İlk kez mavi ekran hatası alıyorum oyun oynarken aldım USB'den cihaz çıkardığımda mavi ekran verdi mavi ekran kodu ise kernel Security check failed.
Konu anasayfaya düşmedi
Son düzenleme:
Samsung telefonunuzu taktığınızdan dolayı oluşmuş. Farklı USB portuna takabilirsiniz ve muhtemelen bir daha olmaz. 1 hafta içinde tekrar olursa ya da olmazsa belirtirseniz sevinirim.
[CODE title="Dökümler"]*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption.
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff890f4203e630, Address of the trap frame for the exception that caused the BugCheck.
Arg3: ffff890f4203e588, Address of the exception record for the exception that caused the BugCheck.
Arg4: 0000000000000000, Reserved.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7281.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 76536.
Key : Analysis.Init.CPU.mSec
Value: 1796.
Key : Analysis.Init.Elapsed.mSec
Value: 59246.
Key : Analysis.Memory.CommitPeak.Mb
Value: 76.
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY.
Key : FailFast.Type
Value: 3
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 011922-8937-01.dmp
BUGCHECK_CODE: 139.
BUGCHECK_P1: 3
BUGCHECK_P2: ffff890f4203e630.
BUGCHECK_P3: ffff890f4203e588.
BUGCHECK_P4: 0
TRAP_FRAME: ffff890f4203e630 -- (.trap 0xffff890f4203e630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb38d0c0813a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffff890f477a2f21 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80317c1a7e1 rsp=ffff890f4203e7c0 rbp=0000002a9c9bf105
r8=0000002a9c9aa129 r9=fffff80314ac1190 r10=fffff80314abeac0
r11=ffff890f4203e800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy.
nt!KiInsertTimerTable+0x20cbb1:
fffff803`17c1a7e1 cd29 int 29h.
Resetting default scope.
EXCEPTION_RECORD: ffff890f4203e588 -- (.exr 0xffff890f4203e588)
ExceptionAddress: fffff80317c1a7e1 (nt!KiInsertTimerTable+0x000000000020cbb1)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001.
NumberParameters: 1
Parameter[0]: 0000000000000003.
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409.
EXCEPTION_PARAMETER1: 0000000000000003.
EXCEPTION_STR: 0xc0000409.
STACK_TEXT:
ffff890f`4203e308 fffff803`17c09269 : 00000000`00000139 00000000`00000003 ffff890f`4203e630 ffff890f`4203e588 : nt!KeBugCheckEx
ffff890f`4203e310 fffff803`17c09690 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff890f`4203e450 fffff803`17c07a23 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`17bfe066 : nt!KiFastFailDispatch+0xd0
ffff890f`4203e630 fffff803`17c1a7e1 : ffffb38d`0c0d6420 00000000`00000000 ffffb38d`0c052010 ffffb38d`0a8942d0 : nt!KiRaiseSecurityCheckFailure+0x323
ffff890f`4203e7c0 fffff803`17a0bf9d : ffffb38d`0c081280 ffff890f`00000004 fffff803`17b632b0 fffff803`17af4000 : nt!KiInsertTimerTable+0x20cbb1
ffff890f`4203e840 fffff803`17a8045e : 00000000`00000026 ffff890f`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x3bd
ffff890f`4203e8e0 fffff803`29e2802d : ffff890f`4203ea01 00000000`00989680 0000002a`9c2495b0 00000000`00000002 : nt!KeWaitForMultipleObjects+0x2be
ffff890f`4203e9f0 fffff803`29dca11a : 00000000`00000000 ffffb38d`0c07e000 ffff890f`4203eb19 ffffb38d`0c07e000 : dxgmms2!VidSchiWaitForSchedulerEvents+0x25d
ffff890f`4203eac0 fffff803`29e4d3d5 : ffffb38d`0f9c3000 ffffb38d`0c07e000 ffffb38d`0f9c3010 ffffb38d`0c102050 : dxgmms2!VidSchiScheduleCommandToRun+0x2ca
ffff890f`4203eb80 fffff803`29e4d38a : ffffb38d`0c07e400 fffff803`29e4d2c0 ffffb38d`0c07e000 ffffdb00`a1847100 : dxgmms2!VidSchiRun_PriorityTable+0x35
ffff890f`4203ebd0 fffff803`17b55995 : ffffb38d`0c081280 fffff803`00000001 ffffb38d`0c07e000 000f8067`bcbbbdff : dxgmms2!VidSchiWorkerThread+0xca
ffff890f`4203ec10 fffff803`17bfe938 : ffffdb00`a1847180 ffffb38d`0c081280 fffff803`17b55940 ffffffff`042c8e58 : nt!PspSystemThreadStartup+0x55
ffff890f`4203ec60 00000000`00000000 : ffff890f`4203f000 ffff890f`42039000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!KiInsertTimerTable+20cbb1
MODULE_NAME: nt.
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1469
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 20cbb1.
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}
Followup: MachineOwner.
---------[/CODE]
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.