none
蓝屏了,附上DUMP结果……麻烦看看,谢谢 RRS feed

  • 问题

  • Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\Mini032709-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\temp*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18145.amd64fre.vistasp1_gdr.080917-1612
    Machine Name:
    Kernel base = 0xfffff800`01e47000 PsLoadedModuleList = 0xfffff800`0200cdb0
    Debug session time: Fri Mar 27 12:59:24.315 2009 (GMT+8)
    System Uptime: 0 days 0:16:21.207
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {0, 2, 8, 0}

    Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+20b )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000000, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
    Arg4: 0000000000000000, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002070080
     0000000000000000

    CURRENT_IRQL:  2

    FAULTING_IP:
    +0
    00000000`00000000 ??              ???

    PROCESS_NAME:  System

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xD1

    TRAP_FRAME:  fffffa600171bb70 -- (.trap 0xfffffa600171bb70)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000003457cb744 rbx=0000000000000000 rcx=fffff80001fbea78
    rdx=0003b52800000000 rsi=0000000000000000 rdi=0000000000000000
    rip=0000000000000000 rsp=fffffa600171bd08 rbp=0000000000000000
     r8=fffff80001fbeaa0  r9=fffff80001fbeaa0 r10=0000000000000000
    r11=fffffa80037411f0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    00000000`00000000 ??              ???
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff80001e9c0ee to fffff80001e9c350

    FAILED_INSTRUCTION_ADDRESS:
    +0
    00000000`00000000 ??              ???

    STACK_TEXT: 
    fffffa60`0171ba28 fffff800`01e9c0ee : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
    fffffa60`0171ba30 fffff800`01e9afcb : 00000000`00000008 fffffa80`054d5520 00000000`00000000 fffff800`01fbea78 : nt!KiBugCheckDispatch+0x6e
    fffffa60`0171bb70 00000000`00000000 : fffff800`01ea59d7 fffff800`01fbea78 00000000`00000000 fffffa60`005ef580 : nt!KiPageFault+0x20b


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt!KiPageFault+20b
    fffff800`01e9afcb 488d058e320000  lea     rax,[nt!ExpInterlockedPopEntrySList (fffff800`01e9e260)]

    SYMBOL_STACK_INDEX:  2

    SYMBOL_NAME:  nt!KiPageFault+20b

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrnlmp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  48d1ba35

    FAILURE_BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+20b

    BUCKET_ID:  X64_0xD1_CODE_AV_NULL_IP_nt!KiPageFault+20b

    Followup: MachineOwner
    ---------

    2009年3月27日 5:39

答案

  • 敬请等待系统升级补丁。现保持正常的补丁更新。
    Microsoft Certified Systems Engineer 如果您觉得对您有帮助,请在“是否有帮助”点“是”;如果你觉得回复很满意,请“标记为已解答”
    2009年3月27日 8:13