本帖最后由 812534593 于 2014-3-21 12:36 编辑
第一个是win32k.sys 由 QQProtect.exe进程造成
第二个是ntkrnlmp.exe
第三个还是ntkrnlmp.exe
第四个还是ntkrnlmp.exe
帖出后四个信息
- ....
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck C2, {42, 1010, 0, 0}
- Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+4cf0a )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- BAD_POOL_CALLER (c2)
- The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
- Arguments:
- Arg1: 0000000000000042, Attempt to free a virtual address which was never in any pool
- Arg2: 0000000000001010, Address being freed.
- Arg3: 0000000000000000, 0
- Arg4: 0000000000000000, 0
- Debugging Details:
- ------------------
- BUGCHECK_STR: 0xc2_42
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- PROCESS_NAME: System
- CURRENT_IRQL: 2
- LAST_CONTROL_TRANSFER: from fffff8000455659c to fffff800044d4b80
- STACK_TEXT:
- fffff800`00b9cb18 fffff800`0455659c : 00000000`000000c2 00000000`00000042 00000000`00001010 00000000`00000000 : nt!KeBugCheckEx
- fffff800`00b9cb20 fffff800`046055b1 : 00000000`00000001 fffffa80`0aeef970 ffffffff`fffffffe 00000000`0000000f : nt! ?? ::FNODOBFM::`string'+0x4cf0a
- fffff800`00b9cc70 fffff800`04471cc4 : fffffa80`0b15f000 fffff800`636f6c4d 00000000`00001010 fffff880`00000000 : nt!MiFreePoolPages+0x2b1
- fffff800`00b9cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x23960
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- nt! ?? ::FNODOBFM::`string'+4cf0a
- fffff800`0455659c cc int 3
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+4cf0a
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- DEBUG_FLR_IMAGE_TIMESTAMP: 51fb06cd
- FAILURE_BUCKET_ID: X64_0xc2_42_nt!_??_::FNODOBFM::_string_+4cf0a
- BUCKET_ID: X64_0xc2_42_nt!_??_::FNODOBFM::_string_+4cf0a
- Followup: MachineOwner
- ---------
- 0: kd> !process
- GetPointerFromAddress: unable to read from fffff8000470c000
- PROCESS fffffa800544a5f0
- SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
- DirBase: 00187000 ObjectTable: fffff8a0000015e0 HandleCount: <Data Not Accessible>
- Image: System
- VadRoot fffffa80066cff80 Vads 5 Clone 0 Private 9. Modified 171119. Locked 0.
- DeviceMap fffff8a0000088f0
- Token fffff8a0000049d0
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- fffff78000000000: Unable to get shared data
- ElapsedTime 00:00:00.000
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- QuotaPoolUsage[PagedPool] 0
- QuotaPoolUsage[NonPagedPool] 0
- Working Set Sizes (now,min,max) (92, 0, 0) (368KB, 0KB, 0KB)
- PeakWorkingSetSize 2688
- VirtualSize 3 Mb
- PeakVirtualSize 13 Mb
- PageFaultCount 39169
- MemoryPriority BACKGROUND
- BasePriority 8
- CommitCharge 28
- *** Error in reading nt!_ETHREAD @ fffffa800544b040
复制代码 |