Y
yongchaoli
Guest
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\lyc\Desktop\聊城日志\032621-48453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (48 procs) Free x64
Product: LanManNt, suite: TerminalServer SingleUserTS
Edition build lab: 9600.17041.amd64fre.winblue_gdr.140305-1710
Machine Name:
Kernel base = 0xfffff802`1728f000 PsLoadedModuleList = 0xfffff802`175592d0
Debug session time: Fri Mar 26 11:28:46.313 2021 (UTC + 8:00)
System Uptime: 0 days 0:11:56.555
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`173e2fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`0e129dc0=0000000000000050
14: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe000c1989000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff8016d53e2d8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2156
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11810
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 3052
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : WER.OS.Branch
Value: winblue_gdr
Key : WER.OS.Timestamp
Value: 2014-03-05T17:10:00Z
Key : WER.OS.Version
Value: 8.1.9600.17041
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe000c1989000
BUGCHECK_P2: 1
BUGCHECK_P3: fffff8016d53e2d8
BUGCHECK_P4: 0
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802175e3298
GetUlongPtrFromAddress: unable to read from fffff802175e3518
ffffe000c1989000 Nonpaged pool
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd0010e129fa0 -- (.trap 0xffffd0010e129fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000c1989000
rdx=ffffc001ae37609a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016d53e2d8 rsp=ffffd0010e12a130 rbp=ffffc001ae376095
r8=0000000000000000 r9=0000000000000000 r10=0000000000000801
r11=ffffe000c1989000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
srv!SrvOs2FeaToNt+0x48:
fffff801`6d53e2d8 c60300 mov byte ptr [rbx],0 ds:00000000`00000000=??
Resetting default scope
STACK_TEXT:
ffffd001`0e129db8 fffff802`174140e7 : 00000000`00000050 ffffe000`c1989000 00000000`00000001 ffffd001`0e129fa0 : nt!KeBugCheckEx
ffffd001`0e129dc0 fffff802`172f69c9 : 00000000`00000001 ffffe000`bfb1a880 ffffd001`0e129fa0 00000000`00000011 : nt! ?? ::FNODOBFM::`string'+0x20c37
ffffd001`0e129e60 fffff802`173ed22f : 00000000`00000001 ffffe000`c1989000 00000000`00010f00 ffffd001`0e129fa0 : nt!MmAccessFault+0x7a9
ffffd001`0e129fa0 fffff801`6d53e2d8 : 00000000`00010fe8 7643554f`68617365 ffffd001`0e12a258 ffffd001`0e12a250 : nt!KiPageFault+0x12f
ffffd001`0e12a130 fffff801`6d53e21d : ffffc001`ae376095 ffffe000`c1988ff8 00000000`00000010 ffffc001`ae376138 : srv!SrvOs2FeaToNt+0x48
ffffd001`0e12a160 fffff801`6d54d9df : ffffe000`c1863010 00000000`00000000 ffffc001`ae366010 ffffd000`d7c40180 : srv!SrvOs2FeaListToNt+0x125
ffffd001`0e12a1b0 fffff801`6d513cc7 : 00000000`00000000 fffff801`00010fe8 ffffe000`c1978010 ffffe000`c1863010 : srv!SrvSmbOpen2+0xc3
ffffd001`0e12a250 fffff801`6d55368e : ffffc001`ae366010 00000000`00001000 ffffe000`bfbc5b30 ffffe000`c1863010 : srv!ExecuteTransaction+0x117
ffffd001`0e12a290 fffff801`6d4cad6d : ffffe000`00000000 fffff801`00000000 fffff801`00000035 ffffe000`0000f3d0 : srv!SrvSmbTransactionSecondary+0x40b
ffffd001`0e12a330 fffff801`6d4cac54 : fffff801`6d4e6010 ffffe000`c1863a80 ffffe000`c1863010 ffffe000`00000000 : srv!SrvProcessSmb+0xdd
ffffd001`0e12a3b0 fffff801`6d5207e1 : ffffe000`bfb8dca0 00000000`00000002 00000000`00000001 ffffe000`c1863020 : srv!SrvRestartReceive+0xc4
ffffd001`0e12a3f0 fffff802`177a9ca6 : 00000000`00000000 ffffe000`c1863010 00000000`00000000 00000000`20206f49 : srv!WorkerThread+0x111
ffffd001`0e12a450 fffff802`1735e794 : ffffe000`bfb1a880 ffffe000`bfb1a880 00000000`00000000 00000000`00000000 : nt!IopThreadStart+0x26
ffffd001`0e12a480 fffff802`173e95c6 : ffffd000`d7c40180 ffffe000`bfb1a880 ffffd000`d7c4f9c0 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`0e12a4e0 00000000`00000000 : ffffd001`0e12b000 ffffd001`0e124000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: srv!SrvOs2FeaToNt+48
MODULE_NAME: srv
IMAGE_NAME: 斯尔夫.sys
IMAGE_VERSION: 6.3.9600.16421
STACK_COMMAND: . 线程 : . cxr :K b
BUCKET_ID_FUNC_OFFSET: 48
FAILURE_BUCKET_ID:AV_srv!斯尔沃斯2感觉不
OS_VERSION: 8.1.9600.17041
BUILDLAB_STR:winblue_gdr
OSPLATFORM_TYPE:x64
奥斯纳梅: 视窗 8.1
FAILURE_ID_HASH:+d5f1a37d-2c94-f55b-5042-7a5dbaa092e1}
跟进:机器所有者
Continue reading...
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\lyc\Desktop\聊城日志\032621-48453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (48 procs) Free x64
Product: LanManNt, suite: TerminalServer SingleUserTS
Edition build lab: 9600.17041.amd64fre.winblue_gdr.140305-1710
Machine Name:
Kernel base = 0xfffff802`1728f000 PsLoadedModuleList = 0xfffff802`175592d0
Debug session time: Fri Mar 26 11:28:46.313 2021 (UTC + 8:00)
System Uptime: 0 days 0:11:56.555
Loading Kernel Symbols
...............................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
....
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`173e2fa0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd001`0e129dc0=0000000000000050
14: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe000c1989000, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff8016d53e2d8, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2156
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 11810
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 3052
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : WER.OS.Branch
Value: winblue_gdr
Key : WER.OS.Timestamp
Value: 2014-03-05T17:10:00Z
Key : WER.OS.Version
Value: 8.1.9600.17041
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe000c1989000
BUGCHECK_P2: 1
BUGCHECK_P3: fffff8016d53e2d8
BUGCHECK_P4: 0
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802175e3298
GetUlongPtrFromAddress: unable to read from fffff802175e3518
ffffe000c1989000 Nonpaged pool
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd0010e129fa0 -- (.trap 0xffffd0010e129fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000c1989000
rdx=ffffc001ae37609a rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016d53e2d8 rsp=ffffd0010e12a130 rbp=ffffc001ae376095
r8=0000000000000000 r9=0000000000000000 r10=0000000000000801
r11=ffffe000c1989000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
srv!SrvOs2FeaToNt+0x48:
fffff801`6d53e2d8 c60300 mov byte ptr [rbx],0 ds:00000000`00000000=??
Resetting default scope
STACK_TEXT:
ffffd001`0e129db8 fffff802`174140e7 : 00000000`00000050 ffffe000`c1989000 00000000`00000001 ffffd001`0e129fa0 : nt!KeBugCheckEx
ffffd001`0e129dc0 fffff802`172f69c9 : 00000000`00000001 ffffe000`bfb1a880 ffffd001`0e129fa0 00000000`00000011 : nt! ?? ::FNODOBFM::`string'+0x20c37
ffffd001`0e129e60 fffff802`173ed22f : 00000000`00000001 ffffe000`c1989000 00000000`00010f00 ffffd001`0e129fa0 : nt!MmAccessFault+0x7a9
ffffd001`0e129fa0 fffff801`6d53e2d8 : 00000000`00010fe8 7643554f`68617365 ffffd001`0e12a258 ffffd001`0e12a250 : nt!KiPageFault+0x12f
ffffd001`0e12a130 fffff801`6d53e21d : ffffc001`ae376095 ffffe000`c1988ff8 00000000`00000010 ffffc001`ae376138 : srv!SrvOs2FeaToNt+0x48
ffffd001`0e12a160 fffff801`6d54d9df : ffffe000`c1863010 00000000`00000000 ffffc001`ae366010 ffffd000`d7c40180 : srv!SrvOs2FeaListToNt+0x125
ffffd001`0e12a1b0 fffff801`6d513cc7 : 00000000`00000000 fffff801`00010fe8 ffffe000`c1978010 ffffe000`c1863010 : srv!SrvSmbOpen2+0xc3
ffffd001`0e12a250 fffff801`6d55368e : ffffc001`ae366010 00000000`00001000 ffffe000`bfbc5b30 ffffe000`c1863010 : srv!ExecuteTransaction+0x117
ffffd001`0e12a290 fffff801`6d4cad6d : ffffe000`00000000 fffff801`00000000 fffff801`00000035 ffffe000`0000f3d0 : srv!SrvSmbTransactionSecondary+0x40b
ffffd001`0e12a330 fffff801`6d4cac54 : fffff801`6d4e6010 ffffe000`c1863a80 ffffe000`c1863010 ffffe000`00000000 : srv!SrvProcessSmb+0xdd
ffffd001`0e12a3b0 fffff801`6d5207e1 : ffffe000`bfb8dca0 00000000`00000002 00000000`00000001 ffffe000`c1863020 : srv!SrvRestartReceive+0xc4
ffffd001`0e12a3f0 fffff802`177a9ca6 : 00000000`00000000 ffffe000`c1863010 00000000`00000000 00000000`20206f49 : srv!WorkerThread+0x111
ffffd001`0e12a450 fffff802`1735e794 : ffffe000`bfb1a880 ffffe000`bfb1a880 00000000`00000000 00000000`00000000 : nt!IopThreadStart+0x26
ffffd001`0e12a480 fffff802`173e95c6 : ffffd000`d7c40180 ffffe000`bfb1a880 ffffd000`d7c4f9c0 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`0e12a4e0 00000000`00000000 : ffffd001`0e12b000 ffffd001`0e124000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: srv!SrvOs2FeaToNt+48
MODULE_NAME: srv
IMAGE_NAME: 斯尔夫.sys
IMAGE_VERSION: 6.3.9600.16421
STACK_COMMAND: . 线程 : . cxr :K b
BUCKET_ID_FUNC_OFFSET: 48
FAILURE_BUCKET_ID:AV_srv!斯尔沃斯2感觉不
OS_VERSION: 8.1.9600.17041
BUILDLAB_STR:winblue_gdr
OSPLATFORM_TYPE:x64
奥斯纳梅: 视窗 8.1
FAILURE_ID_HASH:+d5f1a37d-2c94-f55b-5042-7a5dbaa092e1}
跟进:机器所有者
Continue reading...