详细描述: |
直接蓝屏,windows kit debug dump dmp文件提示:
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff806541ca0ee, Virtual address for the attempted execute.
Arg2: 8900000669978021, PTE contents.
Arg3: ffff828518f2f450, (reserved)
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on PC-20210724LXVR
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 7
Key : Analysis.Memory.CommitPeak.Mb
Value: 107
Key : Analysis.System
Value: CreateObject
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: fc
BUGCHECK_P1: fffff806541ca0ee
BUGCHECK_P2: 8900000669978021
BUGCHECK_P3: ffff828518f2f450
BUGCHECK_P4: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: mhmain.exe
TRAP_FRAME: ffff828518f2f450 -- (.trap 0xffff828518f2f450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000211000 rbx=0000000000000000 rcx=00000000c0000100
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff806541ca0ee rsp=ffff828518f2f5e0 rbp=000024efbd9bbfff
r8=ffff8b00861e4180 r9=0000000000000005 r10=ffff8b0086879180
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
ACPI!`string'+0x63ee:
fffff806`541ca0ee 0a00 or al,byte ptr [rax] ds:00000000`00211000=??
Resetting default scope
MISALIGNED_IP:
ACPI!`string'+63ee
fffff806`541ca0ee 0a00 or al,byte ptr [rax]
STACK_TEXT:
ffff8285`18f2f228 fffff806`50255eee : 00000000`000000fc fffff806`541ca0ee 89000006`69978021 ffff8285`18f2f450 : nt!KeBugCheckEx
ffff8285`18f2f230 fffff806`502500aa : 00000000`00000003 00000000`00000001 00000000`00000000 ffff8285`18f2f370 : nt!MiCheckSystemNxFault+0x123fb6
ffff8285`18f2f270 fffff806`500956da : 89000006`69978021 00000000`00000011 ffff8285`18f2f3b0 00000000`00000000 : nt!MiRaisedIrqlFault+0x12920a
ffff8285`18f2f2b0 fffff806`501d0d5e : ffff8b00`860c2180 ffff8285`18f2f4d0 ffffa68e`65ee3400 00001f80`00000200 : nt!MmAccessFault+0x48a
ffff8285`18f2f450 fffff806`541ca0ee : 000024ef`bd9bbfff 00000000`00000001 ffffa68e`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffff8285`18f2f5e0 000024ef`bd9bbfff : 00000000`00000001 ffffa68e`00000000 00000000`00000000 00000000`00000000 : ACPI!`string'+0x63ee
ffff8285`18f2f5e8 00000000`00000001 : ffffa68e`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000024ef`bd9bbfff
ffff8285`18f2f5f0 ffffa68e`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000fff : 0x1
ffff8285`18f2f5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000fff fffff806`501c9a26 : 0xffffa68e`00000000
SYMBOL_NAME: ACPI!`string'+63ee
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.18362.1645
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
--------- |