Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bsod on win 10 18362.145 #92

Open
baby0o01999 opened this issue Feb 28, 2023 · 1 comment
Open

bsod on win 10 18362.145 #92

baby0o01999 opened this issue Feb 28, 2023 · 1 comment

Comments

@baby0o01999
Copy link

(Please use this issue template for a bug report. You need not use it for any other type of issues.)

Description

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack extents for the thread.
Arg2: fffff8030b8904f0, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff8030b890448, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

0: kd> dd fffff8030b8904f0
fffff8030b8904f0 00000000 00000000 0b890930 fffff803 fffff8030b890500 00000046 00000000 073bdbcf fffff803
fffff8030b890510 0b890930 fffff803 01890590 00001f80 fffff8030b890520 1430b000 ffff9907 00000004 00000000
fffff8030b890530 14311000 ffff9907 14311000 ffff9907 fffff8030b890540 0b890700 fffff803 d755d040 ffffb682
fffff8030b890550 f9c7be58 ffffb682 0b890710 fffff803 fffff8030b890560 00000000 00000000 00000000 00000000

0: kd> dd fffff8030b890448
fffff8030b890448 c0000409 00000001 00000000 00000000 fffff8030b890458 0744fa87 fffff803 00000001 00000000
fffff8030b890468 00000004 00000000 d755d040 ffffb682 fffff8030b890478 f9c7be58 ffffb682 00000000 00000000
fffff8030b890488 00000000 00000000 00000000 00000000 fffff8030b890498 00000000 00000000 00000000 00000000
fffff8030b8904a8 00000000 00000000 00000000 00000000 fffff8030b8904b8 00000000 00000000 00000000 00000000

STACK_TEXT:

STACK_TEXT:
fffff80313373d3f 0000000000000000 000000009e80f172 0000000000000008 : nt!KiGeneralProtectionFault+0x31c
0000000000000000 000000009e80f172 0000000000000008 0000000000000398 : ddimon+0x22c0 // UtilVmWrite
000000009e80f172 0000000000000008 0000000000000398 ffffb682f9c7bf70 : ddimon+0x3d3f //VmmpHandleMsrAccess


// Reads natural-width VMCS
Use_decl_annotations ULONG_PTR UtilVmRead(VmcsField field)
{
size_t field_value = 0;
const auto vmx_status = static_cast(__vmx_vmread(static_cast<size_t>(field), &field_value));
if (vmx_status != VmxStatus::kOk)
{
//BSOD
HYPERPLATFORM_COMMON_BUG_CHECK(
HyperPlatformBugCheck::kCriticalVmxInstructionFailure,
static_cast<ULONG_PTR>(vmx_status), static_cast<ULONG_PTR>(field), 0);
}
return field_value;
}

Specifications

Microsoft Windows [Version 10.0.18362.145]

  • Architecture: (Please choose: x86, x64, Both, or N/A)
    x64
  • Hardware (eg, Physical, VMware 15, Bochs, or N/A): (Please fill in)
    e3 1230-v3 32G
@baby0o01999
Copy link
Author

readmsr(26660)

Giving the wrong value also causes a blue screen

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant