Sevgili dostlar,
Son haftalarda nadiren de olsa mavi ekran hatası almaya başladım.
Hata bazen tarayıcı kullanırken bazen de oyun oynarken olabiliyor. Kasa sıcaklıkları normal, herhangi bir yüklenme olmadığında da hata aldığım oluyor.
Dump dosyasının içinden çıkamadım, yorumlayabilir misiniz?
Bu arada HD Tune ile disk testi, ramtest ile bellek testi yaptım.
Hata bulunamadı.
Son haftalarda nadiren de olsa mavi ekran hatası almaya başladım.
Hata bazen tarayıcı kullanırken bazen de oyun oynarken olabiliyor. Kasa sıcaklıkları normal, herhangi bir yüklenme olmadığında da hata aldığım oluyor.
Dump dosyasının içinden çıkamadım, yorumlayabilir misiniz?
Kod:
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (24 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`25800000 PsLoadedModuleList = 0xfffff805`2642a2d0
Debug session time: Mon Feb 21 22:57:05.386 2022 (UTC + 3:00)
System Uptime: 0 days 18:15:19.852
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
..............................................
Loading User Symbols.
Loading unloaded module list.
.............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`25bf7610 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd280`9182e280=0000000000000139
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd2809182e5a0, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffffd2809182e4f8, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
Unable to load image \SystemRoot\system32\DRIVERS\klmouflt.sys, Win32 error 0n2.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4171.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 37631.
Key : Analysis.Init.CPU.mSec
Value: 749.
Key : Analysis.Init.Elapsed.mSec
Value: 3670.
Key : Analysis.Memory.CommitPeak.Mb
Value: 106.
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: 139.
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd2809182e5a0.
BUGCHECK_P3: ffffd2809182e4f8.
BUGCHECK_P4: 0
TRAP_FRAME: ffffd2809182e5a0 -- (.trap 0xffffd2809182e5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd2809182e7a0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff805444344ed rsp=ffffd2809182e738 rbp=ffffd2809182e7b0
r8=ffff9c07fac25dd8 r9=ffffd2809182e8e4 r10=fffff80525a1e350
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy.
mouclass!MouseClassDequeueRead+0x51:
fffff805`444344ed cd29 int 29h.
Resetting default scope.
EXCEPTION_RECORD: ffffd2809182e4f8 -- (.exr 0xffffd2809182e4f8)
ExceptionAddress: fffff805444344ed (mouclass!MouseClassDequeueRead+0x0000000000000051)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System.
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409.
EXCEPTION_PARAMETER1: 0000000000000003.
EXCEPTION_STR: 0xc0000409.
STACK_TEXT:
ffffd280`9182e278 fffff805`25c09569 : 00000000`00000139 00000000`00000003 ffffd280`9182e5a0 ffffd280`9182e4f8 : nt!KeBugCheckEx
ffffd280`9182e280 fffff805`25c09990 : ffff9c07`e9010340 00000000`000000c0 00000000`00000100 01800040`475580e7 : nt!KiBugCheckDispatch+0x69
ffffd280`9182e3c0 fffff805`25c07d23 : 00000000`00000002 00000000`00000000 ffff9c07`faa832b0 00000000`00000002 : nt!KiFastFailDispatch+0xd0
ffffd280`9182e5a0 fffff805`444344ed : fffff805`44434c7a ffff9c07`fac25d40 00000000`000000c0 00000000`00000100 : nt!KiRaiseSecurityCheckFailure+0x323
ffffd280`9182e738 fffff805`44434c7a : ffff9c07`fac25d40 00000000`000000c0 00000000`00000100 ffff9c07`f3e2e010 : mouclass!MouseClassDequeueRead+0x51
ffffd280`9182e740 fffff805`44411776 : 00000099`0415b25c ffff9c07`fac24ec0 ffff9c07`fabd0e80 ffffd280`9182e8e4 : mouclass!MouseClassServiceCallback+0x9a
ffffd280`9182e7e0 fffff805`443f3aa8 : 00000000`00000000 00000000`00000002 ffffd280`9182e8f8 ffffd280`9182e8e4 : klmouflt+0x1776
ffffd280`9182e8a0 fffff805`25a84ffe : 00000000`00000000 00000000`00000000 00000000`0007c001 fffff805`00000000 : mouhid!MouHid_ReadComplete+0x758
ffffd280`9182e940 fffff805`25a84ec7 : 00000000`00000000 ffff9c07`faa2d006 ffff9c07`faac8c50 00000000`00000000 : nt!IopfCompleteRequest+0x11e
ffffd280`9182ea30 fffff805`440faef5 : ffff9c07`f662ee98 ffff9c07`fabad102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
ffffd280`9182ea60 fffff805`440fa7ed : ffff9c07`fabad1d0 ffff9c07`fabad102 ffff9c07`fabad1d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
ffffd280`9182eb60 fffff805`25a84ffe : ffff9c07`f3e2f010 ffff9c07`f3e2f010 ffffd280`9182ec01 ffff9c07`f3e2f7a3 : HIDCLASS!HidpInterruptReadComplete+0x37d
ffffd280`9182ec00 fffff805`25a84ec7 : 00000000`00000001 00000000`00000000 ffff9c07`fabdc020 00000000`00000002 : nt!IopfCompleteRequest+0x11e
ffffd280`9182ecf0 fffff805`2aba811a : 00000000`00000000 ffff9c07`f3fc0b90 ffff9c07`f3e2f010 ffffd280`9182edd0 : nt!IofCompleteRequest+0x17
ffffd280`9182ed20 fffff805`2aba5bbf : ffff9c07`fc63e402 ffff9c08`04bd0a20 ffff9c07`f3e2f010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
ffffd280`9182edb0 fffff805`40e9c1dd : 00000000`ffffff02 ffff9c07`fc63e280 ffff9c07`fabdc400 ffff9c07`fabdc400 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
ffffd280`9182ee10 fffff805`40e9c0a1 : ffff9c07`fc63e420 00000000`00000009 ffff9c07`fc63e4b0 ffffd280`9182f028 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc9
ffffd280`9182ee70 fffff805`40e9be90 : 00000000`00000004 ffffd280`9182efe0 00000000`00000000 ffff9c07`fabdb620 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
ffffd280`9182ef20 fffff805`40e968f1 : 00000000`00000004 ffffd280`9182eff8 00000000`00000008 ffffd280`9182f000 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
ffffd280`9182ef50 fffff805`40e96425 : 00000000`00000780 000063f8`0c049700 ffff9c07`f4538920 ffff9c07`fa7a0d00 : USBXHCI!Endpoint_TransferEventHandler+0xb1
ffffd280`9182efb0 fffff805`40e960fc : ffff9c07`f3dde368 ffffd400`5d9e0180 000063f8`0c020338 ffffd280`9182f0d0 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
ffffd280`9182f0b0 fffff805`2aba38f6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
ffffd280`9182f0e0 fffff805`25a9a3fe : ffffd400`5d9e3240 fffff805`40e3870b ffffd280`9182f3e0 ffff9c08`007f4080 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa6 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 410]
ffffd280`9182f120 fffff805`25a996e4 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
ffffd280`9182f290 fffff805`25bfb17e : ffffffff`00000000 ffffd400`5d9e0180 ffffd400`5d9eb640 ffff9c08`007f4080 : nt!KiRetireDpcList+0x1f4
ffffd280`9182f520 00000000`00000000 : ffffd280`91830000 ffffd280`91829000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: mouclass!MouseClassDequeueRead+51
MODULE_NAME: mouclass.
IMAGE_NAME: mouclass.sys
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 51.
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassDequeueRead
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {6b5843fa-650f-1f9f-d95b-388440977a32}
Followup: MachineOwner.
---------
Bu arada HD Tune ile disk testi, ramtest ile bellek testi yaptım.
Hata bulunamadı.
Son düzenleyen: Moderatör: