Bilgisizci
Hectopat
- Katılım
- 5 Ocak 2020
- Mesajlar
- 463
Daha fazla
- Cinsiyet
- Erkek
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff682ef46f450, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffff682ef46f3a8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6546
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 25760
Key : Analysis.Init.CPU.mSec
Value: 734
Key : Analysis.Init.Elapsed.mSec
Value: 24134
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 121421-6328-01.dmp
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: fffff682ef46f450
BUGCHECK_P3: fffff682ef46f3a8
BUGCHECK_P4: 0
TRAP_FRAME: fffff682ef46f450 -- (.trap 0xfffff682ef46f450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb90ecbc838a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80466a97f8c rsp=fffff682ef46f5e0 rbp=ffffb90ebb400000
r8=ffffb90ed0b5c4a0 r9=0000000000000000 r10=fffff804620d7910
r11=ffffbafcf4000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
ndis!ndisFreeNblToNPagedPool+0x7c:
fffff804`66a97f8c cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: fffff682ef46f3a8 -- (.exr 0xfffff682ef46f3a8)
ExceptionAddress: fffff80466a97f8c (ndis!ndisFreeNblToNPagedPool+0x000000000000007c)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
fffff682`ef46f128 fffff804`62209269 : 00000000`00000139 00000000`00000003 fffff682`ef46f450 fffff682`ef46f3a8 : nt!KeBugCheckEx
fffff682`ef46f130 fffff804`62209690 : ffffbafc`f4000000 ffff67f9`73cae81c 00000000`00000000 fffff804`726cf5f0 : nt!KiBugCheckDispatch+0x69
fffff682`ef46f270 fffff804`62207a23 : ffffb90e`bfbfd5f0 ffffb90e`bfbfd5f0 ffffb90e`be03606e 01b000b0`bfbfd5f0 : nt!KiFastFailDispatch+0xd0
fffff682`ef46f450 fffff804`66a97f8c : ffffb90e`bed31240 ffffb90e`cbc838c0 00000000`00000000 ffffb90e`cc522c80 : nt!KiRaiseSecurityCheckFailure+0x323
fffff682`ef46f5e0 fffff804`66a9542c : ffffb90e`bb413e78 fffff804`73e08762 00000000`00000000 ffffb90e`cbc838c0 : ndis!ndisFreeNblToNPagedPool+0x7c
fffff682`ef46f610 fffff804`74ce34b4 : ffffb90e`cbc838c0 ffffb90e`bb400000 00000000`00000000 00000000`00000000 : ndis!NdisFreeNetBufferList+0x11c
fffff682`ef46f650 fffff804`74cf7df7 : ffffb90e`cbc838c0 fffff682`ef46f750 fffff804`74f87000 ffffb90e`bb400000 : rtwlanu!WDI_FreeRxFrame+0x108
fffff682`ef46f690 fffff804`73e0c8b1 : ffffb90e`ce4fdbb0 00000000`00000000 00000000`00000000 ffffb90e`cbc838c0 : rtwlanu!N6UsbWdi_RxReturnFrames+0x4f
fffff682`ef46f6c0 fffff804`73e0c9fa : 00000000`00000000 00000000`00000000 ffffb90e`ce4fa000 00000000`00000001 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x5191
fffff682`ef46f6f0 fffff804`73e28443 : ffffb90e`c7ee2ba0 00000000`00000000 00000000`00000001 ffffb90e`bfafbb31 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x52da
fffff682`ef46f770 fffff804`73e2040d : 00000000`00000001 ffffb90e`cbc838c0 ffffb90e`00000001 ffffb90e`c9e51d00 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x20d23
fffff682`ef46f7e0 fffff804`66a97e25 : ffffb90e`ca3f21a0 fffff682`ef46f900 ffffb90e`cbc838c0 ffffb90e`cbc838c0 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x18ced
fffff682`ef46f830 fffff804`66a97fd2 : fffff804`66a97d60 fffff682`ef46f999 ffffb90e`ccb4af48 ffffb90e`ccb4af00 : ndis!ndisReturnNblWithPowerQueue+0xc5
fffff682`ef46f890 fffff804`66a94927 : 203b0aec`03754c44 dc1bdff1`92677e30 eefac807`a9048fcb 93fa8e15`1c554319 : ndis!ndisCallReceiveCompleteHandler+0x32
fffff682`ef46f8d0 fffff804`66da2d74 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000002 : ndis!NdisReturnNetBufferLists+0x557
fffff682`ef46fa00 fffff804`66c15b63 : 00000000`00000000 00000000`00000000 00001e00`00001e00 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd4
fffff682`ef46fa60 fffff804`66d68156 : ffffb90e`c77ce4b0 fffff682`ef46fb00 ffffb90e`c9cf69a0 ffffb90e`ba51a000 : NETIO!NetioDereferenceNetBufferListChain+0x103
fffff682`ef46fae0 fffff804`66d6763f : fffff804`66f29230 ffffb90e`ba4b58a0 ffffb90e`ba51a000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x2b6
fffff682`ef46fbe0 fffff804`66d6497c : ffffb90e`ce20c7e0 ffffb90e`c9cf69a0 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f
fffff682`ef46fd00 fffff804`66db29bf : ffffb90e`c9cf69a0 00000000`00000000 fffff682`ef46fdd1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc
fffff682`ef46fd30 fffff804`66db1fbc : 00000000`00000001 ffffb90e`c77ce400 fffff804`66da2ca0 fffff682`f24e581c : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f
fffff682`ef46fe30 fffff804`621fab7e : 00000000`00000000 00000000`00000000 fffff682`ef46ffd0 ffffb90e`cbe0d040 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c
fffff682`ef46ff80 fffff804`621fab3c : fffff682`ef46ffd0 ffffb90e`cbe0d040 fffff682`ef470000 fffff804`620f87bd : nt!KxSwitchKernelStackCallout+0x2e
fffff682`f24e5560 fffff804`620f87bd : fffff682`ef46ffd0 ffffb90e`cbe0d040 fffff682`f24e561a fffff682`f24e5600 : nt!KiSwitchKernelStackContinue
fffff682`f24e5580 fffff804`620f85b2 : fffff804`66db1e40 fffff682`f24e5838 fffff682`00000002 00000020`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d
fffff682`f24e5620 fffff804`620f8413 : ffffb90e`ba4ff180 00000000`00000002 fffff682`00000002 fffff682`f24e5838 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2
fffff682`f24e5690 fffff804`620f83cd : fffff804`66db1e40 fffff682`f24e5838 ffffb90e`b7c88aa0 00001f80`00000200 : nt!KeExpandKernelStackAndCalloutInternal+0x33
fffff682`f24e5700 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d
SYMBOL_NAME: rtwlanu!WDI_FreeRxFrame+108
MODULE_NAME: rtwlanu
IMAGE_NAME: rtwlanu.sys
IMAGE_VERSION: 1030.6.1201.2015
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 108
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_rtwlanu!WDI_FreeRxFrame
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {89d98928-9344-dcc9-8a8c-7f619e696aac}
Followup: MachineOwner
Ağ sürücünüzü güncelleyip test eder misiniz?
Gerekli driver: https://dlcdnets.asus.com/pub/ASUS/...k_LAN_Driver_V10.42.526.2020_WIN10_64-bit.zip
Bir de sisteminizde harici bir kablosuz ağ ürünü kullanıyor musunuz?
Kod:KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption. could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffff682ef46f450, Address of the trap frame for the exception that caused the BugCheck. Arg3: fffff682ef46f3a8, Address of the exception record for the exception that caused the BugCheck. Arg4: 0000000000000000, Reserved. Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6546. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 25760. Key : Analysis.Init.CPU.mSec Value: 734. Key : Analysis.Init.Elapsed.mSec Value: 24134. Key : Analysis.Memory.CommitPeak.Mb Value: 93. Key : FailFast.Name Value: CORRUPT_LIST_ENTRY. Key : FailFast.Type Value: 3 Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 121421-6328-01.dmp BUGCHECK_CODE: 139. BUGCHECK_P1: 3 BUGCHECK_P2: fffff682ef46f450. BUGCHECK_P3: fffff682ef46f3a8. BUGCHECK_P4: 0 TRAP_FRAME: fffff682ef46f450 -- (.trap 0xfffff682ef46f450) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000003 rdx=ffffb90ecbc838a8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80466a97f8c rsp=fffff682ef46f5e0 rbp=ffffb90ebb400000 r8=ffffb90ed0b5c4a0 r9=0000000000000000 r10=fffff804620d7910 r11=ffffbafcf4000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac pe cy. ndis!ndisFreeNblToNPagedPool+0x7c: fffff804`66a97f8c cd29 int 29h. Resetting default scope. EXCEPTION_RECORD: fffff682ef46f3a8 -- (.exr 0xfffff682ef46f3a8) ExceptionAddress: fffff80466a97f8c (ndis!ndisFreeNblToNPagedPool+0x000000000000007c) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001. NumberParameters: 1 Parameter[0]: 0000000000000003. Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir. EXCEPTION_CODE_STR: c0000409. EXCEPTION_PARAMETER1: 0000000000000003. EXCEPTION_STR: 0xc0000409. STACK_TEXT: fffff682`ef46f128 fffff804`62209269 : 00000000`00000139 00000000`00000003 fffff682`ef46f450 fffff682`ef46f3a8 : nt!KeBugCheckEx fffff682`ef46f130 fffff804`62209690 : ffffbafc`f4000000 ffff67f9`73cae81c 00000000`00000000 fffff804`726cf5f0 : nt!KiBugCheckDispatch+0x69 fffff682`ef46f270 fffff804`62207a23 : ffffb90e`bfbfd5f0 ffffb90e`bfbfd5f0 ffffb90e`be03606e 01b000b0`bfbfd5f0 : nt!KiFastFailDispatch+0xd0 fffff682`ef46f450 fffff804`66a97f8c : ffffb90e`bed31240 ffffb90e`cbc838c0 00000000`00000000 ffffb90e`cc522c80 : nt!KiRaiseSecurityCheckFailure+0x323 fffff682`ef46f5e0 fffff804`66a9542c : ffffb90e`bb413e78 fffff804`73e08762 00000000`00000000 ffffb90e`cbc838c0 : ndis!ndisFreeNblToNPagedPool+0x7c fffff682`ef46f610 fffff804`74ce34b4 : ffffb90e`cbc838c0 ffffb90e`bb400000 00000000`00000000 00000000`00000000 : ndis!NdisFreeNetBufferList+0x11c fffff682`ef46f650 fffff804`74cf7df7 : ffffb90e`cbc838c0 fffff682`ef46f750 fffff804`74f87000 ffffb90e`bb400000 : rtwlanu!WDI_FreeRxFrame+0x108 fffff682`ef46f690 fffff804`73e0c8b1 : ffffb90e`ce4fdbb0 00000000`00000000 00000000`00000000 ffffb90e`cbc838c0 : rtwlanu!N6UsbWdi_RxReturnFrames+0x4f fffff682`ef46f6c0 fffff804`73e0c9fa : 00000000`00000000 00000000`00000000 ffffb90e`ce4fa000 00000000`00000001 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x5191 fffff682`ef46f6f0 fffff804`73e28443 : ffffb90e`c7ee2ba0 00000000`00000000 00000000`00000001 ffffb90e`bfafbb31 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x52da fffff682`ef46f770 fffff804`73e2040d : 00000000`00000001 ffffb90e`cbc838c0 ffffb90e`00000001 ffffb90e`c9e51d00 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x20d23 fffff682`ef46f7e0 fffff804`66a97e25 : ffffb90e`ca3f21a0 fffff682`ef46f900 ffffb90e`cbc838c0 ffffb90e`cbc838c0 : wdiwifi!Wdi_NdisMIndicateStatusEx+0x18ced fffff682`ef46f830 fffff804`66a97fd2 : fffff804`66a97d60 fffff682`ef46f999 ffffb90e`ccb4af48 ffffb90e`ccb4af00 : ndis!ndisReturnNblWithPowerQueue+0xc5 fffff682`ef46f890 fffff804`66a94927 : 203b0aec`03754c44 dc1bdff1`92677e30 eefac807`a9048fcb 93fa8e15`1c554319 : ndis!ndisCallReceiveCompleteHandler+0x32 fffff682`ef46f8d0 fffff804`66da2d74 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000002 : ndis!NdisReturnNetBufferLists+0x557 fffff682`ef46fa00 fffff804`66c15b63 : 00000000`00000000 00000000`00000000 00001e00`00001e00 00000000`00000000 : tcpip!FlpReturnNetBufferListChain+0xd4 fffff682`ef46fa60 fffff804`66d68156 : ffffb90e`c77ce4b0 fffff682`ef46fb00 ffffb90e`c9cf69a0 ffffb90e`ba51a000 : NETIO!NetioDereferenceNetBufferListChain+0x103 fffff682`ef46fae0 fffff804`66d6763f : fffff804`66f29230 ffffb90e`ba4b58a0 ffffb90e`ba51a000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x2b6 fffff682`ef46fbe0 fffff804`66d6497c : ffffb90e`ce20c7e0 ffffb90e`c9cf69a0 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f fffff682`ef46fd00 fffff804`66db29bf : ffffb90e`c9cf69a0 00000000`00000000 fffff682`ef46fdd1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc fffff682`ef46fd30 fffff804`66db1fbc : 00000000`00000001 ffffb90e`c77ce400 fffff804`66da2ca0 fffff682`f24e581c : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f fffff682`ef46fe30 fffff804`621fab7e : 00000000`00000000 00000000`00000000 fffff682`ef46ffd0 ffffb90e`cbe0d040 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c fffff682`ef46ff80 fffff804`621fab3c : fffff682`ef46ffd0 ffffb90e`cbe0d040 fffff682`ef470000 fffff804`620f87bd : nt!KxSwitchKernelStackCallout+0x2e fffff682`f24e5560 fffff804`620f87bd : fffff682`ef46ffd0 ffffb90e`cbe0d040 fffff682`f24e561a fffff682`f24e5600 : nt!KiSwitchKernelStackContinue fffff682`f24e5580 fffff804`620f85b2 : fffff804`66db1e40 fffff682`f24e5838 fffff682`00000002 00000020`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d fffff682`f24e5620 fffff804`620f8413 : ffffb90e`ba4ff180 00000000`00000002 fffff682`00000002 fffff682`f24e5838 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2 fffff682`f24e5690 fffff804`620f83cd : fffff804`66db1e40 fffff682`f24e5838 ffffb90e`b7c88aa0 00001f80`00000200 : nt!KeExpandKernelStackAndCalloutInternal+0x33 fffff682`f24e5700 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d SYMBOL_NAME: rtwlanu!WDI_FreeRxFrame+108 MODULE_NAME: rtwlanu. IMAGE_NAME: rtwlanu.sys IMAGE_VERSION: 1030.6.1201.2015 STACK_COMMAND: .cxr; .ecxr ; kb. BUCKET_ID_FUNC_OFFSET: 108. FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_rtwlanu!WDI_FreeRxFrame OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {89d98928-9344-dcc9-8a8c-7f619e696aac} Followup: MachineOwner
Harici bir kablosuz ürün kullanıyorum.
2 senedir kullanmaktayım ancak Türkçe sitesinde bir driverı olduğu belirtilmemiş önceden de sıkıntıları vardı o yüzden araştırıp böyle bir driver yüklemiştim ve iyileşmişti. Onda bir sıkıntı olabilir büyük ihtimalle.
MW150US | N150 Wireless Nano USB Adaptör - Mercusys'e Hoş Geldiniz
www.mercusys.com
Download for MW150US - Bienvenido a MERCUSYS
Download for Adaptador USB Nano Inalámbrico N150www.mercusys.com.mx
Kendi sitesinden alıntıladığım rehberi takip ederek driverini güncellemeyi dener misiniz?
Link: How to Manually Install Adapters on Windows 10? - Welcome to MERCUSYS
Rica etsem benimle o ürünün donanım kimliğini paylaşabilir misiniz? Bir de ürünün resmi sitesinde ürün ile birlikte CD gönderildiği yazıyor. Elinizde mevcut mu bu CD?Herhangi bir .inf dosyası bulamadım.
Rica etsem benimle o ürünün donanım kimliğini paylaşabilir misiniz? Bir de ürünün resmi sitesinde ürün ile birlikte CD gönderildiği yazıyor. Elinizde mevcut mu bu CD?
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.