附:Debug结果:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18939.amd64fre.win7sp1_gdr.150722-0600
Machine Name:
Kernel base = 0xfffff800`04a14000 PsLoadedModuleList = 0xfffff800`04c5b730
Debug session time: Wed Sep 23 18:34:06.055 2015 (UTC + 8:00)
System Uptime: 0 days 0:15:43.914
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
......................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, 2, 1, fffff880063f5954}
Probably caused by : kbdclass.sys ( kbdclass!memcpy+64 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880063f5954, address which referenced memory
Debugging Details:
------------------
SYSTEM_SKU: To be filled by O.E.M.
SYSTEM_VERSION: To be filled by O.E.M.
BIOS_DATE: 02/27/2013
BASEBOARD_PRODUCT: B75M-D3V
BASEBOARD_VERSION: x.x
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff880063f5954
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004cc5100
GetUlongPtrFromAddress: unable to read from fffff80004cc52e0
GetUlongPtrFromAddress: unable to read from fffff80004cc5490
0000000000000000 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
kbdclass!memcpy+64
fffff880`063f5954 488901 mov qword ptr [rcx],rax
CPU_COUNT: 8
CPU_MHZ: cdc
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3a
CPU_STEPPING: 9
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
ANALYSIS_VERSION: 10.0.10240.9 x86fre
TRAP_FRAME: fffff8800451b310 -- (.trap 0xfffff8800451b310)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000390001 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800b9f1dc0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880063f5954 rsp=fffff8800451b4a8 rbp=000000000000000c
r8=000000000000000c r9=0000000000000001 r10=000000000000002c
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
kbdclass!memcpy+0x64:
fffff880`063f5954 488901 mov qword ptr [rcx],rax ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80004a86b69 to fffff80004a875c0
STACK_TEXT:
fffff880`0451b1c8 fffff800`04a86b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0451b1d0 fffff800`04a857e0 : fffff880`0451b3d0 00000000`00000002 fffffa80`0bc02410 00000000`0000000c : nt!KiBugCheckDispatch+0x69
fffff880`0451b310 fffff880`063f5954 : fffff880`063f3af4 00000000`0000000c fffffa80`0b9f6ab0 fffffa80`0b9f6ab0 : nt!KiPageFault+0x260
fffff880`0451b4a8 fffff880`063f3af4 : 00000000`0000000c fffffa80`0b9f6ab0 fffffa80`0b9f6ab0 00000000`00000000 : kbdclass!memcpy+0x64
fffff880`0451b4b0 fffff880`030a0978 : 00000000`00000002 fffff880`0451b5c0 00000000`0000000e fffff880`10774127 : kbdclass!KeyboardClassServiceCallback+0x164
fffff880`0451b530 fffff880`03098629 : fffffa80`0ba069f8 fffffa80`0b9f1cc0 fffffa80`00000001 00000000`0000000e : kbdhid!KbdHid_InsertCodesIntoQueue+0x118
fffff880`0451b590 fffff880`03098894 : fffffa80`00000039 fffffa80`0bc02ba8 00000000`00000000 00000000`00000001 : HIDPARSE!HidP_KbdPutKey+0x3d
fffff880`0451b5c0 fffff880`030987d2 : 00000000`00000000 fffff880`030969d6 00000000`00000007 fffffa80`0d990000 : HIDPARSE!HidP_TranslateUsage+0x84
fffff880`0451b600 fffff880`030a0672 : 00000000`00000000 fffffa80`0ba06958 fffffa80`0ba068b0 00000000`00000000 : HIDPARSE!HidP_TranslateUsageAndPagesToI8042ScanCodes+0xde
fffff880`0451b660 fffff800`04a8a8f1 : fffffa80`0b9f4fb3 fffff880`00000002 fffffa80`00000000 fffff880`03087b67 : kbdhid!KbdHid_ReadComplete+0x276
fffff880`0451b6e0 fffff880`030809c4 : fffffa80`0b9ec860 fffffa80`0b9ec806 fffffa80`0b9ecc00 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`0451b7d0 fffff880`03080c2d : fffffa80`0b9f5a02 fffffa80`0b9f5ae0 fffffa80`0b9ecca0 00000000`00000008 : HIDCLASS!HidpDistributeInterruptReport+0x130
fffff880`0451b860 fffff800`04a8a8f1 : fffffa80`0b9f3fb3 00000000`00000000 fffffa80`0b9ecb01 fffffa80`0b9f3c10 : HIDCLASS!HidpInterruptReadComplete+0x235
fffff880`0451b8f0 fffff880`05baf631 : fffffa80`0af2b050 fffffa80`0b9db800 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x341
fffff880`0451b9e0 fffff880`05bafb0f : fffffa80`0ba0dc02 fffffa80`0b9f3c10 00000000`ffffffff fffffa80`0af2beb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0xa15
fffff880`0451bac0 fffff880`05bad66f : fffffa80`0af2beb0 fffffa80`0af2b1a0 fffffa80`0af2c050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff880`0451bb20 fffff880`05b9ef89 : fffffa80`0af2b050 00000000`00000000 fffffa80`0af2be02 fffffa80`0af2beb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff880`0451bb60 fffff800`04a92ecc : fffff880`009ec180 fffffa80`0af2beb0 fffffa80`0af2bec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff880`0451bb90 fffff800`04a7f2ca : fffff880`009ec180 fffff880`009f70c0 00000000`00000000 fffff880`05b9edb0 : nt!KiRetireDpcList+0x1bc
fffff880`0451bc40 00000000`00000000 : fffff880`0451c000 fffff880`04516000 fffff880`0451bc00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
kbdclass!memcpy+64
fffff880`063f5954 488901 mov qword ptr [rcx],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: kbdclass!memcpy+64
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: kbdclass
IMAGE_NAME: kbdclass.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc116
IMAGE_VERSION: 6.1.7600.16385
FAILURE_BUCKET_ID: X64_0xD1_kbdclass!memcpy+64
BUCKET_ID: X64_0xD1_kbdclass!memcpy+64
PRIMARY_PROBLEM_CLASS: X64_0xD1_kbdclass!memcpy+64
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xd1_kbdclass!memcpy+64
FAILURE_ID_HASH: {380da9bc-6516-3673-f59e-4ee25157648b}
Followup: MachineOwner
https://msdn.microsoft.com/zh-cn ... s/hardware/ff560244(v=vs.85).aspx |