BSOD_0X0A

Microsoft ® Windows Debugger Version 10.0.17134.12 AMD64
Copyright © Microsoft Corporation. All rights reserved.

Loading Dump File [E:\00 V530s\320s Driver\MEMORY\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

WARNING: Whitespace at start of path element
Error: Empty Path.
WARNING: Whitespace at start of path element
Symbol search path is:
SRVC:\MyLocalSymbolshttp://msdl.microsoft.com/download/symbols
Executable search path is:
WARNING: Whitespace at start of path element
Windows 10 Kernel Version 15063 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff8006167c000 PsLoadedModuleList = 0xfffff800619c85c0
Debug session time: Tue Jan 15 09:49:21.286 2019 (UTC + 8:00)
System Uptime: 0 days 0:00:32.003
Loading Kernel Symbols



Loading User Symbols
PEB is paged out (Peb.Ldr = 0000003f`256c8018). Type “.hh dbgerr001” for details
Loading unloaded module list


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

Use !analyze -v to get detailed debugging information.

BugCheck A, {800000000, 2, 1, fffff800616ccc94}

Probably caused by : dxgmms2.sys ( dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Reset+197 )

Followup: MachineOwner

1: kd> !analyze -v


  •                                                                         *
    
  •                    Bugcheck Analysis                                    *
    
  •                                                                         *
    

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000800000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800616ccc94, address which referenced memory

Debugging Details:

KEY_VALUES_STRING: 1

TIMELINE_ANALYSIS: 1

DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834

SYSTEM_MANUFACTURER: LENOVO

SYSTEM_PRODUCT_NAME: 81BS

SYSTEM_SKU: LENOVO_MT_81BS_BU_idea_FM_XiaoXin CHAO7000-13

SYSTEM_VERSION: Lenovo XiaoXin CHAO7000-13

BIOS_VENDOR: LENOVO

BIOS_VERSION: 5ZCN36WW

BIOS_DATE: 08/24/2018

BASEBOARD_MANUFACTURER: LENOVO

BASEBOARD_PRODUCT: LNVNB161216

BASEBOARD_VERSION: No DPK

DUMP_TYPE: 1

BUGCHECK_P1: 800000000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff800616ccc94

WRITE_ADDRESS: 0000000800000000

CURRENT_IRQL: 2

FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff800`616ccc94 48890a mov qword ptr [rdx],rcx

CPU_COUNT: 4

CPU_MHZ: 960

CPU_VENDOR: GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 8e

CPU_STEPPING: 9

CPU_MICROCODE: 6,8e,9,0 (F,M,S,R) SIG: 8E’00000000 (cache) 8E’00000000 (init)

BLACKBOXBSD: 1 (!blackboxbsd)

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: SearchUI.exe

ANALYSIS_SESSION_HOST: DESKTOP-O43BPAB

ANALYSIS_SESSION_TIME: 01-16-2019 09:15:15.0025

ANALYSIS_VERSION: 10.0.17134.12 amd64fre

TRAP_FRAME: ffffd501d6dfadb0 – (.trap 0xffffd501d6dfadb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000020d rbx=0000000000000000 rcx=ffffd501d6dfafa0
rdx=0000000800000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800616ccc94 rsp=ffffd501d6dfaf40 rbp=ffffd501d6dfb009
r8=ffffee8000007000 r9=fffff800619fa068 r10=0000000000000069
r11=ffffee8000007000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KxWaitForLockOwnerShip+0x14:
fffff800616ccc94 48890a mov qword ptr [rdx],rcx ds:0000000800000000=???
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800617f38a9 to fffff800617e8560

STACK_TEXT:
ffffd501d6dfac68 fffff800617f38a9 : 000000000000000a 0000000800000000 0000000000000002 0000000000000001 : nt!KeBugCheckEx
ffffd501d6dfac70 fffff800617f1e7d : 0000000b8020040b fffff80000000001 0000000000000000 fffff800616b94ee : nt!KiBugCheckDispatch+0x69
ffffd501d6dfadb0 fffff800616ccc94 : 0000000000000000 0000000000000000 ffffd501d6dfb009 ffffeb800367c3b0 : nt!KiPageFault+0x23d
ffffd501d6dfaf40 fffff80061712279 : ffffeb800367c3b0 0000000000000000 00000000fffffffe ffffeb800367c200 : nt!KxWaitForLockOwnerShip+0x14
ffffd501d6dfaf70 fffff800616ff76a : 0000000000122969 0a0000011872e867 ffffc000a1de4ac8 0000000000000000 : nt!MiInsertPageInFreeOrZeroedList+0x819
ffffd501d6dfb070 fffff800616fec30 : 0000000000000009 0000000000000007 0000000000000000 0000000000000000 : nt!MiWsleFree+0x38a
ffffd501d6dfb100 fffff800616f6b61 : ffffc000a1de4b18 0000000000000000 0000000000000000 00000143bc963000 : nt!MiFreeWsleList+0x140
ffffd501d6dfb2d0 fffff800617f3413 : 0000000200000182 0000000000000000 0000000000000000 ffffc18300000000 : nt!NtUnlockVirtualMemory+0x451
ffffd501d6dfb4d0 fffff800617eb740 : fffff8015df377a3 ffff8c8800000004 ffffffffffffffff ffffd501d6dfb6b8 : nt!KiSystemServiceCopyEnd+0x13
ffffd501d6dfb668 fffff8015df377a3 : ffff8c8800000004 ffffffffffffffff ffffd501d6dfb6b8 0000000000000000 : nt!KiServiceLinkage
ffffd501d6dfb670 fffff8015df34781 : 00000143bc950000 ffff8c88e9c377e0 ffffc183683bc901 0000000000040000 : dxgmms2!VIDMM_RECYCLE_MULTIRANGE::Reset+0x197
ffffd501d6dfb700 fffff8015df2e238 : ffff8c88e9c377e0 ffffc18368400000 0000000000000000 ffff8c88eb12a1a0 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Reset+0x41
ffffd501d6dfb740 fffff8015df199ce : ffff8c88e9c377e0 ffffc18368400000 ffff8c88e9c377e0 0000000000000000 : dxgmms2!VIDMM_GLOBAL::ResetBackingStore+0x144
ffffd501d6dfb7f0 fffff8015df26475 : ffffc18368400000 ffffc18368409be8 ffffc18368409c10 ffffc18368409c10 : dxgmms2!VIDMM_SYSMEM_SEGMENT::EvictResource+0x3be
ffffd501d6dfb860 fffff8015df411cf : ffffd501d6dfb9e0 ffffd50100000000 ffffc18368409bd8 ffffc18368400000 : dxgmms2!VIDMM_GLOBAL::ProcessSystemMemoryOfferList+0x385
ffffd501d6dfb8e0 fffff80061758ac7 : ffffd501d590a180 ffffc183683bc700 fffff8015df40b20 ffff8c88e3029590 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x69f
ffffd501d6dfbb90 fffff800617ed9e6 : ffffd501d590a180 ffffc183

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值