dmp解析如下: Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.   Loading Dump File [C:\Windows\Minidump\072021-6375-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available   ************* Path validation summary ************** Response                         Time (ms)     Location Deferred                                       srv* Symbol search path is: srv* Executable search path is:  Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff807`33000000 PsLoadedModuleList = 0xfffff807`33c2a2d0 Debug session time: Tue Jul 20 10:30:56.168 2021 (UTC + 8:00) System Uptime: 0 days 17:57:36.932 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ....................... Loading User Symbols Loading unloaded module list ................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`333f6b90 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffac8f`6a9b7e40=000000000000000a 1: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * *******************************************************************************  DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high.  This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory  Debugging Details: ------------------  *** WARNING: Unable to verify timestamp for SecTDI.sys *** WARNING: Unable to verify checksum for win32k.sys  KEY_VALUES_STRING: 1      Key  : Analysis.CPU.mSec     Value: 4843      Key  : Analysis.DebugAnalysisManager     Value: Create      Key  : Analysis.Elapsed.mSec     Value: 53447      Key  : Analysis.Init.CPU.mSec     Value: 374      Key  : Analysis.Init.Elapsed.mSec     Value: 154001      Key  : Analysis.Memory.CommitPeak.Mb     Value: 87      Key  : WER.OS.Branch     Value: vb_release      Key  : WER.OS.Timestamp     Value: 2019-12-06T14:06:00Z      Key  : WER.OS.Version     Value: 10.0.19041.1   BUGCHECK_CODE:  d1  BUGCHECK_P1: 0  BUGCHECK_P2: 2  BUGCHECK_P3: 8  BUGCHECK_P4: 0  READ_ADDRESS: fffff80733cfb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse  0000000000000000   PROCESS_NAME:  System  BLACKBOXBSD: 1 (!blackboxbsd)   BLACKBOXNTFS: 1 (!blackboxntfs)   BLACKBOXPNP: 1 (!blackboxpnp)   BLACKBOXWINLOGON: 1  CUSTOMER_CRASH_COUNT:  1  TRAP_FRAME:  ffffac8f6a9b7f80 -- (.trap 0xffffac8f6a9b7f80) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffae832d503820 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000016 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=ffffac8f6a9b8118 rbp=ffffac8f6a9b82c0  r8=ffffac8f6a9b82c0  r9=0000000000000018 r10=0000fffff807303b r11=ffff73fd5bc00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0         nv up ei pl zr na po nc 00000000`00000000 ??              ??? Resetting default scope  IP_IN_FREE_BLOCK: 0  FAILED_INSTRUCTION_ADDRESS:  +0 STACK_TEXT:   ffffac8f`6a9b8118 fffff807`303b48ed     : ffffd1d5`6217210f ffffae83`00000000 ffffae83`2d503800 00000000`0000004c : 0x0 ffffac8f`6a9b8120 ffffd1d5`6217210f     : ffffae83`00000000 ffffae83`2d503800 00000000`0000004c ffffae83`2d503820 : SecTDI+0x48ed ffffac8f`6a9b8128 ffffae83`00000000     : ffffae83`2d503800 00000000`0000004c ffffae83`2d503820 00000000`00001000 : 0xffffd1d5`6217210f ffffac8f`6a9b8130 ffffae83`2d503800     : 00000000`0000004c ffffae83`2d503820 00000000`00001000 ffffae83`0000004c : 0xffffae83`00000000 ffffac8f`6a9b8138 00000000`0000004c     : ffffae83`2d503820 00000000`00001000 ffffae83`0000004c ffffac8f`0000004c : 0xffffae83`2d503800 ffffac8f`6a9b8140 ffffae83`2d503820     : 00000000`00001000 ffffae83`0000004c ffffac8f`0000004c ffffac8f`6a9b8228 : 0x4c ffffac8f`6a9b8148 00000000`00001000     : ffffae83`0000004c ffffac8f`0000004c ffffac8f`6a9b8228 ffff8400`cd29607e : 0xffffae83`2d503820 ffffac8f`6a9b8150 ffffae83`0000004c     : ffffac8f`0000004c ffffac8f`6a9b8228 ffff8400`cd29607e ffffac8f`6a9b8218 : 0x1000 ffffac8f`6a9b8158 ffffac8f`0000004c     : ffffac8f`6a9b8228 ffff8400`cd29607e ffffac8f`6a9b8218 fffff807`40282eec : 0xffffae83`0000004c ffffac8f`6a9b8160 ffffac8f`6a9b8228     : ffff8400`cd29607e ffffac8f`6a9b8218 fffff807`40282eec ffff8400`cd29607e : 0xffffac8f`0000004c ffffac8f`6a9b8168 ffff8400`cd29607e     : ffffac8f`6a9b8218 fffff807`40282eec ffff8400`cd29607e ffffae83`34732c70 : 0xffffac8f`6a9b8228 ffffac8f`6a9b8170 ffffac8f`6a9b8218     : fffff807`40282eec ffff8400`cd29607e ffffae83`34732c70 00000000`00001000 : 0xffff8400`cd29607e ffffac8f`6a9b8178 fffff807`40282eec     : ffff8400`cd29607e ffffae83`34732c70 00000000`00001000 00000000`0000003c : 0xffffac8f`6a9b8218 ffffac8f`6a9b8180 fffff807`4028175e     : ffffae83`2d503790 ffffae83`2cbefc40 00000000`0000004c ffffae83`2d503790 : tdx!DbgTdxReferenceTransportAddress+0x88 ffffac8f`6a9b81b0 fffff807`37e0fafb     : 00000000`00000008 00000000`00000004 00000000`00000000 fffff807`37e10b19 : tdx!TdxEventReceiveMessagesTransportAddress+0x34e ffffac8f`6a9b83a0 fffff807`37e0f0d3     : ffffae83`36189900 ffffac8f`6a9b86c0 ffffae83`361899c0 ffffac8f`6a9b8628 : tcpip!UdpDeliverDatagrams+0x8eb ffffac8f`6a9b85c0 fffff807`37e0ddc0     : 00000000`00000000 ffffae83`22445140 fffff807`37fe9858 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x1203 ffffac8f`6a9b89d0 fffff807`37e2abd0     : ffffae83`2a662d70 fffff807`37e28000 00000000`00000000 ffffae83`1f3fb0a0 : tcpip!UdpNlClientReceiveDatagrams+0x10 ffffac8f`6a9b8a00 fffff807`37e2751b     : ffffae83`22445140 ffffac8f`6a9b8b79 00000000`00000000 ffffae83`22445000 : tcpip!IppProcessDeliverList+0xc0 ffffac8f`6a9b8ae0 fffff807`37e26a9f     : fffff807`37fe9230 ffffae83`223dd8a0 ffffae83`22445000 00000000`00000000 : tcpip!IppReceiveHeaderBatch+0x21b ffffac8f`6a9b8be0 fffff807`37e23ddc     : ffffae83`2d3060f0 ffffae83`2f3db650 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore+0x32f ffffac8f`6a9b8d00 fffff807`37e720ff     : ffffae83`2a662d70 00000000`00000000 ffffac8f`6a9b8dd1 00000000`00000000 : tcpip!IpFlcReceivePackets+0xc ffffac8f`6a9b8d30 fffff807`37e716fc     : 00000000`00000001 ffffae83`23378000 fffff807`37e63010 ffffac8f`6adc37ec : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x26f ffffac8f`6a9b8e30 fffff807`333fa46e     : 00000000`00000000 00000000`00000000 ffffac8f`6a9b8fd0 ffffae83`2326e4c0 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x17c ffffac8f`6a9b8f80 fffff807`333fa42c     : ffffac8f`6a9b8fd0 ffffae83`2326e4c0 ffffac8f`6a9b9000 fffff807`33298efd : nt!KxSwitchKernelStackCallout+0x2e ffffac8f`6adc3530 fffff807`33298efd     : ffffac8f`6a9b8fd0 ffffae83`2326e4c0 ffffac8f`6adc351a fffff807`333fd500 : nt!KiSwitchKernelStackContinue ffffac8f`6adc3550 fffff807`33298cf2     : fffff807`37e71580 ffffac8f`6adc3808 ffffac8f`00000002 00000000`00000002 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x19d ffffac8f`6adc35f0 fffff807`33298b53     : ffffae83`224b1800 00000000`00000002 00000000`00000002 ffffac8f`6adc3808 : nt!KiExpandKernelStackAndCalloutSwitchStack+0xf2 ffffac8f`6adc3660 fffff807`33298b0d     : fffff807`37e71580 ffffac8f`6adc3808 ffffae83`1f7f45f0 00000000`00040282 : nt!KeExpandKernelStackAndCalloutInternal+0x33 ffffac8f`6adc36d0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0x1d   STACK_COMMAND:  .trap 0xffffac8f6a9b7f80 ; kb  SYMBOL_NAME:  SecTDI+48ed  MODULE_NAME: SecTDI  IMAGE_NAME:  SecTDI.sys  BUCKET_ID_FUNC_OFFSET:  48ed  FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_SecTDI!unknown_function  OS_VERSION:  10.0.19041.1  BUILDLAB_STR:  vb_release  OSPLATFORM_TYPE:  x64  OSNAME:  Windows 10  FAILURE_ID_HASH:  {6e35a2c3-cc75-43ad-6fcf-9c2e8b03f82f}  Followup:     MachineOwner ---------      根据第三方网站的信息,这个是赛门铁克的驱动1人认为此有帮助·此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        您好欢迎咨询本站,
        您好欢迎咨询本站,
        SecTDI.sys这个是什么软件的驱动,找不到此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
        根据第三方网站的信息,这个是赛门铁克的驱动1人认为此有帮助·此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。

点赞(97) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部