Error code 2: Access violation的错误.

研究了半天的 tftp,老是冒出这个鬼东西 Error code 2: Access violation的错误.

查了各种答案,都是说不对,我chmod 都快加到888了

最后还是被我搞成功啦~~~~~~

首先想要碰见这个问题的前提是安装正确。

1、安装软件包

 

sudo apt-get install tftpd tftp xinetd

 

2、建立配置文件

 

/etc/xinetd.d/下建立一个配置文件tftp

 

sudo vi /etc/xinetd.d/tftp

 

内容如下

 

service tftp   

{   

    socket_type = dgram   

    protocol = udp   

    wait = yes   

    user = root   

    server = /usr/sbin/in.tftpd   

    server_args = -s /tftpboot     //这里写的是 ubuntu的tfpt目录位置 ,  当前的在根目录下。

    disable = no   

    per_source = 11   

    cps = 100 2   

    flags = IPv4   

}  

3、建立tftp服务文件目录

 

在上面的配置中有server_args = -s /tftpboot,其中/tftpboot这个目录就是上传文件与下载文件的位置。

 

sudo mkdir /tftpboot          --在根目录下   创建/tftpboot目录

 

sudo chmod 777 /tftpboot -R   --设置权限为777

 

4、重新启动tftp服务

 

sudo /etc/init.d/xinetd restart  --重启tftp服务器

 

5、测试

sudo netstat -a | grep tftp      --查看是否启动成功,可以看到udp 0 0 *:tftp *:*

 

 可我的比较特别 

udp6 0 0 *:tftp 【】:*

但依旧是安装正确的。

然后再 安装这个东西 

apt-get install inetutils-inetd

据说是tftp服务器的什么服务管理


接下来

我在开发板里面 输入 tftp 192.168.1.205 -g -r abc     

 // 192.168.1.205  是我ubuntu地址 

   -g 代表下载 

   -r 代表远程文件下载

   abc 是我在虚拟机tftp里面的所放置的测试文件



[root@GEC210 /]tftp 192.168.1.205 -p -r abc

tftp: server error: (2) Access violatio

遇到这个问题 tftp: server error: (2) Access violatio


1:先要确认tftp配置文件 的目录对不对     //sudo vi /etc/xinetd.d/tftp 里面的  server_args = -s   /tftpboot   //(现在我tftp共享目录,设置在根目录)

2:在配置文件里面 设置路径,还要创建对应目录的。

3:然后对共享目录进行授权 

chmod  777  /tftpboot:

4:在 虚拟机 /tftpboot 里面我们创建一个文件,随便写一些东西进去

touch abc 

gedit abc

并且授权

chmod 766 abc

5:在开发板哪里打 

 [root@GEC210 /]tftp 192.168.1.205 -g  -r abc

tftp: server error: (2) Access violatio

6:还是这个问题,那么我们就在开发板的当前目录里

touch abc//创建一个同名文件//跟我们要下载的文件同名再次对他授权

chmod 766 abc

7:再一次  [root@GEC210 /]tftp 192.168.1.205 -g -r abc

8:成功了~~~~//成功是没有任何显示的。只能在虚拟机哪里cat一下文件 看看是不是自己的东西。


从开发板上传(上传就一定要在虚拟机的tftp里面先创建一个相同名字的文件,权限还是766,因为上传是覆盖性写入,需要先创建一个对应的文件名。

 

第一次 失败了~~~

[root@GEC210 /]tftp 192.168.1.205 -p -r abc
abc                    0% |                               |     0   - stalled -
tftp: timeout

再来一次 成功上传 ~~~~
[root@GEC210 /]tftp 192.168.1.205 -p -r abc
abc                  100% |*******************************|    16   0:00:00 ETA


 

 



WS 1, `current_uA WS 1, `voltage_mV WS 1, `power_mW *** error 65: access violation at 0x7EFE80 : no 'read' permission *** error 65: access violation at 0x7EFE80 : no 'write' permission *** error 65: access violation at 0x7EFE82 : no 'write' permission *** error 65: access violation at 0x7EFE80 : no 'read' permission *** error 65: access violation at 0x7EFE80 : no 'write' permission *** error 65: access violation at 0x7EFE88 : no 'read' permission *** error 65: access violation at 0x7EFE88 : no 'write' permission *** error 65: access violation at 0x7EFE80 : no 'read' permission *** error 65: access violation at 0x7EFE80 : no 'write' permission *** error 65: access violation at 0x7EFE81 : no 'write' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission *** error 65: access violation at 0x7EFE82 : no 'read' permission
07-18
上面的错误,我使用了!analyze -v 指令后 SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c000001d, Exception code that caused the BugCheck Arg2: ffffbf8942103b20, Address of the instruction which caused the BugCheck Arg3: ffffdf815547d070, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3109 Key : Analysis.Elapsed.mSec Value: 15964 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 14 Key : Analysis.IO.Write.Mb Value: 2 Key : Analysis.Init.CPU.mSec Value: 1625 Key : Analysis.Init.Elapsed.mSec Value: 336944 Key : Analysis.Memory.CommitPeak.Mb Value: 121 Key : Analysis.Version.DbgEng Value: 10.0.27829.1001 Key : Analysis.Version.Description Value: 10.2503.24.01 amd64fre Key : Analysis.Version.Ext Value: 1.2503.24.1 Key : Bugcheck.Code.KiBugCheckData Value: 0x3b Key : Bugcheck.Code.LegacyAPI Value: 0x3b Key : Bugcheck.Code.TargetModel Value: 0x3b Key : Failure.Bucket Value: 0x3B_C000001D_HyperHideDrv!HookedNtContinue Key : Failure.Exception.IP.Address Value: 0xffffbf8942103b20 Key : Failure.Hash Value: {8e106373-5690-bf65-5b28-0541e087c782} Key : Hypervisor.Enlightenments.Value Value: 13088 Key : Hypervisor.Enlightenments.ValueHex Value: 0x3320 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 0 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 0 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 0 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 0 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 1 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 0 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 536632 Key : Hypervisor.Flags.ValueHex Value: 0x83038 Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 0 Key : Hypervisor.RootFlags.AccessStats Value: 0 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 0 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 0 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 0 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 0 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 0 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 0 Key : Hypervisor.RootFlags.MceEnlightened Value: 0 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 0 Key : Hypervisor.RootFlags.Value Value: 0 Key : Hypervisor.RootFlags.ValueHex Value: 0x0 Key : SecureKernel.HalpHvciEnabled Value: 0 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b BUGCHECK_P1: c000001d BUGCHECK_P2: ffffbf8942103b20 BUGCHECK_P3: ffffdf815547d070 BUGCHECK_P4: 0 FAULTING_THREAD: ffffbf8943364080 CONTEXT: ffffdf815547d070 -- (.cxr 0xffffdf815547d070) rax=ffffbf8942103b10 rbx=ffffbf8943364080 rcx=000000e265bff770 rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000 rip=ffffbf8942103b20 rsp=ffffdf815547da78 rbp=ffffdf815547db80 r8=00000000ffffffff r9=7ffff80119936b30 r10=7ffffffffffffffc r11=0000000000336cb0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz ac po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297 ffffbf89`42103b20 ff ??? Resetting default scope PROCESS_NAME: msedgewebview2.exe STACK_TEXT: ffffdf81`5547da78 fffff801`1992bc21 : ffffbf89`48c74080 fffff801`00000013 00000000`00000000 ffffdf81`5547db80 : 0xffffbf89`42103b20 ffffdf81`5547da80 fffff801`14811f05 : 000000e2`65bff770 00000000`00000001 00000000`00000001 ffffbf89`00000000 : HyperHideDrv!HookedNtContinue+0x1b1 [C:\Users\pc\Desktop\vt-debuuger-main\HyperHideDrv\HookedFunctions.cpp @ 1540] ffffdf81`5547db00 00007ff9`79badd54 : 00007ff9`79b85c28 000000e2`65bff770 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 000000e2`65bff718 00007ff9`79b85c28 : 000000e2`65bff770 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtContinue+0x14 000000e2`65bff720 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0x18 FAULTING_SOURCE_LINE: C:\Users\pc\Desktop\vt-debuuger-main\HyperHideDrv\HookedFunctions.cpp FAULTING_SOURCE_FILE: C:\Users\pc\Desktop\vt-debuuger-main\HyperHideDrv\HookedFunctions.cpp FAULTING_SOURCE_LINE_NUMBER: 1540 FAULTING_SOURCE_CODE: 1536: } 1537: } 1538: 1539: return OriginalNtContinue(Context, TestAlert); > 1540: } 1541: 1542: NTSTATUS(NTAPI* OriginalNtQueryInformationJobObject)(HANDLE JobHandle, JOBOBJECTINFOCLASS JobInformationClass, PVOID JobInformation, ULONG JobInformationLength, PULONG ReturnLength); 1543: NTSTATUS NTAPI HookedNtQueryInformationJobObject(HANDLE JobHandle, JOBOBJECTINFOCLASS JobInformationClass, PVOID JobInformation, ULONG JobInformationLength, PULONG ReturnLength) 1544: { 1545: NTSTATUS Status = OriginalNtQueryInformationJobObject(JobHandle, JobInformationClass, JobInformation, JobInformationLength, ReturnLength); SYMBOL_NAME: HyperHideDrv!HookedNtContinue+1b1 MODULE_NAME: HyperHideDrv IMAGE_NAME: HyperHideDrv.sys STACK_COMMAND: .cxr 0xffffdf815547d070 ; kb BUCKET_ID_FUNC_OFFSET: 1b1 FAILURE_BUCKET_ID: 0x3B_C000001D_HyperHideDrv!HookedNtContinue OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8e106373-5690-bf65-5b28-0541e087c782} Followup: MachineOwner ---------
最新发布
08-08
************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 44 Microsoft (R) Windows Debugger Version 10.0.27829.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\072425-40484-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Kernel base = 0xfffff802`de600000 PsLoadedModuleList = 0xfffff802`df4f4c40 Debug session time: Thu Jul 24 13:19:52.572 2025 (UTC + 8:00) System Uptime: 0 days 0:38:49.409 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ........................................................... Loading User Symbols Loading unloaded module list ........... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`deb005d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff802`726a6e10=000000000000000a 0: kd> !analyze -v Loading Kernel Symbols ............................................................... ................................................................ ........................................................... Loading User Symbols Loading unloaded module list ........... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000007e70010, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff802de8ff1f8, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for aicusbwifi.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 984 Key : Analysis.Elapsed.mSec Value: 11951 Key : Analysis.IO.Other.Mb Value: 1 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 2 Key : Analysis.Init.CPU.mSec Value: 453 Key : Analysis.Init.Elapsed.mSec Value: 127094 Key : Analysis.Memory.CommitPeak.Mb Value: 114 Key : Analysis.Version.DbgEng Value: 10.0.27829.1001 Key : Analysis.Version.Description Value: 10.2503.24.01 amd64fre Key : Analysis.Version.Ext Value: 1.2503.24.1 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x2180c Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.InsufficientDumpfileSize Value: 1 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Dump.Attributes.RequiredDumpfileSize Value: 0x458e9834 Key : Failure.Bucket Value: AV_aicusbwifi!unknown_function Key : Failure.Exception.IP.Address Value: 0xfffff802de8ff1f8 Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x2ff1f8 Key : Failure.Hash Value: {88a7df4e-1779-d31a-2348-fb551a42f896} Key : Hypervisor.Enlightenments.ValueHex Value: 0x7497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 38408431 Key : Hypervisor.Flags.ValueHex Value: 0x24a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 0x3f7 Key : Stack.Pointer Value: NMI BUGCHECK_CODE: a BUGCHECK_P1: 7e70010 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff802de8ff1f8 FILE_IN_CAB: 072425-40484-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x2180c Insufficient Dumpfile Size Kernel Generated Triage Dump FAULTING_THREAD: fffff802df5d1640 READ_ADDRESS: fffff802df5c44c0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000007e70010 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System DPC_STACK_BASE: FFFFF802726B0FB0 STACK_TEXT: fffff802`726a6e08 fffff802`decb96e9 : 00000000`0000000a 00000000`07e70010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff802`726a6e10 fffff802`decb49a8 : 00000000`00000001 ffffac07`e731c010 ffffac07`d3105490 00000000`00000002 : nt!KiBugCheckDispatch+0x69 fffff802`726a6f50 fffff802`de8ff1f8 : ffffac07`00000001 00000000`00000001 00000000`00000001 00000000`00000001 : nt!KiPageFault+0x468 fffff802`726a70e0 fffff802`de9bd2e5 : 00000000`00000618 00000000`00000001 ffffac07`d31002c0 ffffac07`e8024e48 : nt!RtlRbInsertNodeEx+0x3d8 fffff802`726a7140 fffff802`deaf749a : ffffac07`e91d4890 ffffac07`d3105480 ffffac07`00000000 00000000`0003a480 : nt!RtlpHpVsChunkSplit+0x905 fffff802`726a71e0 fffff802`de9bbede : ffffac07`d31002c3 fffff802`df4ee740 fffff802`0000002c fffff802`002c0000 : nt!RtlpHpVsSlotAllocate+0x29e fffff802`726a7240 fffff802`de8f91f3 : 00000000`0000028c fffff802`002c0000 00000000`0000002c fffff802`00000000 : nt!RtlpHpVsContextAllocate+0xd6 fffff802`726a72d0 fffff802`de8f7562 : 00000000`00000009 fffff802`df46ca40 00000000`486c7452 00000000`00000000 : nt!ExAllocateHeapPool+0x1c23 fffff802`726a7500 fffff802`df16b4fb : 00000000`00000042 00000000`0000028c 00000000`486c7452 fffff802`de8f92a1 : nt!ExpAllocatePoolWithTagFromNode+0x52 fffff802`726a7540 fffff802`dea5275a : 00000000`00000003 00000000`00000000 00000000`00000000 00000000`00000050 : nt!ExAllocatePool3+0xcb fffff802`726a75c0 fffff802`71963066 : ffffac07`e7169d88 fffff802`726a789a ffffac07`01500050 00000000`00000038 : nt!ExAllocatePoolWithTagPriority+0x11a fffff802`726a7610 fffff802`734b3a08 : ffffac07`dbf23910 fffff802`b503e068 00000000`00000000 00000000`00000000 : ndis!NdisAllocateMemoryWithTagPriority+0x26 fffff802`726a7640 ffffac07`dbf23910 : fffff802`b503e068 00000000`00000000 00000000`00000000 00000000`00000000 : aicusbwifi+0x53a08 fffff802`726a7648 fffff802`b503e068 : 00000000`00000000 00000000`00000000 00000000`00000000 000000e8`00000001 : 0xffffac07`dbf23910 fffff802`726a7650 fffff802`b503c798 : ffffac07`e7802200 00000000`00000000 00000000`00000000 fffff802`734985cb : USBXHCI!Bulk_MapStage+0xe8 fffff802`726a76c0 fffff802`7349933b : ffffac07`e551b030 ffffac07`e68576a0 fffff802`726a7800 00000000`00000000 : USBXHCI!Bulk_MapTransfers+0x88 fffff802`726a7730 ffffac07`e551b030 : ffffac07`e68576a0 fffff802`726a7800 00000000`00000000 00000001`00000000 : aicusbwifi+0x3933b fffff802`726a7738 ffffac07`e68576a0 : fffff802`726a7800 00000000`00000000 00000001`00000000 ffffac07`e780232e : 0xffffac07`e551b030 fffff802`726a7740 fffff802`726a7800 : 00000000`00000000 00000001`00000000 ffffac07`e780232e fffff802`726a789a : 0xffffac07`e68576a0 fffff802`726a7748 00000000`00000000 : 00000001`00000000 ffffac07`e780232e fffff802`726a789a fffff802`734c8d5a : 0xfffff802`726a7800 SYMBOL_NAME: aicusbwifi+53a08 MODULE_NAME: aicusbwifi IMAGE_NAME: aicusbwifi.sys STACK_COMMAND: .process /r /p 0xfffff802df5cef80; .thread 0xfffff802df5d1640 ; kb BUCKET_ID_FUNC_OFFSET: 53a08 FAILURE_BUCKET_ID: AV_aicusbwifi!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {88a7df4e-1779-d31a-2348-fb551a42f896} Followup: MachineOwner ---------
07-25
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

交叉编译之王 hahaha

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值