Calls to MmProbeAndLockPages must be enclosed in a try/except block. If the pages do not support the specified operation, the routine raises the STATUS_ACCESS_VIOLATION exception. For more information, see Handling Exceptions.
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp3_gdr.100216-1514
Machine Name:
Kernel base = 0x804d8000 PsLoadedModuleList = 0x8055e720
Debug session time: Tue Jun 22 15:10:20.718 2010 (GMT+8)
System Uptime: 0 days 0:02:58.421
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 7ffd500c). Type ".hh dbgerr001" for details
Loading unloaded module list
................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {f633e8b2, 1c, 0, 804f9a2a}
Page 10866 not present in the dump file. Type ".hh dbgerr004" for details
Page 10866 not present in the dump file. Type ".hh dbgerr004" for details
Page 10866 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 7ffd500c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffd500c). Type ".hh dbgerr001" for details
Probably caused by : memory_corruption
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: f633e8b2, memory referenced
Arg2: 0000001c, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804f9a2a, address which referenced memory
Debugging Details:
------------------
Page 10866 not present in the dump file. Type ".hh dbgerr004" for details
Page 10866 not present in the dump file. Type ".hh dbgerr004" for details
Page 10866 not present in the dump file. Type ".hh dbgerr004" for details
PEB is paged out (Peb.Ldr = 7ffd500c). Type ".hh dbgerr001" for details
PEB is paged out (Peb.Ldr = 7ffd500c). Type ".hh dbgerr001" for details
nt!KiAttachProcess+0x11d:
804f9b25 5f pop edi
804f9b26 5e pop esi
804f9b27 5b pop ebx
804f9b28 5d pop ebp
804f9b29 c21000 ret 10h
====================================================
KiAttachProcess的代码和我虚拟机的代码不一样,一样的XPSP3系统啊?
前两个NOP是我故意填充的,原来是mov edi,edi,这个应该没影响
错误在804f9a2a 1b8d463c8940 sbb ecx,dword ptr [ebp+40893C46h] ss:0010:f633e8b2=????????
是一个jne跳转过来的,咋代码不一样呢?纠结ING
望大牛们指点