1235906f     : 00000000`00000000 fffff803`12c6b480 fffff803`12c6b480 ffff8384`5d2571a0 : nt!MiProcessWorkingSets+0x751
ffffd406`9d9d2980 fffff803`123d98f7     : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff803`123d97a0 : nt!MiWorkingSetManager+0x13f
ffffd406`9d9d2a40 fffff803`12324e47     : ffff8384`5d4cc040 00000000`00000080 fffff803`12c6b480 0d8d4cc8`48894cd0 : nt!KeBalanceSetManager+0x157
ffffd406`9d9d2b30 fffff803`124361b4     : fffff803`0f934180 ffff8384`5d4cc040 fffff803`12324df0 8d48037f`0ff32024 : nt!PspSystemThreadStartup+0x57
ffffd406`9d9d2b80 00000000`00000000     : ffffd406`9d9d3000 ffffd406`9d9cc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME:  nt!KiFastFailDispatch+b2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.2134

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  b2

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------
 
Son düzenleme:
Bu akşam yapıp atacağım

Az önce bilgisayarı açar açmaz masaüstüne gelmeden Kernel Security Check Failure hatası aldım, rami test edeceğim sonrasına bakarız artık.

*BIOS'u da güncelledim, teste geçiyorum.

@as_not_found Hocam XMP açık bir şekilde güncel Memtest86 ile RAM'i test ettim sorun bulmadı, gece bir de XMP kapalı şekilde test ederim. Bugün aldığım yeni hatayı da spoilera ekliyorum bakabilirseniz sevinirim.

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd4069d9d2640, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffd4069d9d2598, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 702

    Key  : Analysis.Elapsed.mSec
    Value: 5945

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 93

    Key  : Analysis.Init.Elapsed.mSec
    Value: 125585

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 97

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x139

    Key  : Dump.Attributes.AsUlong
    Value: 1008

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : Failure.Bucket
    Value: 0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

    Key  : Failure.Hash
    Value: {3aede96a-54dd-40d6-d4cb-2a161a843851}


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffd4069d9d2640

BUGCHECK_P3: ffffd4069d9d2598

BUGCHECK_P4: 0

FILE_IN_CAB:  090223-9062-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
  Kernel Generated Triage Dump

TRAP_FRAME:  ffffd4069d9d2640 -- (.trap 0xffffd4069d9d2640)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff83848429b758 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffd4069d9d29a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8031235a891 rsp=ffffd4069d9d27d0 rbp=ffffd4069d9d28d0
 r8=0000000000000b83  r9=0000000000000003 r10=0000000000000000
r11=0000000000000004 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiProcessWorkingSets+0x751:
fffff803`1235a891 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffd4069d9d2598 -- (.exr 0xffffd4069d9d2598)
ExceptionAddress: fffff8031235a891 (nt!MiProcessWorkingSets+0x0000000000000751)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffd406`9d9d2318 fffff803`124468a9     : 00000000`00000139 00000000`00000003 ffffd406`9d9d2640 ffffd406`9d9d2598 : nt!KeBugCheckEx
ffffd406`9d9d2320 fffff803`12446e32     : 00000000`00000008 fffff803`122502d0 fffff803`12215dd0 ffffd406`9d9d22d0 : nt!KiBugCheckDispatch+0x69
ffffd406`9d9d2460 fffff803`12444c06     : 00000000`00000000 fffff803`1232b79e fffff803`12c64e60 fffff803`12369fa6 : nt!KiFastFailDispatch+0xb2
ffffd406`9d9d2640 fffff803`1235a891     : ffffd406`9d9d28d0 ffff8384`702b9700 ffffd406`00000400 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x346
ffffd406`9d9d27d0 fffff803`1235906f     : 00000000`00000000 fffff803`12c6b480 fffff803`12c6b480 ffff8384`5d2571a0 : nt!MiProcessWorkingSets+0x751
ffffd406`9d9d2980 fffff803`123d98f7     : 00000000`00000001 00000000`00000001 00000000`ffffffff fffff803`123d97a0 : nt!MiWorkingSetManager+0x13f
ffffd406`9d9d2a40 fffff803`12324e47     : ffff8384`5d4cc040 00000000`00000080 fffff803`12c6b480 0d8d4cc8`48894cd0 : nt!KeBalanceSetManager+0x157
ffffd406`9d9d2b30 fffff803`124361b4     : fffff803`0f934180 ffff8384`5d4cc040 fffff803`12324df0 8d48037f`0ff32024 : nt!PspSystemThreadStartup+0x57
ffffd406`9d9d2b80 00000000`00000000     : ffffd406`9d9d3000 ffffd406`9d9cc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


SYMBOL_NAME:  nt!KiFastFailDispatch+b2

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.22621.2134

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  b2

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_nt!KiFastFailDispatch

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {3aede96a-54dd-40d6-d4cb-2a161a843851}

Followup:     MachineOwner
---------
HD Tune ile ssd kontrol edin DDU ile sürücüleri silip yeniden yükleyin.
 
HD Tune ile ssd kontrol edin DDU ile sürücüleri silip yeniden yükleyin.
1693741149398.png


Error scan kısmı bu şekilde.
 

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı