none
蓝屏 RRS feed

  • 问题

  • Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [I:\新建文件夹\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available

    Symbol search path is: SRV*d:\DebugSymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (16 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.17273.x86fre.win7_gdr.130318-1532
    Machine Name:
    Kernel base = 0x84a41000 PsLoadedModuleList = 0x84b89810
    Debug session time: Wed May  2 18:27:11.010 2018 (GMT+8)
    System Uptime: 0 days 7:45:40.946
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........Page 10fd9 not present in the dump file. Type ".hh dbgerr004" for details
    ..........Page 42080 not present in the dump file. Type ".hh dbgerr004" for details
    .........................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    ......
    0: kd> !analvze -v
    No export analvze found
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    KERNEL_MODE_EXCEPTION_NOT_HANDLED (8e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: 80000004, The exception code that was not handled
    Arg2: ffdff2a5, The address that the exception occurred at
    Arg3: a5154d48, Trap Frame
    Arg4: 00000000

    Debugging Details:
    ------------------

    Page 10fd9 not present in the dump file. Type ".hh dbgerr004" for details
    Page 10fd9 not present in the dump file. Type ".hh dbgerr004" for details
    Page 42080 not present in the dump file. Type ".hh dbgerr004" for details
    PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details
    Page 10fd9 not present in the dump file. Type ".hh dbgerr004" for details
    Page 42080 not present in the dump file. Type ".hh dbgerr004" for details
    PEB is paged out (Peb.Ldr = 7ffda00c).  Type ".hh dbgerr001" for details

    EXCEPTION_CODE: (HRESULT) 0x80000004 (2147483652) - <Unable to get error code text>

    FAULTING_IP: 
    +ffffffffffdff2a5
    ffdff2a5 c3              ret

    TRAP_FRAME:  a5154d48 -- (.trap 0xffffffffa5154d48)
    ErrCode = 00000000
    eax=00000000 ebx=84a835b0 ecx=00000000 edx=00000000 esi=02f7fbac edi=00135701
    eip=ffdff2a5 esp=a5154dbc ebp=801ec000 iopl=0         ov dn di ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00044c86
    ffdff2a5 c3              ret
    Resetting default scope

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0x8E

    PROCESS_NAME:  360sd.exe

    CURRENT_IRQL:  0

    LAST_CONTROL_TRANSFER:  from 84afe532 to 84b1db3c

    STACK_TEXT:  
    a51548b4 84afe532 0000008e 80000004 ffdff2a5 nt!KeBugCheckEx+0x1e
    a5154cd8 84a842c6 a5154cf4 00000000 a5154d48 nt!KiDispatchException+0x1ac
    a5154d40 84a84262 801ec000 ffdff2a5 badb0d00 nt!CommonDispatchException+0x4a
    a5154d48 ffdff2a5 badb0d00 00000000 ffffffff nt!Kei386EoiHelper+0x17a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    a5154d4c badb0d00 00000000 ffffffff 0000003b 0xffdff2a5
    a5154d50 00000000 ffffffff 0000003b 00000000 0xbadb0d00


    STACK_COMMAND:  kb

    FOLLOWUP_IP: 
    nt!KiDispatchException+1ac
    84afe532 cc              int     3

    SYMBOL_STACK_INDEX:  1

    SYMBOL_NAME:  nt!KiDispatchException+1ac

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrpamp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  5147d3b2

    FAILURE_BUCKET_ID:  0x8E_nt!KiDispatchException+1ac

    BUCKET_ID:  0x8E_nt!KiDispatchException+1ac

    Followup: MachineOwner
    ---------

    0: kd> !process
    PROCESS 89b4e0e8  SessionId: 1  Cid: 0dcc    Peb: 7ffda000  ParentCid: 065c
        DirBase: 779af7e0  ObjectTable: a11c9e40  HandleCount: 292.
        Image: 360sd.exe
        VadRoot 897e4130 Vads 423 Clone 0 Private 8430. Modified 98082. Locked 0.
        DeviceMap 97939c78
        Token                             a11ba978
        ElapsedTime                       07:44:59.431
        UserTime                          00:00:00.000
        KernelTime                        00:00:00.046
        QuotaPoolUsage[PagedPool]         0
        QuotaPoolUsage[NonPagedPool]      0
        Working Set Sizes (now,min,max)  (413, 122, 244) (1652KB, 488KB, 976KB)
        PeakWorkingSetSize                11883
        VirtualSize                       174 Mb
        PeakVirtualSize                   192 Mb
        PageFaultCount                    317066
        MemoryPriority                    BACKGROUND
        BasePriority                      8
        CommitCharge                      10847

            THREAD 89abfd48  Cid 0dcc.0dd0  Teb: 7ffdf000 Win32Thread: fcb297e0 WAIT: (WrUserRequest) UserMode Non-Alertable
                898045d0  SynchronizationEvent

            THREAD 8852a830  Cid 0dcc.0dd8  Teb: 7ffde000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Alertable
                89aec030  NotificationEvent

            THREAD 89b78918  Cid 0dcc.0ddc  Teb: 7ffdd000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                89aec030  NotificationEvent
                89adb3c8  Semaphore Limit 0x7fffffff

            THREAD 89b78d48  Cid 0dcc.0de0  Teb: 7ffdc000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Alertable
                89ac2970  NotificationEvent

            THREAD 89addd48  Cid 0dcc.0de4  Teb: 7ffdb000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                89ac2970  NotificationEvent
                89b787f0  Semaphore Limit 0x7fffffff

            THREAD 89ca3d48  Cid 0dcc.0ee4  Teb: 7ffd8000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                883f8ebc  NotificationEvent

            THREAD 89ca15b8  Cid 0dcc.0ee8  Teb: 7ffd7000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Alertable
                89803960  NotificationEvent

            THREAD 89ca12d0  Cid 0dcc.0eec  Teb: 7ffd6000 Win32Thread: 00000000 RUNNING on processor 0
            THREAD 89ca37b0  Cid 0dcc.0ef0  Teb: 7ffd5000 Win32Thread: fdb934f8 WAIT: (UserRequest) UserMode Non-Alertable
                89803960  NotificationEvent
                89c47be0  Semaphore Limit 0x7fffffff

            THREAD 89ca34c8  Cid 0dcc.0ef4  Teb: 7ffd4000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Alertable
                897ffa00  NotificationEvent

            THREAD 89ca31e0  Cid 0dcc.0ef8  Teb: 7ffd3000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                897ffa00  NotificationEvent
                897ffe70  Semaphore Limit 0x7fffffff

            THREAD 897a6cb8  Cid 0dcc.0f00  Teb: 7ff9e000 Win32Thread: fe72fdd8 WAIT: (DelayExecution) UserMode Non-Alertable
                893c0540  SynchronizationEvent

            THREAD 89ca46d0  Cid 0dcc.0f04  Teb: 7ff9d000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                89c99178  NotificationEvent
                897a7238  NotificationEvent

            THREAD 897a68a0  Cid 0dcc.0f08  Teb: 7ff9c000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                89c600d8  SynchronizationEvent
                897a53f0  SynchronizationEvent

            THREAD 89dacd48  Cid 0dcc.11c0  Teb: 7ffd9000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                89b75b18  NotificationEvent
                89cc9798  SynchronizationEvent

            THREAD 89d98d48  Cid 0dcc.11c4  Teb: 7ff9b000 Win32Thread: 00000000 WAIT: (DelayExecution) UserMode Non-Alertable
                87850ce4  NotificationEvent

            THREAD 89cb7360  Cid 0dcc.0df8  Teb: 7ff9a000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Alertable
                8941e280  SynchronizationTimer
                8825d658  SynchronizationTimer
                89c8bcb0  SynchronizationTimer
                880de898  SynchronizationTimer
                89dd7818  SynchronizationTimer

            THREAD 89c63d48  Cid 0dcc.0cbc  Teb: 7ff9f000 Win32Thread: fe532568 WAIT: (UserRequest) UserMode Non-Alertable
                87428328  NotificationEvent
                894007b0  SynchronizationEvent

            THREAD 89db1030  Cid 0dcc.1700  Teb: 7ff99000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                89c1e208  SynchronizationEvent
                8858d848  SynchronizationEvent

            THREAD 8950f3e8  Cid 0dcc.16d8  Teb: 7ff98000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                89da9c20  NotificationEvent
                86dd7120  NotificationEvent
                88502e08  SynchronizationEvent

            THREAD 88d2a418  Cid 0dcc.0e50  Teb: 7ff96000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                880e1680  NotificationEvent
                89db65b0  NotificationEvent

            THREAD 86d5d788  Cid 0dcc.17f4  Teb: 7ff94000 Win32Thread: 00000000 WAIT: (WrQueue) UserMode Alertable
                8945e5c0  QueueObject

            THREAD 898ccd48  Cid 0dcc.12ac  Teb: 7ff92000 Win32Thread: 00000000 WAIT: (WrQueue) UserMode Alertable
                8945e5c0  QueueObject

            THREAD 878465b0  Cid 0dcc.0fd8  Teb: 7ff97000 Win32Thread: 00000000 WAIT: (WrQueue) UserMode Alertable
                89c91200  QueueObject

            THREAD 86dd3d48  Cid 0dcc.1a40  Teb: 7ff95000 Win32Thread: 00000000 WAIT: (UserRequest) UserMode Non-Alertable
                878f1900  NotificationEvent
                89b75b18  NotificationEvent
    2018年5月3日 6:51

全部回复