免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
楼主: 东方蜘蛛
打印 上一主题 下一主题

[互操作系统] XP无法正常关机和重启 [复制链接]

论坛徽章:
2
双鱼座
日期:2014-02-23 12:10:03操作系统版块每日发帖之星
日期:2015-12-17 06:20:00
11 [报告]
发表于 2010-04-09 15:18 |只看该作者
第三次的--Mini040910-03.dmp

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8053ba1e, The address that the exception occurred at
Arg3: a7a90bf0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - "0x%08lx"

FAULTING_IP:
nt!memmove+16e
8053ba1e 8807            mov     byte ptr [edi],al

TRAP_FRAME:  a7a90bf0 -- (.trap 0xffffffffa7a90bf0)
ErrCode = 00000002
eax=a7a90c5c ebx=00000000 ecx=00000000 edx=00000002 esi=a7a90cb4 edi=00000000
eip=8053ba1e esp=a7a90c64 ebp=a7a90c6c iopl=0         nv up ei ng nz ac po cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010293
nt!memmove+0x16e:
8053ba1e 8807            mov     byte ptr [edi],al          ds:0023:00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  3

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  tvt_reg_monitor

LAST_CONTROL_TRANSFER:  from 8052cb27 to 8053ba1e

STACK_TEXT:  
a7a90c6c 8052cb27 00000000 a7a90cb4 00000002 nt!memmove+0x16e
a7a90c8c ba10bac0 89ebac68 00000002 a7131cb0 nt!RtlAppendUnicodeStringToString+0x45
WARNING: Stack unwind information not available. Following frames may be wrong.
a7a90ce0 ba10bbe4 00000040 86328de0 a7a90d1c PROCMON20+0x3ac0
a7a90cfc ba10c73a 00000001 000000f8 00000000 PROCMON20+0x3be4
a7a90d2c ba10c7c3 00000000 00020019 000000f8 PROCMON20+0x473a
a7a90d50 8054263c 007362bc 00020019 0182fc98 PROCMON20+0x47c3
a7a90d50 7c92e514 007362bc 00020019 0182fc98 nt!KiFastCallEntry+0xfc
0182fcd8 00000000 00000000 00000000 00000000 0x7c92e514


STACK_COMMAND:  kb

FOLLOWUP_IP:
PROCMON20+3ac0
ba10bac0 ??              ???

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  PROCMON20+3ac0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: PROCMON20

IMAGE_NAME:  PROCMON20.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4aeb76fe

FAILURE_BUCKET_ID:  0x8E_PROCMON20+3ac0

BUCKET_ID:  0x8E_PROCMON20+3ac0

Followup: MachineOwner
---------

论坛徽章:
2
双鱼座
日期:2014-02-23 12:10:03操作系统版块每日发帖之星
日期:2015-12-17 06:20:00
12 [报告]
发表于 2010-04-09 15:22 |只看该作者
第二次的---Mini040910-02.dmp

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8053ba1e, The address that the exception occurred at
Arg3: a7bb4bf0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - "0x%08lx"

FAULTING_IP:
nt!memmove+16e
8053ba1e 8807            mov     byte ptr [edi],al

TRAP_FRAME:  a7bb4bf0 -- (.trap 0xffffffffa7bb4bf0)
ErrCode = 00000002
eax=a7bb4c5c ebx=00000000 ecx=00000000 edx=00000002 esi=a7bb4cb4 edi=00000000
eip=8053ba1e esp=a7bb4c64 ebp=a7bb4c6c iopl=0         nv up ei ng nz ac po cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010293
nt!memmove+0x16e:
8053ba1e 8807            mov     byte ptr [edi],al          ds:0023:00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  tvt_reg_monitor

LAST_CONTROL_TRANSFER:  from 8052cb27 to 8053ba1e

STACK_TEXT:  
a7bb4c6c 8052cb27 00000000 a7bb4cb4 00000002 nt!memmove+0x16e
a7bb4c8c ba10bac0 88eba228 00000002 a7015cf7 nt!RtlAppendUnicodeStringToString+0x45
WARNING: Stack unwind information not available. Following frames may be wrong.
a7bb4ce0 ba10bbe4 0000002a 88e13780 a7bb4d1c PROCMON20+0x3ac0
a7bb4cfc ba10c73a 00000001 000000f8 00000000 PROCMON20+0x3be4
a7bb4d2c ba10c7c3 00000000 00020019 000000f8 PROCMON20+0x473a
a7bb4d50 8054263c 00736cb4 00020019 0192fc98 PROCMON20+0x47c3
a7bb4d50 7c92e514 00736cb4 00020019 0192fc98 nt!KiFastCallEntry+0xfc
0192fcd8 00000000 00000000 00000000 00000000 0x7c92e514


STACK_COMMAND:  kb

FOLLOWUP_IP:
PROCMON20+3ac0
ba10bac0 ??              ???

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  PROCMON20+3ac0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: PROCMON20

IMAGE_NAME:  PROCMON20.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4aeb76fe

FAILURE_BUCKET_ID:  0x8E_PROCMON20+3ac0

BUCKET_ID:  0x8E_PROCMON20+3ac0

Followup: MachineOwner
---------

论坛徽章:
2
双鱼座
日期:2014-02-23 12:10:03操作系统版块每日发帖之星
日期:2015-12-17 06:20:00
13 [报告]
发表于 2010-04-09 15:25 |只看该作者
第一次的---Mini040910-01.dmp

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 8053ba1e, The address that the exception occurred at
Arg3: a7858bf0, Trap Frame
Arg4: 00000000

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - "0x%08lx"

FAULTING_IP:
nt!memmove+16e
8053ba1e 8807            mov     byte ptr [edi],al

TRAP_FRAME:  a7858bf0 -- (.trap 0xffffffffa7858bf0)
ErrCode = 00000002
eax=a7858c5c ebx=00000000 ecx=00000000 edx=00000002 esi=a7858cb4 edi=00000000
eip=8053ba1e esp=a7858c64 ebp=a7858c6c iopl=0         nv up ei ng nz ac po cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010293
nt!memmove+0x16e:
8053ba1e 8807            mov     byte ptr [edi],al          ds:0023:00000000=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0x8E

PROCESS_NAME:  tvt_reg_monitor

LAST_CONTROL_TRANSFER:  from 8052cb27 to 8053ba1e

STACK_TEXT:  
a7858c6c 8052cb27 00000000 a7858cb4 00000002 nt!memmove+0x16e
a7858c8c ba10bac0 8a4e9cd8 00000002 a73f9cbf nt!RtlAppendUnicodeStringToString+0x45
WARNING: Stack unwind information not available. Following frames may be wrong.
a7858ce0 ba10bbe4 0000002a 892e30d8 a7858d1c PROCMON20+0x3ac0
a7858cfc ba10c73a 00000001 000000f8 00000000 PROCMON20+0x3be4
a7858d2c ba10c7c3 00000000 00020019 000000f8 PROCMON20+0x473a
a7858d50 8054263c 00736934 00020019 01d2fc98 PROCMON20+0x47c3
a7858d50 7c92e514 00736934 00020019 01d2fc98 nt!KiFastCallEntry+0xfc
01d2fcd8 00000000 00000000 00000000 00000000 0x7c92e514


STACK_COMMAND:  kb

FOLLOWUP_IP:
PROCMON20+3ac0
ba10bac0 ??              ???

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  PROCMON20+3ac0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: PROCMON20

IMAGE_NAME:  PROCMON20.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4aeb76fe

FAILURE_BUCKET_ID:  0x8E_PROCMON20+3ac0

BUCKET_ID:  0x8E_PROCMON20+3ac0

Followup: MachineOwner
---------

论坛徽章:
2
双鱼座
日期:2014-02-23 12:10:03操作系统版块每日发帖之星
日期:2015-12-17 06:20:00
14 [报告]
发表于 2010-04-09 15:26 |只看该作者
我好像能看出点端倪了,是不是这个导致的:PROCESS_NAME:  tvt_reg_monitor

名称:tvt_reg_monitor_svc.exe
可信认证:安全
PID:820
路径:c:\Program Files\Common Files\Lenovo\tvt_reg_monitor_svc.exe
描述:IBM ThinkPad 笔记本电脑注册表监控服务(Registry Monitor Service)相关进程。

难道这个有问题?

论坛徽章:
2
双鱼座
日期:2014-02-23 12:10:03操作系统版块每日发帖之星
日期:2015-12-17 06:20:00
15 [报告]
发表于 2010-04-09 15:29 |只看该作者
我看了启动项里面了,好像没有这个进程的启动项哦?

论坛徽章:
0
16 [报告]
发表于 2010-04-09 15:33 |只看该作者
procmon导致蓝屏? 要么你还是直接跑procmon收集点日志看吧,别整boot mode了,就滤32bit的架构。。。。。。。。。。

论坛徽章:
2
双鱼座
日期:2014-02-23 12:10:03操作系统版块每日发帖之星
日期:2015-12-17 06:20:00
17 [报告]
发表于 2010-04-09 15:49 |只看该作者
在服务里面把tvt_reg_monitor_svc.exe停掉了,但是重启还是老样子。。。。怎么用procmon收集日志啊。。。。

论坛徽章:
0
18 [报告]
发表于 2010-04-09 15:52 |只看该作者
打开procmon,出现过滤界面,我建议你过滤下金山的进程,然后apply再然后点那个save就ok了。。。。。

论坛徽章:
0
19 [报告]
发表于 2010-04-09 16:11 |只看该作者
这个文档比较短,但基本够用了........

procmon.chm

59.23 KB, 下载次数: 44

论坛徽章:
2
双鱼座
日期:2014-02-23 12:10:03操作系统版块每日发帖之星
日期:2015-12-17 06:20:00
20 [报告]
发表于 2010-04-09 16:22 |只看该作者
怎么看logfile啊?
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP