人参没有洗具多 人参没有洗具多
关注数: 18 粉丝数: 45 发帖数: 3,486 关注贴吧数: 16
有么有大佬分析一下WinDbg Preview解析出来的蓝屏意思 Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\072222-7546-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: srv*Executable search path is: **************************************************************************** ****** ****** Either you specified an unqualified symbol, or your debugger ****** doesn't have full symbol information. Unqualified symbol ****** resolution is turned off by default. Please either specify a ****** fully qualified symbol module!symbolname, or enable resolution ****** of unqualified symbols by typing ".symopt- 100". Note that ****** enabling unqualified symbol resolution with network symbol ****** server shares in the symbol path may cause the debugger to ****** appear to hang for long periods of time when an incorrect ****** symbol name is typed or the network symbol server is down. ****** ****** For some commands to work properly, your symbol path ****** must point to .pdb files that have full type information. ****** ****** Certain .pdb files (such as the public OS symbols) do not ****** contain the required information. Contact the group that ****** provided you with these symbols if you need this command to ****** work. ****** ****** Type referenced: nt!_EPROCESS ****** ****************************************************************************Windows 10 Kernel Version 19041 MP (12 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSEdition build lab: 19041.1.amd64fre.vb_release.191206-1406Machine Name:Kernel base = 0xfffff804`56600000 PsLoadedModuleList = 0xfffff804`5722a230Debug session time: Fri Jul 22 18:23:36.817 2022 (UTC + 8:00)System Uptime: 0 days 0:33:34.423Loading Kernel Symbols..........................................................................................................................................................................................Loading User SymbolsLoading unloaded module list......For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff804`569f8590 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffee8b`62c16d10=000000000000000a0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: ffffd18006167458, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff804568d809b, address which referenced memoryDebugging Details:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2031 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 133036 Key : Analysis.Init.CPU.mSec Value: 453 Key : Analysis.Init.Elapsed.mSec Value: 764528 Key : Analysis.Memory.CommitPeak.Mb Value: 84 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1FILE_IN_CAB: 072222-7546-01.dmpBUGCHECK_CODE: aBUGCHECK_P1: ffffd18006167458BUGCHECK_P2: 2BUGCHECK_P3: 0BUGCHECK_P4: fffff804568d809bREAD_ADDRESS: fffff804572fb390: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse ffffd18006167458 BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: steamwebhelper.exeTRAP_FRAME: ffffee8b62c16e50 -- (.trap 0xffffee8b62c16e50)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=ffffd18000000028 rbx=0000000000000000 rcx=0000000fffffffffrdx=0000000000c2ce86 rsi=0000000000000000 rdi=0000000000000000rip=fffff804568d809b rsp=ffffee8b62c16fe0 rbp=ffffee8b62c171e0 r8=7fffffffffffffff r9=ffffcb0000000000 r10=3fffffffffffffffr11=ffffd18000000023 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl nz na pe ncnt!MiResolveProtoPteFault+0x62b:fffff804`568d809b 488b0cd0 mov rcx,qword ptr [rax+rdx*8] ds:ffffd180`06167458=80040000002addd8Resetting default scopeSTACK_TEXT: ffffee8b`62c16d08 fffff804`56a0a569 : 00000000`0000000a ffffd180`06167458 00000000`00000002 00000000`00000000 : nt!KeBugCheckExffffee8b`62c16d10 fffff804`56a06869 : ffffcb00`ad416b68 00000000`00000000 ffffd180`07a24cd0 00000000`00000001 : nt!KiBugCheckDispatch+0x69ffffee8b`62c16e50 fffff804`568d809b : ffffee8b`62c17140 8a000004`306c2921 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469ffffee8b`62c16fe0 fffff804`568d14b5 : ffffee8b`62c17140 00000000`00000000 ffffee8b`62c17120 ffff8308`e37e9740 : nt!MiResolveProtoPteFault+0x62bffffee8b`62c170e0 fffff804`568cf3f9 : 00000000`00000110 00000000`00000001 00000000`c0000016 ffffda80`3a3fb990 : nt!MiDispatchFault+0x3d5ffffee8b`62c17220 fffff804`56a0675e : 00000036`a8fdc550 0000015a`82d60000 ffffee8b`62c17440 ffff8308`e37e90c0 : nt!MmAccessFault+0x189ffffee8b`62c173c0 00007ff7`dd692898 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e00000036`a8fddea0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`dd692898SYMBOL_NAME: nt!MiResolveProtoPteFault+62bMODULE_NAME: ntIMAGE_VERSION: 10.0.19041.1826STACK_COMMAND: .cxr; .ecxr ; kbIMAGE_NAME: ntkrnlmp.exeBUCKET_ID_FUNC_OFFSET: 62bFAILURE_BUCKET_ID: AV_nt!MiResolveProtoPteFaultOS_VERSION: 10.0.19041.1BUILDLAB_STR: vb_releaseOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {2f2238e9-4751-e3c3-543c-b0cdf930b219}Followup: MachineOwner---------
1 下一页