标签:ffffe186 00000000 01222222 0000000000000000 Key fffff801 nt
Microsoft (R) Windows Debugger Version 10.0.22415.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\090521-7437-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff801`59c00000 PsLoadedModuleList = 0xfffff801`5a82a190 Debug session time: Sun Sep 5 14:09:53.844 2021 (UTC + 8:00) System Uptime: 0 days 15:34:10.583 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ......................... Loading User Symbols Loading unloaded module list ......................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`59ff71d0 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffe186`e5926ec0=000000000000000a 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80159e78d2e, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2140 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 26781 Key : Analysis.Init.CPU.mSec Value: 500 Key : Analysis.Init.Elapsed.mSec Value: 51102 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: a BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff80159e78d2e WRITE_ADDRESS: fffff8015a8fa390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: FlashCenterService.exe TRAP_FRAME: ffffe186e5927000 -- (.trap 0xffffe186e5927000) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffbadd6eb7571d rbx=0000000000000000 rcx=0000000000000000 rdx=1a000001a7aa6867 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80159e78d2e rsp=ffffe186e5927190 rbp=ffffbb8c1221e700 r8=ffffbadd6eb75000 r9=ffffbadd6eb75000 r10=ffffbb8c1221e700 r11=ffffbadd6eb75fff r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po cy nt!MiUnlockPageTableInternal+0xae: fffff801`59e78d2e 8801 mov byte ptr [rcx],al ds:00000000`00000000=?? Resetting default scope MISALIGNED_IP: nt!MiUnlockPageTableInternal+ae fffff801`59e78d2e 8801 mov byte ptr [rcx],al STACK_TEXT: ffffe186`e5926eb8 fffff801`5a009169 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffffe186`e5926ec0 fffff801`5a005469 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffe186`e5927000 fffff801`59e78d2e : 00000000`00000002 ffffe186`e5927400 00000000`00000000 ffffbadd`6ea00000 : nt!KiPageFault+0x469 ffffe186`e5927190 fffff801`59e9fdf8 : ffffe186`e5927320 ffffbadd`00000000 00000000`00000002 ffffbadd`40000000 : nt!MiUnlockPageTableInternal+0xae ffffe186`e59271d0 fffff801`59e9f25a : 00000000`00000000 00000000`00000000 ffffbb8c`00000000 00000000`00000000 : nt!MiUserFault+0x628 ffffe186`e5927260 fffff801`5a00535e : ffffbb8c`1218a000 ffffbb8c`122bafe0 ffffe186`e5927480 00000000`00000000 : nt!MmAccessFault+0x16a ffffe186`e5927400 00000000`774116ee : 00000023`77492a8c 00007ffb`26190023 00000000`00000000 00000000`00f3eca4 : nt!KiPageFault+0x35e 00000000`00e3e870 00000023`77492a8c : 00007ffb`26190023 00000000`00000000 00000000`00f3eca4 00000000`00f9002b : 0x774116ee 00000000`00e3e878 00007ffb`26190023 : 00000000`00000000 00000000`00f3eca4 00000000`00f9002b 00000000`00e3e8f0 : 0x00000023`77492a8c 00000000`00e3e880 00000000`00000000 : 00000000`00f3eca4 00000000`00f9002b 00000000`00e3e8f0 00002ecc`00000000 : 0x00007ffb`26190023 SYMBOL_NAME: nt!MiUnlockPageTableInternal+ae IMAGE_VERSION: 10.0.19041.1165 STACK_COMMAND: .thread ; .cxr ; kb IMAGE_NAME: hardware MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner --------- 5: kd> lmvm hardware Browse full module list start end module name
标签:ffffe186,00000000,01222222,0000000000000000,Key,fffff801,nt 来源: https://blog.csdn.net/weixin_43674051/article/details/120115058
本站声明: 1. iCode9 技术分享网(下文简称本站)提供的所有内容,仅供技术学习、探讨和分享; 2. 关于本站的所有留言、评论、转载及引用,纯属内容发起人的个人观点,与本站观点和立场无关; 3. 关于本站的所有言论和文字,纯属内容发起人的个人观点,与本站观点和立场无关; 4. 本站文章均是网友提供,不完全保证技术分享内容的完整性、准确性、时效性、风险性和版权归属;如您发现该文章侵犯了您的权益,可联系我们第一时间进行删除; 5. 本站为非盈利性的个人网站,所有内容不会用来进行牟利,也不会利用任何形式的广告来间接获益,纯粹是为了广大技术爱好者提供技术内容和技术思想的分享性交流网站。