bukibuks
Hectopat
- Katılım
- 6 Temmuz 2019
- Mesajlar
- 511
- Makaleler
- 1
- Çözümler
- 3
Eski bilgisayarımda annem kullanırken mavi ekran almış. Daha sonra da boot etmemiş. Çıkan mavi ekran hakkında Windbg'den çıkan durum bu. Yorumlarınızı bekliyorum.
Sistem özellikleri:
Phenom 2 955
2+4 GB DDR3 1333MHz
1GB HD 5770
120GB James Donkey SSD
700W Huntkey PSU
Sistem özellikleri:
Phenom 2 955
2+4 GB DDR3 1333MHz
1GB HD 5770
120GB James Donkey SSD
700W Huntkey PSU
Kod:
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: fffff8070da6e240, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-JN83BD7
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 746
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 139
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8070da6e240
TRAP_FRAME: ffffe68f67c1d1a0 -- (.trap 0xffffe68f67c1d1a0)
Unable to read trap frame at ffffe68f`67c1d1a0
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
DPC_STACK_BASE: FFFFF8070DA6EFB0
STACK_TEXT:
fffff807`0da6da58 fffff807`081c9f8b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff807`0da6da60 fffff807`081ca30f : fffff807`08511000 fffff807`08000000 0005e560`00ab6000 00000000`0010001f : nt!guard_icall_handler+0x1b
fffff807`0da6da90 fffff807`080c33c5 : fffff807`0da6e9f8 00000000`00000000 fffff807`0da6e000 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
fffff807`0da6dac0 fffff807`080c795e : fffff807`0da6e9f8 fffff807`0da6e740 fffff807`0da6e9f8 fffff807`062e2180 : nt!RtlDispatchException+0x4a5
fffff807`0da6e210 fffff807`081d341d : ffffe68f`724c9650 ffffe68f`67c4e1b0 ffffe68f`67c1d1a0 ffffe68f`6d48e2e0 : nt!KiDispatchException+0x16e
fffff807`0da6e8c0 fffff807`081cf1a2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0x11d
fffff807`0da6eaa0 fffff807`081ca061 : fffff807`0806ae95 fffff807`062e4f80 ffffe68f`673c6000 fffff807`062e2180 : nt!KiGeneralProtectionFault+0x322
fffff807`0da6ec38 fffff807`0806ae95 : fffff807`062e4f80 ffffe68f`673c6000 fffff807`062e2180 00000000`00000002 : nt!guard_dispatch_icall+0x71
fffff807`0da6ec40 fffff807`0806a4ef : 00000000`00000012 00000000`00da7a64 00000000`00d003f8 00000000`00000010 : nt!KiExecuteAllDpcs+0x305
fffff807`0da6ed80 fffff807`081c8525 : 00000000`00000000 fffff807`062e2180 00000000`00000000 00000000`00000000 : nt!KiRetireDpcList+0x1ef
fffff807`0da6efb0 fffff807`081c8310 : 00000000`00000000 00000000`02000102 ffffe68f`7610a730 ffffe68f`7610a6d0 : nt!KxRetireDpcList+0x5
ffff8984`3f106bf0 fffff807`081c79e0 : ffffe68f`7610a6d0 ffff8984`3f106ca0 fffff807`07fcc0e0 ffff8984`00000000 : nt!KiDispatchInterruptContinue
ffff8984`3f106c20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt+0x2f0
SYMBOL_NAME: nt!guard_icall_handler+1b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.476
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_handler
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9ac18088-8c91-40fd-01fb-5255bc467cba}
Followup: MachineOwner
---------