Çözüldü Windows Server 2019 KERNEL_SECURITY_CHECK_FAILURE

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

CelalHann

Hectopat
Katılım
4 Kasım 2019
Mesajlar
95
Makaleler
1
Merhaba sayın Technopat ailesi.

Ben 3 hafta önce Ryzen 7 3700X 64 GB RAM B450 GAMING X anakarta sahip bir sunucu makinesi topladım yaklaşık 20 gündür sorunsuz çalışıyordu, son 3 günde aniden restart sorunları çıktı, bu 3 gün içindede format atmıştık tekrardan Windows server 2019 datacenter kurmuştuk.

Minidump dosyası:

.

Konu aciliyet çünkü sunucumu işletemiyorum sürekli restart atıyor makine kendine.

Bilen kişilerin özellikle yöneticilerin bakmasını rica ederim.

Bugün 14.48 vede 17.28 de restart yedi 2 sininde dump dosyası rarda teşekkürler.
 
Çözüm
Realtek ağ sürücüsünü temiz kaldırın tekrar kurun.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe389d3edf4f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe389d3edf448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe389d3edf4f0

BUGCHECK_P3: ffffe389d3edf448

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe389d3edf4f0 -- (.trap 0xffffe389d3edf4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb00df853f130 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb00df85cfb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80329dc7a84 rsp=ffffe389d3edf688 rbp=0000000000000001
r8=0000000000003fff  r9=0000000000000000 r10=ffffb00df853f000
r11=ffffb00df858d6d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4:
fffff803`29dc7a84 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe389d3edf448 -- (.exr 0xffffe389d3edf448)
ExceptionAddress: fffff80329dc7a84 (rt640x64!NICReturnRFDFreeRxDescAndLink+0x00000000000000e4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 10

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-22-2020 18:32:21.0969

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80327061669 to fffff8032704ff30

STACK_TEXT:
ffffe389`d3edf1c8 fffff803`27061669 : 00000000`00000139 00000000`00000003 ffffe389`d3edf4f0 ffffe389`d3edf448 : nt!KeBugCheckEx
ffffe389`d3edf1d0 fffff803`27061a10 : ffffe389`d3edf500 fffff803`4dac4344 00000000`00000000 ffffb00d`f9a391a0 : nt!KiBugCheckDispatch+0x69
ffffe389`d3edf310 fffff803`2705fe08 : 00000000`000fc8ee 00000000`00000001 fffff803`4dac2160 fffff803`4dac4ee9 : nt!KiFastFailDispatch+0xd0
ffffe389`d3edf4f0 fffff803`29dc7a84 : fffff803`29dc3f72 ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 : nt!KiRaiseSecurityCheckFailure+0x308
ffffe389`d3edf688 fffff803`29dc3f72 : ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 fffff803`29fc3e73 : rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4
ffffe389`d3edf690 fffff803`29db1a26 : 00000000`00008000 fffff803`26f1b001 00000000`00000400 ffffe389`d3edf7e0 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb8e
ffffe389`d3edf770 fffff803`4daee85a : 00000000`00000000 ffffb00d`f8561000 00000000`00000000 ffffb00d`f8559050 : rt640x64!MPHandleInterrupt+0x366
ffffe389`d3edf7e0 fffff803`26f01da7 : 00000000`00000000 ffffe389`d3edfa10 00000000`00040000 00000000`00000000 : NDIS!ndisInterruptDpc+0x281aa
ffffe389`d3edf910 fffff803`26f013ee : 00000000`0000000e 00000000`00989680 ffff8980`a4090800 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
ffffe389`d3edfa50 fffff803`2705394a : ffffffff`00000000 ffff8980`a4080180 00000000`00000000 ffff8980`a4090800 : nt!KiRetireDpcList+0x1ae
ffffe389`d3edfc60 00000000`00000000 : ffffe389`d3ee0000 ffffe389`d3eda000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC:  2cd228c191cdabec1006ff08f02859852f2357e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b8110d3ff79c6c01b1962d24dfb4ad856f4acee5

THREAD_SHA1_HASH_MOD:  029163d6212d4283fcff206e52d4d010357c9449

FOLLOWUP_IP:
rt640x64!NICReturnRFDFreeRxDescAndLink+e4
fffff803`29dc7a84 cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  rt640x64!NICReturnRFDFreeRxDescAndLink+e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5a0a844e

IMAGE_VERSION:  9.1.407.2015

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

TARGET_TIME:  2020-03-22T11:47:34.000Z

OSBUILD:  17763

OSSERVICEPACK:  1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  3

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 Server TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1986-10-28 08:40:20

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  10aca

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_rt640x64!nicreturnrfdfreerxdescandlink

FAILURE_ID_HASH:  {0d26e8d0-23f7-8f11-fb99-877e8a495f96}

Followup:     MachineOwner
---------

Ek olarak BIOS güncellemesi gelmiş onuda yapın.
Realtek ağ sürücüsünü temiz kaldırın tekrar kurun.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe389d3edf4f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe389d3edf448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe389d3edf4f0

BUGCHECK_P3: ffffe389d3edf448

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe389d3edf4f0 -- (.trap 0xffffe389d3edf4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb00df853f130 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb00df85cfb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80329dc7a84 rsp=ffffe389d3edf688 rbp=0000000000000001
r8=0000000000003fff  r9=0000000000000000 r10=ffffb00df853f000
r11=ffffb00df858d6d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4:
fffff803`29dc7a84 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe389d3edf448 -- (.exr 0xffffe389d3edf448)
ExceptionAddress: fffff80329dc7a84 (rt640x64!NICReturnRFDFreeRxDescAndLink+0x00000000000000e4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 10

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-22-2020 18:32:21.0969

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80327061669 to fffff8032704ff30

STACK_TEXT:
ffffe389`d3edf1c8 fffff803`27061669 : 00000000`00000139 00000000`00000003 ffffe389`d3edf4f0 ffffe389`d3edf448 : nt!KeBugCheckEx
ffffe389`d3edf1d0 fffff803`27061a10 : ffffe389`d3edf500 fffff803`4dac4344 00000000`00000000 ffffb00d`f9a391a0 : nt!KiBugCheckDispatch+0x69
ffffe389`d3edf310 fffff803`2705fe08 : 00000000`000fc8ee 00000000`00000001 fffff803`4dac2160 fffff803`4dac4ee9 : nt!KiFastFailDispatch+0xd0
ffffe389`d3edf4f0 fffff803`29dc7a84 : fffff803`29dc3f72 ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 : nt!KiRaiseSecurityCheckFailure+0x308
ffffe389`d3edf688 fffff803`29dc3f72 : ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 fffff803`29fc3e73 : rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4
ffffe389`d3edf690 fffff803`29db1a26 : 00000000`00008000 fffff803`26f1b001 00000000`00000400 ffffe389`d3edf7e0 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb8e
ffffe389`d3edf770 fffff803`4daee85a : 00000000`00000000 ffffb00d`f8561000 00000000`00000000 ffffb00d`f8559050 : rt640x64!MPHandleInterrupt+0x366
ffffe389`d3edf7e0 fffff803`26f01da7 : 00000000`00000000 ffffe389`d3edfa10 00000000`00040000 00000000`00000000 : NDIS!ndisInterruptDpc+0x281aa
ffffe389`d3edf910 fffff803`26f013ee : 00000000`0000000e 00000000`00989680 ffff8980`a4090800 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
ffffe389`d3edfa50 fffff803`2705394a : ffffffff`00000000 ffff8980`a4080180 00000000`00000000 ffff8980`a4090800 : nt!KiRetireDpcList+0x1ae
ffffe389`d3edfc60 00000000`00000000 : ffffe389`d3ee0000 ffffe389`d3eda000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC:  2cd228c191cdabec1006ff08f02859852f2357e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b8110d3ff79c6c01b1962d24dfb4ad856f4acee5

THREAD_SHA1_HASH_MOD:  029163d6212d4283fcff206e52d4d010357c9449

FOLLOWUP_IP:
rt640x64!NICReturnRFDFreeRxDescAndLink+e4
fffff803`29dc7a84 cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  rt640x64!NICReturnRFDFreeRxDescAndLink+e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5a0a844e

IMAGE_VERSION:  9.1.407.2015

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

TARGET_TIME:  2020-03-22T11:47:34.000Z

OSBUILD:  17763

OSSERVICEPACK:  1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  3

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 Server TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1986-10-28 08:40:20

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  10aca

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_rt640x64!nicreturnrfdfreerxdescandlink

FAILURE_ID_HASH:  {0d26e8d0-23f7-8f11-fb99-877e8a495f96}

Followup:     MachineOwner
---------

Ek olarak BIOS güncellemesi gelmiş onuda yapın.
 
Çözüm
Realtek ağ sürücüsünü temiz kaldırın tekrar kurun.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe389d3edf4f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe389d3edf448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe389d3edf4f0

BUGCHECK_P3: ffffe389d3edf448

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe389d3edf4f0 -- (.trap 0xffffe389d3edf4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb00df853f130 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb00df85cfb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80329dc7a84 rsp=ffffe389d3edf688 rbp=0000000000000001
r8=0000000000003fff  r9=0000000000000000 r10=ffffb00df853f000
r11=ffffb00df858d6d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4:
fffff803`29dc7a84 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe389d3edf448 -- (.exr 0xffffe389d3edf448)
ExceptionAddress: fffff80329dc7a84 (rt640x64!NICReturnRFDFreeRxDescAndLink+0x00000000000000e4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 10

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-22-2020 18:32:21.0969

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80327061669 to fffff8032704ff30

STACK_TEXT:
ffffe389`d3edf1c8 fffff803`27061669 : 00000000`00000139 00000000`00000003 ffffe389`d3edf4f0 ffffe389`d3edf448 : nt!KeBugCheckEx
ffffe389`d3edf1d0 fffff803`27061a10 : ffffe389`d3edf500 fffff803`4dac4344 00000000`00000000 ffffb00d`f9a391a0 : nt!KiBugCheckDispatch+0x69
ffffe389`d3edf310 fffff803`2705fe08 : 00000000`000fc8ee 00000000`00000001 fffff803`4dac2160 fffff803`4dac4ee9 : nt!KiFastFailDispatch+0xd0
ffffe389`d3edf4f0 fffff803`29dc7a84 : fffff803`29dc3f72 ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 : nt!KiRaiseSecurityCheckFailure+0x308
ffffe389`d3edf688 fffff803`29dc3f72 : ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 fffff803`29fc3e73 : rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4
ffffe389`d3edf690 fffff803`29db1a26 : 00000000`00008000 fffff803`26f1b001 00000000`00000400 ffffe389`d3edf7e0 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb8e
ffffe389`d3edf770 fffff803`4daee85a : 00000000`00000000 ffffb00d`f8561000 00000000`00000000 ffffb00d`f8559050 : rt640x64!MPHandleInterrupt+0x366
ffffe389`d3edf7e0 fffff803`26f01da7 : 00000000`00000000 ffffe389`d3edfa10 00000000`00040000 00000000`00000000 : NDIS!ndisInterruptDpc+0x281aa
ffffe389`d3edf910 fffff803`26f013ee : 00000000`0000000e 00000000`00989680 ffff8980`a4090800 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
ffffe389`d3edfa50 fffff803`2705394a : ffffffff`00000000 ffff8980`a4080180 00000000`00000000 ffff8980`a4090800 : nt!KiRetireDpcList+0x1ae
ffffe389`d3edfc60 00000000`00000000 : ffffe389`d3ee0000 ffffe389`d3eda000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC:  2cd228c191cdabec1006ff08f02859852f2357e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b8110d3ff79c6c01b1962d24dfb4ad856f4acee5

THREAD_SHA1_HASH_MOD:  029163d6212d4283fcff206e52d4d010357c9449

FOLLOWUP_IP:
rt640x64!NICReturnRFDFreeRxDescAndLink+e4
fffff803`29dc7a84 cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  rt640x64!NICReturnRFDFreeRxDescAndLink+e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5a0a844e

IMAGE_VERSION:  9.1.407.2015

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

TARGET_TIME:  2020-03-22T11:47:34.000Z

OSBUILD:  17763

OSSERVICEPACK:  1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  3

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 Server TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1986-10-28 08:40:20

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  10aca

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_rt640x64!nicreturnrfdfreerxdescandlink

FAILURE_ID_HASH:  {0d26e8d0-23f7-8f11-fb99-877e8a495f96}

Followup:     MachineOwner
---------
Ek olarak BIOS güncellemesi gelmiş onuda yapın.
Hocam dump dosyalarında genellikle hangi hata kodlarını araştırıyorsunuz?
 
@Uton sadece tek bir koda bakıp cevap vermiyorum, çünkü çoğu zaman aynı dosyalar olsa bile farklı hatalar nedenli olabilir, paylaştığım çıktılar herkesin alabileceği çıktılar, ayrıca bir kaç farklı bölümler var oralara da bakıyorum.
 
@Uton sadece tek bir koda bakıp cevap vermiyorum, çünkü çoğu zaman aynı dosyalar olsa bile farklı hatalar nedenli olabilir, paylaştığım çıktılar herkesin alabileceği çıktılar, ayrıca bir kaç farklı bölümler var oralara da bakıyorum.
Bir rehber oluşturmanızı beklemiyor değilim. :)
 
Realtek ağ sürücüsünü temiz kaldırın tekrar kurun.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe389d3edf4f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffe389d3edf448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  17763.1.amd64fre.rs5_release.180914-1434

SYSTEM_MANUFACTURER:  Gigabyte Technology Co., Ltd.

SYSTEM_PRODUCT_NAME:  B450 GAMING X

SYSTEM_SKU:  Default string

SYSTEM_VERSION:  Default string

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  F41

BIOS_DATE:  07/22/2019

BASEBOARD_MANUFACTURER:  Gigabyte Technology Co., Ltd.

BASEBOARD_PRODUCT:  B450 GAMING X

BASEBOARD_VERSION:  x.x

DUMP_TYPE:  2

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe389d3edf4f0

BUGCHECK_P3: ffffe389d3edf448

BUGCHECK_P4: 0

TRAP_FRAME:  ffffe389d3edf4f0 -- (.trap 0xffffe389d3edf4f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb00df853f130 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb00df85cfb50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80329dc7a84 rsp=ffffe389d3edf688 rbp=0000000000000001
r8=0000000000003fff  r9=0000000000000000 r10=ffffb00df853f000
r11=ffffb00df858d6d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4:
fffff803`29dc7a84 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffe389d3edf448 -- (.exr 0xffffe389d3edf448)
ExceptionAddress: fffff80329dc7a84 (rt640x64!NICReturnRFDFreeRxDescAndLink+0x00000000000000e4)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

CPU_COUNT: 10

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXPNP: 1 (!blackboxpnp)


CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  FAIL_FAST_CORRUPT_LIST_ENTRY

BUGCHECK_STR:  0x139

PROCESS_NAME:  System

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-22-2020 18:32:21.0969

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff80327061669 to fffff8032704ff30

STACK_TEXT:
ffffe389`d3edf1c8 fffff803`27061669 : 00000000`00000139 00000000`00000003 ffffe389`d3edf4f0 ffffe389`d3edf448 : nt!KeBugCheckEx
ffffe389`d3edf1d0 fffff803`27061a10 : ffffe389`d3edf500 fffff803`4dac4344 00000000`00000000 ffffb00d`f9a391a0 : nt!KiBugCheckDispatch+0x69
ffffe389`d3edf310 fffff803`2705fe08 : 00000000`000fc8ee 00000000`00000001 fffff803`4dac2160 fffff803`4dac4ee9 : nt!KiFastFailDispatch+0xd0
ffffe389`d3edf4f0 fffff803`29dc7a84 : fffff803`29dc3f72 ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 : nt!KiRaiseSecurityCheckFailure+0x308
ffffe389`d3edf688 fffff803`29dc3f72 : ffffb00d`f853f000 00000000`00000000 ffffb00d`f8780850 fffff803`29fc3e73 : rt640x64!NICReturnRFDFreeRxDescAndLink+0xe4
ffffe389`d3edf690 fffff803`29db1a26 : 00000000`00008000 fffff803`26f1b001 00000000`00000400 ffffe389`d3edf7e0 : rt640x64!MpHandleRecvIntPriVLanJumbo+0xb8e
ffffe389`d3edf770 fffff803`4daee85a : 00000000`00000000 ffffb00d`f8561000 00000000`00000000 ffffb00d`f8559050 : rt640x64!MPHandleInterrupt+0x366
ffffe389`d3edf7e0 fffff803`26f01da7 : 00000000`00000000 ffffe389`d3edfa10 00000000`00040000 00000000`00000000 : NDIS!ndisInterruptDpc+0x281aa
ffffe389`d3edf910 fffff803`26f013ee : 00000000`0000000e 00000000`00989680 ffff8980`a4090800 00000000`00000019 : nt!KiExecuteAllDpcs+0x2e7
ffffe389`d3edfa50 fffff803`2705394a : ffffffff`00000000 ffff8980`a4080180 00000000`00000000 ffff8980`a4090800 : nt!KiRetireDpcList+0x1ae
ffffe389`d3edfc60 00000000`00000000 : ffffe389`d3ee0000 ffffe389`d3eda000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


THREAD_SHA1_HASH_MOD_FUNC:  2cd228c191cdabec1006ff08f02859852f2357e3

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b8110d3ff79c6c01b1962d24dfb4ad856f4acee5

THREAD_SHA1_HASH_MOD:  029163d6212d4283fcff206e52d4d010357c9449

FOLLOWUP_IP:
rt640x64!NICReturnRFDFreeRxDescAndLink+e4
fffff803`29dc7a84 cd29            int     29h

FAULT_INSTR_CODE:  8b4829cd

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  rt640x64!NICReturnRFDFreeRxDescAndLink+e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: rt640x64

IMAGE_NAME:  rt640x64.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5a0a844e

IMAGE_VERSION:  9.1.407.2015

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  e4

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

PRIMARY_PROBLEM_CLASS:  0x139_3_CORRUPT_LIST_ENTRY_rt640x64!NICReturnRFDFreeRxDescAndLink

TARGET_TIME:  2020-03-22T11:47:34.000Z

OSBUILD:  17763

OSSERVICEPACK:  1

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  3

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 Server TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID:  0

OSBUILD_TIMESTAMP:  1986-10-28 08:40:20

BUILDDATESTAMP_STR:  180914-1434

BUILDLAB_STR:  rs5_release

BUILDOSVER_STR:  10.0.17763.1.amd64fre.rs5_release.180914-1434

ANALYSIS_SESSION_ELAPSED_TIME:  10aca

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x139_3_corrupt_list_entry_rt640x64!nicreturnrfdfreerxdescandlink

FAILURE_ID_HASH:  {0d26e8d0-23f7-8f11-fb99-877e8a495f96}

Followup:     MachineOwner
---------

Ek olarak BIOS güncellemesi gelmiş onuda yapın.
Hocam bu uzak masaüstü ile bağlantı kurduğumuzdan silemiyoruz üstüne kurmamız gerekiyor, anakartın sitesinden gittim indirdim kurdum, umarım sorun düzelir nereden indirmemi tavsiye edersiniz driveri?

Olmazsa bu gece veri merkezinden kvm talep edip silip yüklerim.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı