KERNEL_SECURITY_CHECK_FAILURE Mavi ekran hatası

cardepare

Centipat
Katılım
5 Mayıs 2020
Mesajlar
19
PC ben yeni topladım.

  • B450M-A PRO Max
  • 1050 Ti ekran kartı
  • G.Skill Sniper X DDR4 3000MHz CL16 2x8GB
  • 3600X işlemci aldım

3-4 gün geçiyor sonra ara ara mavi ekran hatası alıyorum ve bunun nedenini anlamıyorum. PC'den de anlamam. Oturduğum bölgede de doğru düzgün PC yok ve bunları toplama aldığım için ne yapacağımı da bilemiyorum. Bana yardımcı olabilecek biri var mı acaba? İnternette dolaşırken bir anda mavi ekran hatası alıyorum. CoD'u okutuyorum telefona ama bir şey açıklamıyor.

 
Son düzenleyen: Moderatör:
CSGO içindeki "cdd.dll" klasöründen dolayı mavi ekran yemişsin ikisinde de, bu dosyayı silip buradan indirip dosyaları değiştirebilirsin. Eski dosyayı mutlaka kaydet.

Yönetim: DLL sitesine verilen link silindi.
 
Son düzenleyen: Moderatör:
Öncelikle teşekkür ederim. Ama bilgisayardan pek anlamıyorum attığınız sitede 32 Bit diyor benim 64 Bit bulamadım ayrıca System32 Bit atarken yönetici olmanız gerekmektedir diyor yapamıyorum yardımcı olur musunuz?

CS:GO içindeki "cdd.dll" klasöründen dolayı mavi ekran yemişsin ikisinde de, bu dosyayı silip buradan indirip dosyaları değiştirebilirsin. Eski dosyayı mutlaka kaydet.

Ayrıca CS:GO içinde bir ''cdd.dll" dosyası göremedim bulamadım :/
Onarım yaptım ancak sistem onarma moduna girdi.


Yunus bey buralarda mısınız acaba?
 
Son düzenleyen: Moderatör:
İlk aldığın hatalar RAM kaynaklı olabilir ama son iki aldığın hata CDD.DLL kaynaklı. Bu dosya da Canonical Display Driver. Windows sürümün 10.0.19041.443. Bu sürüm eski. 10.0.19041.450 sürümüne güncelle.

Ayrıca ekran kartı sürücü sürümünü de belirt.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffee880548b0e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffee880548b038, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7750

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10124

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffee880548b0e0

BUGCHECK_P3: ffffee880548b038

BUGCHECK_P4: 0

TRAP_FRAME:  ffffee880548b0e0 -- (.trap 0xffffee880548b0e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8927447f35f8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8f85337a6670 rsi=0000000000000000 rdi=0000000000000000
rip=ffff89548015721c rsp=ffffee880548b270 rbp=ffffee880548b2e9
 r8=ffffee880548b258  r9=0000000000000000 r10=fffff80520b1fc60
r11=ffffb9fc46400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
cdd!CddBitmap::RemoveFromCddBitmapList+0x80:
ffff8954`8015721c cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffee880548b038 -- (.exr 0xffffee880548b038)
ExceptionAddress: ffff89548015721c (cdd!CddBitmap::RemoveFromCddBitmapList+0x0000000000000080)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csgo.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffee88`0548adb8 fffff805`20befe29     : 00000000`00000139 00000000`00000003 ffffee88`0548b0e0 ffffee88`0548b038 : nt!KeBugCheckEx
ffffee88`0548adc0 fffff805`20bf0250     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffee88`0548af00 fffff805`20bee5e3     : ffffee88`0548b0f8 ffff8f85`32d69080 ffffee88`0548b250 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffee88`0548b0e0 ffff8954`8015721c     : ffff8927`447f3570 00000000`00000000 ffff8927`44cddb00 fffff805`20b16eca : nt!KiRaiseSecurityCheckFailure+0x323
ffffee88`0548b270 ffff8954`801575f2     : ffff8927`447f3570 ffff8927`447df000 fffff805`20b16eb0 ffff8954`7fa2f770 : cdd!CddBitmap::RemoveFromCddBitmapList+0x80
ffffee88`0548b2a0 ffff8954`8015f84d     : 00000000`050508c1 ffff8927`447f3570 00000000`00000003 00000000`00000003 : cdd!CddBitmapHw::Release+0x72
ffffee88`0548b350 ffff8954`7fa422e8     : ffff8927`40911000 ffff8927`44cddb00 00000000`00000001 ffff8927`000008c1 : cdd!DrvDeleteDeviceBitmapEx+0x7d
ffffee88`0548b380 ffff8954`7fa435fc     : ffffee88`00000000 00000000`00000003 00000000`00000000 ffffee88`00000001 : win32kbase!SURFACE::bDeleteSurface+0x738
ffffee88`0548b550 ffff8954`7fad569d     : 00000000`050508c1 ffffee88`0548b610 00000000`00000002 ffff8954`00000000 : win32kbase!SURFREF::bDeleteSurface+0x14
ffffee88`0548b580 ffff8954`7fa4d86f     : 00000000`00000000 ffff8927`44cddb00 00000000`00000000 ffff8927`40a0d218 : win32kbase!vGarbageCollectObject<SURFREF>+0x9d
ffffee88`0548b5e0 ffff8954`7fa4d31d     : 00000000`00002918 ffff8f85`342d1005 00000000`050508c1 ffff8954`7fa84c52 : win32kbase!NtGdiCloseProcess+0x1d3
ffffee88`0548b650 ffff8954`7fd1c817     : ffff8927`44fcf0a0 ffff8954`7fdd2d51 ffff8927`44fcf0a0 00000000`00000001 : win32kbase!GdiProcessCallout+0x6d
ffffee88`0548b6d0 ffff8954`7fa77be8     : 00000000`00000000 00000000`c000001c ffffee88`0548ba38 fffff805`20a25bdb : win32kfull!W32pProcessCallout+0x107
ffffee88`0548b710 ffff8954`802c10d0     : 00000000`c000001c ffffee88`0548b9d0 00000000`00000000 ffffee88`0548ba38 : win32kbase!W32CalloutDispatch+0x488
ffffee88`0548b920 fffff805`20e62d05     : 00000000`00000000 fffff805`2141deb0 ffff8f85`24e1a3a0 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffffee88`0548b960 fffff805`20de9174     : ffff8f85`2af21cf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffffee88`0548b990 fffff805`20e4f8de     : ffff8f85`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x598
ffffee88`0548ba90 fffff805`20bef878     : ffff8f85`342d1080 ffff8f85`32d69080 ffffee88`0548bb80 ffff8f85`342d1080 : nt!NtTerminateProcess+0xde
ffffee88`0548bb00 00000000`76e71cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`00d6edd8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e71cfc


SYMBOL_NAME:  cdd!CddBitmap::RemoveFromCddBitmapList+80

MODULE_NAME: cdd

IMAGE_NAME:  cdd.dll

IMAGE_VERSION:  10.0.19041.443

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  80

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_cdd!CddBitmap::RemoveFromCddBitmapList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a1c0d964-903d-625e-6a5d-948bd2e59450}

Followup:     MachineOwner
---------

0: kd> lmvm cdd
Browse full module list
start             end                 module name
ffff8954`80150000 ffff8954`80198000   cdd      # (pdb symbols)          C:\ProgramData\Dbg\sym\cdd.pdb\8F5D845C77058271319682526AEF22DF1\cdd.pdb
    Loaded symbol image file: cdd.dll
    Mapped memory image file: C:\ProgramData\Dbg\sym\cdd.dll\5788914948000\cdd.dll
    Image path: \SystemRoot\System32\cdd.dll
    Image name: cdd.dll
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        57889149 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         0004AAC2
    ImageSize:        00048000
    File version:     10.0.19041.443
    Product version:  10.0.19041.443
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.4 Driver
    File date:        00000000.00000000
    Translations:     0000.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     cdd.dll
        OriginalFilename: cdd.dll
        ProductVersion:   10.0.19041.443
        FileVersion:      10.0.19041.443 (WinBuild.160101.0800)
        FileDescription:  Canonical Display Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
0: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.1, DMIVersion 0, Size=2467]
BiosMajorRelease = 5
BiosMinorRelease = 13
BiosVendor = American Megatrends Inc.
BiosVersion = 2202
BiosReleaseDate = 07/14/2020
SystemManufacturer = System manufacturer
SystemProductName = System Product Name
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = TUF B450-PRO GAMING
BaseBoardVersion = Rev X.0x
0: kd> .trap 0xffffee880548b0e0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8927447f35f8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff8f85337a6670 rsi=0000000000000000 rdi=0000000000000000
rip=ffff89548015721c rsp=ffffee880548b270 rbp=ffffee880548b2e9
 r8=ffffee880548b258  r9=0000000000000000 r10=fffff80520b1fc60
r11=ffffb9fc46400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
cdd!CddBitmap::RemoveFromCddBitmapList+0x80:
ffff8954`8015721c cd29            int     29h
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe901734e60e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe901734e6038, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G25IS1E

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 9405

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe901734e60e0

BUGCHECK_P3: ffffe901734e6038

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe901734e60e0 -- (.trap 0xffffe901734e60e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffef18c697b0b8 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc78adc856430 rsi=0000000000000000 rdi=0000000000000000
rip=ffffef63be3c721c rsp=ffffe901734e6270 rbp=ffffe901734e62e9
 r8=ffffe901734e6258  r9=0000000000000000 r10=fffff8000cb1fc60
r11=ffff8d78aac00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe cy
cdd!CddBitmap::RemoveFromCddBitmapList+0x80:
ffffef63`be3c721c cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe901734e6038 -- (.exr 0xffffe901734e6038)
ExceptionAddress: ffffef63be3c721c (cdd!CddBitmap::RemoveFromCddBitmapList+0x0000000000000080)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csgo.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
ffffe901`734e5db8 fffff800`0cbefe29     : 00000000`00000139 00000000`00000003 ffffe901`734e60e0 ffffe901`734e6038 : nt!KeBugCheckEx
ffffe901`734e5dc0 fffff800`0cbf0250     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe901`734e5f00 fffff800`0cbee5e3     : ffffe901`734e60f8 ffffc78a`dafe5080 ffffe901`734e6250 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffe901`734e60e0 ffffef63`be3c721c     : ffffef18`c697b030 00000000`00000000 ffffef18`c45e0b00 fffff800`0cb16eca : nt!KiRaiseSecurityCheckFailure+0x323
ffffe901`734e6270 ffffef63`be3c75f2     : ffffef18`c697b030 ffffef18`c65cf000 fffff800`0cb16eb0 ffffef63`bed1f770 : cdd!CddBitmap::RemoveFromCddBitmapList+0x80
ffffe901`734e62a0 ffffef63`be3cf84d     : 00000000`00051341 ffffef18`c697b030 00000000`00000003 00000000`00000003 : cdd!CddBitmapHw::Release+0x72
ffffe901`734e6350 ffffef63`bed322e8     : ffffef18`c0911000 ffffef18`c45e0b00 00000000`00000001 ffffef18`c45e0b00 : cdd!DrvDeleteDeviceBitmapEx+0x7d
ffffe901`734e6380 ffffef63`bed335fc     : ffffe901`00000000 00000000`00000003 00000000`00000000 ffffe901`00000001 : win32kbase!SURFACE::bDeleteSurface+0x738
ffffe901`734e6550 ffffef63`bedc569d     : 00000000`00051341 ffffe901`734e6610 00000000`00000002 ffffef63`00000000 : win32kbase!SURFREF::bDeleteSurface+0x14
ffffe901`734e6580 ffffef63`bed3d86f     : 00000000`00000000 ffffef18`c45e0b00 00000000`00000000 ffffef18`c0a1ce18 : win32kbase!vGarbageCollectObject<SURFREF>+0x9d
ffffe901`734e65e0 ffffef63`bed3d31d     : 00000000`00000708 ffffc78a`dbeda005 00000000`00051341 ffffef63`bed74c52 : win32kbase!NtGdiCloseProcess+0x1d3
ffffe901`734e6650 ffffef63`be02c817     : ffffef18`c076eb30 ffffef63`be0e2d51 ffffef18`c076eb30 00000000`00000001 : win32kbase!GdiProcessCallout+0x6d
ffffe901`734e66d0 ffffef63`bed67be8     : 00000000`00000000 00000000`c000001c ffffe901`734e6a38 fffff800`0ca25bdb : win32kfull!W32pProcessCallout+0x107
ffffe901`734e6710 ffffef63`bded10d0     : 00000000`c000001c ffffe901`734e69d0 00000000`00000000 ffffe901`734e6a38 : win32kbase!W32CalloutDispatch+0x488
ffffe901`734e6920 fffff800`0ce62d05     : 00000000`00000000 fffff800`0d41deb0 ffffc78a`cff887e0 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x30
ffffe901`734e6960 fffff800`0cde9174     : ffffc78a`cf3b7c90 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PsInvokeWin32Callout+0x55
ffffe901`734e6990 fffff800`0ce4f8de     : ffffc78a`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x598
ffffe901`734e6a90 fffff800`0cbef878     : ffffc78a`dbeda080 ffffc78a`dafe5080 ffffe901`734e6b80 ffffc78a`dbeda080 : nt!NtTerminateProcess+0xde
ffffe901`734e6b00 00000000`778a1cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`005ce7f8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778a1cfc


SYMBOL_NAME:  cdd!CddBitmap::RemoveFromCddBitmapList+80

MODULE_NAME: cdd

IMAGE_NAME:  cdd.dll

IMAGE_VERSION:  10.0.19041.443

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  80

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_cdd!CddBitmap::RemoveFromCddBitmapList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {a1c0d964-903d-625e-6a5d-948bd2e59450}

Followup:     MachineOwner
---------
 

Yeni konular

Geri
Yukarı