4r0
Advanced Member | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Код: Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\MEMORY.DMP] Kernel Bitmap Dump File: Full address space is available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff800`4d800000 PsLoadedModuleList = 0xfffff800`4e42a310 Debug session time: Tue Jul 28 16:49:05.102 2020 (UTC + 3:00) System Uptime: 0 days 4:31:24.262 Loading Kernel Symbols ............................................................... ................................................................ ............................................... Loading User Symbols ................................. Loading unloaded module list ........... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`4dbddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8901`b82874d0=000000000000000a 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1859 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 9098 Key : Analysis.Memory.CommitPeak.Mb Value: 86 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: d1 BUGCHECK_P1: 0 BUGCHECK_P2: 2 BUGCHECK_P3: 8 BUGCHECK_P4: 0 READ_ADDRESS: 0000000000000000 PROCESS_NAME: chrome.exe BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 TRAP_FRAME: ffff8901b8287610 -- (.trap 0xffff8901b8287610) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff9f02b01ef080 rbx=0000000000000000 rcx=0000000000000002 rdx=ffff9f02b01ef080 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=ffff8901b82877a0 rbp=0000000000000000 r8=0000000000000004 r9=ffff9f02ad09a158 r10=ffff9f02b01ef158 r11=ffffcb0194fc9180 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc 00000000`00000000 ?? ??? Resetting default scope IP_IN_FREE_BLOCK: 0 FAILED_INSTRUCTION_ADDRESS: +0 00000000`00000000 ?? ??? STACK_TEXT: ffff8901`b82874c8 fffff800`4dbefa29 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx ffff8901`b82874d0 fffff800`4dbebd29 : 00000000`00000000 00000000`00000000 ffff9f02`ac18e080 ffff8901`b82876b9 : nt!KiBugCheckDispatch+0x69 ffff8901`b8287610 00000000`00000000 : ffffcb01`94fc9180 00000000`00000000 ffffcb01`956eda00 00000000`00000004 : nt!KiPageFault+0x469 SYMBOL_NAME: nt!KiPageFault+469 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 469 FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692} Followup: MachineOwner --------- |
| Всего записей: 731 | Зарегистр. 26-01-2010 | Отправлено: 14:38 28-07-2020 | Исправлено: 4r0, 17:32 28-07-2020 |
|