使用windbg看了下是这个驱动造成的h3comfilter.sys,你看看安装什么东西有这个,卸载或者重装下!
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {400000000, 2, 8, 400000000}
- Unable to load image \SystemRoot\system32\DRIVERS\h3comfilter.sys, Win32 error 0n2
- *** WARNING: Unable to verify timestamp for h3comfilter.sys
- *** ERROR: Module load completed but symbols could not be loaded for h3comfilter.sys
- Probably caused by : h3comfilter.sys ( h3comfilter+352e )
- Followup: MachineOwner
- ---------
- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000400000000, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
- Arg4: 0000000400000000, address which referenced memory
- Debugging Details:
- ------------------
- READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80004ac4100
- 0000000400000000
- CURRENT_IRQL: 2
- FAULTING_IP:
- +3730633033373662
- 00000004`00000000 ?? ???
- PROCESS_NAME: System
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0xD1
- TRAP_FRAME: fffff8800d2fb760 -- (.trap 0xfffff8800d2fb760)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000000 rbx=0000000000000000 rcx=00000018fe2712ac
- rdx=fffff8800cd81480 rsi=0000000000000000 rdi=0000000000000000
- rip=0000000400000000 rsp=fffff8800d2fb8f8 rbp=0000000000000002
- r8=0000000000000000 r9=0000000000000000 r10=fffff880049d5e20
- r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- 00000004`00000000 ?? ???
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff8000488c169 to fffff8000488cbc0
- FAILED_INSTRUCTION_ADDRESS:
- +3730633033373662
- 00000004`00000000 ?? ???
- STACK_TEXT:
- fffff880`0d2fb618 fffff800`0488c169 : 00000000`0000000a 00000004`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
- fffff880`0d2fb620 fffff800`0488ade0 : fffffa80`07d9b1a0 fffff880`0d2fba90 00000000`00000000 fffffa80`070abb50 : nt!KiBugCheckDispatch+0x69
- fffff880`0d2fb760 00000004`00000000 : fffff880`018cf112 fffffa80`070abc00 00000000`00000002 fffff880`0d2fb9c0 : nt!KiPageFault+0x260
- fffff880`0d2fb8f8 fffff880`018cf112 : fffffa80`070abc00 00000000`00000002 fffff880`0d2fb9c0 fffffa80`07d8d1a0 : 0x4`00000000
- fffff880`0d2fb900 fffff880`0191a27c : fffffa80`03f37600 00000000`00000000 fffff880`0cd81480 00000000`00000000 : ndis!ndisOidRequestComplete+0x392
- fffff880`0d2fb990 fffff880`0191a4fe : fffffa80`03f375a0 00000000`00000000 fffffa80`07d8d1a0 fffffa80`00000230 : ndis!ndisMOidRequestCompleteInternal+0xdc
- fffff880`0d2fba10 fffff880`019675e9 : fffffa80`07d8d1a0 fffffa80`03fa8530 fffff880`01930110 00000000`00000100 : ndis!ndisCompleteLegacyRequest+0x10e
- fffff880`0d2fba70 fffff880`07e0352e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0d2fbc00 : ndis!NdisMSetInformationComplete+0xa9
- fffff880`0d2fbab0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff880`0d2fbc00 fffffa80`0c7c8930 : h3comfilter+0x352e
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- h3comfilter+352e
- fffff880`07e0352e ?? ???
- SYMBOL_STACK_INDEX: 8
- SYMBOL_NAME: h3comfilter+352e
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: h3comfilter
- IMAGE_NAME: h3comfilter.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4c491c00
- FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_h3comfilter+352e
- BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_h3comfilter+352e
- Followup: MachineOwner
- ---------
- 3: kd> !process
- GetPointerFromAddress: unable to read from fffff80004ac4000
- PROCESS fffffa8003e71040
- SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
- DirBase: 001a7000 ObjectTable: fffff8a000001780 HandleCount: <Data Not Accessible>
- Image: System
- VadRoot fffffa8006c16a00 Vads 23 Clone 0 Private 24. Modified 60570177. Locked 64.
- DeviceMap fffff8a000008bc0
- Token fffff8a000004b20
- ReadMemory error: Cannot get nt!KeMaximumIncrement value.
- fffff78000000000: Unable to get shared data
- ElapsedTime 00:00:00.000
- UserTime 00:00:00.000
- KernelTime 00:00:00.000
- QuotaPoolUsage[PagedPool] 0
- QuotaPoolUsage[NonPagedPool] 0
- Working Set Sizes (now,min,max) (777, 0, 0) (3108KB, 0KB, 0KB)
- PeakWorkingSetSize 3748
- VirtualSize 6 Mb
- PeakVirtualSize 18 Mb
- PageFaultCount 53481
- MemoryPriority BACKGROUND
- BasePriority 8
- CommitCharge 45
- *** Error in reading nt!_ETHREAD [url=home.php?mod=space&uid=340]@[/url] fffffa8003e71ab0
复制代码 |