Çözüldü KERNEL_SECURITY_CHECK_FAILURE mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
Durum
Mesaj gönderimine kapalı.

mrgokirmak

Centipat
Katılım
25 Mart 2020
Mesajlar
8
Öncelikle selamlar, sistemime yeni format atmış olmama rağmen sürekli çeşitli kodlar altında mavi ekran hatası alıyorum (kernel gibi). Bu konuda yardımcı olabilir misiniz acaba? donanımsal mı yazılımsal bir problem mi, çözemedim.

Minidump klasör linki: dumps.zip.zip
 
Son düzenleyen: Moderatör:
Çözüm
Belleği diğer yuvaya tak aynı Memtest86 testine sok, kırmızı hatalar gözükür ise bellek arızalıdır.
Realtek ağ sürücüsünü kaldır ve tekrar yükle.

Bellek nedenli de olabilir Memtest86 testi yapar mısın?
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.


Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff50d3e28b690, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff50d3e28b5e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: fffff50d3e28b690

BUGCHECK_P3: fffff50d3e28b5e8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff50d3e28b690 -- (.trap 0xfffff50d3e28b690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff838dacf3c768 rbx=0000000000000000 rcx=0000000000000003
rdx=fffff8042469a180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80428680327 rsp=fffff50d3e28b820 rbp=ffff838dacf3c760
r8=0000000000000000  r9=0000000000000008 r10=0000fffff804286d
r11=fffff50d3e28b3d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiProcessThreadWaitList+0xd7:
fffff804`28680327 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff50d3e28b5e8 -- (.exr 0xfffff50d3e28b5e8)
ExceptionAddress: fffff80428680327 (nt!KiProcessThreadWaitList+0x00000000000000d7)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-25-2020 22:37:24.0726

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff804287af729 to fffff8042879d860

STACK_TEXT:
fffff50d`3e28b368 fffff804`287af729 : 00000000`00000139 00000000`00000003 fffff50d`3e28b690 fffff50d`3e28b5e8 : nt!KeBugCheckEx
fffff50d`3e28b370 fffff804`287afb50 : 00000000`00000006 00000001`00000000 00000000`00000000 fffff50d`3e28b5d0 : nt!KiBugCheckDispatch+0x69
fffff50d`3e28b4b0 fffff804`287adee3 : 00000000`00000000 fffff804`28682225 00000000`00000008 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff50d`3e28b690 fffff804`28680327 : ffff838d`00000000 00000000`00000000 ffff838d`9e7771f0 00000000`00000080 : nt!KiRaiseSecurityCheckFailure+0x323
fffff50d`3e28b820 fffff804`28661ae0 : ffff838d`9e0a1d88 fffff50d`3e28b8f9 00000000`0000000d 00000000`00000002 : nt!KiProcessThreadWaitList+0xd7
fffff50d`3e28b870 fffff804`28662717 : ffff838d`a6a91330 00000000`00000000 ffff838d`00000019 ffff838d`9e176248 : nt!KiProcessExpiredTimerList+0x224
fffff50d`3e28b960 fffff804`286624dc : ffffd801`3d5c0180 00000000`00000019 ffffd801`0000b801 00000000`0000001a : nt!KiExpireTimerTable+0x1a7
fffff50d`3e28ba20 fffff804`2868309d : ffffd801`3d5c0180 fffff780`00000014 fffff50d`00000000 ffffd801`3d5c0180 : nt!KiTimerExpiration+0x134
fffff50d`3e28bae0 fffff804`287a13ce : ffffffff`00000000 ffffd801`3d5c0180 00000000`00000000 ffffd801`3d5cb340 : nt!KiRetireDpcList+0x1bd
fffff50d`3e28bc60 00000000`00000000 : fffff50d`3e28c000 fffff50d`3e286000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


THREAD_SHA1_HASH_MOD_FUNC:  bf3dd0663a9cf95cff33ce5a7fe35cd674e57065

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  92bead3ecc6004081c66e59d97e1eff419aaaa7f

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+224
fffff804`28661ae0 e9b2feffff      jmp     nt!KiProcessExpiredTimerList+0xdb (fffff804`28661997)

FAULT_INSTR_CODE:  fffeb2e9

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  nt!KiProcessExpiredTimerList+224

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b2da5bb

IMAGE_VERSION:  10.0.19041.84

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  224

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

TARGET_TIME:  2020-03-25T19:19:42.000Z

OSBUILD:  19041

OSSERVICEPACK:  84

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2009-12-20 07:19:07

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  4592

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist

FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}

Followup:     MachineOwner
---------
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff8015a269690, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8015a2695e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: fffff8015a269690

BUGCHECK_P3: fffff8015a2695e8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff8015a269690 -- (.trap 0xfffff8015a269690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff82015daa9868 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffdc0088ede180 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80154a80327 rsp=fffff8015a269820 rbp=ffff82015daa9860
r8=0000000000000000  r9=0000000000000008 r10=0000fffff80154ad
r11=fffff8015a2693d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiProcessThreadWaitList+0xd7:
fffff801`54a80327 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff8015a2695e8 -- (.exr 0xfffff8015a2695e8)
ExceptionAddress: fffff80154a80327 (nt!KiProcessThreadWaitList+0x00000000000000d7)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-25-2020 22:37:22.0543

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80154baf729 to fffff80154b9d860

STACK_TEXT:
fffff801`5a269368 fffff801`54baf729 : 00000000`00000139 00000000`00000003 fffff801`5a269690 fffff801`5a2695e8 : nt!KeBugCheckEx
fffff801`5a269370 fffff801`54bafb50 : 00000000`00000006 00000001`00000001 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff801`5a2694b0 fffff801`54badee3 : 00000000`00000000 fffff801`54a82225 00000000`00000002 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff801`5a269690 fffff801`54a80327 : ffff8201`00000000 00000000`00000000 ffff8201`5f9df1f0 00000000`00000080 : nt!KiRaiseSecurityCheckFailure+0x323
fffff801`5a269820 fffff801`54a61ae0 : ffff8201`5b7c7568 fffff801`5a2698f9 00000000`00000009 00000000`00000002 : nt!KiProcessThreadWaitList+0xd7
fffff801`5a269870 fffff801`54a62717 : ffff8201`53320330 00000000`00000000 ffff8201`0000001f ffff8201`6229d6c0 : nt!KiProcessExpiredTimerList+0x224
fffff801`5a269960 fffff801`54a624dc : fffff801`524bf180 00000000`00000037 fffff801`0001ac1f 00000000`0000001a : nt!KiExpireTimerTable+0x1a7
fffff801`5a269a20 fffff801`54a8309d : fffff801`524bf180 fffff780`00000014 fffff801`00000000 fffff801`524bf180 : nt!KiTimerExpiration+0x134
fffff801`5a269ae0 fffff801`54ba13ce : 00000000`00000000 fffff801`524bf180 00000000`001a6550 fffff801`55527600 : nt!KiRetireDpcList+0x1bd
fffff801`5a269c60 00000000`00000000 : fffff801`5a26a000 fffff801`5a264000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


THREAD_SHA1_HASH_MOD_FUNC:  bf3dd0663a9cf95cff33ce5a7fe35cd674e57065

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  92bead3ecc6004081c66e59d97e1eff419aaaa7f

THREAD_SHA1_HASH_MOD:  bc100a5647b828107ac4e18055e00abcbe1ec406

FOLLOWUP_IP:
nt!KiProcessExpiredTimerList+224
fffff801`54a61ae0 e9b2feffff      jmp     nt!KiProcessExpiredTimerList+0xdb (fffff801`54a61997)

FAULT_INSTR_CODE:  fffeb2e9

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  nt!KiProcessExpiredTimerList+224

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b2da5bb

IMAGE_VERSION:  10.0.19041.84

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  224

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiProcessExpiredTimerList

TARGET_TIME:  2020-03-25T18:51:13.000Z

OSBUILD:  19041

OSSERVICEPACK:  84

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2009-12-20 07:19:07

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  db19

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_ktimer_list_corruption_nt!kiprocessexpiredtimerlist

FAILURE_ID_HASH:  {9db7945b-255d-24a1-9f2c-82344e883ab8}

Followup:     MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8062d095da7, The address that the exception occurred at
Arg3: ffffee06ac9e45e8, Parameter 0 of the exception
Arg4: ffffb101912fe920, Parameter 1 of the exception

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for rt640x64.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  19041.1.amd64fre.vb_release.191206-1406

DUMP_TYPE:  2

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff8062d095da7

BUGCHECK_P3: ffffee06ac9e45e8

BUGCHECK_P4: ffffb101912fe920

WRITE_ADDRESS: fffff8062dafb388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
ffffb101912fe920

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP:
nt!RtlpHpVsFreeChunkInsert+eb
fffff806`2d095da7 8b08            mov     ecx,dword ptr [rax]

EXCEPTION_PARAMETER1:  ffffee06ac9e45e8

EXCEPTION_PARAMETER2:  ffffb101912fe920

BUGCHECK_STR:  0x1E_c0000005

CPU_COUNT: c

CPU_MHZ: d42

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-25-2020 22:37:27.0826

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

EXCEPTION_RECORD:  a100a0e8a0e0a0d0 -- (.exr 0xa100a0e8a0e0a0d0)
Cannot read Exception record @ a100a0e8a0e0a0d0

TRAP_FRAME:  a178a170a160a148 -- (.trap 0xa178a170a160a148)
Unable to read trap frame at a178a170`a160a148

BAD_STACK_POINTER:  ffffb101912fe098

LAST_CONTROL_TRANSFER:  from fffff8062d2a96cf to fffff8062d19d860

STACK_TEXT:
ffffb101`912fe098 fffff806`2d2a96cf : 00000000`0000001e ffffffff`c0000005 fffff806`2d095da7 ffffee06`ac9e45e8 : nt!KeBugCheckEx
ffffb101`912fe0a0 fffff806`2d1b67ac : ffffee06`ac9e50c0 fffff806`2d0f1b75 ffffee06`ac9e4820 ffffb101`912fe700 : nt!KiFatalFilter+0x1f
ffffb101`912fe0e0 fffff806`2d179152 : ffffee06`00000002 00000000`00000000 ffffee06`ac9e0000 ffffee06`ac9e6000 : nt!KeExpandKernelStackAndCalloutInternal$filt$0+0x16
ffffb101`912fe120 fffff806`2d1a6722 : 00000000`00000000 ffffb101`912fe700 ffffee06`ac9e50c0 00000000`00000000 : nt!_C_specific_handler+0xa2
ffffb101`912fe190 fffff806`2d0485d0 : 00000000`00000000 ffffb101`912fe700 ffffee06`ac9e50c0 a460a458`a450a448 : nt!RtlpExecuteHandlerForException+0x12
ffffb101`912fe1c0 fffff806`2d0ccdd6 : ffffee06`ac9e45e8 ffffb101`912fee20 ffffee06`ac9e45e8 00000000`00000000 : nt!RtlDispatchException+0x280
ffffb101`912fe8f0 fffff806`2d19e6f2 : a100a0e8`a0e0a0d0 a140a130`a118a110 a178a170`a160a148 a1c0a1a8`a1a0a190 : nt!KiDispatchException+0x186
ffffb101`912fefb0 fffff806`2d19e6c0 : fffff806`2d1af865 00000000`00000000 fffff806`2fd31fce 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffee06`ac9e44a8 fffff806`2d1af865 : 00000000`00000000 fffff806`2fd31fce 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffee06`ac9e44b0 fffff806`2d1ab5a0 : 00000000`00000000 ffffee06`ac9e4968 00000000`00000002 fffff806`2d007939 : nt!KiExceptionDispatch+0x125
ffffee06`ac9e4690 fffff806`2d095da7 : ffffde0a`33010280 ffffde0a`42803e20 00000000`00000000 00000000`00000001 : nt!KiGeneralProtectionFault+0x320
ffffee06`ac9e4820 fffff806`2d095c6e : 0000005e`00000000 ffffde0a`42802000 00000000`00000000 ffffde0a`42803e20 : nt!RtlpHpVsFreeChunkInsert+0xeb
ffffee06`ac9e4850 fffff806`2d095296 : 00000000`00000000 00000000`0000007a 00000000`ffffde0a ffffde0a`33010280 : nt!RtlpHpVsChunkFree+0xaa
ffffee06`ac9e48a0 fffff806`2d0951ab : ffffde0a`33010280 00000000`00000000 00000000`00000000 ffffee06`ac9e4a00 : nt!RtlpHpVsContextFreeInternal+0xb6
ffffee06`ac9e48f0 fffff806`2d092f9e : ffffde0a`425e8ff0 00000000`00000005 ffffde0a`33010280 fffff806`2d069620 : nt!RtlpHpVsContextFreeList+0x5b
ffffee06`ac9e4950 fffff806`2d069643 : ffffde0a`33010100 ffffde0a`427ba000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0xd6
ffffee06`ac9e49a0 fffff806`2d069554 : 00000000`00000000 00000000`00000000 ffffde0a`427ba010 fffff806`000005d0 : nt!RtlpHpSegFree+0x83
ffffee06`ac9e49e0 fffff806`2d068b65 : ffffde0a`427ba000 ffffee06`ac9e4a90 00000000`00044fd0 00000000`000005c0 : nt!RtlpHpFreeHeap+0xa8
ffffee06`ac9e4a30 fffff806`2d734019 : ffffde0a`41d6e480 00000000`00000000 00000000`00000000 00000000`42526354 : nt!ExFreeHeapPool+0x179
ffffee06`ac9e4ad0 fffff806`2fd57263 : ffffde0a`4028da40 00000000`00000001 00000000`00000000 00000000`00000001 : nt!ExFreePool+0x9
ffffee06`ac9e4b00 fffff806`2fbe5af3 : 00000000`00000000 00000000`00000002 00000000`00000001 00000000`00000000 : tcpip!TcpTcbReassemblyFreeNetBufferList+0x63
ffffee06`ac9e4b30 fffff806`2fd2ee12 : 00000000`00000000 00000000`00989601 ffffde0a`4028d8c0 00000000`00000100 : NETIO!NetioDereferenceNetBufferListChain+0x103
ffffee06`ac9e4bb0 fffff806`2fd2d7ce : ffffde0a`36bfd370 ffffde0a`3f0f1040 ffffde0a`00000004 00000000`00000000 : tcpip!TcpReceive+0x442
ffffee06`ac9e4ca0 fffff806`2fd53d69 : 00000000`00000000 ffffde0a`3bf42780 ffffde0a`37dd0601 00000000`00000000 : tcpip!TcpNlClientReceivePreValidatedDatagrams+0x2e
ffffee06`ac9e4ce0 fffff806`2fd6685e : ffffde0a`3b7fa140 ffffde0a`385c9720 00000000`00040206 fffff806`2d084200 : tcpip!IpFlcReceivePreValidatedPackets+0x6b9
ffffee06`ac9e4f70 fffff806`2d09bba7 : ffffde0a`377f85f0 ffffee06`ac9e5268 ffffde0a`372ee040 00000000`00000002 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x12e
ffffee06`ac9e50c0 fffff806`2d09bb1d : fffff806`2fd66730 ffffee06`ac9e5268 ffffde0a`377f85f0 fffff806`2fbe23af : nt!KeExpandKernelStackAndCalloutInternal+0x77
ffffee06`ac9e5130 fffff806`2fd5888d : ffffee06`00000004 ffffee06`ac9e5102 ffffde0a`4193fe20 fffff806`2ffe142f : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffffee06`ac9e5170 fffff806`2fd57f6d : 00000000`00000001 ffffee06`ac9e52d0 ffffde0a`385c9720 ffffee06`ac9e52e0 : tcpip!NetioExpandKernelStackAndCallout+0x8d
ffffee06`ac9e51d0 fffff806`2fa71eb0 : ffffde0a`382fb481 00000000`00000001 ffffde0a`3c1f41f0 ffffee06`ac9e55e0 : tcpip!FlReceiveNetBufferListChain+0x46d
ffffee06`ac9e5480 fffff806`2fa71ccb : ffffde0a`3c2023b0 fffff806`00000001 ffffee06`00000000 ffffee06`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x140
ffffee06`ac9e5560 fffff806`2fa77ef0 : ffffde0a`386ea1a0 ffffde0a`3bf65c01 ffffde0a`386ea1a0 00000000`00000001 : ndis!ndisMTopReceiveNetBufferLists+0x22b
ffffee06`ac9e55e0 fffff806`2faadcf3 : ffffde0a`3bf65c60 ffffee06`ac9e56b1 00000000`00000000 00000000`00000202 : ndis!ndisCallReceiveHandler+0x60
ffffee06`ac9e5630 fffff806`2fa74a94 : 00000000`00000b41 00000000`00000001 ffffde0a`386ea1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x1df
ffffee06`ac9e5700 fffff806`39e58017 : fffff806`2efb2b30 fffff806`2efb2b30 ffffee06`ac9e5890 00000000`00000000 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffffee06`ac9e5790 fffff806`2efb2b2f : fffff806`2efb2b30 ffffee06`ac9e5890 00000000`00000000 ffffde0a`00000001 : rt640x64+0x28017
ffffee06`ac9e5798 fffff806`2efb2b2f : ffffee06`ac9e5890 00000000`00000000 ffffde0a`00000001 fffff806`2d1a4d93 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffffee06`ac9e57a0 ffffee06`ac9e5890 : 00000000`00000000 ffffde0a`00000001 fffff806`2d1a4d93 00000002`912d0001 : Wdf01000!imp_WdfSpinLockAcquire+0xbf
ffffee06`ac9e57a8 00000000`00000000 : ffffde0a`00000001 fffff806`2d1a4d93 00000002`912d0001 80000000`00000001 : 0xffffee06`ac9e5890


THREAD_SHA1_HASH_MOD_FUNC:  9366a2762fc1668c450fe259c6bbf233d7a3e9b3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  592178274dcd0539081be3b72c436b5265e12022

THREAD_SHA1_HASH_MOD:  45983810096273aebf2b55536114b0ccc7b45860

FOLLOWUP_IP:
nt!ExFreePool+9
fffff806`2d734019 4883c428        add     rsp,28h

FAULT_INSTR_CODE:  28c48348

SYMBOL_STACK_INDEX:  13

SYMBOL_NAME:  nt!ExFreePool+9

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.19041.84

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_nt!ExFreePool

BUCKET_ID:  0x1E_c0000005_STACKPTR_ERROR_nt!ExFreePool

PRIMARY_PROBLEM_CLASS:  0x1E_c0000005_STACKPTR_ERROR_nt!ExFreePool

TARGET_TIME:  2020-03-25T19:20:53.000Z

OSBUILD:  19041

OSSERVICEPACK:  84

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  2009-12-20 07:19:07

BUILDDATESTAMP_STR:  191206-1406

BUILDLAB_STR:  vb_release

BUILDOSVER_STR:  10.0.19041.1.amd64fre.vb_release.191206-1406

ANALYSIS_SESSION_ELAPSED_TIME:  26427

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_stackptr_error_nt!exfreepool

FAILURE_ID_HASH:  {bf73f4aa-d0f4-ff68-472b-5166c586b255}

Followup:     Pool_corruption
---------
 
Test edip sonucu paylaşacağım hemen.
@MayCrasH Realtek ağ sürücüsü hangisi acaba.
 

Dosya Ekleri

  • asdasdasdasdas.png
    asdasdasdasdas.png
    16,5 KB · Görüntüleme: 40
Son düzenleme:
Durum
Mesaj gönderimine kapalı.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı