icrosoft (R) Windows Debugger Version 10.0.22621.755 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\super\Desktop\110922-13437-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff801`56200000 PsLoadedModuleList = 0xfffff801`56e2a270 Debug session time: Wed Nov 9 21:54:42.974 2022 (UTC 8:00) System Uptime: 0 days 0:03:36.740 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ .......... Loading User Symbols Loading unloaded module list ............... For analysis of this file, run !analyze -v 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack extents for the thread. Arg2: ffffb601968db010, Address of the trap frame for the exception that caused the BugCheck Arg3: ffffb601968daf68, Address of the exception record for the exception that caused the BugCheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5155 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 78320 Key : Analysis.Init.CPU.mSec Value: 6093 Key : Analysis.Init.Elapsed.mSec Value: 207608 Key : Analysis.Memory.CommitPeak.Mb Value: 98 Key : FailFast.Name Value: INCORRECT_STACK Key : FailFast.Type Value: 4 FILE_IN_CAB: 110922-13437-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 139 BUGCHECK_P1: 4 BUGCHECK_P2: ffffb601968db010 BUGCHECK_P3: ffffb601968daf68 BUGCHECK_P4: 0 TRAP_FRAME: eafb88e9e372c23b -- (.trap 0xeafb88e9e372c23b) Unable to read trap frame at eafb88e9`e372c23b EXCEPTION_RECORD: ffffb601968daf68 -- (.exr 0xffffb601968daf68) ExceptionAddress: fffff8015663d22f (nt!RtlpGetStackLimitsEx 0x00000000001c5b3f) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000004 Subcode: 0x4 FAST_FAIL_INCORRECT_STACK BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System ERROR_CODE: (NTSTATUS) 0xc0000409 - EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000004 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffb601`968dace8 fffff801`5660b069 : 00000000`00000139 00000000`00000004 ffffb601`968db010 ffffb601`968daf68 : nt!KeBugCheckEx ffffb601`968dacf0 fffff801`5660b490 : 57415641`55415441 00208341`20ec8348 8b4d0021`8341ff33 8b4d7024`6c8b4cf9 : nt!KiBugCheckDispatch 0x69 ffffb601`968dae30 fffff801`56609823 : ffffb601`968db7c0 00000000`00000000 ffffb601`968daa60 00000000`00000000 : nt!KiFastFailDispatch 0xd0 ffffb601`968db010 fffff801`5663d22f : ffffe083`0eafdbf0 fffff801`565fc9bc ffffb601`968db710 00000000`00000000 : nt!KiRaiseSecurityCheckFailure 0x323 ffffb601`968db1a0 fffff801`5663d3fd : ffffb601`968db710 00000000`00000000 ffffe083`1153ff80 fffff801`00000002 : nt!RtlpGetStackLimitsEx 0x1c5b3f ffffb601`968db1d0 fffff801`56476676 : ffffe083`1153ed18 ffffb601`968dbe20 ffffe083`1153ed18 ffffe20f`b4658c10 : nt!RtlDispatchException 0x1c5c1d ffffb601`968db8f0 fffff801`565f9f82 : eaf60ce9`c000000d 4804428d`480a8bff eafb88e9`e372c23b c08401e0`83c18bff : nt!KiDispatchException 0x186 ffffb601`968dbfb0 fffff801`565f9f50 : fffff801`5660b1a5 00000000`024b34d6 ffffe083`1153ef40 00000000`00000002 : nt!KxExceptionDispatchOnExceptionStack 0x12 ffffe083`1153ebd8 fffff801`5660b1a5 : 00000000`024b34d6 ffffe083`1153ef40 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatchOnExceptionStackContinue ffffe083`1153ebe0 fffff801`56606ee0 : 00000000`00000000 ffffe20f`ae67c000 00000000`00000000 ffffe20f`ae629980 : nt!KiExceptionDispatch 0x125 ffffe083`1153edc0 fffff801`564250e0 : ffffe083`1153efc8 00000000`00000021 ffffe20f`b4658a00 00000000`00000025 : nt!KiGeneralProtectionFault 0x320 ffffe083`1153ef50 fffff801`5642497a : 00000004`00000004 ffffe20f`b4658a00 00000000`00000004 00000000`00000000 : nt!RtlpHpVsChunkSplit 0x590 ffffe083`1153f010 fffff801`56427ef8 : 00000000`00000000 fffff801`00000200 ffffe083`1153f151 00000000`00000200 : nt!RtlpHpVsContextAllocateInternal 0x1fa ffffe083`1153f070 fffff801`56bb2094 : 00000000`00000000 00000000`00000000 ffffe20f`206c6148 00000000`00000000 : nt!ExAllocateHeapPool 0x888 ffffe083`1153f1b0 fffff801`5669dbcf : ffffb601`98009020 ffffe20f`ae62a910 00000000`00000000 fffff801`00000000 : nt!ExAllocatePoolWithTag 0x64 ffffe083`1153f200 fffff801`5667c143 : ffffb601`98009020 00000000`c0000023 00000000`00000000 00000000`0000bc00 : nt!HalpBuildScatterGatherList 0x1006fb ffffe083`1153f280 fffff801`599e41b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalGetScatterGatherList 0x13a953 ffffe083`1153f310 fffff801`599ea4d1 : 00000000`40200342 ffffe20f`00000001 ffffe083`1153f4b0 00000100`00000001 : storport!RaUnitStartIo 0x794 ffffe083`1153f410 fffff801`599e9d9c : 00000000`00000000 00000000`00000002 00000000`00000000 ffffe20f`ae625101 : storport!RaidStartIoPacket 0x4f1 ffffe083`1153f540 fffff801`599e9b3a : 00000000`0128bb40 00000000`00000000 ffffe20f`ae5badf0 fffff801`565f929d : storport!RaUnitScsiIrp 0x21c ffffe083`1153f5e0 fffff801`5642a6b5 : ffffe20f`b8bc49d0 ffffe20f`b8bc49d0 ffffe20f`ae5badf0 00000000`00000000 : storport!RaDriverScsiIrp 0x5a ffffe083`1153f620 fffff801`5952b58d : ffffe20f`ae5badf0 ffffe20f`b8bc49d0 00000000`00000000 00000000`00000000 : nt!IofCallDriver 0x55 ffffe083`1153f660 fffff801`595210d6 : ffffe20f`ab895800 00000000`00000007 ffffe20f`b8bc4b30 fffff801`56521b90 : ACPI!ACPIIrpDispatchDeviceControl 0xad ffffe083`1153f6a0 fffff801`5642a6b5 : 00000000`00000007 ffffe20f`b05b9090 00000000`0000bc00 00000001`17048000 : ACPI!ACPIDispatchIrp 0xc6 ffffe083`1153f720 fffff801`5a6e7e0d : ffffe20f`b05b9090 00000000`0000bc00 ffffe20f`ae836040 ffffe20f`ae836040 : nt!IofCallDriver 0x55 ffffe083`1153f760 fffff801`5a6e732c : 00000000`00000000 00000000`00000000 00000000`0000bc00 00000000`0000005e : CLASSPNP!SubmitTransferPacket 0x29d ffffe083`1153f7b0 fffff801`5a6e708b : ffffe20f`b05b9090 ffffe20f`b9493010 ffffe20f`b9493000 00000000`00000000 : CLASSPNP!ServiceTransferRequest 0x21c ffffe083`1153f840 fffff801`5a6e9df4 : 00000000`00000000 ffffe20f`ae814a90 00000001`0fb53c00 00000000`00989680 : CLASSPNP!ClassReadWrite 0x14b ffffe083`1153f890 fffff801`5642a6b5 : ffffe20f`ae6fa8a0 ffffe20f`b9493010 ffffe20f`ae7ffde0 00000000`00000000 : CLASSPNP!ClassGlobalDispatch 0x24 ffffe083`1153f8c0 fffff801`59803bcb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IofCallDriver 0x55 ffffe083`1153f900 fffff801`59803f00 : 00000001`00000001 00000000`8146ef08 00000000`00000000 00000000`00000000 : partmgr!PmIo 0xeb ffffe083`1153f980 fffff801`5642a6b5 : 00000000`00060403 ffffe083`1153fc03 00000000`00000001 ffffe20f`b90bb040 : partmgr!PmGlobalDispatch 0x20 ffffe083`1153f9b0 fffff801`59803734 : ffffe083`1153fcb0 00000000`0000bc00 00000000`00000000 ffffe083`1153fa30 : nt!IofCallDriver 0x55 ffffe083`1153f9f0 fffff801`59803f00 : 00000000`0000bc00 ffffe20f`b9493248 ffffe083`1153fc19 00000000`00000000 : partmgr!PartitionIo 0x1d4 ffffe083`1153faa0 fffff801`5642a6b5 : ffffe083`1153fc19 fffff801`59803e7d 00000000`00000000 ffffe083`1153fb10 : partmgr!PmGlobalDispatch 0x20 ffffe083`1153fad0 fffff801`598f1109 : ffffe20f`ae795a40 00000000`00000001 00000000`8146ef06 ffffe20f`ae7958f0 : nt!IofCallDriver 0x55 ffffe083`1153fb10 fffff801`5642a6b5 : ffffe083`1153fc19 ffffe20f`ae84d180 00000000`00000002 00000000`00000000 : volmgr!VmReadWrite 0xf9 ffffe083`1153fb50 fffff801`5a4b4ece : ffffe20f`ae84d180 ffffe083`1153fc19 ffffe20f`ae84d1b8 00000000`00000000 : nt!IofCallDriver 0x55 ffffe083`1153fb90 fffff801`5a4b4b77 : 00000000`00000000 ffffe083`1153fd70 00000000`00000000 ffffe20f`b9493010 : fvevol!FveFilterRundownReadWrite 0x33e ffffe083`1153fc80 fffff801`5642a6b5 : 8f000000`8f000000 90000000`8f000000 08000000`09000000 05000000`07000000 : fvevol!FveFilterRundownRead 0x27 ffffe083`1153fcb0 fffff801`5a683d07 : ffff4a10`a0ece0e4 ffffe083`1153ff50 00000000`00000004 ffffe083`0eafde08 : nt!IofCallDriver 0x55 ffffe083`1153fcf0 fffff801`5a685035 : 00000000`00000002 ffffe083`0eafdc00 ffffe20f`ae6e59a0 ffffe20f`b9493010 : iorate!IoRateIssueAndRecordIo 0x7f ffffe083`1153fd30 fffff801`5a6851ef : ffffe20f`ae84f190 ffffe20f`b90bb040 ffffe20f`be2c79b0 ffffe20f`ae83f0b0 : iorate!IoRateProcessIrpWrapper 0x69 ffffe083`1153fdc0 fffff801`5642a6b5 : ffff9f03`555e5b30 fffff801`53b03ad8 ffffe20f`bddafb20 00000000`00000001 : iorate!IoRateDispatchReadWrite 0x5f ffffe083`1153fe00 fffff801`5a571033 : ffffe20f`ae830520 fffff801`5a581a98 ffffe20f`bddafb58 ffff9f03`555e5b48 : nt!IofCallDriver 0x55 ffffe083`1153fe40 fffff801`5642a6b5 : ffffe20f`ae84f190 fffff801`5a5cacf8 fffff801`53b1c4b8 00000000`00000012 : volume!VolumePassThrough 0x23 ffffe083`1153fe70 fffff801`5a584e3a : 00000000`00000000 fffff801`53b04234 00000000`00008000 ffffe083`ffff7fff : nt!IofCallDriver 0x55 ffffe083`1153feb0 fffff801`5a5811a9 : ffffe083`0eafde08 00000000`00000000 00000000`00000000 00000000`00000000 : volsnap!VolSnapReadFilter 0x3c7a ffffe083`1153fee0 fffff801`5642a6b5 : 00000000`00000001 00000000`00000000 00000000`00000004 ffffe083`0eafe940 : volsnap!VolSnapRead 0x19 ffffe083`1153ff10 fffff801`59bd37cc : ffffe083`0eafe700 ffffe20f`b90bb040 ffffe083`0eafe730 ffffe20f`b90bb040 : nt!IofCallDriver 0x55 ffffe083`1153ff50 fffff801`565fc9fe : 00000000`00000000 00000000`0128dfd0 00000000`0128e0b8 00000000`0138e684 : Ntfs!NtfsStorageDriverCallout 0x1c ffffe083`1153ff80 fffff801`565fc9bc : ffffe083`1153ffd0 ffffe20f`b90bb040 ffffe083`11540000 fffff801`5648a01d : nt!KxSwitchKernelStackCallout 0x2e ffffe083`0eafdbf0 fffff801`5648a01d : ffffe083`1153ffd0 ffffe20f`b90bb040 ffffe083`0eafdc00 00000000`00000000 : nt!KiSwitchKernelStackContinue ffffe083`0eafdc10 fffff801`56489e12 : fffff801`59bd37b0 ffffe083`0eafde08 ffffe083`00000002 ffffe20f`00000000 : nt!KiExpandKernelStackAndCalloutOnStackSegment 0x19d ffffe083`0eafdcb0 fffff801`56489c73 : ffffe083`0eafde90 00000000`00000001 ffffe20f`00000000 ffffe20f`ae84f040 : nt!KiExpandKernelStackAndCalloutSwitchStack 0xf2 ffffe083`0eafdd20 fffff801`56489c2d : fffff801`59bd37b0 ffffe083`0eafde08 ffffe20f`b9825d38 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal 0x33 ffffe083`0eafdd90 fffff801`59bd04c0 : ffffe20f`b9825d38 fffff801`59bb3335 ffffe20f`b9825d03 ffffe20f`b9493010 : nt!KeExpandKernelStackAndCalloutEx 0x1d ffffe083`0eafddd0 fffff801`59bbcdc7 : ffffe20f`b9825d38 00000000`0000bc00 ffffe20f`b9358758 00000000`00000000 : Ntfs!NtfsMultipleAsync 0x140 ffffe083`0eafde50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsNonCachedIo 0x957 SYMBOL_NAME: storport!RaUnitStartIo 794 MODULE_NAME: storport IMAGE_NAME: storport.sys IMAGE_VERSION: 10.0.19041.2132 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 794 FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_storport!RaUnitStartIo OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {0d88d6ce-04f9-ca15-dfec-a940aee01cb6} Followup: MachineOwner ---------

嗨子恒,保罗,来帮助你解决你的问题的。你能上传所有的小型转储文件,以便我可以正确分析它们吗?1.打开Windows文件资源管理器2.转到C:\Windows\Minidump3.压缩这些文件4.将zip文件上传到云端(OneDriveDropBox..等)。5.然后在这里分享链接。谢谢。此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(63) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部