none
VISTA Ultimate SP1 出现蓝屏(内附Windbg 分析Dump文件描述 RRS feed

  • 问题

  • 基本上每天都有出现蓝屏,听他们说qq有可能引起蓝屏,但是没有办法一天不开qq,工作需要,麻烦各位大虾帮忙看看,谢谢

     

    Microsoft (R) Windows Debugger  Version 6.6.0007.5
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\Mini123008-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\temp*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows Vista Kernel Version 6001 (Service Pack 1) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 6001.18145.x86fre.vistasp1_gdr.080917-1612
    Kernel base = 0x81c01000 PsLoadedModuleList = 0x81d18c70
    Debug session time: Tue Dec 30 18:57:36.137 2008 (GMT+8)
    System Uptime: 0 days 3:14:16.485
    Loading Kernel Symbols
    ..........................................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck A, {ffd470f0, 2, 0, 81c53380}

    Probably caused by : ntkrpamp.exe ( nt!READ_REGISTER_ULONG+4 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: ffd470f0, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 81c53380, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: GetPointerFromAddress: unable to read from 81d38868
    Unable to read MiSystemVaType memory at 81d18420
     ffd470f0

    CURRENT_IRQL:  2

    FAULTING_IP:
    nt!READ_REGISTER_ULONG+4
    81c53380 8b02            mov     eax,dword ptr [edx]

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_RC

    BUGCHECK_STR:  0xA

    PROCESS_NAME:  System

    TRAP_FRAME:  81cf6c64 -- (.trap ffffffff81cf6c64)
    ErrCode = 00000000
    eax=ffd470f0 ebx=0002b195 ecx=ffffffff edx=ffd470f0 esi=00000026 edi=80000020
    eip=81c53380 esp=81cf6cd8 ebp=81cf6cf4 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    nt!READ_REGISTER_ULONG+0x4:
    81c53380 8b02            mov     eax,dword ptr [edx]  ds:0023:ffd470f0=????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from 81c53380 to 81c5bd24

    STACK_TEXT: 
    81cf6c64 81c53380 badb0d00 ffd470f0 81cf6cf8 nt!KiTrap0E+0x2ac
    81cf6cd4 81fc3823 ffd470f0 85bc4a80 81cfb790 nt!READ_REGISTER_ULONG+0x4
    81cf6cf4 81fc3c65 81cf6d50 81cbcd94 00000000 hal!HalpQueryHpetCount+0x4b
    81cf6cfc 81cbcd94 00000000 9edeaa98 81cfd640 hal!HalpHpetQueryPerformanceCounter+0x1d
    81cf6d50 81cb5ea1 00000000 0000000e 00000000 nt!PoIdle+0x333
    81cf6d54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0xd


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt!READ_REGISTER_ULONG+4
    81c53380 8b02            mov     eax,dword ptr [edx]

    SYMBOL_STACK_INDEX:  1

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME:  ntkrpamp.exe

    DEBUG_FLR_IMAGE_TIMESTAMP:  48d1b7fa

    SYMBOL_NAME:  nt!READ_REGISTER_ULONG+4

    FAILURE_BUCKET_ID:  0xA_nt!READ_REGISTER_ULONG+4

    BUCKET_ID:  0xA_nt!READ_REGISTER_ULONG+4

    Followup: MachineOwner
    ---------

     

     

     

    2008年12月30日 11:33

答案

全部回复