Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\101522-4796-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff800`7f800000 PsLoadedModuleList = 0xfffff800`804133d0 Debug session time: Sat Oct 15 16:51:26.089 2022 (UTC 8:00) System Uptime: 2 days 2:35:32.215 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ........................................................... Loading User Symbols Loading unloaded module list ............................................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`7fc280f0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffff990e`f3bbf510=000000000000001a 6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041202, The subtype of the BugCheck. Arg2: ffffd3bffbab69c0 Arg3: 81000000bb6c7480 Arg4: ffff800fabe7bc00 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1296 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 6326 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 156 Key : Analysis.Init.Elapsed.mSec Value: 12730 Key : Analysis.Memory.CommitPeak.Mb Value: 85 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 101522-4796-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump BUGCHECK_CODE: 1a BUGCHECK_P1: 41202 BUGCHECK_P2: ffffd3bffbab69c0 BUGCHECK_P3: 81000000bb6c7480 BUGCHECK_P4: ffff800fabe7bc00 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: r5apex.exe STACK_TEXT: ffff990e`f3bbf508 fffff800`7fc7bffe : 00000000`0000001a 00000000`00041202 ffffd3bf`fbab69c0 81000000`bb6c7480 : nt!KeBugCheckEx ffff990e`f3bbf510 fffff800`7fa487a9 : 00000000`00000000 00000000`00001000 00000000`00000000 ffff990e`f3bbf670 : nt!MiGetPageProtection 0x23280e ffff990e`f3bbf570 fffff800`7fa45c35 : 00000000`00000000 ffff990e`f3bbf7d9 00000000`00000001 00000000`0022e023 : nt!MiQueryAddressState 0x4c9 ffff990e`f3bbf780 fffff800`7fe941e7 : ffff990e`f3bbf8d0 00007ff7`569e7000 ffff800f`abe70000 ffff800f`abe7bc00 : nt!MiQueryAddressSpan 0x2a5 ffff990e`f3bbf840 fffff800`7fe93a95 : 00000040`b112f440 ffffd3e9`0022e023 0000016a`ab381a38 ffff800f`0000002c : nt!MmQueryVirtualMemory 0x737 ffff990e`f3bbf9e0 fffff800`7fc3aa68 : 00000000`00000000 00000000`00000000 00000000`00000000 0000016a`ab381a38 : nt!NtQueryVirtualMemory 0x25 ffff990e`f3bbfa30 00007ff8`6186f1d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x28 00000040`b112f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6186f1d4 SYMBOL_NAME: nt!MiGetPageProtection 23280e MODULE_NAME: nt IMAGE_VERSION: 10.0.22621.674 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 23280e FAILURE_BUCKET_ID: 0x1a_41202_nt!MiGetPageProtection OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f0b0cf68-a44f-c0c2-6870-6a13e4de4705} Followup: MachineOwner --------- 6: kd> lmvm nt Browse full module list start end module name fffff800`7f800000 fffff800`80847000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\48529016A13F2DB730E0C5FDFE04C32E1\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\A665DD9A1047000\ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: A665DD9A (This is a reproducible build file hash, not a timestamp) CheckSum: 00B7A9EB ImageSize: 01047000 File version: 10.0.22621.674 Product version: 10.0.22621.674 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 10.0.22621.674 FileVersion: 10.0.22621.674 (WinBuild.160101.0800) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved. 麻烦了