FX 8300 - GTX 750Ti sistemde mavi ekran hataları

EnesK01

Decapat
Katılım
3 Nisan 2023
Mesajlar
98
Çözümler
1
Son iki aydır sürekli mavi ekran yiyorum, ne yaptıysam düzeltemedim. Windows'u açtığım gibi yiyorum, bazen oyun ortasında yiyorum. Sık sık oluyor. Anlayan varsa yardımcı olursa sevinirim. WinDbg raporu:
Sistem: 750 Ti 2 GB, 16 GB 1600MHz RAM. FX 8300 işlemci.

Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
 ExtensionRepository : Implicit
 UseExperimentalFeatureForNugetShare : true
 AllowNugetExeUpdate : true
 NonInteractiveNuget : true
 AllowNugetMSCredentialProviderInstall : true
 AllowParallelInitializationOfLocalRepositories : true

 EnableRedirectToV8JsProvider : false

 -- Configuring repositories
 ----> Repository : LocalInstalled, Enabled: true
 ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.375 seconds
 ----> Repository : UserExtensions, Enabled: true, Packages count: 0
 ----> Repository : LocalInstalled, Enabled: true, Packages count: 41

Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\The-_\Desktop\041524-6000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff803`6ae00000 PsLoadedModuleList = 0xfffff803`6ba2a790
Debug session time: Mon Apr 15 21:40:29.400 2024 (UTC + 3:00)
System Uptime: 0 days 22:49:19.233
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols

Loading unloaded module list
.............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`6b1fda40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffea8f`03be9450=0000000000000139
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000eac, Type of memory safety violation
Arg2: ffffea8f03be9770, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffea8f03be96c8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 4749

 Key : Analysis.Elapsed.mSec
 Value: 6400

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 1155

 Key : Analysis.Init.Elapsed.mSec
 Value: 11700

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 89

 Key : Bugcheck.Code.LegacyAPI
 Value: 0x139

 Key : Bugcheck.Code.TargetModel
 Value: 0x139

 Key : FailFast.Type
 Value: 3756

 Key : Failure.Bucket
 Value: 0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

 Key : Failure.Hash
 Value: {dde04553-d42f-b4d7-f06a-e1871a067075}

 Key : WER.OS.Branch
 Value: vb_release

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: 139

BUGCHECK_P1: eac

BUGCHECK_P2: ffffea8f03be9770

BUGCHECK_P3: ffffea8f03be96c8

BUGCHECK_P4: 0

FILE_IN_CAB: 041524-6000-01.dmp

TRAP_FRAME: ffffea8f03be9770 -- (.trap 0xffffea8f03be9770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffffff27a0869 rbx=0000000000000000 rcx=0000000000000eac
rdx=fffff804c107c3e9 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804c107c3ee rsp=ffffea8f03be9908 rbp=0000000000000004
 r8=ffffea8f03be9ff0 r9=ffffea8f03be9fd0 r10=0000000000000084
r11=fffff804c1a9739e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
EasyAntiCheat_EOS+0x3ac3ee:
fffff804`c107c3ee cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffea8f03be96c8 -- (.exr 0xffffea8f03be96c8)
ExceptionAddress: fffff804c107c3ee (EasyAntiCheat_EOS+0x00000000003ac3ee)
 ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
 ExceptionFlags: 00000001
NumberParameters: 1
 Parameter[0]: 0000000000000eac
Subcode: 0xeac (unknown subcode)

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad . Bu ta ma, k t niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000eac

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffea8f`03be9448 fffff803`6b212269 : 00000000`00000139 00000000`00000eac ffffea8f`03be9770 ffffea8f`03be96c8 : nt!KeBugCheckEx
ffffea8f`03be9450 fffff803`6b212810 : 00000000`00000000 00000630`00608086 00000000`c0011020 00400000`00000000 : nt!KiBugCheckDispatch+0x69
ffffea8f`03be9590 fffff803`6b2106ae : ffffffff`f96af5ff fffff803`6b200321 00000000`00000000 ff389123`f0d87e95 : nt!KiFastFailDispatch+0xd0
ffffea8f`03be9770 fffff804`c107c3ee : 78023488`fc98c9df fe3e60f6`ffffffff f9ae0c30`f50586b8 fe727878`f07d9183 : nt!KiRaiseSecurityCheckFailure+0x32e
ffffea8f`03be9908 78023488`fc98c9df : fe3e60f6`ffffffff f9ae0c30`f50586b8 fe727878`f07d9183 27395477`f5a76cc0 : EasyAntiCheat_EOS+0x3ac3ee
ffffea8f`03be9910 fe3e60f6`ffffffff : f9ae0c30`f50586b8 fe727878`f07d9183 27395477`f5a76cc0 950a5c07`ffffffff : 0x78023488`fc98c9df
ffffea8f`03be9918 f9ae0c30`f50586b8 : fe727878`f07d9183 27395477`f5a76cc0 950a5c07`ffffffff 85443f38`8c935d28 : 0xfe3e60f6`ffffffff
ffffea8f`03be9920 fe727878`f07d9183 : 27395477`f5a76cc0 950a5c07`ffffffff 85443f38`8c935d28 00000000`00000000 : 0xf9ae0c30`f50586b8
ffffea8f`03be9928 27395477`f5a76cc0 : 950a5c07`ffffffff 85443f38`8c935d28 00000000`00000000 00000000`00000000 : 0xfe727878`f07d9183
ffffea8f`03be9930 950a5c07`ffffffff : 85443f38`8c935d28 00000000`00000000 00000000`00000000 00000000`00000000 : 0x27395477`f5a76cc0
ffffea8f`03be9938 85443f38`8c935d28 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x950a5c07`ffffffff
ffffea8f`03be9940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x85443f38`8c935d28

SYMBOL_NAME: EasyAntiCheat_EOS+3ac3ee

MODULE_NAME: EasyAntiCheat_EOS

IMAGE_NAME: EasyAntiCheat_EOS.sys

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 3ac3ee

FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_EasyAntiCheat_EOS!unknown_function

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {dde04553-d42f-b4d7-f06a-e1871a067075}

Followup: MachineOwner
---------
 

Technopat Haberler

Yeni konular

Geri
Yukarı