|
本帖最后由 lenovo54483720 于 2025-8-15 11:16 编辑 蓝屏windbg代码如下,求大佬解答这是怎么回事,我刚重装的系统,Windows 11 家庭中文版 PF2G74F7 3: kd> !analyze -v Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ .................................. Loading User Symbols PEB is paged out (Peb.Ldr = 00000000`003e9018). Type ".hh dbgerr001" for details Loading unloaded module list ........................ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove). Arg2: fffff487ace767e0, Address of the trap frame for the exception that caused the BugCheck Arg3: fffff487ace76738, Address of the exception record for the exception that caused the BugCheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1968 Key : Analysis.Elapsed.mSec Value: 12217 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 24 Key : Analysis.Init.CPU.mSec Value: 1593 Key : Analysis.Init.Elapsed.mSec Value: 51732 Key : Analysis.Memory.CommitPeak.Mb Value: 109 Key : Analysis.Version.DbgEng Value: 10.0.27871.1001 Key : Analysis.Version.Description Value: 10.2505.01.02 amd64fre Key : Analysis.Version.Ext Value: 1.2505.1.2 Key : Bugcheck.Code.LegacyAPI Value: 0x139 Key : Bugcheck.Code.TargetModel Value: 0x139 Key : Dump.Attributes.AsUlong Value: 0x21808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : FailFast.Name Value: CORRUPT_LIST_ENTRY Key : FailFast.Type Value: 3 Key : Failure.Bucket Value: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait Key : Failure.Exception.Code Value: 0xc0000409 Key : Failure.Exception.Record Value: 0xfffff487ace76738 Key : Failure.Hash Value: {369b7001-cfef-011b-6243-985c04f34d42} Key : Hypervisor.Enlightenments.ValueHex Value: 0x7497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 38408431 Key : Hypervisor.Flags.ValueHex Value: 0x24a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 0x3f7 BUGCHECK_CODE: 139 BUGCHECK_P1: 3 BUGCHECK_P2: fffff487ace767e0 BUGCHECK_P3: fffff487ace76738 BUGCHECK_P4: 0 FILE_IN_CAB: 081525-11796-01.dmp DUMP_FILE_ATTRIBUTES: 0x21808 Kernel Generated Triage Dump FAULTING_THREAD: ffff8b0d2c0180c0 TRAP_FRAME: fffff487ace767e0 -- (.trap 0xfffff487ace767e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000000e5 rbx=0000000000000000 rcx=0000000000000003 rdx=000000002c018198 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8039ce923ee rsp=fffff487ace76970 rbp=0000000000000001 r8=0000000000000002 r9=0000000000000000 r10=0000000000000000 r11=fffff487ace76a08 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac po cy nt!KiCommitThreadWait+0x46e: fffff803`9ce923ee cd29 int 29h Resetting default scope EXCEPTION_RECORD: fffff487ace76738 -- (.exr 0xfffff487ace76738) ExceptionAddress: fffff8039ce923ee (nt!KiCommitThreadWait+0x000000000000046e) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000003 Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: wegame.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text> EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000003 EXCEPTION_STR: 0xc0000409 STACK_TEXT: fffff487`ace764b8 fffff803`9d2b85e9 : 00000000`00000139 00000000`00000003 fffff487`ace767e0 fffff487`ace76738 : nt!KeBugCheckEx fffff487`ace764c0 fffff803`9d2b8bf2 : ffff8b0d`1079fd58 ffffbf01`57e47180 00000000`00000000 ffff8b0d`10789b00 : nt!KiBugCheckDispatch+0x69 fffff487`ace76600 fffff803`9d2b6828 : 00000000`00040246 fffff803`9ce1198a ffff8b0d`2c018b70 fffff803`9ce82035 : nt!KiFastFailDispatch+0xb2 fffff487`ace767e0 fffff803`9ce923ee : ffff8b0d`2c0180c0 ffffbf01`57e47180 00000000`00000000 fffff487`00000000 : nt!KiRaiseSecurityCheckFailure+0x368 fffff487`ace76970 fffff803`9cf5693f : fffff487`00000000 00000000`000000e5 00000000`00000002 0000000c`4b97965a : nt!KiCommitThreadWait+0x46e fffff487`ace76a10 fffff803`9d460d1e : ffff8b0d`2c0180c0 00000000`00292000 fffff487`ace76af0 00000000`00290000 : nt!KeDelayExecutionThread+0x47f fffff487`ace76ab0 fffff803`9d2b7c58 : 0000000c`46ddda00 00000000`274fcd98 ffffffff`fffe7960 00000000`00292000 : nt!NtDelayExecution+0x5e fffff487`ace76ae0 00000000`77381f83 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`00b3f158 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77381f83 SYMBOL_NAME: nt!KiCommitThreadWait+46e MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.26100.4946 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 46e FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiCommitThreadWait OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {369b7001-cfef-011b-6243-985c04f34d42} Followup: MachineOwner --------- |
-
8029644
-
8029645
157
0