| 查看: 1689 | 回复: 0 | |||
[求助]
电脑蓝屏,代码是这样的怎么破,谢谢
|
|
Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {41790, fffffa80016aac60, ffff, 0} Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3a2 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041790, The subtype of the bugcheck. Arg2: fffffa80016aac60 Arg3: 000000000000ffff Arg4: 0000000000000000 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_41790 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: 360se.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80004146bb0 to fffff800040d63c0 STACK_TEXT: fffff880`0b638398 fffff800`04146bb0 : 00000000`0000001a 00000000`00041790 fffffa80`016aac60 00000000`0000ffff : nt!KeBugCheckEx fffff880`0b6383a0 fffff800`04109149 : fffff900`00000000 00000000`15119fff fffff880`00000000 00000000`0000003c : nt! ?? ::FNODOBFM::`string'+0x33854 fffff880`0b638560 fffff800`043f2c41 : fffffa80`04463ad0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9 fffff880`0b638680 fffff800`043f3043 : 00000402`00000000 00000000`14e00000 fffffa80`00000001 fffff960`00220a00 : nt!MiUnmapViewOfSection+0x1b1 fffff880`0b638740 fffff800`040d5653 : 00000000`00000001 fffff900`c0789a10 fffffa80`073ac380 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f fffff880`0b638790 fffff800`040d1c10 : fffff960`000f87ba 00000000`00000001 fffff900`c00b7010 fffff900`c0844cc0 : nt!KiSystemServiceCopyEnd+0x13 fffff880`0b638928 fffff960`000f87ba : 00000000`00000001 fffff900`c00b7010 fffff900`c0844cc0 00000000`00000000 : nt!KiServiceLinkage fffff880`0b638930 fffff960`000f8b34 : ffffffff`00000000 fffff880`00000000 fffff900`c0844cc0 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x3a2 fffff880`0b638a80 fffff960`000b8ced : ffffffff`8e0516c9 fffff900`c0844cc0 00000000`000016c9 00000000`00000018 : win32k!bDeleteSurface+0x34 fffff880`0b638ab0 fffff800`040d5653 : fffffa80`04aef060 fffff900`c00b7010 fffff900`c00b7001 00000000`6a549c90 : win32k!NtGdiDeleteObjectApp+0xd5 fffff880`0b638ae0 00000000`738e2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`001ae4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x738e2e09 STACK_COMMAND: kb FOLLOWUP_IP: win32k!SURFACE::bDeleteSurface+3a2 fffff960`000f87ba e9d6010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`000f8995) SYMBOL_STACK_INDEX: 7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 568ea602 SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3a2 FAILURE_BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3a2 BUCKET_ID: X64_0x1a_41790_win32k!SURFACE::bDeleteSurface+3a2 Followup: MachineOwner --------- |
» 猜你喜欢
论文投稿,期刊推荐
已经有6人回复
寻求一种能扛住强氧化性腐蚀性的容器密封件
已经有3人回复
请问哪里可以有青B申请的本子可以借鉴一下。
已经有4人回复
真诚求助:手里的省社科项目结项要求主持人一篇中文核心,有什么渠道能发核心吗
已经有6人回复
孩子确诊有中度注意力缺陷
已经有14人回复
请问下大家为什么这个铃木偶联几乎不反应呢
已经有5人回复
请问有评职称,把科研教学业绩算分排序的高校吗
已经有5人回复
2025冷门绝学什么时候出结果
已经有3人回复
天津工业大学郑柳春团队欢迎化学化工、高分子化学或有机合成方向的博士生和硕士生加入
已经有4人回复
康复大学泰山学者周祺惠团队招收博士研究生
已经有6人回复













回复此楼