记录大概是这样,谁知道这是怎么回事:
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
POOL_CORRUPTION_IN_FILE_AREA (de)
A driver corrupted pool memory used for holding pages destined for disk.
This was discovered by the memory manager when dereferencing the file.
Arguments:
Arg1: 00000000
Arg2: 892e2008
Arg3: e3718060
Arg4: a781b121
Debugging Details:
------------------
DEFAULT_BUCKET_ID: DRIVER_FAULT
BUGCHECK_STR: 0xDE
PROCESS_NAME: LINK.EXE
LAST_CONTROL_TRANSFER: from 80834236 to 80822f43
STACK_TEXT:
ad5983f4 80834236 000000de 00000000 892e2008 nt!KeBugCheckEx+0x1b
ad5984d8 80837a3f 002e2008 00000001 00001000 nt!MiCleanSection+0x710
ad5984fc b9ce1e30 8927836c 892e2008 ad598894 nt!MmFlushImageSection+0xa9
ad598534 b9caf55e 897faef0 89254c68 89254dd4 Ntfs!NtfsOpenAttributeCheck+0x16f
ad598560 b9caf497 897faef0 89254c68 89254dd4 Ntfs!NtfsOpenExistingAttr+0xd1
ad59866c b9caf9b8 897faef0 89254c68 89254dd4 Ntfs!NtfsOpenAttributeInExistingFile+0x3f3
ad598754 b9caf151 897faef0 89254c68 89254dd4 Ntfs!NtfsOpenExistingPrefixFcb+0x253
ad5988d4 b9cb0f2d 897faef0 89254c68 ad59892c Ntfs!NtfsCommonCreate+0x134a
ad5989b8 8081819f 8aa4a020 89254c68 89254c68 Ntfs!NtfsFsdCreate+0x1dc
ad5989c8 808ac220 896912c0 89bd8c10 ad598b98 nt!IopfCallDriver+0x31
ad598aa8 808ac642 8aa4a020 00000000 89733e68 nt!IopParseDevice+0xa12
ad598ae0 808e8091 896912c0 00000000 89733e68 nt!IopParseFile+0x46
ad598b58 808e4a40 00000704 ad598b98 00000040 nt!ObpLookupObjectName+0x119
ad598bac 8089f057 00000000 00000000 00000001 nt!ObOpenObjectByName+0xea
ad598c28 8089f9ce 0012f7bc c0100080 0012f75c nt!IopCreateFile+0x407
ad598c84 808a20d8 0012f7bc c0100080 0012f75c nt!IoCreateFile+0x8e
ad598cc4 b0e60515 0012f7bc c0100080 0012f75c nt!NtCreateFile+0x30
WARNING: Stack unwind information not available. Following frames may be wrong.
ad598d30 8086a67c 0012f7bc c0100080 0012f75c QQProtect+0xe515
ad598d30 7c92e514 0012f7bc c0100080 0012f75c nt!KiFastCallEntry+0xfc
0012f7b4 00000000 00000000 00000000 00000000 0x7c92e514
STACK_COMMAND: kb
FOLLOWUP_IP:
QQProtect+e515
b0e60515 8bf0 mov esi,eax
SYMBOL_STACK_INDEX: 11
SYMBOL_NAME: QQProtect+e515
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: QQProtect
IMAGE_NAME: QQProtect.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 50e5823a
FAILURE_BUCKET_ID: 0xDE_QQProtect+e515
BUCKET_ID: 0xDE_QQProtect+e515
Followup: MachineOwner
---------
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
上传的附件: