Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\云盘\OneDrive\桌面\102625-14921-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRVC:\Symbolshttp://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 26100 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff8038aa00000 PsLoadedModuleList = 0xfffff8038b8f4e70
Debug session time: Sun Oct 26 15:53:47.975 2025 (UTC + 8:00)
System Uptime: 0 days 0:01:08.417
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................................................
Loading User Symbols
Loading unloaded module list
...........
Use !analyze -v to get detailed debugging information.
BugCheck D1, {0, ff, a, fffff80320a7c170}
Probably caused by : memory_corruption
Followup: memory_corruption
*** Memory manager detected 196736 instance(s) of page corruption, target is likely to have memory corruption.
8: kd> !analyze -v
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000000a, value 0 = read operation, 1 = write operation
Arg4: fffff80320a7c170, address which referenced memory
Debugging Details:
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
0000000000000000
CURRENT_IRQL: 0
FAULTING_IP:
+3662633363616630
fffff803`20a7c170 0fae39 clflush [rcx]
ADDITIONAL_DEBUG_TEXT: The trap occurred when interrupts are disabled on the target.
BUGCHECK_STR: DISABLED_INTERRUPT_FAULT
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: svchost.exe
BAD_PAGES_DETECTED: 30080
LAST_CONTROL_TRANSFER: from fffff8038b0b39e9 to fffff8038aef9280
STACK_TEXT:
ffff98829d0af358 fffff8038b0b39e9 : 000000000000000a 0000000000000000 00000000000000ff 000000000000000a : nt!KeBugCheckEx
ffff98829d0af360 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8038aef90ca-fffff8038aef90cd 4 bytes - nt!_C_specific_handler+9a
[ ff d0 0f 1f:e8 31 42 6b ]
fffff8038aef91cc-fffff8038aef91cf 4 bytes - nt!_C_specific_handler+19c (+0x102)
[ ff d0 0f 1f:e8 2f 41 6b ]
fffff8038aef9710-fffff8038aef9712 3 bytes - nt!TmInitSystemPhase2 (+0x544)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9717-fffff8038aef971b 5 bytes - nt!TmInitSystemPhase2+7 (+0x07)
[ cc cc cc cc cc:e9 24 3c 4c 91 ]
fffff8038aef9730-fffff8038aef9732 3 bytes - nt!TmInitSystem (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9737-fffff8038aef973b 5 bytes - nt!TmInitSystem+7 (+0x07)
[ cc cc cc cc cc:e9 44 b9 4d 91 ]
fffff8038aef9750-fffff8038aef9752 3 bytes - nt!NtCommitComplete (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9757-fffff8038aef975b 5 bytes - nt!NtCommitComplete+7 (+0x07)
[ cc cc cc cc cc:e9 54 71 4c 91 ]
fffff8038aef9770-fffff8038aef9772 3 bytes - nt!NtCommitEnlistment (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9777-fffff8038aef977b 5 bytes - nt!NtCommitEnlistment+7 (+0x07)
[ cc cc cc cc cc:e9 04 72 4c 91 ]
fffff8038aef9790-fffff8038aef9792 3 bytes - nt!NtCommitTransaction (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9797-fffff8038aef979b 5 bytes - nt!NtCommitTransaction+7 (+0x07)
[ cc cc cc cc cc:e9 24 2d 4d 91 ]
fffff8038aef97b0-fffff8038aef97b2 3 bytes - nt!NtCreateEnlistment (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef97b7-fffff8038aef97bb 5 bytes - nt!NtCreateEnlistment+7 (+0x07)
[ cc cc cc cc cc:e9 24 6f 4d 91 ]
fffff8038aef97d0-fffff8038aef97d2 3 bytes - nt!NtCreateResourceManager (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef97d7-fffff8038aef97db 5 bytes - nt!NtCreateResourceManager+7 (+0x07)
[ cc cc cc cc cc:e9 34 8a 4d 91 ]
fffff8038aef97f0-fffff8038aef97f2 3 bytes - nt!NtCreateTransaction (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef97f7-fffff8038aef97fb 5 bytes - nt!NtCreateTransaction+7 (+0x07)
[ cc cc cc cc cc:e9 24 d1 4c 91 ]
fffff8038aef9810-fffff8038aef9812 3 bytes - nt!NtCreateTransactionManager (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9817-fffff8038aef981b 5 bytes - nt!NtCreateTransactionManager+7 (+0x07)
[ cc cc cc cc cc:e9 f4 d8 4c 91 ]
fffff8038aef9830-fffff8038aef9832 3 bytes - nt!NtEnumerateTransactionObject (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9837-fffff8038aef983b 5 bytes - nt!NtEnumerateTransactionObject+7 (+0x07)
[ cc cc cc cc cc:e9 b4 9c 4c 91 ]
fffff8038aef9850-fffff8038aef9852 3 bytes - nt!NtFreezeTransactions (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9857-fffff8038aef985b 5 bytes - nt!NtFreezeTransactions+7 (+0x07)
[ cc cc cc cc cc:e9 e4 9e 4c 91 ]
fffff8038aef9870-fffff8038aef9872 3 bytes - nt!NtGetNotificationResourceManager (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9877-fffff8038aef987b 5 bytes - nt!NtGetNotificationResourceManager+7 (+0x07)
[ cc cc cc cc cc:e9 e4 80 4c 91 ]
fffff8038aef9890-fffff8038aef9892 3 bytes - nt!NtOpenEnlistment (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9897-fffff8038aef989b 5 bytes - nt!NtOpenEnlistment+7 (+0x07)
[ cc cc cc cc cc:e9 b4 71 4c 91 ]
fffff8038aef98b0-fffff8038aef98b2 3 bytes - nt!NtOpenResourceManager (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef98b7-fffff8038aef98bb 5 bytes - nt!NtOpenResourceManager+7 (+0x07)
[ cc cc cc cc cc:e9 24 82 4c 91 ]
fffff8038aef98d0-fffff8038aef98d2 3 bytes - nt!NtOpenTransaction (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef98d7-fffff8038aef98db 5 bytes - nt!NtOpenTransaction+7 (+0x07)
[ cc cc cc cc cc:e9 44 9f 4c 91 ]
fffff8038aef98f0-fffff8038aef98f2 3 bytes - nt!NtOpenTransactionManager (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef98f7-fffff8038aef98fb 5 bytes - nt!NtOpenTransactionManager+7 (+0x07)
[ cc cc cc cc cc:e9 d4 a5 4c 91 ]
fffff8038aef9910-fffff8038aef9912 3 bytes - nt!NtPrePrepareComplete (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9917-fffff8038aef991b 5 bytes - nt!NtPrePrepareComplete+7 (+0x07)
[ cc cc cc cc cc:e9 74 73 4c 91 ]
fffff8038aef9930-fffff8038aef9932 3 bytes - nt!NtPrePrepareEnlistment (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9937-fffff8038aef993b 5 bytes - nt!NtPrePrepareEnlistment+7 (+0x07)
[ cc cc cc cc cc:e9 94 74 4c 91 ]
fffff8038aef9950-fffff8038aef9952 3 bytes - nt!NtPrepareComplete (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9957-fffff8038aef995b 5 bytes - nt!NtPrepareComplete+7 (+0x07)
[ cc cc cc cc cc:e9 44 75 4c 91 ]
fffff8038aef9970-fffff8038aef9972 3 bytes - nt!NtPrepareEnlistment (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9977-fffff8038aef997b 5 bytes - nt!NtPrepareEnlistment+7 (+0x07)
[ cc cc cc cc cc:e9 64 76 4c 91 ]
fffff8038aef9990-fffff8038aef9992 3 bytes - nt!NtPropagationComplete (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef9997-fffff8038aef999b 5 bytes - nt!NtPropagationComplete+7 (+0x07)
[ cc cc cc cc cc:e9 34 ac 4c 91 ]
fffff8038aef99b0-fffff8038aef99b2 3 bytes - nt!NtPropagationFailed (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef99b7-fffff8038aef99bb 5 bytes - nt!NtPropagationFailed+7 (+0x07)
[ cc cc cc cc cc:e9 24 ad 4c 91 ]
fffff8038aef99d0-fffff8038aef99d2 3 bytes - nt!NtQueryInformationEnlistment (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef99d7-fffff8038aef99db 5 bytes - nt!NtQueryInformationEnlistment+7 (+0x07)
[ cc cc cc cc cc:e9 d4 76 4c 91 ]
fffff8038aef99f0-fffff8038aef99f2 3 bytes - nt!NtQueryInformationResourceManager (+0x19)
[ 48 ff 25:4c 8b 15 ]
fffff8038aef99f7-fffff8038aef99fb 5 bytes - nt!NtQueryInformationResourceManager+7 (+0x07)
[ cc cc cc cc cc:e9 f4 82 4c 91 ]
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
584 errors : !nt (fffff8038aef90ca-fffff8038aef9ffb)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
*** Memory manager detected 196736 instance(s) of page corruption, target is likely to have memory corruption.
8: kd> lmvm memory_corruption
start end module name
8: kd> lmvm memory_corruption
start end module name
8: kd> !chkimg
584 errors : @rip (fffff8038aef90ca-fffff8038aef9ffb)
8: kd> lmvm memory_corruption
start end module name