KERNEL_SECURITY_FAILURE mavi ekran hatası

Mesut Kaya

Kilopat
Katılım
21 Haziran 2016
Mesajlar
34
Daha fazla  
Cinsiyet
Erkek
Merhaba, ortalama olarak haftada 1 kez (KERNEL_SECURITY_FAILURE) mavi ekran hatasını alıyorum; Memtest86 sonucunda RAM'lerde sorun çıkmadı. İnternet bağlantım kabloludur. Minidump dosyası linktedir yardımcı olursanız sevinirim, teşekkürler.
 
Son düzenleyen: Moderatör:
Memtest86'nın hangi sürümünü kullandınız? Sorun kesinlikle bellek ile alakalı. Ya belleklerin kendisi arızalı ya da işlemci Intel ise soğutucu fazla sıkılmış. Ya da anakartın bellek yuvasında bir sorun var.

Bana kalırsa belleklerin kendisi arızalı.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
extents for the thread.
Arg2: ffffc3003eb9dff0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc3003eb9df48, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 3

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffc3003eb9dff0

BUGCHECK_P3: ffffc3003eb9df48

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc3003eb9dff0 -- (.trap 0xffffc3003eb9dff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffe8e27d04000 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffe8e27d0a000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075744e2d3 rsp=ffffc3003eb9e180 rbp=ffffc3003eb9e6f0
r8=fffffe8e27d0a000 r9=ffffc3003eb9e701 r10=ffffd989c7252080
r11=000000007aeab6a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12e557:
fffff807`5744e2d3 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD:  ffffc3003eb9df48 -- (.exr 0xffffc3003eb9df48)
ExceptionAddress: fffff8075744e2d3 (nt!RtlpGetStackLimitsEx+0x000000000012e557)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: vegas170.exe

WATSON_BKT_EVENT: BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000004

EXCEPTION_STR: 0xc0000409

BAD_STACK_POINTER: ffffc3003eb9dcc8

STACK_TEXT:
ffffc300`3eb9dcc8 fffff807`573d1ae9 : 00000000`00000139 00000000`00000004 ffffc300`3eb9dff0 ffffc300`3eb9df48 : nt!KeBugCheckEx
ffffc300`3eb9dcd0 fffff807`573d1f10 : 00000080`00000030 00090000`00000000 00010018`00000064 00010000`00000eda : nt!KiBugCheckDispatch+0x69
ffffc300`3eb9de10 fffff807`573d02a5 : fffff807`57326958 fffff807`5760d024 ffffc300`3eb9e7d0 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc300`3eb9dff0 fffff807`5744e2d3 : 00000000`00000000 00000000`000002f5 0005e4a0`00ab5000 00000000`0010001f : nt!KiRaiseSecurityCheckFailure+0x325
ffffc300`3eb9e180 fffff807`5742db82 : fffffe8e`27d098c8 00000000`00000000 ffffc300`3eb9e6f0 00007fff`00000003 : nt!RtlpGetStackLimitsEx+0x12e557
ffffc300`3eb9e1b0 fffff807`572c738e : fffffe8e`27d098c8 ffffc300`3eb9ee30 fffffe8e`27d098c8 00000000`00090fb0 : nt!RtlDispatchException+0x16b232
ffffc300`3eb9e900 fffff807`573c0b42 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffc300`3eb9efb0 fffff807`573c0b10 : fffff807`573d1c16 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffffe8e`27d09788 fffff807`573d1c16 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue
fffffe8e`27d09790 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x116


SYMBOL_NAME: nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.295

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: d0

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup: MachineOwner
---------


SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80625045d5d, Address of the instruction which caused the bugcheck
Arg3: ffffa58e24de1af0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 22

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80625045d5d

BUGCHECK_P3: ffffa58e24de1af0

BUGCHECK_P4: 0

CONTEXT:  ffffa58e24de1af0 -- (.cxr 0xffffa58e24de1af0)
rax=0000000000001de0 rbx=fffbdf0832a00000 rcx=ffffc78035a30858
rdx=0000000000000020 rsi=ffffdf084d9d0700 rdi=ffffdf084d9d06f0
rip=fffff80625045d5d rsp=ffffa58e24de24e0 rbp=0000000064536553
r8=0000000000000030 r9=ffffc78035a00000 r10=0000000000000000
r11=0000000000000fff r12=0000000000000ddd r13=0000000000000001
r14=0000000000000070 r15=0000000000000003
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ExFreeHeapPool+0x21d:
fffff806`25045d5d 488b5328 mov rdx,qword ptr [rbx+28h] ds:002b:fffbdf08`32a00028=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffffa58e`24de24e0 fffff806`2536e0a9 : 00000000`00000000 ffffdf08`65daa2d0 ffffa58e`24de2770 01000000`00100000 : nt!ExFreeHeapPool+0x21d
ffffa58e`24de2600 fffff806`255c9dde : ffff8006`00000054 ffffa58e`24de2660 00000000`00000010 00000000`00000054 : nt!ExFreePool+0x9
ffffa58e`24de2630 fffff806`255db4dd : ffff8006`87c16ce0 ffffa58e`24de2770 ffffa58e`24de2770 00000000`00000000 : nt!SeDefaultObjectMethod+0x5e
ffffa58e`24de2690 fffff806`255d8e2a : 00000000`08000000 00000000`00000001 00000000`00000001 00000000`08000000 : nt!ObInsertObjectEx+0x37d
ffffa58e`24de2940 fffff806`255d8b30 : 0000001d`859fef80 00000000`000f0007 0000001d`859fef98 ffff8006`80b31400 : nt!MiCreateSectionCommon+0x28a
ffffa58e`24de2a20 fffff806`251d2918 : ffff8006`851ed080 0000001d`859ff7d8 ffffa58e`24de2aa8 0000018a`d4c6ebb0 : nt!NtCreateSection+0x60
ffffa58e`24de2a90 00007ffc`fa35ca14 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001d`859fef28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`fa35ca14


SYMBOL_NAME: nt!ExFreePool+9

IMAGE_NAME: Pool_Corruption

IMAGE_VERSION: 10.0.18362.329

MODULE_NAME: Pool_Corruption

STACK_COMMAND:  .cxr 0xffffa58e24de1af0 ; kb

BUCKET_ID_FUNC_OFFSET: 9

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!ExFreePool

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {c9913766-80de-cdf5-a1a8-15c856d3f064}

Followup: Pool_corruption
---------


MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 00007ff9b4d7c9c0
Arg3: 000000000000001d
Arg4: ffffc68c06325b00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 2

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 8

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 7ff9b4d7c9c0

BUGCHECK_P3: 1d

BUGCHECK_P4: ffffc68c06325b00

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: audiodg.exe

STACK_TEXT:
ffffc68c`06325958 fffff805`2da0ce62 : 00000000`0000001a 00000000`00061941 00007ff9`b4d7c9c0 00000000`0000001d : nt!KeBugCheckEx
ffffc68c`06325960 fffff805`2d9cf120 : 000001ec`00000000 ffffc68c`00000001 000001ec`5a2d7580 ffffc68c`06325b80 : nt!MmAccessFault+0x19a0f2
ffffc68c`06325b00 00007ff9`b4d7c9c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
00000071`56efe908 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`b4d7c9c0


SYMBOL_NAME: ANALYSIS_INCONCLUSIVE

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x1a_61941_ANALYSIS_INCONCLUSIVE!unknown_function

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {5deef4f7-7ffd-da2a-fbcb-ad563ba13c90}

Followup: MachineOwner
---------


PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa48f326e27c8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80125a9e79e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec
Value: 3

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-HH6FM2D

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.Sec
Value: 6

Key : Analysis.Memory.CommitPeak.Mb
Value: 67

Key : Analysis.System
Value: CreateObject


BUGCHECK_CODE: 50

BUGCHECK_P1: ffffa48f326e27c8

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80125a9e79e

BUGCHECK_P4: 2

READ_ADDRESS: fffff801257723b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801256293b8: Unable to get Flags value from nt!KdVersionBlock
fffff801256293b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa48f326e27c8

MM_INTERNAL_CODE: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: Steam.exe

TRAP_FRAME:  ffff9d8da4fc2630 -- (.trap 0xffff9d8da4fc2630)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffa48f326e27 rbx=0000000000000000 rcx=0000000000000027
rdx=ffffa48f326e27e0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80125a9e79e rsp=ffff9d8da4fc27c8 rbp=ffffcf87b607c640
r8=0000000000000000 r9=ffffa48f326e27b0 r10=0000000000131900
r11=ffff9d8da4fc2810 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei pl nz na po cy
nt!ObpCaptureHandleInformation+0x8e:
fffff801`25a9e79e 410fb64118 movzx eax,byte ptr [r9+18h] ds:ffffa48f`326e27c8=??
Resetting default scope

STACK_TEXT:
ffff9d8d`a4fc2388 fffff801`253e31d6 : 00000000`00000050 ffffa48f`326e27c8 00000000`00000000 ffff9d8d`a4fc2630 : nt!KeBugCheckEx
ffff9d8d`a4fc2390 fffff801`252730bf : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa48f`326e27c8 : nt!MiSystemFault+0x1d64a6
ffff9d8d`a4fc2490 fffff801`253cf120 : 00000000`00000120 ffff9d8d`a4fc26b0 ffffba81`e7800050 00000000`00000000 : nt!MmAccessFault+0x34f
ffff9d8d`a4fc2630 fffff801`25a9e79e : fffff801`25b0bd49 00000000`00001e34 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x360
ffff9d8d`a4fc27c8 fffff801`25b0bd49 : 00000000`00001e34 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCaptureHandleInformation+0x8e
ffff9d8d`a4fc27d0 fffff801`25b095d5 : fffff801`25a9e710 ffffcf87`b607c658 ffff9d8d`0017fffc 00000000`0017fffc : nt!ExpSnapShotHandleTables+0x131
ffff9d8d`a4fc2860 fffff801`259a6bf8 : 00000000`11d9c050 ffffa48d`00020000 00000800`00131900 ffffba81`e7800050 : nt!ExpGetHandleInformation+0x71
ffff9d8d`a4fc28b0 fffff801`257e019b : 00000000`00180010 00000000`00000000 00000000`00000002 00000000`0000c000 : nt!ExpQuerySystemInformation+0x1c6938
ffff9d8d`a4fc2ac0 fffff801`253d2918 : ffffa48d`3632b080 00000000`0a8afec4 00000000`00000001 ffff9d8d`a4fc2b80 : nt!NtQuerySystemInformation+0x2b
ffff9d8d`a4fc2b00 00007ffd`961dc794 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`041fdea8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`961dc794


SYMBOL_NAME: nt!ObpCaptureHandleInformation+8e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION: 10.0.18362.329

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 8e

FAILURE_BUCKET_ID: AV_R_INVALID_nt!ObpCaptureHandleInformation

OS_VERSION: 10.0.18362.1

BUILDLAB_STR: 19h1_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ca33f0ed-ea4f-08da-9cd1-d248328d82af}

Followup: MachineOwner
---------


KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack
    extents for the thread.
Arg2: ffffa78019e464f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffa78019e46448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.Sec
    Value: 3

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-HH6FM2D

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 3

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 67

    Key  : Analysis.System
    Value: CreateObject


BUGCHECK_CODE:  139

BUGCHECK_P1: 4

BUGCHECK_P2: ffffa78019e464f0

BUGCHECK_P3: ffffa78019e46448

BUGCHECK_P4: 0

TRAP_FRAME:  ffffa78019e464f0 -- (.trap 0xffffa78019e464f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff8a8f816fd000 rbx=0000000000000000 rcx=0000000000000004
rdx=ffff8a8f81703000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064be4ecc7 rsp=ffffa78019e46680 rbp=ffffa78019e466f0
 r8=ffff8a8f81703000  r9=ffffa78019e46710 r10=ffffe6817242e080
r11=ffffa78019e00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!RtlpGetStackLimitsEx+0x12e6cb:
fffff806`4be4ecc7 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffa78019e46448 -- (.exr 0xffffa78019e46448)
ExceptionAddress: fffff8064be4ecc7 (nt!RtlpGetStackLimitsEx+0x000000000012e6cb)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000004
Subcode: 0x4 FAST_FAIL_INCORRECT_STACK

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000004

EXCEPTION_STR:  0xc0000409

BAD_STACK_POINTER:  ffffa78019e461c8

STACK_TEXT: 
ffffa780`19e461c8 fffff806`4bdd2ee9 : 00000000`00000139 00000000`00000004 ffffa780`19e464f0 ffffa780`19e46448 : nt!KeBugCheckEx
ffffa780`19e461d0 fffff806`4bdd3310 : 00000001`ffffffff fffffff6`00000008 00020000`00060b51 00000000`00520068 : nt!KiBugCheckDispatch+0x69
ffffa780`19e46310 fffff806`4bdd16a5 : 00000000`00000000 ffffe681`65f8d080 00000000`00000000 00001f80`00dc02f5 : nt!KiFastFailDispatch+0xd0
ffffa780`19e464f0 fffff806`4be4ecc7 : ffffa780`19e46930 ffffa780`19dffdc8 00000001`00000010 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
ffffa780`19e46680 fffff806`4bcc3171 : ffffa780`19e46930 ffffa780`19dffdc8 000004e8`fffffb30 000004d0`00000003 : nt!RtlpGetStackLimitsEx+0x12e6cb
ffffa780`19e466b0 fffff806`4bcc7aee : ffffa780`19dffdc8 ffffa780`19e46e30 ffffa780`19dffdc8 ffffa780`19d9c240 : nt!RtlDispatchException+0xc1
ffffa780`19e46900 fffff806`4bdc1f22 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x16e
ffffa780`19e46fb0 fffff806`4bdc1ef0 : fffff806`4bdd3016 00000000`3e3e0c90 00000070`00000030 00020000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa780`19dffc88 fffff806`4bdd3016 : 00000000`3e3e0c90 00000070`00000030 00020000`00000000 00010018`00000054 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa780`19dffc90 fffff806`4bdcd5ab : 00000000`7461632e 00000028`00000100 00030000`00180400 00000020`00000008 : nt!KiExceptionDispatch+0x116
ffffa780`19dffe70 fffff806`4bfc7e27 : 00000000`43636450 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x32b
ffffa780`19e00000 00000000`43636450 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000005f0 : nt!_xmm+0x233e7
ffffa780`19e00008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`000005f0 00000000`00000174 : 0x43636450


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.18362.356

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_STACKPTR_ERROR_nt!KiFastFailDispatch

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {7b0febb5-6007-4f2b-3d38-57fef278d8d5}

Followup:     MachineOwner
---------
 
Memtest86'in sitesinde bulunan güncel versiyonu kurdum, ramlere "OC" yaptığım zaman aldığım mavi ekran hatalarıda kayıtlı baktığınız yerde onları tekrar düzelttim, şuan benim için tek sorun ve aldığım tek mavi ekran " KERNEL_SECURITY_FAILURE" hatasıdır. Mavi ekran hatasını pc yükte değilken alıyorum. Anakart için birşey diyemeyeceğim.
 
Uyarı! Bu konu 7 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Yeni konular

Geri
Yukarı