网页资讯视频图片知道文库贴吧地图采购
进入贴吧全吧搜索

 
 
 
日一二三四五六
       
       
       
       
       
       

签到排名:今日本吧第个签到,

本吧因你更精彩,明天继续来努力!

本吧签到人数:0

一键签到
成为超级会员,使用一键签到
一键签到
本月漏签0次!
0
成为超级会员,赠送8张补签卡
如何使用?
点击日历上漏签日期,即可进行补签。
连续签到:天  累计签到:天
0
超级会员单次开通12个月以上,赠送连续签到卡3张
使用连续签到卡
08月25日漏签0天
电脑故障吧 关注:605,106贴子:5,458,374
  • 看贴

  • 图片

  • 吧主推荐

  • 视频

  • 游戏

  • 5回复贴,共1页
<<返回电脑故障吧
>0< 加载中...

标题长点好 先面试分析出的蓝屏原因 大神求解释

  • 只看楼主
  • 收藏

  • 回复
  • zangshuduo
  • 武林新贵
    8
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\050914-25880-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`04400000 PsLoadedModuleList = 0xfffff800`046436d0
Debug session time: Fri May 9 19:17:33.595 2014 (UTC + 8:00)
System Uptime: 0 days 6:04:50.891
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {fffff6fb800083f8, ffffffffc0000185, bff61880, fffff7000107fff8}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+36c1a )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fb800083f8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000185, error status (normally i/o status code)
Arg3: 00000000bff61880, current process (virtual address for lock type 3, or PTE)
Arg4: fffff7000107fff8, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
ERROR_CODE: (NTSTATUS) 0xc0000185 - I/O
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c0000185
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88004b9c6b0 -- (.trap 0xfffff88004b9c6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff70001080068 rbx=0000000000000000 rcx=00000000003fffff
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80004788f1a rsp=fffff88004b9c840 rbp=00000000003fffff
r8=fffff70001000000 r9=0000000000000078 r10=0000000000002000
r11=fffff80004676360 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiInsertVadCharges+0x10a:
fffff800`04788f1a 490fa308 bt qword ptr [r8],rcx ds:4b30:fffff700`01000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800044e8752 to fffff80004475bc0
STACK_TEXT:
fffff880`04b9c398 fffff800`044e8752 : 00000000`0000007a fffff6fb`800083f8 ffffffff`c0000185 00000000`bff61880 : nt!KeBugCheckEx
fffff880`04b9c3a0 fffff800`0449c91f : fffffa80`04b9cc10 fffff880`04b9c510 fffffa80`089d4ec8 fffffa80`04b9cc10 : nt! ?? ::FNODOBFM::`string'+0x36c1a
fffff880`04b9c480 fffff800`0448328a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff800`0478f888 : nt!MiIssueHardFault+0x28b
fffff880`04b9c550 fffff800`04473cee : 00000000`00000000 fffff700`0107fff8 ffffffff`ffffff00 000007ff`fff9f000 : nt!MmAccessFault+0x146a
fffff880`04b9c6b0 fffff800`04788f1a : fffff880`047d7180 fffffa80`00000201 fffff800`04605750 fffff800`04605588 : nt!KiPageFault+0x16e
fffff880`04b9c840 fffff800`04767082 : 00000000`00000000 ffffffff`ffffffff fffff880`04b9c8f8 00000000`000007ff : nt!MiInsertVadCharges+0x10a
fffff880`04b9c8d0 fffff800`04765ec4 : fffffa80`089d4b30 00000000`00000000 00000004`00001818 fffff880`04b9c9f0 : nt!MiCreatePebOrTeb+0x2d2
fffff880`04b9c960 fffff800`047616df : 000007ff`fff9e000 00000000`00001002 00000000`00000000 00000000`00000003 : nt!MmCreateTeb+0x5c
fffff880`04b9c9f0 fffff800`0476124a : fffffa80`089d4b30 fffff880`04b9d858 fffffa80`03962d00 fffff880`04b9d440 : nt!PspAllocateThread+0x35f
fffff880`04b9cc10 fffff800`04765569 : fffffa80`00000004 00000000`00000000 00000000`00000001 fffff880`04b9d440 : nt!PspCreateThread+0x1d2
fffff880`04b9ce90 fffff800`04474e53 : 00000000`001fffff 00000000`00000000 fffffa80`03968b30 00000000`001fffff : nt!NtCreateThreadEx+0x25d
fffff880`04b9d5e0 fffff800`04471410 : fffff800`04767d88 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`04b9d7e8 fffff800`04767d88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`04b9d7f0 fffff800`046da8fa : fffff8a0`09149a00 00000000`00000000 00000000`00000000 fffffa80`08b93b30 : nt!RtlpCreateUserThreadEx+0x138
fffff880`04b9d910 fffff800`046db83e : 00000000`00000000 ffffffff`80005850 ffffffff`80005850 00000000`00000001 : nt!EtwpInjectThread+0x9a
fffff880`04b9d980 fffff800`046dc21f : fffffa80`089d4b30 fffff8a0`09149a00 fffffa80`08bc5690 00000000`00000701 : nt!EtwpQueueNotification+0x19e
fffff880`04b9da10 fffff800`048224e6 : fffffa80`03a66210 fffffa80`03a66238 fffffa80`08bc5690 00000000`00000000 : nt!EtwpSendDataBlock+0x3f
fffff880`04b9dac0 fffff800`048c0de8 : fffffa80`03a603c0 fffff8a0`09149a00 00000000`00000001 00000000`00000000 : nt!EtwpDisableTraceProviders+0x1a6
fffff880`04b9db40 fffff800`047cd2d6 : fffffa80`03a60000 00000000`00000001 00000000`c0000001 fffffa80`03abb020 : nt!EtwpStopLoggerInstance+0x58
fffff880`04b9db80 fffff800`047122ea : e76054af`4aa5158a fffffa80`03a61040 00000000`00000080 fffffa80`03968b30 : nt! ?? ::NNGAKEGL::`string'+0x42983
fffff880`04b9dc00 fffff800`044668e6 : fffff880`009e5180 fffffa80`03a61040 fffffa80`03a16040 e1269e2e`cfda1b27 : nt!PspSystemThreadStartup+0x5a
fffff880`04b9dc40 00000000`00000000 : fffff880`04b9e000 fffff880`04b98000 fffff880`04b9c0f0 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+36c1a
fffff800`044e8752 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+36c1a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
FAILURE_BUCKET_ID: X64_0x7a_c0000185_nt!_??_::FNODOBFM::_string_+36c1a
BUCKET_ID: X64_0x7a_c0000185_nt!_??_::FNODOBFM::_string_+36c1a
Followup: MachineOwner
---------


  • zangshuduo
  • 武林新贵
    8
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
3: kd> lmvm nt
start end module name
fffff800`04400000 fffff800`049e5000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\F69D000687EC491E87FC0425D4D378AC2\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symbols\ntoskrnl.exe\521EA0355e5000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Thu Aug 29 09:13:25 2013 (521EA035)
CheckSum: 0054CBB3
ImageSize: 005E5000
File version: 6.1.7601.18247
Product version: 6.1.7601.18247
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.1.7601.18247
FileVersion: 6.1.7601.18247 (win7sp1_gdr.130828-1532)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
3: kd> lmvm nt
start end module name
fffff800`04400000 fffff800`049e5000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\F69D000687EC491E87FC0425D4D378AC2\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symbols\ntoskrnl.exe\521EA0355e5000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Thu Aug 29 09:13:25 2013 (521EA035)
CheckSum: 0054CBB3
ImageSize: 005E5000
File version: 6.1.7601.18247
Product version: 6.1.7601.18247
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.1.7601.18247
FileVersion: 6.1.7601.18247 (win7sp1_gdr.130828-1532)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
3: kd> .trap 0xfffff88004b9c6b0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff70001080068 rbx=0000000000000000 rcx=00000000003fffff
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80004788f1a rsp=fffff88004b9c840 rbp=00000000003fffff
r8=fffff70001000000 r9=0000000000000078 r10=0000000000002000
r11=fffff80004676360 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiInsertVadCharges+0x10a:
fffff800`04788f1a 490fa308 bt qword ptr [r8],rcx ds:4b30:fffff700`01000000=????????????????
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\050914-25880-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`04400000 PsLoadedModuleList = 0xfffff800`046436d0
Debug session time: Fri May 9 19:17:33.595 2014 (UTC + 8:00)
System Uptime: 0 days 6:04:50.891
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {fffff6fb800083f8, ffffffffc0000185, bff61880, fffff7000107fff8}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+36c1a )
Followup: MachineOwner
---------


2025-08-25 12:27:05
广告
不感兴趣
开通SVIP免广告
  • zangshuduo
  • 武林新贵
    8
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: fffff6fb800083f8, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000185, error status (normally i/o status code)
Arg3: 00000000bff61880, current process (virtual address for lock type 3, or PTE)
Arg4: fffff7000107fff8, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
ERROR_CODE: (NTSTATUS) 0xc0000185 - I/O
DISK_HARDWARE_ERROR: There was error with disk hardware
BUGCHECK_STR: 0x7a_c0000185
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88004b9c6b0 -- (.trap 0xfffff88004b9c6b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff70001080068 rbx=0000000000000000 rcx=00000000003fffff
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80004788f1a rsp=fffff88004b9c840 rbp=00000000003fffff
r8=fffff70001000000 r9=0000000000000078 r10=0000000000002000
r11=fffff80004676360 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiInsertVadCharges+0x10a:
fffff800`04788f1a 490fa308 bt qword ptr [r8],rcx ds:4b30:fffff700`01000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800044e8752 to fffff80004475bc0
STACK_TEXT:
fffff880`04b9c398 fffff800`044e8752 : 00000000`0000007a fffff6fb`800083f8 ffffffff`c0000185 00000000`bff61880 : nt!KeBugCheckEx
fffff880`04b9c3a0 fffff800`0449c91f : fffffa80`04b9cc10 fffff880`04b9c510 fffffa80`089d4ec8 fffffa80`04b9cc10 : nt! ?? ::FNODOBFM::`string'+0x36c1a
fffff880`04b9c480 fffff800`0448328a : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff800`0478f888 : nt!MiIssueHardFault+0x28b
fffff880`04b9c550 fffff800`04473cee : 00000000`00000000 fffff700`0107fff8 ffffffff`ffffff00 000007ff`fff9f000 : nt!MmAccessFault+0x146a
fffff880`04b9c6b0 fffff800`04788f1a : fffff880`047d7180 fffffa80`00000201 fffff800`04605750 fffff800`04605588 : nt!KiPageFault+0x16e
fffff880`04b9c840 fffff800`04767082 : 00000000`00000000 ffffffff`ffffffff fffff880`04b9c8f8 00000000`000007ff : nt!MiInsertVadCharges+0x10a
fffff880`04b9c8d0 fffff800`04765ec4 : fffffa80`089d4b30 00000000`00000000 00000004`00001818 fffff880`04b9c9f0 : nt!MiCreatePebOrTeb+0x2d2
fffff880`04b9c960 fffff800`047616df : 000007ff`fff9e000 00000000`00001002 00000000`00000000 00000000`00000003 : nt!MmCreateTeb+0x5c
fffff880`04b9c9f0 fffff800`0476124a : fffffa80`089d4b30 fffff880`04b9d858 fffffa80`03962d00 fffff880`04b9d440 : nt!PspAllocateThread+0x35f
fffff880`04b9cc10 fffff800`04765569 : fffffa80`00000004 00000000`00000000 00000000`00000001 fffff880`04b9d440 : nt!PspCreateThread+0x1d2
fffff880`04b9ce90 fffff800`04474e53 : 00000000`001fffff 00000000`00000000 fffffa80`03968b30 00000000`001fffff : nt!NtCreateThreadEx+0x25d
fffff880`04b9d5e0 fffff800`04471410 : fffff800`04767d88 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`04b9d7e8 fffff800`04767d88 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiServiceLinkage
fffff880`04b9d7f0 fffff800`046da8fa : fffff8a0`09149a00 00000000`00000000 00000000`00000000 fffffa80`08b93b30 : nt!RtlpCreateUserThreadEx+0x138
fffff880`04b9d910 fffff800`046db83e : 00000000`00000000 ffffffff`80005850 ffffffff`80005850 00000000`00000001 : nt!EtwpInjectThread+0x9a
fffff880`04b9d980 fffff800`046dc21f : fffffa80`089d4b30 fffff8a0`09149a00 fffffa80`08bc5690 00000000`00000701 : nt!EtwpQueueNotification+0x19e
fffff880`04b9da10 fffff800`048224e6 : fffffa80`03a66210 fffffa80`03a66238 fffffa80`08bc5690 00000000`00000000 : nt!EtwpSendDataBlock+0x3f
fffff880`04b9dac0 fffff800`048c0de8 : fffffa80`03a603c0 fffff8a0`09149a00 00000000`00000001 00000000`00000000 : nt!EtwpDisableTraceProviders+0x1a6
fffff880`04b9db40 fffff800`047cd2d6 : fffffa80`03a60000 00000000`00000001 00000000`c0000001 fffffa80`03abb020 : nt!EtwpStopLoggerInstance+0x58
fffff880`04b9db80 fffff800`047122ea : e76054af`4aa5158a fffffa80`03a61040 00000000`00000080 fffffa80`03968b30 : nt! ?? ::NNGAKEGL::`string'+0x42983
fffff880`04b9dc00 fffff800`044668e6 : fffff880`009e5180 fffffa80`03a61040 fffffa80`03a16040 e1269e2e`cfda1b27 : nt!PspSystemThreadStartup+0x5a
fffff880`04b9dc40 00000000`00000000 : fffff880`04b9e000 fffff880`04b98000 fffff880`04b9c0f0 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+36c1a
fffff800`044e8752 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+36c1a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 521ea035
FAILURE_BUCKET_ID: X64_0x7a_c0000185_nt!_??_::FNODOBFM::_string_+36c1a
BUCKET_ID: X64_0x7a_c0000185_nt!_??_::FNODOBFM::_string_+36c1a
Followup: MachineOwner
---------


  • zangshuduo
  • 武林新贵
    8
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
3: kd> lmvm nt
start end module name
fffff800`04400000 fffff800`049e5000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\F69D000687EC491E87FC0425D4D378AC2\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symbols\ntoskrnl.exe\521EA0355e5000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Thu Aug 29 09:13:25 2013 (521EA035)
CheckSum: 0054CBB3
ImageSize: 005E5000
File version: 6.1.7601.18247
Product version: 6.1.7601.18247
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.1.7601.18247
FileVersion: 6.1.7601.18247 (win7sp1_gdr.130828-1532)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
3: kd> lmvm nt
start end module name
fffff800`04400000 fffff800`049e5000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\F69D000687EC491E87FC0425D4D378AC2\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symbols\ntoskrnl.exe\521EA0355e5000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Thu Aug 29 09:13:25 2013 (521EA035)
CheckSum: 0054CBB3
ImageSize: 005E5000
File version: 6.1.7601.18247
Product version: 6.1.7601.18247
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.1.7601.18247
FileVersion: 6.1.7601.18247 (win7sp1_gdr.130828-1532)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.
3: kd> .trap 0xfffff88004b9c6b0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff70001080068 rbx=0000000000000000 rcx=00000000003fffff
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80004788f1a rsp=fffff88004b9c840 rbp=00000000003fffff
r8=fffff70001000000 r9=0000000000000078 r10=0000000000002000
r11=fffff80004676360 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiInsertVadCharges+0x10a:
fffff800`04788f1a 490fa308 bt qword ptr [r8],rcx ds:4b30:fffff700`01000000=????????????????


  • zangshuduo
  • 武林新贵
    8
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
巴黎的大神快戳进来


  • zangshuduo
  • 武林新贵
    8
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
人嘞?


登录百度账号

扫二维码下载贴吧客户端

下载贴吧APP
看高清直播、视频!
  • 贴吧页面意见反馈
  • 违规贴吧举报反馈通道
  • 贴吧违规信息处理公示
  • 5回复贴,共1页
<<返回电脑故障吧
分享到:
©2025 Baidu贴吧协议|隐私政策|吧主制度|意见反馈|网络谣言警示