Probably caused by : memory_corruption ( nt!MiUpdateWsle+2b9 )
内存问题!看看谁会分析:
- Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [D:\Tools\dump\021815-27034-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: D:\Symbols;SRV*D:\Symbols*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.18717.amd64fre.win7sp1_gdr.150113-1808
- Machine Name:
- Kernel base = 0xfffff800`04013000 PsLoadedModuleList = 0xfffff800`04257890
- Debug session time: Wed Feb 18 17:08:21.895 2015 (UTC + 8:00)
- System Uptime: 0 days 0:03:29.674
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................
- Loading User Symbols
- Loading unloaded module list
- ...
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck A, {fffff70640000e94, 0, 1, fffff8000409b029}
- Probably caused by : memory_corruption ( nt!MiUpdateWsle+2b9 )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- IRQL_NOT_LESS_OR_EQUAL (a)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If a kernel debugger is available get the stack backtrace.
- Arguments:
- Arg1: fffff70640000e94, memory referenced
- Arg2: 0000000000000000, IRQL
- Arg3: 0000000000000001, bitfield :
- bit 0 : value 0 = read operation, 1 = write operation
- bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
- Arg4: fffff8000409b029, address which referenced memory
- Debugging Details:
- ------------------
- WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800042c1100
- fffff70640000e94
- CURRENT_IRQL: 0
- FAULTING_IP:
- nt!MiUpdateWsle+2b9
- fffff800`0409b029 44893498 mov dword ptr [rax+rbx*4],r14d
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0xA
- PROCESS_NAME: taskhost.exe
- TRAP_FRAME: fffff88003eba670 -- (.trap 0xfffff88003eba670)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=fffff70440001000 rbx=0000000000000000 rcx=fffff70001080488
- rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8000409b029 rsp=fffff88003eba800 rbp=000000000000000f
- r8=fffff683fffffd28 r9=fffffa8000000000 r10=fffff68000005da8
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl nz na po nc
- nt!MiUpdateWsle+0x2b9:
- fffff800`0409b029 44893498 mov dword ptr [rax+rbx*4],r14d ds:fffff704`40001000=????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff80004087469 to fffff80004087ec0
- STACK_TEXT:
- fffff880`03eba528 fffff800`04087469 : 00000000`0000000a fffff706`40000e94 00000000`00000000 00000000`00000001 : nt!KeBugCheckEx
- fffff880`03eba530 fffff800`040860e0 : 00000000`00000001 fffff706`40000e94 00000000`00000000 00000000`7fffffa5 : nt!KiBugCheckDispatch+0x69
- fffff880`03eba670 fffff800`0409b029 : fffffa80`00000028 00000000`00000000 00000000`00000000 fffff800`00000000 : nt!KiPageFault+0x260
- fffff880`03eba800 fffff800`040a5987 : 80000000`2758a825 fffff800`0439b068 fffff700`01080000 fffff8a0`0a5fb360 : nt!MiUpdateWsle+0x2b9
- fffff880`03eba870 fffff800`040950b9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDispatchFault+0x6e7
- fffff880`03eba980 fffff800`04085fee : 00000000`00000000 00000000`00bb0000 00000000`00000201 00000000`00000004 : nt!MmAccessFault+0x359
- fffff880`03ebaae0 000007fe`ff92e518 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
- 00000000`010de800 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`ff92e518
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt!MiUpdateWsle+2b9
- fffff800`0409b029 44893498 mov dword ptr [rax+rbx*4],r14d
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: nt!MiUpdateWsle+2b9
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 54b5f6ff
- IMAGE_NAME: memory_corruption
- FAILURE_BUCKET_ID: X64_0xA_nt!MiUpdateWsle+2b9
- BUCKET_ID: X64_0xA_nt!MiUpdateWsle+2b9
- Followup: MachineOwner
- ---------
复制代码 |