本帖最后由 ak666 于 2017-7-5 22:53 编辑
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\27526\Desktop\070517-8312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\mysymbol* http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff802`5047c000 PsLoadedModuleList = 0xfffff802`507c85a0
Debug session time: Wed Jul 5 18:50:42.524 2017 (UTC + 8:00)
System Uptime: 0 days 14:59:37.356
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
......................
Cannot read PEB32 from WOW64 TEB32 00009fe5 - Win32 error 0n30
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {1004e, 2, 0, fffff802504b0430}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
*** Memory manager detected 40933 instance(s) of page corruption, target is likely to have memory corruption.
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000001004e, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802504b0430, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
000000000001004e
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiSearchForNewThreadOnProcessor+60
fffff802`504b0430 f74608feffffff test dword ptr [rsi+8],0FFFFFFFEh
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0xA
PROCESS_NAME: System
BAD_PAGES_DETECTED: 9fe5
LAST_CONTROL_TRANSFER: from fffff802505f37a9 to fffff802505e83f0
STACK_TEXT:
ffff8400`7faad5d8 fffff802`505f37a9 : 00000000`0000000a 00000000`0001004e 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8400`7faad5e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff802505e86a3-fffff802505e86b0 14 bytes - nt!KiRestoreProcessorControlState+33
[ 0f 01 59 66 0f b7 41 70:68 00 60 8c 24 c7 44 24 ]
fffff802505e8770-fffff802505e877d 14 bytes - nt!KiSaveProcessorControlState+40 (+0xcd)
[ 0f 01 49 66 0f 00 49 70:68 00 f0 8e 24 c7 44 24 ]
28 errors : !nt (fffff802505e86a3-fffff802505e877d)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
*** Memory manager detected 40933 instance(s) of page corruption, target is likely to have memory corruption.
杀毒软件是BD,然后期间有vbox和dnf一起开着。 dnf一点结束游戏,就蓝屏了。
|