😜杰尼鬼 killwinner46
看我干嘛O.o
关注数: 12 粉丝数: 17 发帖数: 1,547 关注贴吧数: 29
大神们,蓝屏了能救一下嘛 Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\21801\Desktop\042723-16125-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff805`59000000 PsLoadedModuleList = 0xfffff805`59c13430 Debug session time: Thu Apr 27 16:19:31.558 2023 (UTC + 8:00) System Uptime: 4 days 4:36:21.360 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ................................................... Loading User Symbols Loading unloaded module list .................................................. Cannot read PEB32 from WOW64 TEB32 0a072000 - Win32 error 0n30 For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`59429400 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa18e`9c4e78f0=000000000000004a 13: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_GT_ZERO_AT_SYSTEM_SERVICE (4a) Returning to usermode from a system call at an IRQL > PASSIVE_LEVEL. Arguments: Arg1: 0000000077231cf3, Address of system function (system call routine) Arg2: 0000000000000002, Current IRQL Arg3: 0000000000000000, 0 Arg4: ffffa18e9c4e7b20, 0 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 686 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 1333 Key : Analysis.IO.Other.Mb Value: 6 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 23 Key : Analysis.Init.CPU.mSec Value: 109 Key : Analysis.Init.Elapsed.mSec Value: 653335 Key : Analysis.Memory.CommitPeak.Mb Value: 90 Key : Bugcheck.Code.DumpHeader Value: 0x4a Key : Bugcheck.Code.Register Value: 0x4a Key : Dump.Attributes.AsUlong Value: 1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 042723-16125-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage Dump BUGCHECK_CODE: 4a BUGCHECK_P1: 77231cf3 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: ffffa18e9c4e7b20 PROCESS_NAME: LÞsð.exe BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 STACK_TEXT: ffffa18e`9c4e78e8 fffff805`5943eaa9 : 00000000`0000004a 00000000`77231cf3 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffa18e`9c4e78f0 fffff805`5943e96b : fffff805`bee6b000 fffff894`b178f519 00000000`000609ba 00000000`1528ee00 : nt!KiBugCheckDispatch+0x69 ffffa18e`9c4e7a30 00000000`77231cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x380 00000000`1528edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77231cf3 SYMBOL_NAME: nt!KiSystemServiceExitPico+380 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.1413 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 380 FAILURE_BUCKET_ID: RAISED_IRQL_FAULT____L__s_.exe_nt!KiSystemServiceExitPico OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e5efc25c-f58e-368a-00b4-e27d28ba2909} Followup: MachineOwner ---------
1 下一页