Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\081122-7937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`52800000 PsLoadedModuleList = 0xfffff801`5342a230
Debug session time: Thu Aug 11 21:47:03.842 2022 (UTC + 8:00)
System Uptime: 0 days 11:51:44.825
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`52bf8590 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff287`8b9665a0=000000000000001a
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000003300, The subtype of the BugCheck.
Arg2: ffffcc8f5783c000
Arg3: 860000046a1c8201
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5546
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 117397
Key : Analysis.Init.CPU.mSec
Value: 1343
Key : Analysis.Init.Elapsed.mSec
Value: 315815
Key : Analysis.Memory.CommitPeak.Mb
Value: 106
Key : Bugcheck.Code.DumpHeader
Value: 0x1a
Key : Bugcheck.Code.Register
Value: 0x1a
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 081122-7937-01.dmp
BUGCHECK_CODE: 1a
BUGCHECK_P1: 3300
BUGCHECK_P2: ffffcc8f5783c000
BUGCHECK_P3: 860000046a1c8201
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff2878b966ae0 -- (.trap 0xfffff2878b966ae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffcc8f57824000 rbx=0000000000000000 rcx=ffffcc8f5783c010
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014ec3d837 rsp=fffff2878b966c78 rbp=fffff2878b967600
r8=0000000000040618 r9=000000000000050c r10=ffff840f0f2ed0b0
r11=fffff2878b966d18 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
CLFS!memset+0xb7:
fffff801`4ec3d837 0f2941f0 movaps xmmword ptr [rcx-10h],xmm0 ds:ffffcc8f`5783c000=00000000000000000000000000000000
Resetting default scope
STACK_TEXT:
fffff287`8b966598 fffff801`52a92d0a : 00000000`0000001a 00000000`00003300 ffffcc8f`5783c000 86000004`6a1c8201 : nt!KeBugCheckEx
fffff287`8b9665a0 fffff801`52aede19 : ffffcc8f`5783c000 fffff287`8b966a00 ffff840f`00000000 86000004`6a1c8201 : nt!MiCopyOnWrite+0xe3a
fffff287`8b966840 fffff801`52acf670 : 00000000`00000000 00000000`00000003 fffff287`8b966b60 00000000`00000000 : nt!MiSystemFault+0x759
fffff287`8b966940 fffff801`52c0675e : 00000001`00060000 fffff287`8b966ae8 ffff840f`0f284700 ffff840f`0f2841d0 : nt!MmAccessFault+0x400
fffff287`8b966ae0 fffff801`4ec3d837 : fffff801`4ec5ddc1 ffff840f`0f120860 ffff840f`191d3010 ffffcc8f`57783e01 : nt!KiPageFault+0x35e
fffff287`8b966c78 fffff801`4ec5ddc1 : ffff840f`0f120860 ffff840f`191d3010 ffffcc8f`57783e01 00000000`00000000 : CLFS!memset+0xb7
fffff287`8b966c80 fffff801`4ec68230 : ffffcc8f`57732140 00000000`00000000 fffff287`8b966d60 ffffcc8f`00000001 : CLFS!CClfsKernelMarshallingContext::AllocateIocb+0x12d
fffff287`8b966d20 fffff801`4ec6cdda : ffffcc8f`57732140 fffff287`8b966fc8 ffffffff`00000000 fffff287`8b966de8 : CLFS!CClfsKernelMarshallingContext::ReadLogRecord+0x98
fffff287`8b966da0 fffff801`4ec6b6eb : ffffcc8f`57732140 00000000`00000070 ffffcc8f`00000000 ffffffff`00000000 : CLFS!CClfsKernelMarshallingContext::ValidateLogBase+0x11e
fffff287`8b966e30 fffff801`4ec6c4ed : ffffcc8f`57732140 fffff287`8b967120 00000000`00000070 00000000`00000082 : CLFS!CClfsKernelMarshallingContext::WriteRestartArea+0x187
fffff287`8b966f80 fffff801`54f857c8 : ffff840f`00000000 00000000`00000000 ffffcc8f`577ce000 ffffcc8f`00000000 : CLFS!ClfsWriteRestartArea+0xfd
fffff287`8b967010 fffff801`54f580d8 : 00000000`000000d0 fffff287`00000000 fffff287`00000000 ffffcc8f`577ce000 : Ntfs!TxfTransMgrCheckpoint+0x63c
fffff287`8b9671e0 fffff801`54f57789 : fffff287`8b9675d0 ffffcc8f`577ce000 ffff840f`00000000 fffff287`8b967500 : Ntfs!TxfShutdownRm+0x748
fffff287`8b9672d0 fffff801`550412f8 : fffff287`8b9675d0 ffff840f`0f57a180 00000000`00000103 00000000`00000001 : Ntfs!TxfShutdownVolume+0xfd
fffff287`8b967390 fffff801`550410cf : fffff287`8b9675d0 ffff840f`0f57a180 ffff840f`0f57a301 ffff840f`0f57a180 : Ntfs!TxfShutdownVolumeNoRaise+0x90
fffff287`8b9673f0 fffff801`5504125c : fffff287`00000000 ffff840f`1c0e3a00 fffff287`8b967660 ffff840f`0f57a180 : Ntfs!NtfsShutdownVolume+0x8b
fffff287`8b967480 fffff801`54f2463d : ffff840f`1c0e3a02 fffff287`8b967660 ffff840f`0f57a180 fffff287`8b9675d0 : Ntfs!NtfsShutdownVolumeWorker+0xc
fffff287`8b9674b0 fffff801`55040eb6 : fffff287`8b9675d0 00000000`00000000 00000000`00000000 fffff801`55041250 : Ntfs!NtfsForEachVcb+0x201
fffff287`8b967560 fffff801`52a30d45 : ffff840f`0f0b4040 00000000`00000000 ffff840f`0f0b2540 ffffffff`ffffffff : Ntfs!NtfsFsdShutdown+0x166
fffff287`8b967850 fffff801`4ecd4a36 : ffff840f`0f0b4040 ffff840f`0f0b2540 ffff840f`1c0e3a20 00000000`00000000 : nt!IofCallDriver+0x55
fffff287`8b967890 fffff801`52a30d45 : ffff840f`0f0b4040 fffff801`52a3334e 00000000`00000000 fffff287`8b967980 : FLTMGR!FltpDispatch+0xd6
fffff287`8b9678f0 fffff801`531a936e : ffff840f`0f0b2590 fffff287`8b967a20 00000000`00000000 fffff801`00000000 : nt!IofCallDriver+0x55
fffff287`8b967930 fffff801`531a909e : 00000000`00000001 ffff840f`094c5a20 fffff801`53421140 00000000`00000001 : nt!IopShutdownBaseFileSystems+0xca
fffff287`8b9679b0 fffff801`531af30a : 00000000`00000002 00000000`00000002 fffff801`53421140 00000000`00000000 : nt!IoShutdownSystem+0x156
fffff287`8b967a30 fffff801`52ae87f5 : ffff840f`1bc94040 fffff801`52eda470 ffff840f`094c5a20 00000000`00000000 : nt!PopGracefulShutdown+0x23a
fffff287`8b967a70 fffff801`52b4edc5 : ffff840f`1bc94040 00000000`00000080 ffff840f`094ae1c0 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff287`8b967b10 fffff801`52bffbe8 : ffff9481`d815e180 ffff840f`1bc94040 fffff801`52b4ed70 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffff287`8b967b60 00000000`00000000 : fffff287`8b968000 fffff287`8b961000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: CLFS!memset+b7
MODULE_NAME: CLFS
IMAGE_NAME: CLFS.SYS
IMAGE_VERSION: 10.0.19041.1826
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: b7
FAILURE_BUCKET_ID: 0x1a_3300_CLFS!memset
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9e5144ab-93a6-c94c-9774-ce090778479e}
Followup: MachineOwner
---------
5: kd> !process
PROCESS ffff840f094ae1c0
SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
DirBase: 001ad002 ObjectTable: ffffcc8f57016540 HandleCount: <Data Not Accessible>
Image: System
VadRoot ffff840f094f4510 Vads 6 Clone 0 Private 23. Modified 1598183. Locked 0.
DeviceMap ffffcc8f57036360
Token ffffcc8f5701f850
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
fffff78000000000: Unable to get shared data
ElapsedTime 00:00:00.000
UserTime 00:00:00.000
KernelTime 00:00:00.000
QuotaPoolUsage[PagedPool] 0
QuotaPoolUsage[NonPagedPool] 272
Working Set Sizes (now,min,max) (26, 50, 450) (104KB, 200KB, 1800KB)
PeakWorkingSetSize 2091
VirtualSize 3 Mb
PeakVirtualSize 33 Mb
PageFaultCount 29716
MemoryPriority BACKGROUND
BasePriority 8
CommitCharge 50
*** Error in reading nt!_ETHREAD @ ffff840f094b0040宝宝张你好您的小型转储文件表明是驱动器访问导致系统崩溃。转到制造商网站上的PC支持页面,然后从那里下载并安装他们推荐的芯片组驱动程序版本,并在那里检查可能需要安装的任何BIOS更新___________________________________________________________________PowertotheDeveloper!MSIGV72-17.3",i7-8750H(HexCore),32GBDDR4,4GBGeForceGTX1050Ti,256GBNVMeM2,2TBHDD
Hi宝宝张IamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.
Onedrive链接:https://1drv.ms/u/s!AoQR-ynRgERHgRcpuvi0wxLTTUBK?e=ZmG1V5,一共三个DMP文件,麻烦分析一下
宝宝张你好您的小型转储文件表明是驱动器访问导致系统崩溃。转到制造商网站上的PC支持页面,然后从那里下载并安装他们推荐的芯片组驱动程序版本,并在那里检查可能需要安装的任何BIOS更新___________________________________________________________________PowertotheDeveloper!MSIGV72-17.3",i7-8750H(HexCore),32GBDDR4,4GBGeForceGTX1050Ti,256GBNVMeM2,2TBHDD