#电脑蓝屏
#下面是用windbg分析dump的结果,但是看不太懂,有人帮忙看看吗
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\tmp\110423-13406-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff803`67200000 PsLoadedModuleList = 0xfffff803`67e2a2d0
Debug session time: Sat Nov 4 21:29:23.866 2023 (UTC + 8:00)
System Uptime: 0 days 9:50:12.556
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`675fc030 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff803`6b497db0=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2296
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 89027
Key : Analysis.Init.CPU.mSec
Value: 593
Key : Analysis.Init.Elapsed.mSec
Value: 262193
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 139
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
TRAP_FRAME: ffffc281e9da0500 -- (.trap 0xffffc281e9da0500)
Unable to read trap frame at ffffc281`e9da0500
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff803`6b497da8 fffff803`6760623b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff803`6b497db0 fffff803`69bc2853 : ffffc281`dd722000 ffffc281`dd722000 00000000`00000001 ffffc281`dd724dc8 : nt!guard_icall_bugcheck+0x1b
fffff803`6b497de0 fffff803`69bbe842 : ffffc281`e20d3110 00000000`00000001 ffffc281`e20d3130 ffffc281`dd724d88 : Wdf01000!FxThreadedEventQueue::QueueWorkItem+0x4f [minkernel\wdf\framework\shared\irphandlers\pnp\eventqueue.cpp @ 408]
fffff803`6b497e10 fffff803`69c3b29a : 00000000`00000000 ffffc281`e20d3110 fffff803`6b497f58 fffff803`67426399 : Wdf01000!FxThreadedEventQueue::QueueToThread+0x1a [minkernel\wdf\framework\shared\inc\private\common\FxEventQueue.hpp @ 359]
fffff803`6b497e40 fffff803`69c3937e : 00000000`00000000 ffffc281`e20d3000 ffffc281`e6d1a2b0 ffffd480`d0db7970 : Wdf01000!FxWakeInterruptMachine::ProcessEvent+0x16a [minkernel\wdf\framework\shared\irphandlers\pnp\wakeinterruptstatemachine.cpp @ 242]
fffff803`6b497ec0 fffff803`69bcf470 : 00000000`00000000 fffff803`674ff7a1 00000000`00000000 ffffc281`d6bc6000 : Wdf01000!FxInterrupt::WakeInterruptIsr+0x1a [minkernel\wdf\framework\shared\irphandlers\pnp\interruptobject.cpp @ 313]
fffff803`6b497f00 fffff803`6753ec65 : ffffd480`d0db78c0 00000000`00008501 fffff803`62ffd180 fffff803`6b497fc0 : Wdf01000!FxInterrupt::_InterruptThunk+0x1b840 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 346]
fffff803`6b497f40 fffff803`675fdd4f : fffff803`6b488b10 ffffd480`d0db78c0 00000000`000003a0 fffff803`676041d0 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`6b497f90 fffff803`675fe017 : fffff803`6b488bb0 00000000`00000001 00000000`00040046 fffff803`67481ba8 : nt!KiInterruptSubDispatch+0x11f
fffff803`6b488a90 fffff803`676008ea : 00000000`00000000 fffff803`67f27a00 ffffc281`e9da0500 00000000`000003a0 : nt!KiInterruptDispatch+0x37
fffff803`6b488c20 00000000`00000000 : fffff803`6b489000 fffff803`6b482000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: nt!guard_icall_bugcheck+1b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}
Followup: MachineOwner
---------
0: kd> lmvm nt
Browse full module list
start end module name
fffff803`67200000 fffff803`68246000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\822743A92D0786AB4FD541A4C8CBCAA91\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\23C7FC511046000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 23C7FC51 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A5D816
ImageSize: 01046000
File version: 10.0.19041.3086
Product version: 10.0.19041.3086
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft Windows Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.3086
FileVersion: 10.0.19041.3086 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: Microsoft Corporation. All rights reserved.