刚刚还给我干重启了
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)An attempt was made to write to readonly memory. The guilty driver is on thestack trace (and is typically the current instruction pointer).When possible, the guilty driver's name (Unicode string) is printed onthe BugCheck screen and saved in KiBugCheckDriver.Arguments:Arg1: ffffad00266c55a8, Virtual address for the attempted write.Arg2: 8a00000000200121, PTE contents.Arg3: ffffa681857f6c60, (reserved)Arg4: 000000000000000a, (reserved)Debugging DetAIls:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1093 Key : Analysis.ElaPSed.mSec Value: 10470 Key : Analysis.IO.Other.Mb Value: 23 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 31 Key : Analysis.Init.CPU.mSec Value: 171 Key : Analysis.Init.Elapsed.mSec Value: 73874 Key : Analysis.Memory.CommitPeak.Mb Value: 150 Key : Bugcheck.Code.LegacyAPI Value: 0xbe Key : Bugcheck.Code.TargetModel Value: 0xbe Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_nt!MiRaisedIrqlFault Key : Failure.Hash Value: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}BUGCHECK_CODE: beBUGCHECK_P1: ffffad00266c55a8BUGCHECK_P2: 8a00000000200121BUGCHECK_P3: ffffa681857f6c60BUGCHECK_P4: aFILE_IN_CAB: 081024-5921-01.dmpDUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage DumpFAULTING_THREAD: ffff800f4b9db080BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXntfs: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: cs2.exeTRAP_FRAME: ffffa681857f6c60 -- (.trap 0xffffa681857f6c60)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=ffffa681857f7030 rbx=0000000000000000 rcx=ffffad00266c5590rdx=0000000000302107 rsi=0000000000000000 rdi=0000000000000000rip=fffff8055a94509d rsp=ffffa681857f6df0 rbp=0000000000040000 r8=ffffad0009063150 r9=0000000000000004 r10=0000000000ccec73r11=ffffad0000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po ncnt!MiAcquirePageListLock+0x30d:fffff805`5a94509d f0480fba69183f lock bts qword ptr [rcx+18h],3Fh ds:ffffad00`266c55a8=0000000000000000Resetting default scopeSTACK_TEXT: ffffa681`857f6ae8 fffff805`5aa88ff4 : 00000000`000000be ffffad00`266c55a8 8a000000`00200121 ffffa681`857f6c60 : nt!KeBugCheckExffffa681`857f6af0 fffff805`5a947fc3 : 8a000000`00200121 00000000`00000003 ffffa681`857f6bf9 00000000`00000000 : nt!MiRaisedIrqlFault+0x221f54ffffa681`857f6b40 fffff805`5aa2707e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x363ffffa681`857f6c60 fffff805`5a94509d : ffffa681`857f6fc0 1a000001`03350863 00000000`00000001 fffff805`5a808613 : nt!KiPageFault+0x37effffa681`857f6df0 fffff805`5a944243 : fffff805`5b26bcf8 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiAcquirePageListLock+0x30dffffa681`857f6e90 fffff805`5a91f9e0 : 00000000`00000000 ffffff5e`050177d8 ffffad00`1705c530 00000000`00000000 : nt!MiUnlinkPageFromListEx+0x223ffffa681`857f7070 fffff805`5a921015 : fffff805`00000000 00000000`02f40000 ffffa681`00000000 00000000`00000000 : nt!MmCheckCachedPageStates+0x890ffffa681`857f7200 fffff805`5ade13f3 : 00000000`02f40000 00000000`00000000 ffff800f`4b354cb0 00000000`000c0000 : nt!CcFetchDataForRead+0x95ffffa681`857f7260 fffff805`5a91d288 : ffff800f`4b354cb0 00000000`02f40000 ffffa681`00000000 ffffce8c`3e282001 : nt!CcMapAndCopyFromCache+0xf3ffffa681`857f7320 fffff805`601dd6cf : ffffa681`00000000 ffff800f`4ad8ad30 00000000`00100000 ffff800f`00100001 : nt!CcCopyReadEx+0x1c8ffffa681`857f7400 fffff805`5f3fac56 : ffff800f`4b354cb0 00000000`00000000 ffffa681`857f77b8 0000029d`6c5a0300 : Ntfs!NtfsCopyReadA+0x28fffffa681`857f7710 fffff805`5f3f7a3e : ffffa681`857f7820 ffffa681`857f77b8 ffff800f`426d2a20 ffff800f`426d2b20 : FLTMGR!FltpPerformFastIoCall+0x196ffffa681`857f7770 fffff805`5f43274c : ffffa681`857f8000 ffffa681`857f1000 ffffa681`857f7930 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0x10effffa681`857f77f0 fffff805`5acac9f6 : 00000000`00000000 ffff800f`4b354cb0 ffff800f`4b354cb0 00000000`00000000 : FLTMGR!FltpFastIoRead+0x15cffffa681`857f78a0 fffff805`5acac3bb : ffff800f`4b354cb0 00000000`00000000 00000000`00000000 000000e3`34bbfa00 : nt!IopReadFile+0x606ffffa681`857f79a0 fffff805`5aa2b408 : ffff800f`4b9db080 ffffa681`857f7b20 000000e3`34bbf978 ffffa681`857f7a48 : nt!NtReadFile+0xdbffffa681`857f7a30 00007ffa`70730064 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28000000e3`34bbf958 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`70730064SYMBOL_NAME: nt!MiRaisedIrqlFault+221f54MODULE_NAME: ntIMAGE_VERSION: 10.0.22621.3880STACK_COMMAND: .process /r /p 0xffff800f43b4d080; .thread 0xffff800f4b9db080 ; kbIMAGE_NAME: ntkrnlmp.exeBUCKET_ID_FUNC_OFFSET: 221f54FAILURE_BUCKET_ID: AV_nt!MiRaisedIrqlFaultOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}Followup: MachineOwner |