Çözüldü KERNEL_SECURITY_CHECK_FAILURE mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

distinctb

Femtopat
Katılım
30 Ağustos 2020
Mesajlar
5
Merhaba.
Uzunca bir süredir periyordik olarak mavi ekran hatası alıyordum. Daha önce Technopat'ın YouTube videolarından faydalanarak kendimce bir analiz yapmış ve bellek hatası olduğunu düşünerek Memtest uygulamıştım. Memtest sonucu bir hataya rastlamamıştım. Ancak test yaklaşık bir buçuk ay önce yapıldı ve bu süreçten sonra uzunca bir süre bilgisayar kullanılmadı.
Son on gündür bilgisayarı kullanmam ile birlikte mavi ekran hatalarını tekrar almaya da başladım. Aşağıda minidump dosyalarının olduğu linki paylaşıyorum. Maalesef minidump dosyalarım son on günü gösterecek şekilde bilgisayarda kayıtlı. Daha önceki hata dosyalarına ulaşamadım. Sorunun çözümü için yardımlarınızı bekliyorum.

 
1) MSI ile ilgili tüm yazılımları kaldırın.
2) Yandaki rehber anlatımı ile sfc /scannow komutunu kullanın ve sonuçları paylaşın. Bilgisayarda SYS dosyaları eksikliği nedenli alınan Mavi Ekranlar #1
Ayrıca ekran kartı sürücünüz ile ilgili de hatalar var sanırsam. Ekran kartı modelinizi belirtirseniz size WHQL sürümün linkini verebilirim.
 
Son düzenleme:
1) MSI ile ilgili tüm yazılımları kaldırın.
2) Yandaki rehber anlatımı ile sfc /scannow komutunu kullanın ve sonuçları paylaşın. Bilgisayarda SYS dosyaları eksikliği nedenli alınan Mavi Ekranlar #1
Ayrıca ekran kartı sürücünüz ile ilgili de hatalar var sanırsam. Ekran kartı modelinizi belirtirseniz size WHQL sürümün linkini verebilirim.

Dediğiniz gibi MSI sürücülerini kaldırdım ve tarama yaptım.
Sfc /scannow komutu herhangi bir hata bulmadı.
Ekran kartım : MSI GTX 1060 Gaming X 6 GB GDDR5 192 bit.
 
Bellek testi yapın ilk iş.



Kod:
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000010e, The disk subsystem returned corrupt data while reading from the
hibernation file.
Arg2: 000000000000000a
Arg3: 000000000000b5e7, Incorrect checksum
Arg4: 0000000000007d05, Previous disk read's checksum

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3140

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 5559

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

DUMP_FILE_ATTRIBUTES: 0x9
Hiber Crash Dump
Kernel Generated Triage Dump

BUGCHECK_CODE: a0

BUGCHECK_P1: 10e

BUGCHECK_P2: a

BUGCHECK_P3: b5e7

BUGCHECK_P4: 7d05

CUSTOMER_CRASH_COUNT: 1

STACK_TEXT:
ffff8a01`5f22f548 fffff806`0a5b149c : 00000000`000000a0 00000000`0000010e 00000000`0000000a 00000000`0000b5e7 : nt!KeBugCheckEx
ffff8a01`5f22f550 fffff806`0a5bedf1 : 00000000`00000001 ffffdc0d`37366b90 00000003`71c62000 ffffdc0d`48053000 : nt!PopHiberChecksumHiberFileData+0x1083c
ffff8a01`5f22f5b0 fffff806`0a5b0a75 : 00000000`00000000 ffff920d`c3137e58 00000000`00000001 00000000`00000001 : nt!PopRequestRead+0x7d
ffff8a01`5f22f620 fffff806`0a59fdf0 : 00004c58`c63d2d52 ffff920d`c3137e58 00000000`00000000 00000000`00000000 : nt!PopRestoreHiberContext+0x10b2d
ffff8a01`5f22f6b0 fffff806`0a59fb2e : fffff806`0a8503f0 ffff8a01`5f22f830 fffff806`0a8503f0 00000000`00000100 : nt!PopHandleNextState+0x210
ffff8a01`5f22f700 fffff806`0a59f8ab : 00000000`00000100 fffff806`0a8503f0 000001bf`3ab5841f 00000000`00989680 : nt!PopIssueNextState+0x1a
ffff8a01`5f22f730 fffff806`0a5a2ac9 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff806`09e4bae5 : nt!PopInvokeSystemStateHandler+0x33b
ffff8a01`5f22f930 fffff806`0a5a1cdd : ffffffff`00000000 ffffffff`ffffffff ffff8a01`5f22fab0 00000000`00000000 : nt!PopEndMirroring+0x1e9
ffff8a01`5f22f9f0 fffff806`0a5a1a25 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MmDuplicateMemory+0x261
ffff8a01`5f22fa80 fffff806`09f46745 : ffffdc0d`3db4f000 ffffdc0d`3db4f040 fffff806`0a5a18f0 00000000`00000001 : nt!PopTransitionToSleep+0x135
ffff8a01`5f22fb10 fffff806`09fe5598 : fffff806`077f2180 ffffdc0d`3db4f040 fffff806`09f466f0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
ffff8a01`5f22fb60 00000000`00000000 : ffff8a01`5f230000 ffff8a01`5f229000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!PopHiberChecksumHiberFileData+1083c

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1083c

FAILURE_BUCKET_ID: 0xa0_10e_nt!PopHiberChecksumHiberFileData

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {28ba2091-a476-6f77-2dec-6241bccd4685}

Followup: MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff820a475fa450, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff820a475fa3a8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 5905

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 27072

Key : Analysis.Memory.CommitPeak.Mb
Value: 85

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff820a475fa450

BUGCHECK_P3: ffff820a475fa3a8

BUGCHECK_P4: 0

TRAP_FRAME:  ffff820a475fa450 -- (.trap 0xffff820a475fa450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa309fb0b61a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffa30a0131f3a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037920db2f rsp=ffff820a475fa5e0 rbp=0000000000000dc0
r8=0000000000000001 r9=000000000000005e r10=0000000000000000
r11=fffff80378e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiCancelTimer+0x1e468f:
fffff803`7920db2f cd29 int 29h
Resetting default scope

EXCEPTION_RECORD:  ffff820a475fa3a8 -- (.exr 0xffff820a475fa3a8)
ExceptionAddress: fffff8037920db2f (nt!KiCancelTimer+0x00000000001e468f)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff820a`475fa128 fffff803`791efe29 : 00000000`00000139 00000000`00000003 ffff820a`475fa450 ffff820a`475fa3a8 : nt!KeBugCheckEx
ffff820a`475fa130 fffff803`791f0250 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffff6`00000000 : nt!KiBugCheckDispatch+0x69
ffff820a`475fa270 fffff803`791ee5e3 : ffff820a`475fa4b0 ffffc981`41b48180 00000002`00000005 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffff820a`475fa450 fffff803`7920db2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffff820a`475fa5e0 fffff803`79027f6c : fffff803`76c7b180 00000000`00000000 fffff803`8b634028 00000000`00000000 : nt!KiCancelTimer+0x1e468f
ffff820a`475fa690 fffff803`790272cf : ffffa30a`00000000 ffffa30a`00000007 ffff820a`475fa880 fffff803`00000000 : nt!KiSwapThread+0x6cc
ffff820a`475fa740 fffff803`79031e6e : 00000000`0000005e ffff820a`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x14f
ffff820a`475fa7e0 fffff803`7776f21d : ffff820a`475fa901 00000000`00989680 00000000`78f73b90 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff820a`475fa8f0 fffff803`776fb0ca : 00000000`00000000 ffffa30a`0131c000 ffff820a`475faa19 ffffa30a`0131c000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff820a`475fa9c0 fffff803`7777a585 : ffffa30a`01e61500 ffffa30a`0131c000 ffffa30a`01e61520 ffffa30a`03c04620 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff820a`475faa80 fffff803`7777a53a : ffffa30a`0131c400 fffff803`7777a470 ffffa30a`0131c000 ffffc981`41f60100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff820a`475faad0 fffff803`79146745 : ffffa30a`0131f280 fffff803`00000001 ffffa30a`0131c000 000fa4ef`b59bbfff : dxgmms2!VidSchiWorkerThread+0xca
ffff820a`475fab10 fffff803`791e5598 : ffffc981`41f60180 ffffa30a`0131f280 fffff803`791466f0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff820a`475fab60 00000000`00000000 : ffff820a`475fb000 ffff820a`475f4000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!KiCancelTimer+1e468f

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 1e468f

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCancelTimer

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {0a906956-eabe-15a9-fdee-848f8aa430ba}

Followup: MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffe18102f52010, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe18102f51f68, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 4046

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 15779

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffe18102f52010

BUGCHECK_P3: ffffe18102f51f68

BUGCHECK_P4: 0

TRAP_FRAME:  83482824448948c0 -- (.trap 0x83482824448948c0)
Unable to read trap frame at 83482824`448948c0

EXCEPTION_RECORD:  ffffe18102f51f68 -- (.exr 0xffffe18102f51f68)
ExceptionAddress: fffff8060cc88355 (nt!RtlpGetStackLimitsEx+0x000000000014b185)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: firefox.exe

WATSON_BKT_EVENT: BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000004

EXCEPTION_STR: 0xc0000409

BAD_STACK_POINTER: ffffe18102f51ce8

STACK_TEXT:
ffffe181`02f51ce8 fffff806`0cbefe29 : 00000000`00000139 00000000`00000004 ffffe181`02f52010 ffffe181`02f51f68 : nt!KeBugCheckEx
ffffe181`02f51cf0 fffff806`0cbf0250 : 43110f41`8043110f 49642474`89f63390 b489ffff`ff20b389 ee8b4400`00008c24 : nt!KiBugCheckDispatch+0x69
ffffe181`02f51e30 fffff806`0cbee5e3 : ffffe181`02f527c0 00000000`00000000 ffffe181`02f51a60 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe181`02f52010 fffff806`0cc88355 : 00000000`00d7c320 00000000`5c5e51cc ffffe181`02f52710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffe181`02f521a0 fffff806`0cc123c1 : ffffe181`02f52710 00000000`00000000 fffff48b`bd5e2a00 fffff806`00000003 : nt!RtlpGetStackLimitsEx+0x14b185
ffffe181`02f521d0 fffff806`0ca7a7f6 : fffff48b`bd5e1f88 ffffe181`02f52e20 fffff48b`bd5e1f88 00000000`00000000 : nt!RtlDispatchException+0x1df681
ffffe181`02f528f0 fffff806`0cbdedd2 : c7000006`99058d48 570f0000`0030d045 83482824`448948c0 33c93345`00202464 : nt!KiDispatchException+0x186
ffffe181`02f52fb0 fffff806`0cbdeda0 : fffff806`0cbeff65 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff48b`bd5e1e48 fffff806`0cbeff65 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff48b`bd5e1e50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x125


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.450

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup: MachineOwner
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffffb014b8cf1f0
Arg3: 8000000176e28867
Arg4: fffffb011a311660

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3421

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 4133

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 403

BUGCHECK_P2: fffffb014b8cf1f0

BUGCHECK_P3: 8000000176e28867

BUGCHECK_P4: fffffb011a311660

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: svchost.exe

STACK_TEXT:
ffff8001`2ac2ed18 fffff802`5a2464a4 : 00000000`0000001a 00000000`00000403 fffffb01`4b8cf1f0 80000001`76e28867 : nt!KeBugCheckEx
ffff8001`2ac2ed20 fffff802`5a0c1588 : ffff8001`2ac2f020 fffffb7d`80a5c678 ffff8001`2ac2f0d0 00000000`00000000 : nt!MiDeletePteRun+0x19b6a4
ffff8001`2ac2ef50 fffff802`5a0c219b : ffff8001`2ac2f080 ffffd38f`15c52740 fffffb01`4b8cfff8 ffff8001`2ac2f080 : nt!MiDeleteVaTail+0x78
ffff8001`2ac2ef80 fffff802`5a0a789f : 00000000`00000000 00000000`00000060 ffffd38f`15c52800 ffffd38f`15c60080 : nt!MiDeletePagablePteRange+0x33b
ffff8001`2ac2f400 fffff802`5a466dd3 : ffffd38f`15c520c0 00000000`00000000 ffffd38f`00000000 ffffd38f`00000001 : nt!MiDeleteVad+0x41f
ffff8001`2ac2f530 fffff802`5a467c73 : ffffd38f`16023760 ffffd38f`16023760 ffffd38f`16023e90 ffffd38f`15c520c0 : nt!MiCleanVad+0x43
ffff8001`2ac2f560 fffff802`5a4ba247 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffd38f`15c520c0 : nt!MmCleanProcessAddressSpace+0x137
ffff8001`2ac2f5e0 fffff802`5a3e8e32 : ffffd38f`15c520c0 ffffbd84`b9083730 ffff8001`2ac2f820 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8001`2ac2f660 fffff802`5a4f5298 : 00000000`000000ff 00000000`00000001 00000000`00000000 000000a2`40478000 : nt!PspExitThread+0x5f6
ffff8001`2ac2f760 fffff802`5a02a507 : ffff8001`79510101 00000000`00000000 ffffd38f`153ee010 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8001`2ac2f7a0 fffff802`5a1e2100 : 00000297`18a04960 ffff8001`2ac2f850 000000a2`406ff888 ffffd38f`00000000 : nt!KiDeliverApc+0x487
ffff8001`2ac2f850 fffff802`5a1ef51f : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd38f`153ee010 : nt!KiInitiateUserApc+0x70
ffff8001`2ac2f990 00007ffe`0c60e7e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a2`406ff838 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0c60e7e4


SYMBOL_NAME: nt!MiDeletePteRun+19b6a4

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.388

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 19b6a4

FAILURE_BUCKET_ID: 0x1a_403_nt!MiDeletePteRun

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {6e89a852-58e8-3dbb-af93-60d80dcc29e5}

Followup: MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffba8805e16f80, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffba8805e16ed8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 6812

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 40362

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffba8805e16f80

BUGCHECK_P3: ffffba8805e16ed8

BUGCHECK_P4: 0

TRAP_FRAME:  ffffba8805e16f80 -- (.trap 0xffffba8805e16f80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa486ef5d54d8 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807551d7c0a rsp=ffffba8805e17110 rbp=0000000000000468
 r8=ffffa486ee82d6e8  r9=0000000000000001 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x7a:
fffff807`551d7c0a cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffba8805e16ed8 -- (.exr 0xffffba8805e16ed8)
ExceptionAddress: fffff807551d7c0a (dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x000000000000007a)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffba88`05e16c58 fffff807`46defe29     : 00000000`00000139 00000000`00000003 ffffba88`05e16f80 ffffba88`05e16ed8 : nt!KeBugCheckEx
ffffba88`05e16c60 fffff807`46df0250     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffba88`05e16da0 fffff807`46dee5e3     : ffffba88`05e17051 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffba88`05e16f80 fffff807`551d7c0a     : 00000000`00000000 fffff807`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
ffffba88`05e17110 fffff807`5524ed12     : 00000000`00000000 ffffa486`ee703000 00000000`00000000 00000000`00000005 : dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+0x7a
ffffba88`05e17160 fffff807`551d7ecd     : 00000000`00000000 00000000`00000001 00000000`00000001 ffffba88`05e17350 : dxgmms2!VidSchiAllocateQueuePacket+0x82
ffffba88`05e17250 fffff807`5523d0f4     : 00000000`00000000 00000000`00000000 ffffa486`00000000 ffffa486`eda89310 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x2ad
ffffba88`05e17490 fffff807`5523dcaf     : ffff9401`328e0d00 ffff9401`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::FlushPagingBufferInternal+0x3f4
ffffba88`05e175a0 fffff807`5523c8ce     : 00000000`00000000 00000000`00000000 00000000`00000000 ffff9401`3bafad70 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1ff
ffffba88`05e176c0 fffff807`5525980e     : 00000000`00000002 00000000`00989680 ffff9401`283ff190 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x86e
ffffba88`05e17900 fffff807`552636c9     : ffff9401`283ff0c0 ffffa486`ee6d4001 ffffba88`05dc7000 00000000`03d2c500 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xe5e
ffffba88`05e17ae0 fffff807`46d46745     : ffffa486`ee6d4080 fffff807`552636c0 ffff9401`283ff0c0 000fa4ef`b59bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffba88`05e17b10 fffff807`46de5598     : ffff8000`02d60180 ffffa486`ee6d4080 fffff807`46d466f0 00000588`00000b10 : nt!PspSystemThreadStartup+0x55
ffffba88`05e17b60 00000000`00000000     : ffffba88`05e18000 ffffba88`05e11000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VidSchiInterlockedRemoveHeadListIfExist+7a

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.450

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  7a

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!VidSchiInterlockedRemoveHeadListIfExist

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {205f16eb-23f7-9cb6-6b18-dd9368af9984}

Followup:     MachineOwner
---------

5: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.0, DMIVersion 0, Size=4183]
BiosMajorRelease = 5
BiosMinorRelease = 12
BiosVendor = American Megatrends Inc.
BiosVersion = 1205
BiosReleaseDate = 05/11/2018
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = PRIME B250M-PLUS
BaseBoardVersion = Rev X.0x
 
Bellek testi sonucu yine hiçbir hataya rastlanmadı.
memtest 31.08.20.jpeg
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı