Çözüldü Mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

438943

Hectopat
Katılım
15 Mart 2021
Mesajlar
2.589
Çözümler
33
İlk kez mavi ekran hatası alıyorum oyun oynarken aldım USB'den cihaz çıkardığımda mavi ekran verdi mavi ekran kodu ise kernel Security check failed.

Konu anasayfaya düşmedi :(
 
Son düzenleme:
Çözüm
Samsung telefonunuzu taktığınızdan dolayı oluşmuş. Farklı USB portuna takabilirsiniz ve muhtemelen bir daha olmaz. 1 hafta içinde tekrar olursa ya da olmazsa belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff890f4203e630, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff890f4203e588, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7281

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 76536

Key : Analysis.Init.CPU.mSec
Value: 1796

Key : Analysis.Init.Elapsed.mSec
Value: 59246

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 011922-8937-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff890f4203e630

BUGCHECK_P3: ffff890f4203e588

BUGCHECK_P4: 0

TRAP_FRAME: ffff890f4203e630 -- (.trap 0xffff890f4203e630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb38d0c0813a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff890f477a2f21 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80317c1a7e1 rsp=ffff890f4203e7c0 rbp=0000002a9c9bf105
r8=0000002a9c9aa129 r9=fffff80314ac1190 r10=fffff80314abeac0
r11=ffff890f4203e800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiInsertTimerTable+0x20cbb1:
fffff803`17c1a7e1 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff890f4203e588 -- (.exr 0xffff890f4203e588)
ExceptionAddress: fffff80317c1a7e1 (nt!KiInsertTimerTable+0x000000000020cbb1)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff890f`4203e308 fffff803`17c09269 : 00000000`00000139 00000000`00000003 ffff890f`4203e630 ffff890f`4203e588 : nt!KeBugCheckEx
ffff890f`4203e310 fffff803`17c09690 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff890f`4203e450 fffff803`17c07a23 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`17bfe066 : nt!KiFastFailDispatch+0xd0
ffff890f`4203e630 fffff803`17c1a7e1 : ffffb38d`0c0d6420 00000000`00000000 ffffb38d`0c052010 ffffb38d`0a8942d0 : nt!KiRaiseSecurityCheckFailure+0x323
ffff890f`4203e7c0 fffff803`17a0bf9d : ffffb38d`0c081280 ffff890f`00000004 fffff803`17b632b0 fffff803`17af4000 : nt!KiInsertTimerTable+0x20cbb1
ffff890f`4203e840 fffff803`17a8045e : 00000000`00000026 ffff890f`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffff890f`4203e8e0 fffff803`29e2802d : ffff890f`4203ea01 00000000`00989680 0000002a`9c2495b0 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff890f`4203e9f0 fffff803`29dca11a : 00000000`00000000 ffffb38d`0c07e000 ffff890f`4203eb19 ffffb38d`0c07e000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff890f`4203eac0 fffff803`29e4d3d5 : ffffb38d`0f9c3000 ffffb38d`0c07e000 ffffb38d`0f9c3010 ffffb38d`0c102050 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff890f`4203eb80 fffff803`29e4d38a : ffffb38d`0c07e400 fffff803`29e4d2c0 ffffb38d`0c07e000 ffffdb00`a1847100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff890f`4203ebd0 fffff803`17b55995 : ffffb38d`0c081280 fffff803`00000001 ffffb38d`0c07e000 000f8067`bcbbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff890f`4203ec10 fffff803`17bfe938 : ffffdb00`a1847180 ffffb38d`0c081280 fffff803`17b55940 ffffffff`042c8e58 : nt!PspSystemThreadStartup+0x55
ffff890f`4203ec60 00000000`00000000 : ffff890f`4203f000 ffff890f`42039000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!KiInsertTimerTable+20cbb1

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 20cbb1

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner
---------[/CODE]
Samsung telefonunuzu taktığınızdan dolayı oluşmuş. Farklı USB portuna takabilirsiniz ve muhtemelen bir daha olmaz. 1 hafta içinde tekrar olursa ya da olmazsa belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff890f4203e630, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff890f4203e588, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7281

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 76536

Key : Analysis.Init.CPU.mSec
Value: 1796

Key : Analysis.Init.Elapsed.mSec
Value: 59246

Key : Analysis.Memory.CommitPeak.Mb
Value: 76

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


FILE_IN_CAB: 011922-8937-01.dmp

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff890f4203e630

BUGCHECK_P3: ffff890f4203e588

BUGCHECK_P4: 0

TRAP_FRAME: ffff890f4203e630 -- (.trap 0xffff890f4203e630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb38d0c0813a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff890f477a2f21 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80317c1a7e1 rsp=ffff890f4203e7c0 rbp=0000002a9c9bf105
r8=0000002a9c9aa129 r9=fffff80314ac1190 r10=fffff80314abeac0
r11=ffff890f4203e800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiInsertTimerTable+0x20cbb1:
fffff803`17c1a7e1 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffff890f4203e588 -- (.exr 0xffff890f4203e588)
ExceptionAddress: fffff80317c1a7e1 (nt!KiInsertTimerTable+0x000000000020cbb1)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffff890f`4203e308 fffff803`17c09269 : 00000000`00000139 00000000`00000003 ffff890f`4203e630 ffff890f`4203e588 : nt!KeBugCheckEx
ffff890f`4203e310 fffff803`17c09690 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff890f`4203e450 fffff803`17c07a23 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`17bfe066 : nt!KiFastFailDispatch+0xd0
ffff890f`4203e630 fffff803`17c1a7e1 : ffffb38d`0c0d6420 00000000`00000000 ffffb38d`0c052010 ffffb38d`0a8942d0 : nt!KiRaiseSecurityCheckFailure+0x323
ffff890f`4203e7c0 fffff803`17a0bf9d : ffffb38d`0c081280 ffff890f`00000004 fffff803`17b632b0 fffff803`17af4000 : nt!KiInsertTimerTable+0x20cbb1
ffff890f`4203e840 fffff803`17a8045e : 00000000`00000026 ffff890f`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffff890f`4203e8e0 fffff803`29e2802d : ffff890f`4203ea01 00000000`00989680 0000002a`9c2495b0 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff890f`4203e9f0 fffff803`29dca11a : 00000000`00000000 ffffb38d`0c07e000 ffff890f`4203eb19 ffffb38d`0c07e000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff890f`4203eac0 fffff803`29e4d3d5 : ffffb38d`0f9c3000 ffffb38d`0c07e000 ffffb38d`0f9c3010 ffffb38d`0c102050 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff890f`4203eb80 fffff803`29e4d38a : ffffb38d`0c07e400 fffff803`29e4d2c0 ffffb38d`0c07e000 ffffdb00`a1847100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff890f`4203ebd0 fffff803`17b55995 : ffffb38d`0c081280 fffff803`00000001 ffffb38d`0c07e000 000f8067`bcbbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff890f`4203ec10 fffff803`17bfe938 : ffffdb00`a1847180 ffffb38d`0c081280 fffff803`17b55940 ffffffff`042c8e58 : nt!PspSystemThreadStartup+0x55
ffff890f`4203ec60 00000000`00000000 : ffff890f`4203f000 ffff890f`42039000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME: nt!KiInsertTimerTable+20cbb1

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 20cbb1

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner
---------[/CODE]
 
Çözüm
Samsung telefonunuzu taktığınızdan dolayı oluşmuş. Farklı USB portuna takabilirsiniz ve muhtemelen bir daha olmaz. 1 hafta içinde tekrar olursa ya da olmazsa belirtirseniz sevinirim.

[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff890f4203e630, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffff890f4203e588, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7281.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 76536.

Key : Analysis.Init.CPU.mSec
Value: 1796.

Key : Analysis.Init.Elapsed.mSec
Value: 59246.

Key : Analysis.Memory.CommitPeak.Mb
Value: 76.

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 011922-8937-01.dmp

BUGCHECK_CODE: 139.

BUGCHECK_P1: 3

BUGCHECK_P2: ffff890f4203e630.

BUGCHECK_P3: ffff890f4203e588.

BUGCHECK_P4: 0

TRAP_FRAME: ffff890f4203e630 -- (.trap 0xffff890f4203e630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb38d0c0813a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff890f477a2f21 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80317c1a7e1 rsp=ffff890f4203e7c0 rbp=0000002a9c9bf105
r8=0000002a9c9aa129 r9=fffff80314ac1190 r10=fffff80314abeac0
r11=ffff890f4203e800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy.
nt!KiInsertTimerTable+0x20cbb1:
fffff803`17c1a7e1 cd29 int 29h.
Resetting default scope.

EXCEPTION_RECORD: ffff890f4203e588 -- (.exr 0xffff890f4203e588)
ExceptionAddress: fffff80317c1a7e1 (nt!KiInsertTimerTable+0x000000000020cbb1)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409.

EXCEPTION_PARAMETER1: 0000000000000003.

EXCEPTION_STR: 0xc0000409.

STACK_TEXT:
ffff890f`4203e308 fffff803`17c09269 : 00000000`00000139 00000000`00000003 ffff890f`4203e630 ffff890f`4203e588 : nt!KeBugCheckEx
ffff890f`4203e310 fffff803`17c09690 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff890f`4203e450 fffff803`17c07a23 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`17bfe066 : nt!KiFastFailDispatch+0xd0
ffff890f`4203e630 fffff803`17c1a7e1 : ffffb38d`0c0d6420 00000000`00000000 ffffb38d`0c052010 ffffb38d`0a8942d0 : nt!KiRaiseSecurityCheckFailure+0x323
ffff890f`4203e7c0 fffff803`17a0bf9d : ffffb38d`0c081280 ffff890f`00000004 fffff803`17b632b0 fffff803`17af4000 : nt!KiInsertTimerTable+0x20cbb1
ffff890f`4203e840 fffff803`17a8045e : 00000000`00000026 ffff890f`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffff890f`4203e8e0 fffff803`29e2802d : ffff890f`4203ea01 00000000`00989680 0000002a`9c2495b0 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff890f`4203e9f0 fffff803`29dca11a : 00000000`00000000 ffffb38d`0c07e000 ffff890f`4203eb19 ffffb38d`0c07e000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff890f`4203eac0 fffff803`29e4d3d5 : ffffb38d`0f9c3000 ffffb38d`0c07e000 ffffb38d`0f9c3010 ffffb38d`0c102050 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff890f`4203eb80 fffff803`29e4d38a : ffffb38d`0c07e400 fffff803`29e4d2c0 ffffb38d`0c07e000 ffffdb00`a1847100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff890f`4203ebd0 fffff803`17b55995 : ffffb38d`0c081280 fffff803`00000001 ffffb38d`0c07e000 000f8067`bcbbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff890f`4203ec10 fffff803`17bfe938 : ffffdb00`a1847180 ffffb38d`0c081280 fffff803`17b55940 ffffffff`042c8e58 : nt!PspSystemThreadStartup+0x55
ffff890f`4203ec60 00000000`00000000 : ffff890f`4203f000 ffff890f`42039000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME: nt!KiInsertTimerTable+20cbb1

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1469

STACK_COMMAND: .cxr; .ecxr ; kb.

BUCKET_ID_FUNC_OFFSET: 20cbb1.

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner.
---------[/CODE]

Tamamdır teşekkürler.
 

Yeni konular

Geri
Yukarı