locked
Windows 7 藍底白字 RRS feed

  • 問題

  • 各位網兄您好

    最近剛把舊的Avira免費版 2010 更新成Avira Internet Security 2012 就發生藍底白字

    不知道是否是Avira Internet Security 2012 的防火牆與COMODO,彼此之間互衝才這樣的

    目前是把Avira Internet Security 2012重新安裝,去除了小紅傘防火牆

    不過又怕發生藍底白字,請網兄幫忙看看DMP檔, 謝謝  http://www.multiupload.com/KRMGBCS3VI

     

     

    2011年12月16日 上午 07:33

解答

  • Hi kuratuka

    從你提供的DMP中有看到一樣很詭異的東西utorrent.exe <== 這東西應該是使用BT類的軟體才有的

    所以不知道是不是因為你安裝了Avira Internet Security 2012 的防火牆與COMODO所以導致連接阜有問題所以才會造成這樣子的狀況

    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff88003820240, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
     
    Debugging Details:
    ------------------
     
     
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
     
    FAULTING_IP: 
    +3037343534303230
    fffff880`03820240 6811820380      push    0FFFFFFFF80038211h
     
    EXCEPTION_PARAMETER1:  0000000000000000
     
    EXCEPTION_PARAMETER2:  0000000000000000
     
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004ac5100
     0000000000000000 
     
    ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
     
    BUGCHECK_STR:  0x1E_c0000005
     
    CUSTOMER_CRASH_COUNT:  1
     
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
     
    PROCESS_NAME:  utorrent.exe 

     

    CURRENT_IRQL:  2
     
    EXCEPTION_RECORD:  fffff88003821168 -- (.exr 0xfffff88003821168)
    ExceptionAddress: fffff88001761369 (ndis!ndisMSendCompleteNetBufferListsInternal+0x0000000000000109)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
     
    TRAP_FRAME:  fffff88003821210 -- (.trap 0xfffff88003821210)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=c943aef97df82809
    rdx=fffffa80074581c0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001761369 rsp=fffff880038213a0 rbp=0000000000000000
     r8=0000000000000000  r9=fffffa800aa4c2a0 r10=0000000000000000
    r11=fffffa80068f6b30 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    ndis!ndisMSendCompleteNetBufferListsInternal+0x109:
    fffff880`01761369 ff9680050000    call    qword ptr [rsi+580h] ds:00000000`00000580=????????????????
    Resetting default scope
     
    LAST_CONTROL_TRANSFER:  from fffff8000491e4fb to fffff80004892c40
     
    STACK_TEXT:  
    fffff880`03820188 fffff800`0491e4fb : 00000000`0000001e ffffffff`c0000005 fffff880`03820240 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03820190 fffff800`048e6bb4 : 00000000`00000260 00000000`0cbbf1bc 73832bf6`0cbbfc28 fffffffe`5c526211 : nt!KipFatalFilter+0x1b
    fffff880`038201d0 fffff800`048bea7c : 00000000`0cbbf944 10026e7e`0cbbfba8 0cbbf238`00000054 0cbbf948`00000708 : nt! ?? ::FNODOBFM::`string'+0x83d
    fffff880`03820210 fffff800`048be4fd : fffff800`049d5c24 fffff880`03822d20 00000000`00000000 fffff800`04816000 : nt!_C_specific_handler+0x8c
    fffff880`03820280 fffff800`048bd2d5 : fffff800`049d5c24 fffff880`038202f8 fffff880`03821168 fffff800`04816000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`038202b0 fffff800`048ce361 : fffff880`03821168 fffff880`038209c0 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x415
    fffff880`03820990 fffff800`048922c2 : fffff880`03821168 fffffa80`080c31a0 fffff880`03821210 fffffa80`0aa4c2a0 : nt!KiDispatchException+0x135
    fffff880`03821030 fffff800`04890bca : fffff880`03821240 fffffa80`0000000a 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`03821210 fffff880`01761369 : fffffa80`080ba1a0 fffffa80`07edfb10 ffff0000`0616d357 fffffa80`0c4e34b0 : nt!KiGeneralProtectionFault+0x10a
    fffff880`038213a0 fffff880`059155f4 : 00000000`00000000 fffffa80`074581c0 fffffa80`00000000 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x109
    fffff880`03821440 fffff880`0593aa4a : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`06db2530 : pacer! ?? ::FNODOBFM::`string'+0x144
    fffff880`038214a0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`06db2530 fffffa80`068f6b30 : inspect+0x1a4a
     
     
    STACK_COMMAND:  kb
     
    FOLLOWUP_IP: 
    pacer! ?? ::FNODOBFM::`string'+144
    fffff880`059155f4 488b742470      mov     rsi,qword ptr [rsp+70h]
     
    SYMBOL_STACK_INDEX:  a
     
    SYMBOL_NAME:  pacer! ?? ::FNODOBFM::`string'+144
     
    FOLLOWUP_NAME:  qosdev
     
    MODULE_NAME: pacer
     
    IMAGE_NAME:  pacer.sys
     
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7a862
     
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_pacer!_??_::FNODOBFM::_string_+144
     
    BUCKET_ID:  X64_0x1E_c0000005_pacer!_??_::FNODOBFM::_string_+144
     
    Followup: qosdev
    ---------
     
    2: kd> k
    Child-SP          RetAddr           Call Site
    fffff880`03820188 fffff800`0491e4fb nt!KeBugCheckEx
    fffff880`03820190 fffff800`048e6bb4 nt!KipFatalFilter+0x1b
    fffff880`038201d0 fffff800`048bea7c nt! ?? ::FNODOBFM::`string'+0x83d
    fffff880`03820210 fffff800`048be4fd nt!_C_specific_handler+0x8c
    fffff880`03820280 fffff800`048bd2d5 nt!RtlpExecuteHandlerForException+0xd
    fffff880`038202b0 fffff800`048ce361 nt!RtlDispatchException+0x415
    fffff880`03820990 fffff800`048922c2 nt!KiDispatchException+0x135
    fffff880`03821030 fffff800`04890bca nt!KiExceptionDispatch+0xc2
    fffff880`03821210 fffff880`01761369 nt!KiGeneralProtectionFault+0x10a
    fffff880`038213a0 fffff880`059155f4 ndis!ndisMSendCompleteNetBufferListsInternal+0x109
    fffff880`03821440 fffff880`0593aa4a pacer! ?? ::FNODOBFM::`string'+0x144
    fffff880`038214a0 00000000`00000000 inspect+0x1a4a
    2: kd> kb
    RetAddr           : Args to Child                                                           : Call Site
    fffff800`0491e4fb : 00000000`0000001e ffffffff`c0000005 fffff880`03820240 00000000`00000000 : nt!KeBugCheckEx
    fffff800`048e6bb4 : 00000000`00000260 00000000`0cbbf1bc 73832bf6`0cbbfc28 fffffffe`5c526211 : nt!KipFatalFilter+0x1b
    fffff800`048bea7c : 00000000`0cbbf944 10026e7e`0cbbfba8 0cbbf238`00000054 0cbbf948`00000708 : nt! ?? ::FNODOBFM::`string'+0x83d
    fffff800`048be4fd : fffff800`049d5c24 fffff880`03822d20 00000000`00000000 fffff800`04816000 : nt!_C_specific_handler+0x8c
    fffff800`048bd2d5 : fffff800`049d5c24 fffff880`038202f8 fffff880`03821168 fffff800`04816000 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`048ce361 : fffff880`03821168 fffff880`038209c0 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x415
    fffff800`048922c2 : fffff880`03821168 fffffa80`080c31a0 fffff880`03821210 fffffa80`0aa4c2a0 : nt!KiDispatchException+0x135
    fffff800`04890bca : fffff880`03821240 fffffa80`0000000a 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`01761369 : fffffa80`080ba1a0 fffffa80`07edfb10 ffff0000`0616d357 fffffa80`0c4e34b0 : nt!KiGeneralProtectionFault+0x10a
    fffff880`059155f4 : 00000000`00000000 fffffa80`074581c0 fffffa80`00000000 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x109
    fffff880`0593aa4a : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`06db2530 : pacer! ?? ::FNODOBFM::`string'+0x144
    00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`06db2530 fffffa80`068f6b30 : inspect+0x1a4a
    2: kd> !locks
    **** DUMP OF ALL RESOURCE OBJECTS ****
    fffff80004a33430: Unable to get value of ExpSystemResourcesList
    2: kd> !handle
    GetPointerFromAddress: unable to read from fffff80004ac5000
     
    PROCESS fffffa8007484b30
        SessionId: none  Cid: 0af8    Peb: 7efdf000  ParentCid: 1048
        DirBase: 153848000  ObjectTable: fffff8a010c84b80  HandleCount: <Data Not Accessible>
        Image: utorrent.exe
     
    GetPointerFromAddress: unable to read from fffff80004a3df80
    fffff8a010c84b80: Unable to read handle table

     

    2011年12月16日 上午 08:52

所有回覆

  • Hi kuratuka

    從你提供的DMP中有看到一樣很詭異的東西utorrent.exe <== 這東西應該是使用BT類的軟體才有的

    所以不知道是不是因為你安裝了Avira Internet Security 2012 的防火牆與COMODO所以導致連接阜有問題所以才會造成這樣子的狀況

    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff88003820240, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: 0000000000000000, Parameter 1 of the exception
     
    Debugging Details:
    ------------------
     
     
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
     
    FAULTING_IP: 
    +3037343534303230
    fffff880`03820240 6811820380      push    0FFFFFFFF80038211h
     
    EXCEPTION_PARAMETER1:  0000000000000000
     
    EXCEPTION_PARAMETER2:  0000000000000000
     
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004ac5100
     0000000000000000 
     
    ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
     
    BUGCHECK_STR:  0x1E_c0000005
     
    CUSTOMER_CRASH_COUNT:  1
     
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
     
    PROCESS_NAME:  utorrent.exe 

     

    CURRENT_IRQL:  2
     
    EXCEPTION_RECORD:  fffff88003821168 -- (.exr 0xfffff88003821168)
    ExceptionAddress: fffff88001761369 (ndis!ndisMSendCompleteNetBufferListsInternal+0x0000000000000109)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
     
    TRAP_FRAME:  fffff88003821210 -- (.trap 0xfffff88003821210)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=c943aef97df82809
    rdx=fffffa80074581c0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff88001761369 rsp=fffff880038213a0 rbp=0000000000000000
     r8=0000000000000000  r9=fffffa800aa4c2a0 r10=0000000000000000
    r11=fffffa80068f6b30 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    ndis!ndisMSendCompleteNetBufferListsInternal+0x109:
    fffff880`01761369 ff9680050000    call    qword ptr [rsi+580h] ds:00000000`00000580=????????????????
    Resetting default scope
     
    LAST_CONTROL_TRANSFER:  from fffff8000491e4fb to fffff80004892c40
     
    STACK_TEXT:  
    fffff880`03820188 fffff800`0491e4fb : 00000000`0000001e ffffffff`c0000005 fffff880`03820240 00000000`00000000 : nt!KeBugCheckEx
    fffff880`03820190 fffff800`048e6bb4 : 00000000`00000260 00000000`0cbbf1bc 73832bf6`0cbbfc28 fffffffe`5c526211 : nt!KipFatalFilter+0x1b
    fffff880`038201d0 fffff800`048bea7c : 00000000`0cbbf944 10026e7e`0cbbfba8 0cbbf238`00000054 0cbbf948`00000708 : nt! ?? ::FNODOBFM::`string'+0x83d
    fffff880`03820210 fffff800`048be4fd : fffff800`049d5c24 fffff880`03822d20 00000000`00000000 fffff800`04816000 : nt!_C_specific_handler+0x8c
    fffff880`03820280 fffff800`048bd2d5 : fffff800`049d5c24 fffff880`038202f8 fffff880`03821168 fffff800`04816000 : nt!RtlpExecuteHandlerForException+0xd
    fffff880`038202b0 fffff800`048ce361 : fffff880`03821168 fffff880`038209c0 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x415
    fffff880`03820990 fffff800`048922c2 : fffff880`03821168 fffffa80`080c31a0 fffff880`03821210 fffffa80`0aa4c2a0 : nt!KiDispatchException+0x135
    fffff880`03821030 fffff800`04890bca : fffff880`03821240 fffffa80`0000000a 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`03821210 fffff880`01761369 : fffffa80`080ba1a0 fffffa80`07edfb10 ffff0000`0616d357 fffffa80`0c4e34b0 : nt!KiGeneralProtectionFault+0x10a
    fffff880`038213a0 fffff880`059155f4 : 00000000`00000000 fffffa80`074581c0 fffffa80`00000000 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x109
    fffff880`03821440 fffff880`0593aa4a : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`06db2530 : pacer! ?? ::FNODOBFM::`string'+0x144
    fffff880`038214a0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`06db2530 fffffa80`068f6b30 : inspect+0x1a4a
     
     
    STACK_COMMAND:  kb
     
    FOLLOWUP_IP: 
    pacer! ?? ::FNODOBFM::`string'+144
    fffff880`059155f4 488b742470      mov     rsi,qword ptr [rsp+70h]
     
    SYMBOL_STACK_INDEX:  a
     
    SYMBOL_NAME:  pacer! ?? ::FNODOBFM::`string'+144
     
    FOLLOWUP_NAME:  qosdev
     
    MODULE_NAME: pacer
     
    IMAGE_NAME:  pacer.sys
     
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7a862
     
    FAILURE_BUCKET_ID:  X64_0x1E_c0000005_pacer!_??_::FNODOBFM::_string_+144
     
    BUCKET_ID:  X64_0x1E_c0000005_pacer!_??_::FNODOBFM::_string_+144
     
    Followup: qosdev
    ---------
     
    2: kd> k
    Child-SP          RetAddr           Call Site
    fffff880`03820188 fffff800`0491e4fb nt!KeBugCheckEx
    fffff880`03820190 fffff800`048e6bb4 nt!KipFatalFilter+0x1b
    fffff880`038201d0 fffff800`048bea7c nt! ?? ::FNODOBFM::`string'+0x83d
    fffff880`03820210 fffff800`048be4fd nt!_C_specific_handler+0x8c
    fffff880`03820280 fffff800`048bd2d5 nt!RtlpExecuteHandlerForException+0xd
    fffff880`038202b0 fffff800`048ce361 nt!RtlDispatchException+0x415
    fffff880`03820990 fffff800`048922c2 nt!KiDispatchException+0x135
    fffff880`03821030 fffff800`04890bca nt!KiExceptionDispatch+0xc2
    fffff880`03821210 fffff880`01761369 nt!KiGeneralProtectionFault+0x10a
    fffff880`038213a0 fffff880`059155f4 ndis!ndisMSendCompleteNetBufferListsInternal+0x109
    fffff880`03821440 fffff880`0593aa4a pacer! ?? ::FNODOBFM::`string'+0x144
    fffff880`038214a0 00000000`00000000 inspect+0x1a4a
    2: kd> kb
    RetAddr           : Args to Child                                                           : Call Site
    fffff800`0491e4fb : 00000000`0000001e ffffffff`c0000005 fffff880`03820240 00000000`00000000 : nt!KeBugCheckEx
    fffff800`048e6bb4 : 00000000`00000260 00000000`0cbbf1bc 73832bf6`0cbbfc28 fffffffe`5c526211 : nt!KipFatalFilter+0x1b
    fffff800`048bea7c : 00000000`0cbbf944 10026e7e`0cbbfba8 0cbbf238`00000054 0cbbf948`00000708 : nt! ?? ::FNODOBFM::`string'+0x83d
    fffff800`048be4fd : fffff800`049d5c24 fffff880`03822d20 00000000`00000000 fffff800`04816000 : nt!_C_specific_handler+0x8c
    fffff800`048bd2d5 : fffff800`049d5c24 fffff880`038202f8 fffff880`03821168 fffff800`04816000 : nt!RtlpExecuteHandlerForException+0xd
    fffff800`048ce361 : fffff880`03821168 fffff880`038209c0 fffff880`00000000 00000000`00000005 : nt!RtlDispatchException+0x415
    fffff800`048922c2 : fffff880`03821168 fffffa80`080c31a0 fffff880`03821210 fffffa80`0aa4c2a0 : nt!KiDispatchException+0x135
    fffff800`04890bca : fffff880`03821240 fffffa80`0000000a 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
    fffff880`01761369 : fffffa80`080ba1a0 fffffa80`07edfb10 ffff0000`0616d357 fffffa80`0c4e34b0 : nt!KiGeneralProtectionFault+0x10a
    fffff880`059155f4 : 00000000`00000000 fffffa80`074581c0 fffffa80`00000000 fffffa80`00000000 : ndis!ndisMSendCompleteNetBufferListsInternal+0x109
    fffff880`0593aa4a : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`06db2530 : pacer! ?? ::FNODOBFM::`string'+0x144
    00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`06db2530 fffffa80`068f6b30 : inspect+0x1a4a
    2: kd> !locks
    **** DUMP OF ALL RESOURCE OBJECTS ****
    fffff80004a33430: Unable to get value of ExpSystemResourcesList
    2: kd> !handle
    GetPointerFromAddress: unable to read from fffff80004ac5000
     
    PROCESS fffffa8007484b30
        SessionId: none  Cid: 0af8    Peb: 7efdf000  ParentCid: 1048
        DirBase: 153848000  ObjectTable: fffff8a010c84b80  HandleCount: <Data Not Accessible>
        Image: utorrent.exe
     
    GetPointerFromAddress: unable to read from fffff80004a3df80
    fffff8a010c84b80: Unable to read handle table

     

    2011年12月16日 上午 08:52
  • 您好Lissam,所以目前可以排除是硬體問題是嗎?

     

    依照DMP看來可能是utorrent出問題嗎?

     

    非常感謝您幫忙解惑

    2011年12月16日 下午 12:14
  • Hi kuratuka

    是可以排除硬體上面的問題

    從紀錄上看起來應該是utorrent軟體有問題所以才會導致你的系統BSOD

    2011年12月19日 上午 07:45