Advanced Debugging
About AdvDbg Consult Train Services Products Tools Community Contact  
欢迎光临 高端调试 登录 | 注册 | FAQ
 
  ACPI调试
Linux内核调试
Windows内核调试
 
  调试战役
调试原理
新工具观察
 
  Linux
Windows Vista
Windows
 
  Linux驱动
WDF
WDM
 
  PCI Express
PCI/PCI-X
USB
无线通信协议
 
  64位CPU
ARM
IA-32
  CPU Info Center
 
  ACPI标准
系统认证
Desktop
服务器
 
  Embedded Linux
嵌入式开发工具
VxWorks
WinCE
嵌入式Windows
 
  格蠹调试套件(GDK)
  格蠹学院
  小朱书店
  老雷的微博
  《软件调试》
  《格蠹汇编》
  《软件调试(第二版)》
沪ICP备11027180号-1

Windows内核调试

帖子发起人: jerry_hb   发起时间: 2015-04-20 12:41 下午   回复: 2

Print Search
帖子排序:    
   2015-04-20, 12:41 下午
jerry_hb 离线,最后访问时间: 2015/4/20 3:59:57 jerry_hb

发帖数前200位
注册: 2015-04-20
发 贴: 5
3D Mark11 stress test BSOD 0x1a MEMORY_MANAGEMENT请大神帮忙看下
Reply Quote
Hi 各位大神,
    我们在跑3D Mark11 stress test时有碰到bsod 0x1a MEMORY_MANAGEMENT issue,failrate 2/120 by units.
    Minidump如附件,请帮忙看下这个与什么有关。
    Thank you!
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41792, fffff680122068b8, ffff0000, 0}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+1644a )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: fffff680122068b8
Arg3: 00000000ffff0000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41792

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  conhost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre

LAST_CONTROL_TRANSFER:  from fffff8036dfec2fa to fffff8036dfc59a0

STACK_TEXT:  
ffffd001`af63b848 fffff803`6dfec2fa : 00000000`0000001a 00000000`00041792 fffff680`122068b8 00000000`ffff0000 : nt!KeBugCheckEx
ffffd001`af63b850 fffff803`6df377b8 : ffffd001`00000000 00000000`00000026 00000000`00000000 00000000`00000026 : nt! ?? ::FNODOBFM::`string'+0x1644a
ffffd001`af63bae0 fffff803`6dfd11b3 : 00000000`00000000 00000024`4087dea0 00000000`00000001 ffffe000`58c99540 : nt!NtFreeVirtualMemory+0xa48
ffffd001`af63bc40 00007ff9`119f0e2a : 00007ff9`11980bca 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000024`4087dbd8 00007ff9`11980bca : 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 00000000`00000000 : ntdll!NtFreeVirtualMemory+0xa
00000024`4087dbe0 00007ff9`1198019a : 00000024`40c90000 00000024`4087e2f8 00000000`00001002 00000000`00000000 : ntdll!RtlpSecMemFreeVirtualMemory+0x26
00000024`4087dc10 00007ff9`0eb8b2f3 : 00007ff9`0ebf26b0 00007ff9`119bf9fe 00007ff9`0ec73b90 00000024`4087e2f8 : ntdll!RtlCreateHeap+0x93a
00000024`4087de00 00007ff9`10c78518 : 00000024`4087dea0 00007ff9`10c72790 00000024`4087e2f8 00007ff9`10c72790 : KERNELBASE!HeapCreate+0x47
00000024`4087de40 00007ff9`10c7845a : 00000024`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : msvcrt!heap_init+0x18
00000024`4087de70 00007ff9`10c7755e : 00000000`00000000 00000000`00000000 00000024`4087e270 00000000`00000001 : msvcrt!core_crt_dll_init+0xcc
00000024`4087dfe0 00007ff9`1197dcf4 : 00000000`00000001 00007ff9`10c72790 00000000`01000000 00000024`4087e090 : msvcrt!__CRTDLL_INIT+0x13
00000024`4087e010 00007ff9`1197d46e : 00000024`40a03650 00007ff9`10c70000 005c0032`00000001 0033004d`004d0049 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087e070 00007ff9`1197d264 : 00000024`40a03770 00000000`00000000 00000024`40a039d0 00007ff9`10c72790 : ntdll!LdrpInitializeNode+0x176
00000024`4087e180 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a039d0 00000024`4087e200 00000000`00000000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087e1c0 00007ff9`119812cf : 00000024`40a03801 00000024`40a038b0 00000024`4087e260 00007ff9`11998a07 : ntdll!LdrpInitializeGraph+0x74
00000024`4087e200 00007ff9`11996291 : 00000000`00000000 00000000`00000000 00000024`4087e360 00000024`4087e360 : ntdll!LdrpPrepareModuleForExecution+0x13f
00000024`4087e260 00007ff9`0eb84250 : 00000000`003c003a 00000024`4087e4c0 00000000`00000000 00007ff9`0eb829ef : ntdll!LdrGetProcedureAddressForCaller+0x2a1
00000024`4087e450 00007ff9`10afe804 : 00007ff9`11200000 00007ff9`119c8313 00000024`4087e7f0 00000000`00000001 : KERNELBASE!GetProcAddressForCaller+0x70
00000024`4087e4a0 00007ff9`10afdc92 : 00007ff9`10b8e4a0 00000024`4087e7f0 00007ff9`c0000001 00007ff9`10b216e8 : USER32!InitializeImmEntryTable+0x6c
00000024`4087e6f0 00007ff9`1197dcf4 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : USER32!_UserClientDllInitialize+0x2ba
00000024`4087ee70 00007ff9`1197d46e : 00000024`40a033f0 00007ff9`10af0000 00000000`00000001 00000000`00000000 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087eed0 00007ff9`1197d264 : 00000024`40a02520 00007ff9`119cbf00 00000024`40a01f60 00007ff9`10afdec0 : ntdll!LdrpInitializeNode+0x176
00000024`4087efe0 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a01f60 00000024`4087f060 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087f020 00007ff9`11a2426c : 00000000`00000000 00000000`00000010 00000024`4087f0b4 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x74
00000024`4087f060 00007ff9`11a034e8 : 00007ff9`11960000 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!LdrpInitializeProcess+0x19c4
00000024`4087f380 00007ff9`1197a65e : 00000024`4087f440 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!_LdrpInitialize+0x88e38
00000024`4087f3f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+1644a
fffff803`6dfec2fa cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+1644a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  54503718

BUCKET_ID_FUNC_OFFSET:  1644a

FAILURE_BUCKET_ID:  0x1a_41792_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0x1a_41792_nt!_??_::FNODOBFM::_string_

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41792_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {e00e25fc-1d2f-6e67-bb24-ba96083192fa}

Followup: MachineOwner
---------

1: kd> !thread 
THREAD ffffe00058ea5880  Cid 0c88.0c84  Teb: 00007ff6f562e000 Win32Thread: 0000000000000000 RUNNING on processor 1
Not impersonating
DeviceMap                 ffffc0004c4501c0
Owning Process            ffffe00058ea0900       Image:         conhost.exe
Attached Process          N/A            Image:         N/A
Wait Start TickCount      2685           Ticks: 0
Context Switch Count      7              IdealProcessor: 0             
UserTime                  00:00:00.015
KernelTime                00:00:00.000
Win32 Start Address conhost!WinMainCRTStartup (0x00007ff6f6039040)
Stack Init ffffd001af63bdd0 Current ffffd001af63b5e0
Base ffffd001af63c000 Limit ffffd001af636000 Call 0
Priority 14 BasePriority 8 UnusualBoost 5 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP          RetAddr           : Args to Child                                                           : Call Site
ffffd001`af63b848 fffff803`6dfec2fa : 00000000`0000001a 00000000`00041792 fffff680`122068b8 00000000`ffff0000 : nt!KeBugCheckEx
ffffd001`af63b850 fffff803`6df377b8 : ffffd001`00000000 00000000`00000026 00000000`00000000 00000000`00000026 : nt! ?? ::FNODOBFM::`string'+0x1644a
ffffd001`af63bae0 fffff803`6dfd11b3 : 00000000`00000000 00000024`4087dea0 00000000`00000001 ffffe000`58c99540 : nt!NtFreeVirtualMemory+0xa48
ffffd001`af63bc40 00007ff9`119f0e2a : 00007ff9`11980bca 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd001`af63bc40)
00000024`4087dbd8 00007ff9`11980bca : 00000000`003c003a 00000024`4087e4c0 37f682b0`00000000 00000000`00000000 : ntdll!NtFreeVirtualMemory+0xa
00000024`4087dbe0 00007ff9`1198019a : 00000024`40c90000 00000024`4087e2f8 00000000`00001002 00000000`00000000 : ntdll!RtlpSecMemFreeVirtualMemory+0x26
00000024`4087dc10 00007ff9`0eb8b2f3 : 00007ff9`0ebf26b0 00007ff9`119bf9fe 00007ff9`0ec73b90 00000024`4087e2f8 : ntdll!RtlCreateHeap+0x93a
00000024`4087de00 00007ff9`10c78518 : 00000024`4087dea0 00007ff9`10c72790 00000024`4087e2f8 00007ff9`10c72790 : KERNELBASE!HeapCreate+0x47
00000024`4087de40 00007ff9`10c7845a : 00000024`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : msvcrt!heap_init+0x18
00000024`4087de70 00007ff9`10c7755e : 00000000`00000000 00000000`00000000 00000024`4087e270 00000000`00000001 : msvcrt!core_crt_dll_init+0xcc
00000024`4087dfe0 00007ff9`1197dcf4 : 00000000`00000001 00007ff9`10c72790 00000000`01000000 00000024`4087e090 : msvcrt!__CRTDLL_INIT+0x13
00000024`4087e010 00007ff9`1197d46e : 00000024`40a03650 00007ff9`10c70000 005c0032`00000001 0033004d`004d0049 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087e070 00007ff9`1197d264 : 00000024`40a03770 00000000`00000000 00000024`40a039d0 00007ff9`10c72790 : ntdll!LdrpInitializeNode+0x176
00000024`4087e180 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a039d0 00000024`4087e200 00000000`00000000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087e1c0 00007ff9`119812cf : 00000024`40a03801 00000024`40a038b0 00000024`4087e260 00007ff9`11998a07 : ntdll!LdrpInitializeGraph+0x74
00000024`4087e200 00007ff9`11996291 : 00000000`00000000 00000000`00000000 00000024`4087e360 00000024`4087e360 : ntdll!LdrpPrepareModuleForExecution+0x13f
00000024`4087e260 00007ff9`0eb84250 : 00000000`003c003a 00000024`4087e4c0 00000000`00000000 00007ff9`0eb829ef : ntdll!LdrGetProcedureAddressForCaller+0x2a1
00000024`4087e450 00007ff9`10afe804 : 00007ff9`11200000 00007ff9`119c8313 00000024`4087e7f0 00000000`00000001 : KERNELBASE!GetProcAddressForCaller+0x70
00000024`4087e4a0 00007ff9`10afdc92 : 00007ff9`10b8e4a0 00000024`4087e7f0 00007ff9`c0000001 00007ff9`10b216e8 : USER32!InitializeImmEntryTable+0x6c
00000024`4087e6f0 00007ff9`1197dcf4 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000000 : USER32!_UserClientDllInitialize+0x2ba
00000024`4087ee70 00007ff9`1197d46e : 00000024`40a033f0 00007ff9`10af0000 00000000`00000001 00000000`00000000 : ntdll!LdrpCallInitRoutine+0x4c
00000024`4087eed0 00007ff9`1197d264 : 00000024`40a02520 00007ff9`119cbf00 00000024`40a01f60 00007ff9`10afdec0 : ntdll!LdrpInitializeNode+0x176
00000024`4087efe0 00007ff9`1197d2a0 : 00000000`00000000 00000024`40a01f60 00000024`4087f060 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x38
00000024`4087f020 00007ff9`11a2426c : 00000000`00000000 00000000`00000010 00000024`4087f0b4 00007ff6`f5626000 : ntdll!LdrpInitializeGraph+0x74
00000024`4087f060 00007ff9`11a034e8 : 00007ff9`11960000 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!LdrpInitializeProcess+0x19c4
00000024`4087f380 00007ff9`1197a65e : 00000024`4087f440 00000000`00000000 00007ff6`f5626000 00000000`00000000 : ntdll!_LdrpInitialize+0x88e38
00000024`4087f3f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!LdrInitializeThunk+0xe

1: kd> .trap ffffd001`af63bc40
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=00007ff9119f0e2a rsp=000000244087dbd8 rbp=0000000000008000
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
ntdll!NtFreeVirtualMemory+0xa:
0033:00007ff9`119f0e2a c3              ret
1: kd> !locks
**** DUMP OF ALL RESOURCE OBJECTS ****
KD: Scanning for held locks.

Resource @ nt!CmpRegistryLock (0xfffff8036e1d0780)    Shared 3 owning threads
    Contention Count = 5
     Threads: ffffe00058ea7880-01<*> ffffe000582fc880-01<*> ffffe00058eb1080-01<*> 
KD: Scanning for held locks.....

Resource @ 0xffffe00050efda20    Exclusively owned
    Contention Count = 1
     Threads: ffffe000584eb040-01<*> 
KD: Scanning for held locks.

Resource @ 0xffffe00050f9b8b0    Exclusively owned
    Contention Count = 2
     Threads: ffffe000584eb040-01<*> 
KD: Scanning for held locks......

Resource @ 0xffffe000539faa08    Shared 2 owning threads
    Contention Count = 2
     Threads: ffffe00058c6e080-01<*> ffffe00050921880-01<*> 
KD: Scanning for held locks...............

Resource @ 0xffffe0004fd78d60    Exclusively owned
    Contention Count = 1
     Threads: ffffe000511372c0-01<*> 
KD: Scanning for held locks..................................................................................................................................................................................

Resource @ 0xffffe00058d2bd00    Shared 1 owning threads
     Threads: ffffe0005835d600-01<*> 
KD: Scanning for held locks.................................................................................................................................................

Resource @ 0xffffe00058eb2c40    Exclusively owned
     Threads: ffffe000584eb040-01<*> 

Resource @ 0xffffe00058eb2cf0    Exclusively owned
     Threads: ffffe000584eb040-01<*> 

Resource @ 0xffffe000585c7850    Exclusively owned
    Contention Count = 1
    NumberOfSharedWaiters = 1
     Threads: ffffe00058c6e080-01<*> ffffe00050921880-01    
KD: Scanning for held locks.
11146 total locks, 9 locks currently held
1: kd> !thread ffffe000584eb040
THREAD ffffe000584eb040  Cid 0848.0970  Teb: 00007ff6573be000 Win32Thread: fffff9014072bb60 READY on processor 80000000
IRP List:
    ffffe000576175d0: (0006,03e8) Flags: 00060a00  Mdl: 00000000
Not impersonating
DeviceMap                 ffffc0004bfb66b0
Owning Process            ffffe000584d8900       Image:         sppsvc.exe
Attached Process          N/A            Image:         N/A
Wait Start TickCount      2684           Ticks: 1 (0:00:00:00.015)
Context Switch Count      479            IdealProcessor: 1             
UserTime                  00:00:00.312
KernelTime                00:00:00.015
Win32 Start Address ntdll!TppWorkerThread (0x00007ff9119933a0)
Stack Init ffffd001c4868dd0 Current ffffd001c4868110
Base ffffd001c4869000 Limit ffffd001c4863000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5

Child-SP          RetAddr           : Args to Child                                                           : Call Site
ffffd001`c4868150 fffff803`6dedec2b : 00000012`99adcc84 fffff803`00000000 00000000`00000009 00000000`ffffffff : nt!KiSwapContext+0x76
ffffd001`c4868290 fffff803`6dede52f : ffffe000`584eb040 ffffd001`c4868328 00000000`00000001 00000000`00000001 : nt!KiProcessDeferredReadyList+0x13b
ffffd001`c48682d0 fffff800`0ff6449d : ffffc000`4b549600 ffffd001`00000008 00000000`00000010 ffffc000`4b549600 : nt!KeSetPriorityThread+0x2bf
ffffd001`c4868370 fffff800`0ff662da : ffffc000`4b5e06a0 00000000`bb0155c3 ffffe000`50ef9180 00000000`00000000 : Ntfs!LfsFlushToLsnPriv+0x161
ffffd001`c4868410 fffff800`0ff67bc2 : ffffc000`4b5e06a0 00000000`bb0155c3 00000000`bb0155c3 ffffe000`50ef9180 : Ntfs!LfsFlushToLsnWithoutDiskCacheFlush+0xa2
ffffd001`c4868460 fffff800`0ff836a2 : 00000000`00000001 ffffe000`50ef9180 ffffe000`57bd3ca8 ffffc000`4eb41c00 : Ntfs!NtfsCommitCurrentTransaction+0x212
ffffd001`c48684f0 fffff800`0ff86842 : 00000000`00000702 ffffd001`c4868870 ffffc000`4eb41c00 ffffc000`4eb41c00 : Ntfs!NtfsCheckpointCurrentTransaction+0x3e
ffffd001`c4868520 fffff800`0feb1280 : ffffe000`57bd3ca8 ffffc000`4eb41b00 ffffc000`4eb41c30 00000000`00000701 : Ntfs!NtfsPostUsnChangeWithOverrideOption+0x31a
ffffd001`c4868600 fffff800`0feb4b87 : ffffe000`57bd3ca8 ffffe000`58eb2d01 00000000`00000000 ffffe000`57bd3ca8 : Ntfs!NtfsCommonWrite+0x8a0
ffffd001`c4868840 fffff800`0fd84b1e : ffffe000`58e83690 ffffe000`576175d0 00000000`00000001 ffffe000`57617970 : Ntfs!NtfsFsdWrite+0x203
ffffd001`c4868900 fffff800`0fd830c2 : ffffd001`c48689c0 ffffe000`50ecdba0 ffffe000`58eb2dd0 ffffe000`576175d0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2ce
ffffd001`c48689a0 fffff803`6e25b788 : 00000000`00000001 ffffd001`c4868a81 ffffe000`58eb2dd0 00000000`00000000 : fltmgr!FltpDispatch+0xb2
ffffd001`c4868a00 fffff803`6e2822d6 : ffffe000`58eb2d04 ffffe000`58eb2dd0 ffffd001`c4868b18 ffffe000`576175d0 : nt!IopSynchronousServiceTail+0x170
ffffd001`c4868ad0 fffff803`6dfd11b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x682
ffffd001`c4868bd0 00007ff9`119f0cca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ ffffd001`c4868c40)
0000007b`d638df08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!NtWriteFile+0xa

1: kd> !thread ffffe000511372c0
THREAD ffffe000511372c0  Cid 0004.0114  Teb: 0000000000000000 Win32Thread: 0000000000000000 WAIT: (Executive) KernelMode Non-Alertable
    ffffe00051167cd0  SynchronizationEvent
Not impersonating
DeviceMap                 ffffc0004b20c280
Owning Process            ffffe0004fd804c0       Image:         System
Attached Process          N/A            Image:         N/A
Wait Start TickCount      2093           Ticks: 592 (0:00:00:09.250)
Context Switch Count      35             IdealProcessor: 1             
UserTime                  00:00:00.000
KernelTime                00:00:00.015
Win32 Start Address dxgkrnl!DpiPowerArbiterThread (0xfffff80010b4cf40)
Stack Init ffffd001ae570dd0 Current ffffd001ae5709b0
Base ffffd001ae571000 Limit ffffd001ae56b000 Call 0
Priority 8 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP          RetAddr           : Args to Child                                                           : Call Site
ffffd001`ae5709f0 fffff803`6dea6d7e : ffffd001`acfc0180 ffffe000`511372c0 00000000`fffffffe 00000000`fffffffe : nt!KiSwapContext+0x76
ffffd001`ae570b30 fffff803`6dea67f9 : ffffd894`4add3634 ffffe000`51167100 ffffd001`ae5bb900 ffffe000`51167100 : nt!KiSwapThread+0x14e
ffffd001`ae570bd0 fffff803`6dece8d0 : ffffe000`50944440 00000000`00000000 ffffe000`511372c0 ffffe000`5894a1b0 : nt!KiCommitThreadWait+0x129
ffffd001`ae570c50 fffff800`10b4cfa7 : ffffe000`51167cd0 ffffe000`00000000 ffffe000`50e1a000 fffff800`00000000 : nt!KeWaitForSingleObject+0x2c0
ffffd001`ae570ce0 fffff803`6df76c70 : ffffe000`51167c48 ffffe000`511372c0 00000000`00000080 ffffe000`511372c0 : dxgkrnl!DpiPowerArbiterThread+0x67
ffffd001`ae570d40 fffff803`6dfcbfc6 : fffff803`6e178180 ffffe000`511372c0 fffff803`6e1d1a00 ffffd001`ae570e89 : nt!PspSystemThreadStartup+0x58
ffffd001`ae570da0 00000000`00000000 : ffffd001`ae571000 ffffd001`ae56b000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


IP 地址: 已记录   报告
   2015-04-20, 12:52 下午
jerry_hb 离线,最后访问时间: 2015/4/20 3:59:57 jerry_hb

发帖数前200位
注册: 2015-04-20
发 贴: 5
Re: 3D Mark11 stress test BSOD 0x1a MEMORY_MANAGEMENT请大神帮忙看下
Reply Quote
Minidump上传不了,我直接放在网易网盘上了,请大神帮忙看下
http://u.163.com/4BOmdNIX  提取码: 5MSLOiz0

IP 地址: 已记录   报告
   2015-04-20, 21:43 下午
jerry_hb 离线,最后访问时间: 2015/4/20 3:59:57 jerry_hb

发帖数前200位
注册: 2015-04-20
发 贴: 5
Re: 3D Mark11 stress test BSOD 0x1a MEMORY_MANAGEMENT请大神帮忙看下
Reply Quote
求助,张老师
IP 地址: 已记录   报告
高端调试 » 软件调试 » Windows内核调试 » 3D Mark11 stress test BSOD 0x1a MEMORY_MANAGEMENT请大神帮忙看下

 
Legal Notice Privacy Statement Corporate Governance Corporate Governance
(C)2004-2020 ADVDBG.ORG All Rights Reserved.