Çözüldü KERNEL_SECURITY_CHECK_FAILURE mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

bukibuks

Hectopat
Katılım
6 Temmuz 2019
Mesajlar
511
Makaleler
1
Çözümler
3
Eski bilgisayarımda annem kullanırken mavi ekran almış. Daha sonra da boot etmemiş. Çıkan mavi ekran hakkında Windbg'den çıkan durum bu. Yorumlarınızı bekliyorum.

Sistem özellikleri:
Phenom 2 955
2+4 GB DDR3 1333MHz
1GB HD 5770
120GB James Donkey SSD
700W Huntkey PSU

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: fffff8070da6e240, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-JN83BD7

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 746

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  139

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8070da6e240

TRAP_FRAME:  ffffe68f67c1d1a0 -- (.trap 0xffffe68f67c1d1a0)
Unable to read trap frame at ffffe68f`67c1d1a0

EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

DPC_STACK_BASE:  FFFFF8070DA6EFB0

STACK_TEXT:
fffff807`0da6da58 fffff807`081c9f8b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff807`0da6da60 fffff807`081ca30f : fffff807`08511000 fffff807`08000000 0005e560`00ab6000 00000000`0010001f : nt!guard_icall_handler+0x1b
fffff807`0da6da90 fffff807`080c33c5 : fffff807`0da6e9f8 00000000`00000000 fffff807`0da6e000 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff807`0da6dac0 fffff807`080c795e : fffff807`0da6e9f8 fffff807`0da6e740 fffff807`0da6e9f8 fffff807`062e2180 : nt!RtlDispatchException+0x4a5
fffff807`0da6e210 fffff807`081d341d : ffffe68f`724c9650 ffffe68f`67c4e1b0 ffffe68f`67c1d1a0 ffffe68f`6d48e2e0 : nt!KiDispatchException+0x16e
fffff807`0da6e8c0 fffff807`081cf1a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
fffff807`0da6eaa0 fffff807`081ca061 : fffff807`0806ae95 fffff807`062e4f80 ffffe68f`673c6000 fffff807`062e2180 : nt!KiGeneralProtectionFault+0x322
fffff807`0da6ec38 fffff807`0806ae95 : fffff807`062e4f80 ffffe68f`673c6000 fffff807`062e2180 00000000`00000002 : nt!guard_dispatch_icall+0x71
fffff807`0da6ec40 fffff807`0806a4ef : 00000000`00000012 00000000`00da7a64 00000000`00d003f8 00000000`00000010 : nt!KiExecuteAllDpcs+0x305
fffff807`0da6ed80 fffff807`081c8525 : 00000000`00000000 fffff807`062e2180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffff807`0da6efb0 fffff807`081c8310 : 00000000`00000000 00000000`02000102 ffffe68f`7610a730 ffffe68f`7610a6d0 : nt!KxRetireDpcList+0x5
ffff8984`3f106bf0 fffff807`081c79e0 : ffffe68f`7610a6d0 ffff8984`3f106ca0 fffff807`07fcc0e0 ffff8984`00000000 : nt!KiDispatchInterruptContinue
ffff8984`3f106c20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0


SYMBOL_NAME:  nt!guard_icall_handler+1b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.476

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_handler

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9ac18088-8c91-40fd-01fb-5255bc467cba}

Followup:     MachineOwner
---------
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Geri
Yukarı