irql蓝屏,module name:nt
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\072022-6671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred SRVC:\Symbolshttp://msdl.microsoft.com/download/symbols
Symbol search path is: SRVC:\Symbolshttp://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff8042b400000 PsLoadedModuleList = 0xfffff804
2c02a230
Debug session time: Wed Jul 20 13:12:13.515 2022 (UTC + 8:00)
System Uptime: 2 days 0:51:22.341
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff8042b7f8590 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa98f
ca25f5d0=000000000000000a
2: kd> !analyze -v
**
Bugcheck Analysis
**
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000038, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8042b6a52c1, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1813
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 12374
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 072022-6671-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 38
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8042b6a52c1
READ_ADDRESS: fffff8042c0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000038
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa98fca25f710 -- (.trap 0xffffa98fca25f710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffbb82ae983d50 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8042b6a52c1 rsp=ffffa98fca25f8a0 rbp=fffff8042c050b00
r8=0000000080000000 r9=0000000000000003 r10=fffffb8004ab5900
r11=ffffa98fca25f880 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiDereferenceControlAreaPfnList+0x21:
fffff8042b6a52c1 8b4138 mov eax,dword ptr [rcx+38h] ds:00000000
00000038=????????
Resetting default scope
STACK_TEXT:
ffffa98fca25f5c8 fffff804
2b80a569 : 000000000000000a 00000000
00000038 0000000000000002 00000000
00000000 : nt!KeBugCheckEx
ffffa98fca25f5d0 fffff804
2b806869 : 0000000000000001 ffffa98f
ca25f850 fffffb80047fa300 fffff804
2b619a57 : nt!KiBugCheckDispatch+0x69
ffffa98fca25f710 fffff804
2b6a52c1 : 0000000000000000 fffff804
2b691df2 0000000000079504 8a000000
79504963 : nt!KiPageFault+0x469
ffffa98fca25f8a0 fffff804
2b67f54b : bb82ae983d500420 fffff804
2c050b00 0000000080000000 fffffb80
016bf0c0 : nt!MiDereferenceControlAreaPfnList+0x21
ffffa98fca25f8f0 fffff804
2b783128 : bb82ae983d500420 fffffb80
017e5930 0000000000000001 00000000
00000002 : nt!MiRestoreTransitionPte+0x2cb
ffffa98fca25f960 fffff804
2b782a10 : fffff8042c050b00 00000000
00000000 0000000000002000 fffff804
2c051598 : nt!MiRemoveLowestPriorityStandbyPage+0x648
ffffa98fca25fa00 fffff804
2b7822a8 : ffffbb82a3eed260 00000000
00000007 ffffbb8200000000 ffffbb82
a3e43f20 : nt!MiPurgePartitionStandby+0x4c
ffffa98fca25fa40 fffff804
2b6e87f5 : ffffbb82aeccd040 fffff804
2b782260 ffffbb82a3edcba0 ffffbb82
00000000 : nt!MiFinishResume+0x48
ffffa98fca25fa70 fffff804
2b74edc5 : ffffbb82aeccd040 00000000
00000080 ffffbb82a3ee1040 00000000
00000000 : nt!ExpWorkerThread+0x105
ffffa98fca25fb10 fffff804
2b7ffbe8 : ffffe400565c7180 ffffbb82
aeccd040 fffff8042b74ed70 00000000
00000246 : nt!PspSystemThreadStartup+0x55
ffffa98fca25fb60 00000000
00000000 : ffffa98fca260000 ffffa98f
ca259000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!MiDereferenceControlAreaPfnList+21
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1826
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 21
FAILURE_BUCKET_ID: AV_nt!MiDereferenceControlAreaPfnList
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {97b4b4f9-cdc2-f9fb-f66d-b09d543deab0}
Followup: MachineOwner
---------