icrosoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\020523-15125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols
Executable search path is:
Windows 7 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 22621.1.amd64fre.ni_release.220506-1250
Machine Name:
Kernel base = 0xfffff800`16000000 PsLoadedModuleList = 0xfffff800`16c13010
Debug session time: Sun Feb 5 17:38:25.718 2023 (UTC + 8:00)
System Uptime: 6 days 18:39:36.408
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.................................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {1d, ffffe884fa325000, ffffe884fa324f58, 0}
Probably caused by : memory_corruption
Followup: memory_corruption
---------
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Unknown bugcheck code (139)
Unknown bugcheck description
Arguments:
Arg1: 000000000000001d
Arg2: ffffe884fa325000
Arg3: ffffe884fa324f58
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8001643e5a9 to fffff80016428f20
STACK_TEXT:
ffffe884`fa324cd8 fffff800`1643e5a9 : 00000000`00000139 00000000`0000001d ffffe884`fa325000 ffffe884`fa324f58 : nt!KeBugCheckEx
ffffe884`fa324ce0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff800164324f3-fffff800164324f4 2 bytes - nt!SwapContext+63
[ 48 ff:4c 8b ]
fffff800164324fa-fffff800164324fd 4 bytes - nt!SwapContext+6a (+0x07)
[ 0f 1f 44 00:e8 21 5f 6b ]
fffff80016488afc - nt!MiRelinkStandbyPage+20bedc (+0x56602)
[ 00:80 ]
7 errors : !nt (fffff800164324f3-fffff80016488afc)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
10: kd> lmvm memory_corruption
start end module name
|
|
|
|
评论
直达楼层