频繁蓝屏,用 windbg打开显示是360Hvm64的问题,这是咋回事
Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`1e600000 PsLoadedModuleList = 0xfffff805`1f22a1d0
Debug session time: Wed Mar 30 17:05:50.523 2022 (UTC + 8:00)
System Uptime: 0 days 0:01:31.323
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`1e9f6f20 48894c2408 mov qword ptr ,rcx ss:0018:ffff9f8a`44645d00=000000000000003b
3: kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8051ebf15cb, Address of the instruction which caused the BugCheck
Arg3: ffff9f8a44646600, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key: Analysis.CPU.mSec
Value: 3733
Key: Analysis.DebugAnalysisManager
Value: Create
Key: Analysis.Elapsed.mSec
Value: 108117
Key: Analysis.Init.CPU.mSec
Value: 562
Key: Analysis.Init.Elapsed.mSec
Value: 15795
Key: Analysis.Memory.CommitPeak.Mb
Value: 94
Key: WER.OS.Branch
Value: vb_release
Key: WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key: WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB:033022-33921-01.dmp
BUGCHECK_CODE:3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8051ebf15cb
BUGCHECK_P3: ffff9f8a44646600
BUGCHECK_P4: 0
CONTEXT:ffff9f8a44646600 -- (.cxr 0xffff9f8a44646600)
rax=0000000000000000 rbx=ffff9f8a446471c0 rcx=0000000000000011
rdx=fffff8051f2481f8 rsi=fffff8051f248200 rdi=0000000000000000
rip=fffff8051ebf15cb rsp=ffff9f8a44647000 rbp=ffff9f8a44647210
r8=ffff9f8a44647010r9=0000000000000001 r10=fffff8051ebee040
r11=ffff9f8a44647108 r12=0000000000000000 r13=ffff9f8a44647190
r14=0000000000000001 r15=000000000000001c
iopl=0 nv up ei ng nz na po nc
cs=0010ss=0018ds=002bes=002bfs=0053gs=002b efl=00050286
nt!CmpCallCallBacksEx+0xdb:
fffff805`1ebf15cb 4d8b2424 mov r12,qword ptr ds:002b:00000000`00000000=????????????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:1
PROCESS_NAME:services.exe
STACK_TEXT:
ffff9f8a`44647000 fffff805`1ebee28c : 00000001`0000001c ffff9f8a`446471c0 ffff9f8a`44647178 00000000`ffffff01 : nt!CmpCallCallBacksEx+0xdb
ffff9f8a`44647110 fffff805`1ebf23ce : fffff805`1ebee000 00000000`00000000 ffff8c89`039f6a20 000fa4ef`bd9bbf01 : nt!CmpParseKey+0x24c
ffff9f8a`446472b0 fffff805`1ec9433a : ffff8c89`039f6a00 ffff9f8a`44647518 ffffca8a`00000040 ffff8c88`de949900 : nt!ObpLookupObjectName+0x3fe
ffff9f8a`44647480 fffff805`1ec9411c : 00000000`00000000 00000000`00000000 00000000`00000000 ffff8c88`de949900 : nt!ObOpenObjectByNameEx+0x1fa
ffff9f8a`446475b0 fffff805`1ec93c41 : 000000b7`695fe870 ffff9f8a`44647a80 00000000`00000001 fffff805`1ec7399c : nt!ObOpenObjectByName+0x5c
ffff9f8a`44647600 fffff805`1ece2c32 : 000001e5`6903d6a0 00000000`00000003 000001e5`69044e50 ffffffff`ffffffff : nt!CmOpenKey+0x2c1
ffff9f8a`44647860 fffff805`3963b9d0 : ffff8c89`00c31080 00000000`00000032 ffff9f8a`446478d0 00000000`00000000 : nt!NtOpenKey+0x12
ffff9f8a`446478a0 ffff8c89`00c31080 : 00000000`00000032 ffff9f8a`446478d0 00000000`00000000 ffff9f8a`446478f0 : 360Hvm64+0x1b9d0
ffff9f8a`446478a8 00000000`00000032 : ffff9f8a`446478d0 00000000`00000000 ffff9f8a`446478f0 ffff9f8a`44647a00 : 0xffff8c89`00c31080
ffff9f8a`446478b0 ffff9f8a`446478d0 : 00000000`00000000 ffff9f8a`446478f0 ffff9f8a`44647a00 000000b7`695fe828 : 0x32
ffff9f8a`446478b8 00000000`00000000 : ffff9f8a`446478f0 ffff9f8a`44647a00 000000b7`695fe828 00000000`00020019 : 0xffff9f8a`446478d0
SYMBOL_NAME:360Hvm64+1b9d0
MODULE_NAME: 360Hvm64
IMAGE_NAME:360Hvm64.sys
STACK_COMMAND:.cxr 0xffff9f8a44646600 ; kb
BUCKET_ID_FUNC_OFFSET:1b9d0
FAILURE_BUCKET_ID:AV_360Hvm64!unknown_function
OS_VERSION:10.0.19041.1
BUILDLAB_STR:vb_release
OSPLATFORM_TYPE:x64
OSNAME:Windows 10
FAILURE_ID_HASH:{d912e14a-1aa7-da0a-fb32-31dc39167240}
Followup: MachineOwner
--------- 您好 请您留下qq号码 我们添加您核实处理。 什么问题,今天也遇到了
页:
[1]