Çözüldü System_service_expception mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

aesqwe

Hectopat
Katılım
24 Kasım 2017
Mesajlar
12
Çözümler
1
Daha fazla  
Cinsiyet
Erkek
Bugün 1 haftalık PC de mavi ekran hatası aldım. Bunlardan biri karnel_security_check_failure diğeri ise system_service_expception

Minidump ektedir.
minidump
 
Son düzenleyen: Moderatör:
Çözüm
Teşekkürler sağolun.
İyi günler yine mavi ekran aldım. Minidump bırakıyorum şimdiden teşekkürler.
https://drive.google.com/file/d/1uBoQgeaoTROtHBBPdH2LaBGwkLHMmK6m/view?usp=sharing

Yine sorun yaşarsanız minidump paylaşın tekrar bakayım.
Teşekkürler sağ olun.
İyi günler yine mavi ekran aldım. Minidump bırakıyorum şimdiden teşekkürler.
https://drive.google.com/file/d/1uBoQgeaoTROtHBBPdH2LaBGwkLHMmK6m/view?usp=sharing

Linki yanlış yazmışım.
minidump
Pc de anakart ve ekran kartı sorunu varmış 0 ile değişti iyi forumlar
Laptopta anakart ve ekran kartında sorun varmış laptop değişime gitti.
Laptopta anakart ile ekran kartı sorunlu çıktı.
Rehberi uygulayın.

Virüs olabilir tarama yapın.

Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.

Tam emin değilim ama RAM de sorun olabilir.
Test yapıp sonucu paylaşın.
Kod:
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ali_h\AppData\Local\Temp\Rar$DIa6228.33429\031421-7187-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`6f400000 PsLoadedModuleList = 0xfffff804`7002a490
Debug session time: Sun Mar 14 19:04:09.122 2021 (UTC + 3:00)
System Uptime: 0 days 0:13:11.880
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`6f7f5c50 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffa00`18ec56f0=000000000000003b
6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8046f64ee6b, Address of the instruction which caused the bugcheck
Arg3: fffffa0018ec5ff0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7968

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 11087

    Key  : Analysis.Init.CPU.mSec
    Value: 718

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2696

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8046f64ee6b

BUGCHECK_P3: fffffa0018ec5ff0

BUGCHECK_P4: 0

CONTEXT:  fffffa0018ec5ff0 -- (.cxr 0xfffffa0018ec5ff0)
rax=13199c340914604f rbx=ffff8004ffe00290 rcx=ffff80050bd60098
rdx=ffff80050bd37b18 rsi=0000000000000000 rdi=13199c340914604f
rip=fffff8046f64ee6b rsp=fffffa0018ec69f8 rbp=0000000000000022
 r8=ffff80050bd55868  r9=ffff80050bd55868 r10=0000000000000000
r11=ffff80050bd6049a r12=0000000000000000 r13=ffff80050bd35000
r14=0000000000000000 r15=ffff80050bd37b10
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlRbRemoveNode+0x39b:
fffff804`6f64ee6b 488b07          mov     rax,qword ptr [rdi] ds:002b:13199c34`0914604f=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Origin.exe

STACK_TEXT: 
fffffa00`18ec69f8 fffff804`6f64e890     : 00000000`00000022 ffff8005`0bd37c10 00000000`00000000 ffff8005`0bd37b10 : nt!RtlRbRemoveNode+0x39b
fffffa00`18ec6a10 fffff804`6f64e2d8     : ffff8004`ffe00280 ffff8005`0bd35000 ffff8004`ffe00280 fffffa00`18ec6b18 : nt!RtlpHpVsChunkCoalesce+0xb0
fffffa00`18ec6a70 fffff804`6f64cc64     : ffffcb05`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
fffffa00`18ec6b10 fffff804`6fdb1019     : fffffa00`00000210 00000000`00000004 fffffa00`18ec6d38 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffffa00`18ec6bf0 fffff804`896719a7     : fffffa00`18ec6d48 00000000`00000004 ffff2e2a`3533a7e0 ffffcb05`0ff3fc20 : nt!ExFreePool+0x9
fffffa00`18ec6c20 fffff804`896d90bf     : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00001c6c : dxgmms2!operator delete+0x17
fffffa00`18ec6c50 fffff804`896d8764     : ffff8005`0ba40620 00000000`00000001 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::DestroyOneAllocation+0x94f
fffffa00`18ec6e80 fffff804`896716fa     : ffff8005`0ba40620 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::DestroyAllocation+0xc
fffffa00`18ec6eb0 fffff804`87b9fc1c     : 00000000`00000000 fffffa00`18ec6fe0 00000000`00000000 00000000`00000000 : dxgmms2!VidMmDestroyAllocation+0x1a
fffffa00`18ec6ee0 fffff804`87b9f3ff     : ffff8005`0baea7e0 fffff804`87b8bdf2 ffff8005`0baea7e0 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x768
fffffa00`18ec7080 fffff804`87b8b088     : fffffa00`18ec7020 ffff8005`0baea7e0 00000000`00000000 ffff8005`0baea9c0 : dxgkrnl!DXGDEVICE::DrainAllocations+0x5f
fffffa00`18ec70e0 fffff804`87b8a8bc     : ffff8005`0baea7e0 ffff8005`0a5b6e80 00000000`0000000b 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyAllDeviceState+0x148
fffffa00`18ec7120 fffff804`87bcab4c     : 00000000`00000000 fffffa00`18ec7250 ffff8005`0baea7e0 ffff8005`0baea7e0 : dxgkrnl!ADAPTER_RENDER::DestroyDevice+0xd8
fffffa00`18ec7150 fffff804`87bc5c15     : ffff8005`0a8d6b30 00000000`00000000 ffff8005`0a8d6b30 ffff8005`0965c390 : dxgkrnl!DXGPROCESS::Destroy+0x494
fffffa00`18ec73c0 fffff804`87ab6c71     : 00000000`00000000 ffffcb05`193f7290 00000000`00000000 fffff804`72c69c58 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffffa00`18ec7510 fffff804`6fa379ff     : 00000000`00000000 ffffcb05`09ece100 ffffcb05`15243080 ffffcb05`143fbc80 : dxgkrnl!DxgkProcessNotify+0x1a1
fffffa00`18ec7560 fffff804`6fa62cf4     : ffffcb05`15243000 ffffcb05`15243080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffffa00`18ec7630 fffff804`6fb06af2     : ffffcb05`158504b8 00000000`00000000 fffffa00`18ec7820 00000000`00000000 : nt!PspExitProcess+0x70
fffffa00`18ec7660 fffff804`6fad2888     : 00000000`ffffffff 00000000`00000001 00000000`00000000 00000000`009a8000 : nt!PspExitThread+0x5b2
fffffa00`18ec7760 fffff804`6f667fb7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
fffffa00`18ec77a0 fffff804`6f7fa1f0     : 00000000`08e6f7b8 fffffa00`18ec7850 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
fffffa00`18ec7850 fffff804`6f80765f     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`009a8000 : nt!KiInitiateUserApc+0x70
fffffa00`18ec7990 00007ff9`be3b9014     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000000`08d6e2e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`be3b9014


SYMBOL_NAME:  nt!ExFreePool+9

IMAGE_NAME:  Pool_Corruption

IMAGE_VERSION:  10.0.19041.867

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xfffffa0018ec5ff0 ; kb

BUCKET_ID_FUNC_OFFSET:  9

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!ExFreePool

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup:     Pool_corruption
---------
Kod:
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ali_h\AppData\Local\Temp\Rar$DIa6228.39679\031421-7234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`5cc00000 PsLoadedModuleList = 0xfffff802`5d82a490
Debug session time: Sun Mar 14 18:50:35.533 2021 (UTC + 3:00)
System Uptime: 3 days 3:31:07.748
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`5cff5c50 48894c2408      mov     qword ptr [rsp+8],rcx ss:fffff802`63275740=0000000000000139
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 000000000000001d, Type of memory safety violation
Arg2: fffff80263275a60, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff802632759b8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5765

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 9748

    Key  : Analysis.Init.CPU.mSec
    Value: 717

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3242

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 76

    Key  : FailFast.Name
    Value: INVALID_BALANCED_TREE

    Key  : FailFast.Type
    Value: 29

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 1d

BUGCHECK_P2: fffff80263275a60

BUGCHECK_P3: fffff802632759b8

BUGCHECK_P4: 0

TRAP_FRAME:  fffff80263275a60 -- (.trap 0xfffff80263275a60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff87829c84eee0 rbx=0000000000000000 rcx=000000000000001d
rdx=ffff87829c847ee0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025d02d6e7 rsp=fffff80263275bf8 rbp=ffff8782a6bb91c0
 r8=ffff87829c84eee0  r9=0000000000000000 r10=0000000000000001
r11=ffff8782a6bb91c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na po nc
nt!RtlRbRemoveNode+0x1dec17:
fffff802`5d02d6e7 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffff802632759b8 -- (.exr 0xfffff802632759b8)
ExceptionAddress: fffff8025d02d6e7 (nt!RtlRbRemoveNode+0x00000000001dec17)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 000000000000001d
Subcode: 0x1d FAST_FAIL_INVALID_BALANCED_TREE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  proven_ground_client.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  000000000000001d

DPC_STACK_BASE:  FFFFF80263275FB0

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffff802`63275738 fffff802`5d007b69     : 00000000`00000139 00000000`0000001d fffff802`63275a60 fffff802`632759b8 : nt!KeBugCheckEx
fffff802`63275740 fffff802`5d007f90     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff802`63275880 fffff802`5d006323     : 00000000`00000000 00000000`000000ff 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff802`63275a60 fffff802`5d02d6e7     : 00000000`00000048 ffff8782`9d191cf8 fffff802`5ce43215 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff802`63275bf8 fffff802`5ce43215     : 00000000`00000000 ffff8782`9d191d7a 00000000`00000000 fffff802`5d831dc0 : nt!RtlRbRemoveNode+0x1dec17
fffff802`63275c10 fffff802`5ce43060     : ffff8782`9d191d10 00000000`00000000 00000000`00000005 ffff8782`9d191d10 : nt!KiRemoveTimer2+0x95
fffff802`63275c60 fffff802`5ce07184     : fffff802`5a6b3180 00000000`00000000 00000000`00000008 00000000`009e3f8b : nt!KiTimer2Expiration+0x200
fffff802`63275d20 fffff802`5cffcc95     : 00000000`00000000 fffff802`5a6b3180 fffff802`5d8f3ba0 0ea0ea0e`a0ea0ea1 : nt!KiRetireDpcList+0x874
fffff802`63275fb0 fffff802`5cffca80     : 00000000`00000140 fffff802`5ceec5ca 00000000`00000000 00000000`00000001 : nt!KxRetireDpcList+0x5
ffffa905`d0f979c0 fffff802`5cffc335     : 0ea0ea0e`a0ea0ea1 fffff802`5cff7ce1 00000188`81394700 ffffa905`d0f97a80 : nt!KiDispatchInterruptContinue
ffffa905`d0f979f0 fffff802`5cff7ce1     : 00000188`81394700 ffffa905`d0f97a80 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x25
ffffa905`d0f97a00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.867

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_1d_INVALID_BALANCED_TREE_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {67ec97ad-ad0b-071e-ab87-6dc661e22d1b}

Followup:     MachineOwner
---------
 
RAM testi yaptım sorun yok resim ekledim. Sfc /scannow yaptım sonuçu resim olarak yükledim. Virüs taraması da yaptım virüs mevcut değil. Cbs.log ektedir.

cbs.log
 

Dosya Ekleri

  • WhatsApp Image 2021-03-16 at 00.03.49 (1).jpeg
    WhatsApp Image 2021-03-16 at 00.03.49 (1).jpeg
    73,4 KB · Görüntüleme: 16
  • WhatsApp Image 2021-03-16 at 00.03.49.jpeg
    WhatsApp Image 2021-03-16 at 00.03.49.jpeg
    123,6 KB · Görüntüleme: 18
  • WhatsApp Image 2021-03-16 at 00.05.55.jpeg
    WhatsApp Image 2021-03-16 at 00.05.55.jpeg
    64,2 KB · Görüntüleme: 16
Son düzenleme:
Teşekkürler sağolun.
İyi günler yine mavi ekran aldım. Minidump bırakıyorum şimdiden teşekkürler.
https://drive.google.com/file/d/1uBoQgeaoTROtHBBPdH2LaBGwkLHMmK6m/view?usp=sharing

Yine sorun yaşarsanız minidump paylaşın tekrar bakayım.
Teşekkürler sağ olun.
İyi günler yine mavi ekran aldım. Minidump bırakıyorum şimdiden teşekkürler.
https://drive.google.com/file/d/1uBoQgeaoTROtHBBPdH2LaBGwkLHMmK6m/view?usp=sharing

Linki yanlış yazmışım.
minidump
Pc de anakart ve ekran kartı sorunu varmış 0 ile değişti iyi forumlar
Laptopta anakart ve ekran kartında sorun varmış laptop değişime gitti.
Laptopta anakart ile ekran kartı sorunlu çıktı.
 
Son düzenleme:
Çözüm
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı