none
WIN7蓝屏 windebug检测报告如下~ RRS feed

  • 问题


  • Microsoft (R) Windows Debugger Version 6.3.9600.17200 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\081014-163301-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available


    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*c:\e*http://msdl.microsoft.com/download/symbols
    Symbol search path is: srv*c:\e*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.18409.amd64fre.win7sp1_gdr.140303-2144
    Machine Name:
    Kernel base = 0xfffff800`06409000 PsLoadedModuleList = 0xfffff800`0664c890
    Debug session time: Sun Aug 10 09:57:39.399 2014 (UTC + 8:00)
    System Uptime: 0 days 1:06:53.604
    Loading Kernel Symbols
    .

    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.

    ..............................................................
    ................................................................
    ..............................................................
    Loading User Symbols
    Loading unloaded module list
    ...................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 19, {20, fffff8000684d860, fffff8000684dce0, 8548c38b}

    *** WARNING: Unable to verify timestamp for EagleX64.sys
    *** ERROR: Module load completed but symbols could not be loaded for EagleX64.sys
    Probably caused by : memory_corruption

    Followup: memory_corruption
    ---------

    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000020, a pool block header size is corrupt.
    Arg2: fffff8000684d860, The pool entry we were looking for within the page.
    Arg3: fffff8000684dce0, The next pool entry.
    Arg4: 000000008548c38b, (reserved)

    Debugging Details:
    ------------------


    BUGCHECK_STR:  0x19_20

    POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800066b6100
    GetUlongFromAddress: unable to read from fffff800066b61c0
     fffff8000684d860 Nonpaged pool

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  CODE_CORRUPTION

    PROCESS_NAME:  MapleStory.exe

    CURRENT_IRQL:  0

    ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

    LAST_CONTROL_TRANSFER:  from fffff800065b1cae to fffff8000647ebc0

    STACK_TEXT:  
    fffff880`0dca73c8 fffff800`065b1cae : 00000000`00000019 00000000`00000020 fffff800`0684d860 fffff800`0684dce0 : nt!KeBugCheckEx
    fffff880`0dca73d0 fffff800`06482ce3 : 00000000`a0000003 fffffa80`07f7cdd0 00000000`435b30c4 00000000`00000000 : nt!ExDeferredFreePool+0x12da
    fffff880`0dca7480 fffff880`0b013ace : fffffa80`0c5acc10 fffffa80`0fca7600 fffffa80`0fca7640 00000000`00000000 : nt!IopfCompleteRequest+0xa53
    fffff880`0dca7570 fffffa80`0c5acc10 : fffffa80`0fca7600 fffffa80`0fca7640 00000000`00000000 fffff880`04b17180 : EagleX64+0x13ace
    fffff880`0dca7578 fffffa80`0fca7600 : fffffa80`0fca7640 00000000`00000000 fffff880`04b17180 fffff880`0b01886f : 0xfffffa80`0c5acc10
    fffff880`0dca7580 fffffa80`0fca7640 : 00000000`00000000 fffff880`04b17180 fffff880`0b01886f 00000000`00000000 : 0xfffffa80`0fca7600
    fffff880`0dca7588 00000000`00000000 : fffff880`04b17180 fffff880`0b01886f 00000000`00000000 fffff8a0`16886bf0 : 0xfffffa80`0fca7640


    STACK_COMMAND:  kb

    CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
        fffff8000684d863 - nt!EtwpUpdateFileInfoDriverState+c3
    [ 83:85 ]
    1 error : !nt (fffff8000684d863)

    MODULE_NAME: memory_corruption

    IMAGE_NAME:  memory_corruption

    FOLLOWUP_NAME:  memory_corruption

    DEBUG_FLR_IMAGE_TIMESTAMP:  0

    MEMORY_CORRUPTOR:  ONE_BYTE

    FAILURE_BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BYTE

    BUCKET_ID:  X64_MEMORY_CORRUPTION_ONE_BYTE

    ANALYSIS_SOURCE:  KM

    FAILURE_ID_HASH_STRING:  km:x64_memory_corruption_one_byte

    FAILURE_ID_HASH:  {4a7e6383-2ded-d415-6611-44be8fed109f}

    Followup: memory_corruption
    ---------
    2014年8月10日 2:20

答案

  • 你使用的安博士杀毒软件可能与 64 位 Windows 或者你运行的冒险岛游戏存在兼容问题。临时卸载此杀毒软件看看能否解决?Eaglex64.SYS 是个驱动形式的组件,因此可能不能只禁用、而是要卸载才能测试出来。


    Alexis Zhang

    http://mvp.support.microsoft.com/profile/jie
    http://blogs.itecn.net/blogs/alexis

    推荐以 NNTP Bridge 桥接新闻组方式访问论坛。

    本帖是回复帖,原帖作者是楼上的 <coldstarrr>;

    | Loading Dump File [C:\Windows\Minidump\081014-163301-01.dmp]
    | Mini Kernel Dump File: Only registers and stack trace are available

    2014年8月10日 4:15