文件共享服务器蓝屏,我的电脑是WIN7的,从网上邻居共享电脑XP上复制文件会一直蓝屏(蓝屏4次了),而且 - Microsoft Community...

这是WINDBG的一次输出。。

Loading Dump File [C:\Windows\Minidump\122110-43664-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

WARNING: Whitespace at end of path element

Symbol search path is: SRV*c:\temp*http://msdl.microsoft.com/download/symbols

Executable search path is:

Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 7600.16617.x86fre.win7_gdr.100618-1621

Machine Name:

Kernel base = 0x8420c000 PsLoadedModuleList = 0x84354810

Debug session time: Tue Dec 21 09:46:52.588 2010 (GMT+8)

System Uptime: 0 days 0:09:32.211

Loading Kernel Symbols

...............................................................

................................................................

............................................................

Loading User Symbols

Loading unloaded module list

......

0: kd> !analyze -v

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

PFN_LIST_CORRUPT (4e)

Typically caused by drivers passing bad memory descriptor lists (ie: calling

MmUnlockPages twice with the same list, etc).  If a kernel debugger is

available get the stack trace.

Arguments:

Arg1: 00000099, A PTE or PFN is corrupt

Arg2: 0004cf87, page frame number

Arg3: 00000005, current page state

Arg4: bbb0ad34, 0

Debugging Details:

------------------

BUGCHECK_STR:  0x4E_99

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  hh.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from 842f56dc to 842e8d10

STACK_TEXT:

8d5c3850 842f56dc 0000004e 00000099 0004cf87 nt!KeBugCheckEx+0x1e

8d5c3868 84281a84 c000e010 843344f0 c0804ff0 nt!MiBadShareCount+0x24

8d5c3a90 8427e8d7 86739708 8d5c3b40 86739708 nt!MiFreeWsleList+0x68a

8d5c3c10 8427f61b 86739708 00000001 00000001 nt!MiAgeWorkingSet+0x48b

8d5c3c5c 8427f2e0 00000002 00000001 00000000 nt!MiProcessWorkingSets+0x25b

8d5c3c88 8429521f 00000000 86603a70 00000000 nt!MmWorkingSetManager+0xa4

8d5c3d50 8441a6d3 00000000 915496ec 00000000 nt!KeBalanceSetManager+0x1af

8d5c3d90 842cc0f9 84295070 00000000 00000000 nt!PspSystemThreadStartup+0x9e

00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19

STACK_COMMAND:  kb

FOLLOWUP_IP:

nt!MiBadShareCount+24

842f56dc cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiBadShareCount+24

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4c1c3fac

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0x4E_99_nt!MiBadShareCount+24

BUCKET_ID:  0x4E_99_nt!MiBadShareCount+24

Followup: MachineOwner

---------

这是另外一次。。

Loading Dump File [C:\Windows\Minidump\122110-49031-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

WARNING: Whitespace at end of path element

Symbol search path is: SRV*c:\temp*http://msdl.microsoft.com/download/symbols

Executable search path is:

Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 7600.16617.x86fre.win7_gdr.100618-1621

Machine Name:

Kernel base = 0x8420c000 PsLoadedModuleList = 0x84354810

Debug session time: Tue Dec 21 08:27:17.830 2010 (GMT+8)

System Uptime: 0 days 0:17:44.079

Loading Kernel Symbols

...............................................................

................................................................

............................................................

Loading User Symbols

Loading unloaded module list

......

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000008E, {c0000005, 9010d01f, be653a08, 0}

*** WARNING: Unable to verify timestamp for Hookport.sys

*** ERROR: Module load completed but symbols could not be loaded for Hookport.sys

*** WARNING: Unable to verify timestamp for halmacpi.dll

*** ERROR: Module load completed but symbols could not be loaded for halmacpi.dll

Probably caused by : memory_corruption

Followup: memory_corruption

---------

1: kd> !analyze -v

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)

This is a very common bugcheck.  Usually the exception address pinpoints

the driver/function that caused the problem.  Always note this address

as well as the link date of the driver/image that contains this address.

Some common problems are exception code 0x80000003.  This means a hard

coded breakpoint or assertion was hit, but this system was booted

/NODEBUG.  This is not supposed to happen as developers should never have

hardcoded breakpoints in retail code, but ...

If this happens, make sure a debugger gets connected, and the

system is booted /DEBUG.  This will let us see why this breakpoint is

happening.

Arguments:

Arg1: c0000005, The exception code that was not handled

Arg2: 9010d01f, The address that the exception occurred at

Arg3: be653a08, Trap Frame

Arg4: 00000000

Debugging Details:

------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx

FAULTING_IP:

Npfs!NpTranslateAlias+19

9010d01f 89485b          mov     dword ptr [eax+5Bh],ecx

TRAP_FRAME:  be653a08 -- (.trap 0xffffffffbe653a08)

ErrCode = 00000002

eax=2e75fecf ebx=87534998 ecx=0000001c edx=00000000 esi=9b3aa8b6 edi=be653ac8

eip=9010d01f esp=be653a7c ebp=be653aa8 iopl=0         nv up ei pl nz na pe nc

cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206

Npfs!NpTranslateAlias+0x19:

9010d01f 89485b          mov     dword ptr [eax+5Bh],ecx ds:0023:2e75ff2a=????????

Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x8E

PROCESS_NAME:  360sd.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 9010faf1 to 9010d01f

STACK_TEXT:

be653aa8 9010faf1 be653ac8 872cb198 8792eed8 Npfs!NpTranslateAlias+0x19

be653ad0 90110758 8792eed8 872cb198 8792eed8 Npfs!NpWaitForNamedPipe+0xa9

be653af0 901108bf 8792eed8 872cb198 87534998 Npfs!NpCommonFileSystemControl+0x6c

be653b08 842484bc 8792eed8 872cb198 872cb198 Npfs!NpFsdFileSystemControl+0x19

be653b20 84449f6e 87534998 872cb198 872cb208 nt!IofCallDriver+0x63

be653b40 84466d5f 8792eed8 87534998 00000001 nt!IopSynchronousServiceTail+0x1f8

be653bdc 8446fd98 8792eed8 872cb198 00000000 nt!IopXxxControlFile+0x6aa

be653c10 89c5fb69 000003a8 00000000 00000000 nt!NtFsControlFile+0x2a

WARNING: Stack unwind information not available. Following frames may be wrong.

be653d04 8424f44a 000003a8 00000000 00000000 Hookport+0x1b69

be653d04 776764f4 000003a8 00000000 00000000 nt!KiFastCallEntry+0x12a

03deff38 00000000 00000000 00000000 00000000 0x776764f4

STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !Npfs

9010d020-9010d05d  62 bytes - Npfs!NpTranslateAlias+1a

[ 4d e0 85 c9 75 07 33 c0:48 5b 39 65 62 ff 00 21 ]

9010d05f-9010d21b  445 bytes - Npfs!NpTranslateAlias+59 (+0x3f)

[ 83 f9 12 77 3e 6a 12 58:01 9f d9 b3 64 54 6d 16 ]

9010d21d-9010d21e  2 bytes - Npfs!NpCommonCleanup+d3 (+0x1be)

[ 73 06:20 47 ]

9010d220-9010d2c9  170 bytes - Npfs!NpCommonCleanup+d6 (+0x03)

[ 15 18 b0 10 90 f7 46 0c:ff f3 91 4c ca 8f 66 78 ]

9010d2cb-9010d397  205 bytes - Npfs!NpFsdCleanup+1 (+0xab)

[ ff 55 8b ec 56 57 ff 15:07 1e c5 dc ba 0a 28 a8 ]

9010d399-9010d472  218 bytes - Npfs!NpCommonClose+93 (+0xce)

[ e9 b4 00 00 00 8b 0d a8:00 03 93 9a e9 6e 28 03 ]

9010d474-9010d568  245 bytes - Npfs!NpFsdClose+6 (+0xdb)

[ ff 15 28 b0 10 90 ff 75:cb 79 69 4a f3 2a e6 80 ]

9010d56a-9010d607  158 bytes - Npfs!NpCreateClientEnd+74 (+0xf6)

[ 10 90 80 7d 18 00 74 10:fc 9a d0 d3 9e cb 75 bf ]

1505 errors : !Npfs (9010d020-9010d607)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

Followup: memory_corruption

---------

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值