|
[求助]为什么蓝屏
没人看自己先慢慢解决了 interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. IRQL太高 跟进 Arg4: 804fad26, address which referenced memory STACK_TEXT: b8821af8 806d376e 00000000 00000000 00000000 nt!KeWaitForSingleObject+0x186 b8821b18 80639c31 000d0801 86702f68 00000000 hal!ExAcquireFastMutex+0x2a b8821be4 8063ad63 86702d20 863a7020 b8821c2c nt!DbgkpQueueMessage+0x11f b8821c08 8063b343 b8821c2c 00000001 86702d20 nt!DbgkpSendApiMessage+0x45 b8821d08 805c705f 7c8106e9 00000000 00000000 nt!DbgkCreateThread+0x391 b8821d50 80542dd2 00000000 7c8106e9 00000001 nt!PspUserThreadStartup+0x9d 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 看了下堆栈 原因大概是这里了 DbgkCreateThread 跟DbgkpQueueMessage 这两个函数的原因 再看看DbgkCreateThread 用到的偏移 DbgkCreateThread 8063b0d7 399ebc000000 cmp dword ptr [esi+0BCh],ebx |
|
[求助]为什么蓝屏
顺便贴上 DUMP 文件分析 kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 804fad26, address which referenced memory Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'msdirectx' and 'msdirectx.sy' overlap WRITE_ADDRESS: 00000000 CURRENT_IRQL: 2 FAULTING_IP: nt!KeWaitForSingleObject+186 804fad26 8939 mov dword ptr [ecx],edi CUSTOMER_CRASH_COUNT: 17 DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: svchost.exe LAST_CONTROL_TRANSFER: from 806d376e to 804fad26 STACK_TEXT: b8821af8 806d376e 00000000 00000000 00000000 nt!KeWaitForSingleObject+0x186 b8821b18 80639c31 000d0801 86702f68 00000000 hal!ExAcquireFastMutex+0x2a b8821be4 8063ad63 86702d20 863a7020 b8821c2c nt!DbgkpQueueMessage+0x11f b8821c08 8063b343 b8821c2c 00000001 86702d20 nt!DbgkpSendApiMessage+0x45 b8821d08 805c705f 7c8106e9 00000000 00000000 nt!DbgkCreateThread+0x391 b8821d50 80542dd2 00000000 7c8106e9 00000001 nt!PspUserThreadStartup+0x9d 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 STACK_COMMAND: kb FOLLOWUP_IP: nt!KeWaitForSingleObject+186 804fad26 8939 mov dword ptr [ecx],edi SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!KeWaitForSingleObject+186 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlpa.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4802516a FAILURE_BUCKET_ID: 0xA_nt!KeWaitForSingleObject+186 BUCKET_ID: 0xA_nt!KeWaitForSingleObject+186 Followup: MachineOwner |
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值