ntoskrnl.exe mavi ekran hatası

ikalem

Decapat
Katılım
4 Kasım 2020
Mesajlar
34
Daha fazla  
Cinsiyet
Erkek
Mavi ekran hatası alıyorum. Windows en son surumu ve driverlarım kuruludur.

Sistem:
AMD Ryzen 3500X.
G.Skill 16 GB flare X DDR4 3200MHz.
Crucial 1TB BX500 SSD.
Gigabyte B450M S2H.


Minidump dosyayı ekledim.
Yardımlarınızı bekliyorum şimdiden çok teşekkür ederim.

Not: One Drive baslangıçta çalışmasını da durdurdum.
 
Son düzenleyen: Moderatör:
  1. Malwarebytes ve Kaspersky ile sisteminizde tarama yapın.
  2. Realtek'e ait ethernet sürücünüzü güncelleyin.
  3. Ekran kartınızı DDU ile kaldırıp WHQL bir sürüm yükleyin.
 
Son düzenleme:
HD Sentinel ile diskinizin sağlık durumunu paylaşınız.
Memtest86 ile bellek testi yapınız.
Bu içeriği görüntülemek için üçüncü taraf çerezlerini yerleştirmek için izninize ihtiyacımız olacak.
Daha detaylı bilgi için, çerezler sayfamıza bakınız.
DDU ile ekran kartı sürücünüzü kaldırıp WHQL bir sürümünü kurunuz.
Bu rehberi uygulayınız.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000002, Stack cookie instrumentation code detected a stack-based
    buffer overrun.
Arg2: ffffc508103aa3b0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffc508103aa308, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-J7A11VA

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 33959

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  139

BUGCHECK_P1: 2

BUGCHECK_P2: ffffc508103aa3b0

BUGCHECK_P3: ffffc508103aa308

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc508103aa3b0 -- (.trap 0xffffc508103aa3b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000103 rbx=0000000000000000 rcx=0000000000000002
rdx=ffff87893aba0b20 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80610431655 rsp=ffffc508103aa548 rbp=0000000000000004
r8=ffff87893aba0b20  r9=0000000000000000 r10=ffff878931c20cc0
r11=ffff87893b5d3c40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz ac po cy
Ntfs!_report_gsfailure+0x5:
fffff806`10431655 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  ffffc508103aa308 -- (.exr 0xffffc508103aa308)
ExceptionAddress: fffff80610431655 (Ntfs!_report_gsfailure+0x0000000000000005)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000002
Subcode: 0x2 FAST_FAIL_STACK_COOKIE_CHECK_FAILURE

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  MsMpEng.exe

WATSON_BKT_EVENT:  BEX

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000002

EXCEPTION_STR:  0xc0000409

STACK_TEXT:
ffffc508`103aa088 fffff806`0b406569     : 00000000`00000139 00000000`00000002 ffffc508`103aa3b0 ffffc508`103aa308 : nt!KeBugCheckEx
ffffc508`103aa090 fffff806`0b406990     : ffff8789`3998d080 00000000`00000004 ffffb28b`00000003 fffff806`0b2c73a2 : nt!KiBugCheckDispatch+0x69
ffffc508`103aa1d0 fffff806`0b404d23     : 00000000`00000000 ffffb28b`0ce8feb0 ffff8789`3b5d3c80 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffc508`103aa3b0 fffff806`10431655     : fffff806`104de8e0 ffff8789`3b5d3c48 00000000`00000000 ffffc508`00000103 : nt!KiRaiseSecurityCheckFailure+0x323
ffffc508`103aa548 fffff806`104de8e0     : ffff8789`3b5d3c48 00000000`00000000 ffffc508`00000103 ffff8789`00000000 : Ntfs!_report_gsfailure+0x5
ffffc508`103aa550 fffff806`104de45d     : ffff8789`3b5d3c48 00000000`00000001 00000000`00000000 00000000`00000000 : Ntfs!NtfsUserFsRequest+0x160
ffffc508`103aa5d0 fffff806`0b2cd805     : ffff8789`3b3e46e0 fffff806`0a0a4b46 ffff8789`38f22a20 ffffc508`103a5000 : Ntfs!NtfsFsdFileSystemControl+0x17d
ffffc508`103aa6f0 fffff806`0a0a6ccf     : 00000000`00000000 00000000`00000000 00000000`0000009b 00000006`00000000 : nt!IofCallDriver+0x55
ffffc508`103aa730 fffff806`0a0dcaf4     : ffffc508`103aa7c0 00000000`00000000 00000000`000000e0 ffff8789`31069580 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffc508`103aa7a0 fffff806`0b2cd805     : 00000000`0000000a ffff8789`38f22a20 00000000`00000002 00000000`00000001 : FLTMGR!FltpFsControl+0x104
ffffc508`103aa800 fffff806`0b6c2528     : ffff8789`38f22a20 00000000`00000000 00000000`00000000 ffff8789`3998d080 : nt!IofCallDriver+0x55
ffffc508`103aa840 fffff806`0b6c1df5     : 00000000`00090240 ffffc508`103aab80 00000000`00040005 ffffc508`103aab80 : nt!IopSynchronousServiceTail+0x1a8
ffffc508`103aa8e0 fffff806`0b66c486     : 00000000`00000000 00000000`00000000 00000000`00000000 00007ffd`248245d8 : nt!IopXxxControlFile+0x5e5
ffffc508`103aaa20 fffff806`0b405fb8     : 00000000`00000000 fffff806`0b656af7 00000000`00000000 00000000`00000000 : nt!NtFsControlFile+0x56
ffffc508`103aaa90 00007ffd`3ca2c4b4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001c`1857f2c8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`3ca2c4b4


SYMBOL_NAME:  nt!KiFastFailDispatch+d0

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  d0

FAILURE_BUCKET_ID:  0x139_MISSING_GSFRAME_nt!KiFastFailDispatch

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1971a9b0-b7ec-89bf-0a51-10ac52818da5}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
SSD sağlam ekteki dosyada SSD'nin raporunu görebilirsiniz.

Ayrıca SSD kontrol ederken 2 kere mavi ekran hatası verdi onlarda aynı dosyanın içinde.

 
Son düzenleyen: Moderatör:

Yeni konular

Geri
Yukarı