Kernel Security check failure hatası

Cihanunlu1

Hectopat
Katılım
13 Temmuz 2017
Mesajlar
120
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar selam.
Az önce YouTube'da video izlerken bu hatayı aldım. Donanımım gayet yüksek ve yeni bir sistem. Windows'um en son sürüm ve güncel. İlk defa bu hatayı alıyorum.

Minidump:

@MF
@Murat5038
 
Son düzenleyen: Moderatör:
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff80708e6b000, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff80708e6af58, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5374

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 13196

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 90

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff80708e6b000

BUGCHECK_P3: fffff80708e6af58

BUGCHECK_P4: 0

TRAP_FRAME:  fffff80708e6b000 -- (.trap 0xfffff80708e6b000)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff920746cc0d00 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff920746cc0500 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807083a74ff rsp=fffff80708e6b198 rbp=fffff80708e6b2d0
 r8=00000000007ccaed  r9=ffff920746cc0000 r10=ffff92074f80e418
r11=00000000007ccb33 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
NETIO!RemoveAndInsertTimerWheelElement+0x2082f:
fffff807`083a74ff cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff80708e6af58 -- (.exr 0xfffff80708e6af58)
ExceptionAddress: fffff807083a74ff (NETIO!RemoveAndInsertTimerWheelElement+0x000000000002082f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff807`08e6acd8 fffff807`04607169     : 00000000`00000139 00000000`00000003 fffff807`08e6b000 fffff807`08e6af58 : nt!KeBugCheckEx
fffff807`08e6ace0 fffff807`04607590     : 00000000`00000d7a ffff9207`4f80e010 fffff807`08e6af09 fffff807`0848eacc : nt!KiBugCheckDispatch+0x69
fffff807`08e6ae20 fffff807`04605923     : ffff5d04`40f87b67 00000000`00000002 00000000`00000000 fffff807`08e6b168 : nt!KiFastFailDispatch+0xd0
fffff807`08e6b000 fffff807`083a74ff     : fffff807`08386c81 ffff9207`46cc0000 00000000`00000046 ffff9207`46cbf8e0 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`08e6b198 fffff807`08386c81     : ffff9207`46cc0000 00000000`00000046 ffff9207`46cbf8e0 ffff9207`4f80e010 : NETIO!RemoveAndInsertTimerWheelElement+0x2082f
fffff807`08e6b1a0 fffff807`08456094     : ffff9207`46c3f6d0 00000000`00000000 00000000`00000000 00000000`ffffffff : NETIO!RtlIndicateTimerWheelEntryTimerStart+0xf1
fffff807`08e6b1d0 fffff807`08454c5f     : 00000000`00000000 00000000`ffffffff fffff807`08e6b4a0 00000000`00000000 : tcpip!TcpTcbFastDatagram+0x11a4
fffff807`08e6b3a0 fffff807`08453fff     : 00000000`00000028 ffff9207`46d3e000 00000000`4b4120c0 ffff9207`46d3e000 : tcpip!TcpTcbReceive+0x18f
fffff807`08e6b5f0 fffff807`08453088     : 00000000`007ccb0b fffff807`0863dc00 00000000`0b1d4389 fffff807`08638598 : tcpip!TcpMatchReceive+0x51f
fffff807`08e6b8a0 fffff807`084b8a52     : ffff9207`46aa5270 00000000`0000bb01 00000000`00000000 ffff9207`46d3e001 : tcpip!TcpReceive+0x358
fffff807`08e6b990 fffff807`08479b30     : ffff9207`4b79e2a0 00000000`00000000 00000000`00000000 ffff9207`462f6a60 : tcpip!TcpNlClientReceiveDatagrams+0x22
fffff807`08e6b9d0 fffff807`0847647b     : 00000000`00000001 00000000`00000000 00000000`00000000 ffff9207`46d3e000 : tcpip!IppProcessDeliverList+0xc0
fffff807`08e6bab0 fffff807`084759ff     : fffff807`08638230 ffff9207`46cd88a0 ffff9207`46d3e000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b
fffff807`08e6bbb0 fffff807`08472d9c     : ffff9207`4b92bd10 ffff9207`4b79e2a0 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
fffff807`08e6bcd0 fffff807`084befcf     : ffff9207`4b79e2a0 00000000`00000000 fffff807`08e6bda1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
fffff807`08e6bd00 fffff807`084be5cc     : ffff9207`4c26f001 ffff9207`46fed800 fffff807`084b1a50 fffff807`08e6c0dc : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f
fffff807`08e6be00 fffff807`0440d468     : ffff9207`46df67e0 00000000`00000002 fffff807`04f27600 fffff807`08e6c0f8 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff807`08e6bf50 fffff807`0440d3dd     : fffff807`084be450 fffff807`08e6c0f8 ffff9207`468ffa70 fffff807`086018c4 : nt!KeExpandKernelStackAndCalloutInternal+0x78
fffff807`08e6bfc0 fffff807`084b15ed     : 00000000`00000014 fffff807`08516b2a ffff9207`4b79e420 fffff807`0873142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffff807`08e6c000 fffff807`084b0ccd     : 00000000`00000001 fffff807`08e6c160 ffff9207`46fed820 fffff807`08e6c170 : tcpip!NetioExpandKernelStackAndCallout+0x8d
fffff807`08e6c060 fffff807`08201eb0     : ffff9207`4b8e1e61 00000000`00000001 ffff9207`4bad8870 fffff807`08e6c470 : tcpip!FlReceiveNetBufferListChain+0x46d
fffff807`08e6c310 fffff807`08201ccb     : ffff9207`46feb820 fffff807`00000001 fffff807`00000000 ffffa400`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
fffff807`08e6c3f0 fffff807`08207ef0     : ffff9207`4b4111a0 ffff9207`4b79e201 ffff9207`4b4111a0 fffff807`08e6c401 : ndis!ndisMTopReceiveNetBufferLists+0x22b
fffff807`08e6c470 fffff807`0823dee3     : ffff9207`4b79e2a0 fffff807`08e6c541 00000000`00000000 fffff807`00000000 : ndis!ndisCallReceiveHandler+0x60
fffff807`08e6c4c0 fffff807`08204a94     : 00000000`0007fc8e 00000000`00000001 ffff9207`4b4111a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
fffff807`08e6c590 fffff807`12f561d8     : ffff9207`4b6d7000 ffff9207`4b6d7000 00000000`00000000 ffff9207`4b6d75f0 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
fffff807`08e6c620 fffff807`12f425a8     : 00000000`00000000 00000013`0abb6201 ffff9207`00000400 fffff807`08e6c798 : rt640x64!MpHandleRecvIntPriVLanJumbo+0x2c4
fffff807`08e6c710 fffff807`08207886     : 00000000`00000000 ffff9207`4b7e6010 ffff9207`4b834100 00000000`00000000 : rt640x64!MPHandleMessageInterrupt+0x398
fffff807`08e6c780 fffff807`044e535e     : fffff807`010de240 00000000`00000000 00000000`00000004 fffff807`010db180 : ndis!ndisInterruptDpc+0x196
fffff807`08e6c860 fffff807`044e4644     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff807`08e6c9d0 fffff807`045f8d7e     : 00000000`00000000 fffff807`010db180 fffff807`04f27600 ffff9207`4db3f080 : nt!KiRetireDpcList+0x1f4
fffff807`08e6cc60 00000000`00000000     : fffff807`08e6d000 fffff807`08e67000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  NETIO!RemoveAndInsertTimerWheelElement+2082f

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

IMAGE_VERSION:  10.0.19041.610

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2082f

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_NETIO!RemoveAndInsertTimerWheelElement

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b2b60531-1e94-a5c9-4b1d-c7c19e7b13e7}

Followup:     MachineOwner
---------

Sorununuz çözülürse belirtin, çözülmezse yeni dosyaları paylaşın.
 
Hocam selam. Bende Ethernet driver bile kurulu değilmiş şunu kurdum anakart sitesinden.
Realtek PCI-e Ethernet drivers.
Version.
10.42.0526.2020.

Bunu silip sizin verdiğinizi mi kurayım? Anakart MSI B450 Tomahawk Max.

Edit: Simdi baktım benim kurduğum sürüm sizin verdiiğiniz. Bu konuyu açmadan önce Ethernet Driver'i bile kurulu degildi suan da kurdum hocam.

Vanguardı Valorant oynamak için tutuyorum hocam sorun olur mu?
 
Evet hocam mavi ekrandan sonra biraz araştırdım ağ sorunu olduğunu gördüm. Realtek ethernet driver'i güncelleyeyim dedim. Bi baktım benim sistemde Ethernet driver'i bile yoktu. Şimdi kurdum. Bakalım süreci takip edeceğim. Bu zamana kadar vanguard bir sıkıntı çıkarmadı zaten gördüyseniz sistemde 3. parti doğru dürüst yazılım da yok.
 
Ağ sürücüm suan güncel. Ses sürücüsü güncel değildi onuda güncelledim. Gpu güncel değil onuda Game experience üzerinden güncelleyeceğim. Bi daha olursa Vangurdı da Valorantı da silerim. Bios'da güncel. İnşallah olmaz olursa biosuda resetlerim. Buradan bilgi veririm.
 

Yeni konular

Geri
Yukarı