各位大神,想吃苹果的鼠小弟教案想问一下f5真的那么耗电吗

高育良书记用的哑铃有多重_百度知道
高育良书记用的哑铃有多重
我有更好的答案
书记用的哑铃
为您推荐:
其他类似问题
换一换
回答问题,赢新手礼包
个人、企业类
违法有害信息,请在下方选择后提交
色情、暴力
我们会通过消息、邮箱等方式尽快将举报结果通知您。想知道自己是什么眼型,女生_百度知道
想知道自己是什么眼型,女生
想知道自己是什么眼型,女生肤色不同,都是我!!!三眼皮都要出来了。。。
我有更好的答案
采纳率:31%
来自团队:
你是贴的双眼皮吧,臭美型
那我可以臭美的告诉你,爸妈给的基因好,连买双眼皮贴的想法都没有
你左眼眼皮线条很怪,你自己看照片
基因好的,回个话吧
那是因为我那只眼睛是三眼皮,你看第一张照片就是我的左眼
第一张是右眼
坐标重庆,不回了
哈哈,你右眼一张是三眼皮一张是双眼皮,你好牛b,好棒棒
我问的是我的眼型不是我的颜值,眼睛没p
嘿嘿,整个不是都P啦
emmm你开心就好
你眼皮是割了吗
这么晚开心啥啊
你还不困?
你会让医生割三眼皮?
你是眼睛大才好看
其他17条回答
为您推荐:
其他类似问题
您可能关注的内容
换一换
回答问题,赢新手礼包
个人、企业类
违法有害信息,请在下方选择后提交
色情、暴力
我们会通过消息、邮箱等方式尽快将举报结果通知您。Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析 - 高端调试 :: 论坛
通过windbg 自动分析结果,显示是windows taskmgr.exe 强制结束了smss.exe,导致了系统蓝屏,但小弟一直不明白,是什么原因导致的?dump文件内容如下:******************************************************************************** & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & ** & & & & & & & & & & & &Bugcheck Analysis & & & & & & & & & & & & & & & & & &** & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck F4, {3, fffffa, fffffae0, fffff}PEB is paged out (Peb.Ldr = 000007ff`fffdb018). &Type ".hh dbgerr001" for detailsPEB is paged out (Peb.Ldr = 000007ff`fffdb018). &Type ".hh dbgerr001" for detailsProbably caused by : smss.exeFollowup: MachineOwner---------1: kd& !analyze -v******************************************************************************** & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & ** & & & & & & & & & & & &Bugcheck Analysis & & & & & & & & & & & & & & & & & &** & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & ********************************************************************************CRITICAL_OBJECT_TERMINATION (f4)A process or thread crucial to system operation has unexpectedly exited or beenterminated.Several processes and threads are necessary for the operation of the when they are terminated (for any reason), the system can nolonger function.Arguments:Arg1: 0003, ProcessArg2: fffffa, Terminating objectArg3: fffffae0, Process image file nameArg4: fffff, Explanatory message (ascii)Debugging Details:------------------PEB is paged out (Peb.Ldr = 000007ff`fffdb018). &Type ".hh dbgerr001" for detailsPEB is paged out (Peb.Ldr = 000007ff`fffdb018). &Type ".hh dbgerr001" for detailsPROCESS_OBJECT: fffffaDEBUG_FLR_IMAGE_TIMESTAMP: &0MODULE_NAME: smssFAULTING_MODULE: 0000&PROCESS_NAME: &taskmgr.exeBUGCHECK_STR: &0xF4_taskmgr.exeDEFAULT_BUCKET_ID: &VISTA_DRIVER_FAULTCURRENT_IRQL: &0LAST_CONTROL_TRANSFER: &from fffff to fffffSTACK_TEXT: &fffff880`05012ac8 fffff800`01a0b982 : 000f4 00003 fffffa80` fffffa80` : nt!KeBugCheckExfffff880`05012ad0 fffff800`019b90ab : ffffffff`ffffffff fffffa80` fffffa80` fffff800`0193bda0 : nt!PspCatchCriticalBreak+0x92fffff880`05012b10 fffff800` : ffffffff`ffffffff 00001 fffffa80`08 : nt! ?? ::NNGAKEGL::`string'+0x17ad6fffff880`05012b60 fffff800` : fffffa80` fffff880` fffffa80`00 : nt!NtTerminateProcess+0xf4fffff880`0da : 00`00 00000 : nt!KiSystemServiceCopyEnd+0x13dece8 00000 : 00`00 00000 : 0x76e115daSTACK_COMMAND: &kbFOLLOWUP_NAME: &MachineOwnerIMAGE_NAME: &smss.exeFAILURE_BUCKET_ID: &X64_0xF4_taskmgr.exe_VRF_IMAGE_smss.exeBUCKET_ID: &X64_0xF4_taskmgr.exe_VRF_IMAGE_smss.exeFollowup: MachineOwner---------上网查找得知,可以有通过!locks查看当前死锁程序,发现system,svchost.exe,java.exe....等程序都有死锁,但不知道是否是因为这些程序的死锁造成系统蓝屏?&如下:1: kd& !locks**** DUMP OF ALL RESOURCE OBJECTS ****KD: Scanning for held locks.Resource @ nt!CmpRegistryLock (0xfffff0) & &Shared 1 owning threads& & Contention Count = 7& & &Threads: fffffa-01&*&&KD: Scanning for held locks...Resource @ 0xfffffa & &Shared 1 owning threads& & Contention Count = 11& & &Threads: fffffa-01&*&&KD: Scanning for held locks.Resource @ 0xfffff980029bef50 & &Shared 1 owning threads& & Contention Count = 11& & &Threads: fffffa-01&*&&KD: Scanning for held locks....Resource @ 0xfffffa & &Shared 29 owning threads& & &Threads: fffffa-01&*& fffffa-01&*& fffffa8002fac060-01&*& fffffa-01&*&&& & & & & & & fffffa-01&*& fffffa-01&*& fffffa-01&*& fffffa-01&*&&& & & & & & & fffffa8002ede060-01&*& fffffa-01&*& fffffa-01&*& fffffa-01&*&&& & & & & & & fffffa-01&*& fffffa80033ceb60-01&*& fffffa-01&*& fffffa-01&*&&& & & & & & & fffffa-01&*& fffffa-01&*& fffffa8003adeb60-01&*& fffffa8003cdb060-01&*&&& & & & & & & fffffa-01&*& fffffa-01&*& fffffa-01&*& fffffa-01&*&&& & & & & & & fffffa-01&*& fffffa-01&*& fffffa-01&*& fffffa-01&*&&& & & & & & & fffffa-01&*&&KD: Scanning for held locks........................................................Resource @ 0xfffffa & &Shared 1 owning threads& & &Threads: fffffa-01&*&&KD: Scanning for held locks........Resource @ 0xfffff & &Shared 1 owning threads& & &Threads: fffffa-01&*&&KD: Scanning for held locks.................Resource @ 0xfffff & &Shared 1 owning threads& & Contention Count = 1& & &Threads: fffffa-01&*&&KD: Scanning for held locks................................................................................Resource @ 0xfffffef0 & &Exclusively owned& & Contention Count = 26& & NumberOfExclusiveWaiters = 3& & &Threads: fffffa-01&*&&& & &Threads Waiting On Exclusive Access:& & & & & & & fffffa & & & fffffa & & & fffffa & & &&Resource @ 0xffffff98 & &Exclusively owned& & Contention Count = 35& & NumberOfExclusiveWaiters = 16& & &Threads: fffffa-01&*&&& & &Threads Waiting On Exclusive Access:& & & & & & & fffffa & & & fffffa80033ceb60 & & & fffffa & & & fffffa & & &&& & & & & & & fffffa & & & fffffa & & & fffffa & & & fffffa8002fac060 & & &&& & & & & & & fffffa8003cdb060 & & & fffffa & & & fffffa & & & fffffa & & &&& & & & & & & fffffa & & & fffffa & & & fffffa & & & fffffa8003adeb60 & & &&Resource @ 0xfffff98024d2cef0 & &Exclusively owned& & Contention Count = 47& & NumberOfExclusiveWaiters = 4& & &Threads: fffffa-01&*&&& & &Threads Waiting On Exclusive Access:& & & & & & & fffffa & & & fffffa & & & fffffa & & & fffffa & & &&Resource @ 0xfffff & &Exclusively owned& & Contention Count = 10& & NumberOfExclusiveWaiters = 1& & &Threads: fffffa-01&*&&& & &Threads Waiting On Exclusive Access:& & & & & & & fffffa & & &&KD: Scanning for held locks.Resource @ 0xfffffef0 & &Exclusively owned& & Contention Count = 2& & NumberOfSharedWaiters = 1& & &Threads: fffffa-01&*& fffffa-01 & &KD: Scanning for held locks........Resource @ 0xfffff & &Exclusively owned& & &Threads: fffffa-01&*&&KD: Scanning for held locks......5737 total locks, 13 locks currently held1: kd& !thread fffffaTHREAD fffffa &Cid
&Teb: 0000 Win32Thread: 0000 WAIT: (Executive) KernelMode Non-Alertable& & fffff &SynchronizationEventIRP List:& & fffff: () Flags:
&Mdl: Not impersonatingDeviceMap & & & & & & & & fffff8aOwning Process & & & & & &fffffa & & & Image: & & & & SystemAttached Process & & & & &N/A & & & & & &Image: & & & & N/AWait Start TickCount & & &190442 & & & & Ticks: 1 (0:00:00:00.015)Context Switch Count & & &10327 & & & & & &&UserTime & & & & & & & & &00:00:00.000KernelTime & & & & & & & &00:00:03.416Win32 Start Address nt!ExpWorkerThread (0xfffff)Stack Init fffff8 Current fffff8Base fffff8 Limit fffff88001fcc000 Call 0Priority 12 BasePriority 12 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5Child-SP & & & & &RetAddr & & & & & : Args to Child & & & & & & & & & & & & & & & & & & & & & & & & & & & & & : Call Sitefffff880`01fd1610 fffff800` : 00103 fffffa80` fffff980`24c58fe0 fffff980` : nt!KiSwapContext+0x7afffff880`01fd1750 fffff800`0168b1af : 00` fffff800`00 : nt!KiCommitThreadWait+0x1d2fffff880`01fd17e0 fffff800` : 00000 fffff800`00 10200 : nt!KeWaitForSingleObject+0x19ffffff880`01fd1880 fffff800` : fffff980`1e89ab40 fffff980`24c58fe0 fffff980`24c58fe0 00000 : nt!IopSynchronousApiServiceTail+0x74fffff880`01fd18c0 fffff800` : fffffa80` fffff8a0` fffffa80`02801c20 fffffa80` : nt!NtFlushBuffersFile+0x195fffff880`01fd1950 fffff800`0167ee70 : fffff800` fffff880`01fd1b00 fffff8a0` 00000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`01fd1950)fffff880`01fd1ae8 fffff800` : fffff880`01fd1b00 fffff8a0` 00000 fffff800` : nt!KiServiceLinkagefffff880`01fd1af0 fffff800` : fffff880`01fd1ba0 00020 fffff8a0` fffff8a0` : nt!CmpFileFlush+0x3ffffff880`01fd1b30 fffff800` : 00`00 00001 : nt!HvWriteDirtyDataToHive+0xe0fffff880`01fd1ba0 fffff800` : 00`00 fffff8a0`016b48b0 : nt!HvOptimizedSyncHive+0x32fffff880`01fd1bd0 fffff800` : fffff980`1e5d4f00 fffff880`01fd1c78 fffff800`01 : nt!CmpDoFlushNextHive+0x197fffff880`01fd1c30 fffff800`0168da21 : fffff800` fffff800`01979f00 fffffa80` fffff800` : nt!CmpLazyFlushWorker+0xa5fffff880`01fd1c70 fffff800`01920cce : ffffffff`ffffffff fffffa80`80 fffffa80`02205b30 : nt!ExpWorkerThread+0x111fffff880`01fd1d00 fffff800`01674fe6 : fffff880`009bf180 fffffa80` fffff880`009c9f40 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x5afffff880`01fd1d40 00000 : fffff880`01fd2000 fffff880`01fcc000 fffff880`00 : nt!KxStartSystemThread+0x161: kd& !thread fffffaTHREAD fffffa &Cid 0b60.13d0 &Teb: 000007fffff9a000 Win32Thread: 0000 ????IRP List:& & fffff: () Flags:
&Mdl: Not impersonatingDeviceMap & & & & & & & & fffff8aOwning Process & & & & & &fffffa & & & Image: & & & & svchost.exeAttached Process & & & & &N/A & & & & & &Image: & & & & N/AWait Start TickCount & & &190383 & & & & Ticks: 60 (0:00:00:00.936)Context Switch Count & & &12275 & & & & & &&UserTime & & & & & & & & &00:00:00.140KernelTime & & & & & & & &00:00:03.510Win32 Start Address 0x000007feebf8bc10Stack Init fffffd70 Current ffffff0Base fffff0 Limit fffff0 Call 0Priority 5 BasePriority 4 UnusualBoost 0 ForegroundBoost 0 IoPriority 0 PagePriority 3Child-SP & & & & &RetAddr & & & & & : Args to Child & & & & & & & & & & & & & & & & & & & & & & & & & & & & & : Call Sitefffff880`066c0430 fffff800` : 00008 fffffa80`03a915a0 00` : nt!KiSwapContext+0x7afffff880`066c0570 fffff800`0168b1af : fffff6fc`c010b478 00000 ffff0 00000 : nt!KiCommitThreadWait+0x1d2fffff880`066c0600 fffff800` : 00`00` : nt!KeWaitForSingleObject+0x19ffffff880`066c06a0 fffff800`0169208a : 00`be08 : nt!ExfAcquirePushLockExclusive+0x188fffff880`066c0720 fffff800`0168176e : 00008 fffff880`015b9ae9 fffff880`066c0` : nt!MmAccessFault+0x1a6afffff880`066c0880 fffff880`015b9ae9 : fffff980`1e8a6e40 fffffa80` fffff880`066c0b28 8f000 : nt!KiPageFault+0x16e (TrapFrame @ fffff880`066c0880)fffff880`066c0a10 fffff880`014ef252 : fffff980`1e8a6e40 fffff980`00 00a3c : Ntfs!NtfsOpenFcbById+0x1e9fffff880`066c0b10 fffff880`01456a3d : fffff980`1e8a6e40 fffff980`2525ab40 fffff880`068ea3a0 fffffa80` : Ntfs!NtfsCommonCreate+0x1d20fffff880`066c0cf0 fffff800` : fffff880`068ea310 45`45 : Ntfs!NtfsCommonCreateCallout+0x1dfffff880`066c0d20 fffff800` : 00` fffff880`066c1000 fffff800` : nt!KxSwitchKernelStackCallout+0x27 (TrapFrame @ fffff880`066c0be0)fffff880`068ea1e0 fffff800` : fffffa80`02 fffff880`068e5000 fffff880`068eb000 : nt!KiSwitchKernelStackContinuefffff880`068ea200 fffff880`014571bf : fffff880`01456a20 fffff880` fffffa80` fffff880`014f7f00 : nt!KeExpandKernelStackAndCalloutEx+0x2a2fffff880`068ea2e0 fffff880`014f099c : 00`02 fffff980`2525ab40 : Ntfs!NtfsCommonCreateOnNewStack+0x4ffffff880`068ea340 fffff800`01b26c16 : fffffa80` fffff980`00 00000 : Ntfs!NtfsFsdCreate+0x1acfffff880`068ea4f0 fffff880`01303bcf : fffff980`2525afb8 fffff880`068ea5a0 fffff980`22694e30 fffffa80` : nt!IovCallDriver+0x566fffff880`068ea550 fffff880` : fffff980`2525ab40 fffff980` fffff980`2525ab00 fffffa80`02801c20 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24ffffff880`068ea5e0 fffff800`01b26c16 : fffff980`02 00` : fltmgr!FltpCreate+0x2a9fffff880`068ea690 fffff800` : 00004 fffffa80`03c911c8 fffffa80`038f7610 fffffa80`03213ab0 : nt!IovCallDriver+0x566fffff880`068ea6f0 fffff800`0197dac2 : fffffa80`02801c20 fffffa80` fffffa80`03c91010 fffffa80` : nt!IopParseDevice+0x5a5fffff880`068ea880 fffff800`0197ef56 : 00190 fffffa80`03c00` fffffa80` : nt!ObpLookupObjectName+0x312fffff880`068ea970 fffff800`0198085c : fffffa80`02f5a200 00000 fffff800`01808c01 fffff880`068eaa58 : nt!ObOpenObjectByName+0x306fffff880`068eaa40 fffff800` : 7e9b0 fffff8a0`ea18 7e9d0 : nt!IopCreateFile+0x2bcfffff880`068eaae0 fffff800` : fffffa80`02e00` fffffa80`03a915a0 fffff800`0197aa34 : nt!NtOpenFile+0x58fffff880`068eab70 e1164a : 00`00 00000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`068eabe0)7e978 00000 : 00`00 00000 : 0x76e1164a1: kd& !thread fffffaTHREAD fffffa &Cid 0b60.13d0 &Teb: 000007fffff9a000 Win32Thread: 0000 ????IRP List:& & fffff: () Flags:
&Mdl: Not impersonatingDeviceMap & & & & & & & & fffff8aOwning Process & & & & & &fffffa & & & Image: & & & & svchost.exeAttached Process & & & & &N/A & & & & & &Image: & & & & N/AWait Start TickCount & & &190383 & & & & Ticks: 60 (0:00:00:00.936)Context Switch Count & & &12275 & & & & & &&UserTime & & & & & & & & &00:00:00.140KernelTime & & & & & & & &00:00:03.510Win32 Start Address 0x000007feebf8bc10Stack Init fffffd70 Current ffffff0Base fffff0 Limit fffff0 Call 0Priority 5 BasePriority 4 UnusualBoost 0 ForegroundBoost 0 IoPriority 0 PagePriority 3Child-SP & & & & &RetAddr & & & & & : Args to Child & & & & & & & & & & & & & & & & & & & & & & & & & & & & & : Call Sitefffff880`066c0430 fffff800` : 00008 fffffa80`03a915a0 00` : nt!KiSwapContext+0x7afffff880`066c0570 fffff800`0168b1af : fffff6fc`c010b478 00000 ffff0 00000 : nt!KiCommitThreadWait+0x1d2fffff880`066c0600 fffff800` : 00`00` : nt!KeWaitForSingleObject+0x19ffffff880`066c06a0 fffff800`0169208a : 00`be08 : nt!ExfAcquirePushLockExclusive+0x188fffff880`066c0720 fffff800`0168176e : 00008 fffff880`015b9ae9 fffff880`066c0` : nt!MmAccessFault+0x1a6afffff880`066c0880 fffff880`015b9ae9 : fffff980`1e8a6e40 fffffa80` fffff880`066c0b28 8f000 : nt!KiPageFault+0x16e (TrapFrame @ fffff880`066c0880)fffff880`066c0a10 fffff880`014ef252 : fffff980`1e8a6e40 fffff980`00 00a3c : Ntfs!NtfsOpenFcbById+0x1e9fffff880`066c0b10 fffff880`01456a3d : fffff980`1e8a6e40 fffff980`2525ab40 fffff880`068ea3a0 fffffa80` : Ntfs!NtfsCommonCreate+0x1d20fffff880`066c0cf0 fffff800` : fffff880`068ea310 45`45 : Ntfs!NtfsCommonCreateCallout+0x1dfffff880`066c0d20 fffff800` : 00` fffff880`066c1000 fffff800` : nt!KxSwitchKernelStackCallout+0x27 (TrapFrame @ fffff880`066c0be0)fffff880`068ea1e0 fffff800` : fffffa80`02 fffff880`068e5000 fffff880`068eb000 : nt!KiSwitchKernelStackContinuefffff880`068ea200 fffff880`014571bf : fffff880`01456a20 fffff880` fffffa80` fffff880`014f7f00 : nt!KeExpandKernelStackAndCalloutEx+0x2a2fffff880`068ea2e0 fffff880`014f099c : 00`02 fffff980`2525ab40 : Ntfs!NtfsCommonCreateOnNewStack+0x4ffffff880`068ea340 fffff800`01b26c16 : fffffa80` fffff980`00 00000 : Ntfs!NtfsFsdCreate+0x1acfffff880`068ea4f0 fffff880`01303bcf : fffff980`2525afb8 fffff880`068ea5a0 fffff980`22694e30 fffffa80` : nt!IovCallDriver+0x566fffff880`068ea550 fffff880` : fffff980`2525ab40 fffff980` fffff980`2525ab00 fffffa80`02801c20 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24ffffff880`068ea5e0 fffff800`01b26c16 : fffff980`02 00` : fltmgr!FltpCreate+0x2a9fffff880`068ea690 fffff800` : 00004 fffffa80`03c911c8 fffffa80`038f7610 fffffa80`03213ab0 : nt!IovCallDriver+0x566fffff880`068ea6f0 fffff800`0197dac2 : fffffa80`02801c20 fffffa80` fffffa80`03c91010 fffffa80` : nt!IopParseDevice+0x5a5fffff880`068ea880 fffff800`0197ef56 : 00190 fffffa80`03c00` fffffa80` : nt!ObpLookupObjectName+0x312fffff880`068ea970 fffff800`0198085c : fffffa80`02f5a200 00000 fffff800`01808c01 fffff880`068eaa58 : nt!ObOpenObjectByName+0x306fffff880`068eaa40 fffff800` : 7e9b0 fffff8a0`ea18 7e9d0 : nt!IopCreateFile+0x2bcfffff880`068eaae0 fffff800` : fffffa80`02e00` fffffa80`03a915a0 fffff800`0197aa34 : nt!NtOpenFile+0x58fffff880`068eab70 e1164a : 00`00 00000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`068eabe0)7e978 00000 : 00`00 00000 : 0x76e1164a1: kd& !thread fffffaTHREAD fffffa &Cid 070c.10a8 &Teb: 000007ffffee4000 Win32Thread: 0000 ????Not impersonatingDeviceMap & & & & & & & & fffff8aOwning Process & & & & & &fffffa & & & Image: & & & & java.exeAttached Process & & & & &N/A & & & & & &Image: & & & & N/AWait Start TickCount & & &190443 & & & & Ticks: 0Context Switch Count & & &1030 & & & & & &&UserTime & & & & & & & & &00:00:00.046KernelTime & & & & & & & &00:00:01.435Win32 Start Address 0x000007fefd2573fcStack Init fffff8 Current fffff8Base fffff88005dea000 Limit fffff8 Call 0Priority 10 BasePriority 8 UnusualBoost 2 ForegroundBoost 0 IoPriority 2 PagePriority 5Child-SP & & & & &RetAddr & & & & & : Args to Child & & & & & & & & & & & & & & & & & & & & & & & & & & & & & : Call Sitefffff880`05de7fe0 fffff800`016cf453 : fffff800` fffff800`fe5 fffffa80`023f8c01 : nt!KxDispatchInterrupt+0x12ffffff880`05de8120 fffff800` : 98fe5 fffffa80`023f8c01 fffffa80`023f8c00 00000 : nt!KiDpcInterruptBypass+0x13fffff880`05de8130 fffff800`0165c43b : fffffa80`017d30e8 fffff880`05de8470 fffff880`05de8330 fffffa80` : nt!KiInterruptDispatch+0x212 (TrapFrame @ fffff880`05de8130)fffff880`05de82c0 fffff800` : 00` fffff880`05de0`00098fe5 : nt!RtlpLookupFunctionEntryForStackWalks+0xbcfffff880`05de8330 fffff800`0173cac3 : fffffa80`017d30e8 fffff880` fffff880` fffff880` : nt!RtlpWalkFrameChain+0x2e6fffff880`05de89d0 fffff800`0173d94b : 00002 fffffa80`017d30e8 00000 fffff980`1cd54b70 : nt!RtlWalkFrameChain+0x63fffff880`05de8a00 fffff800`01b1724c : fffffa80`017d30d8 00000 fffff980`1cd54b40 cd54b40 : nt!RtlCaptureStackBackTrace+0x4bfffff880`05de8a30 fffff880`014ecc54 : fffff980`1cd54c70 fffff980`1cd54b40 fffff980`0467ee00 fffffa80`03b7e010 : nt!VfKeIrqlLogLower+0x3cfffff880`05de8a60 fffff880`014f20ec : fffff880`05de9300 fffff980`1cd54b40 00000 fffff980`25522fb8 : Ntfs!NtfsCreateScb+0xe4fffff880`05de8b20 fffff880`014e0fe5 : fffff880`05de9300 fffff980`25522fb8 fffffa80` fffff980`1cd54ed8 : Ntfs!NtfsOpenAttribute+0xacfffff880`05de8c30 fffff880`014dce3b : fffff880`05de9250 fffff880`05de9300 fffff980`1cd54ed8 fffff980` : Ntfs!NtfsOpenExistingAttr+0x145fffff880`05de8cf0 fffff880`014e009f : fffff880`05de9300 fffff980`25522b40 fffff980`1cd54ed8 fffff880` : Ntfs!NtfsOpenAttributeInExistingFile+0x5abfffff880`05de8e80 fffff880`014f0166 : fffff880`05de9300 fffff980`25522b40 fffff980`1cd54ed8 `ffffff01 : Ntfs!NtfsOpenExistingPrefixFcb+0x1effffff880`05de8f70 fffff880`014ed911 : fffff880`05de9300 fffff980`25522b40 fffff880`05de9140 fffff880`05de9190 : Ntfs!NtfsFindStartingNode+0x5e6fffff880`05de9040 fffff880`014cf441 : fffff880`05de9300 fffff980`25522b40 fffff880`05de9250 fffff980`25522b00 : Ntfs!NtfsCommonCreate+0x3e1fffff880`05de9220 fffff880` : fffff980`25522b40 fffff980`25522fb8 fffff880`05de9590 fffff800`01b0c900 : Ntfs!NtfsNetworkOpenCreate+0x115fffff880`05de9500 fffff880`01323aed : 00000 fffff980`25522fb8 fffff980`25522b40 fffff800`01b254f3 : fltmgr!FltpPerformFastIoCall+0x357fffff880`05de9560 fffff800` : 00045 fffff880`05de99a0 fffff880`ff : fltmgr!FltpFastIoQueryOpen+0x15dfffff880`05de9600 fffff800`0197dd38 : fffffa80`027d9cd0 fffff800` fffffa80`03c1d630 fffff800` : nt!IopParseDevice+0xad8fffff880`05de9790 fffff800`0197ef56 : 00000 fffffa80`03c1d630 00000 fffffa80` : nt!ObpLookupObjectName+0x588fffff880`05de9880 fffff800` : 00` fffffa80`70 : nt!ObOpenObjectByName+0x306fffff880`05de9950 fffff800` : 9e168 fffff880`05de9c60 fffffa80`00000`cea4d340 : nt!NtQueryFullAttributesFile+0x14ffffff880`05de9be0 e1247a : 00`00 00000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`05de9be0)fff248 00000 : 00`00 00000 : 0x76e1247a为了便于,各位大神分析,我把系统当时运行的应用程序全部列出来,如下:1: kd& !apc*** Enumerating APCs in all processesProcess fffffa SystemProcess fffffa smss.exeProcess fffffa8002adeb30 csrss.exeProcess fffffa csrss.exeProcess fffffa wininit.exeProcess fffffa winlogon.exeProcess fffffa8002bedb30 services.exeProcess fffffa lsass.exeProcess fffffa lsm.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa8002cdab30 svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa8002cec710 svchost.exeProcess fffffa spoolsv.exeProcess fffffa8002ddd660 svchost.exeProcess fffffa8002dccb30 MsDtsSrvr.exeProcess fffffa sqlservr.exe& & Thread fffffa ApcStateIndex 0 ApcListHead fffffab0 [KERNEL]& & & & KAPC @ fffff9801ff6cbb8& & & & & Type & & & & & 12& & & & & KernelRoutine &fffff nt!IopCompleteRequest+0& & & & & RundownRoutine fffff nt!IopAbortRequest+0Process fffffa msmdsrv.exeProcess fffffa SMSvcHost.exeProcess fffffa svchost.exeProcess fffffa ReportingServiProcess fffffa httpd.exeProcess fffffa conhost.exeProcess fffffa sqlwriter.exeProcess fffffa8002ffcb30 svchost.exeProcess fffffa java.exeProcess fffffa fdlauncher.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa fdhost.exeProcess fffffa conhost.exeProcess fffffa8 WMIC.exeProcess fffffa svchost.exeProcess fffffa msdtc.exeProcess fffffa sppsvc.exeProcess fffffa taskhost.exeProcess fffffa dwm.exeProcess fffffa8 explorer.exeProcess fffffa WMIC.exeProcess fffffa80035beb30 mmc.exeProcess fffffa WMIC.exeProcess fffffa TrustedInstallProcess fffffa taskmgr.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa ipconfig.exeProcess fffffa ipconfig.exeProcess fffffa8 WMIC.exeProcess fffffac0 WMIC.exeProcess fffffa8 WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WmiPrvSE.exeProcess fffffa WMIC.exeProcess fffffa Ssms.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa dfrgui.exeProcess fffffa svchost.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa svchost.exeProcess fffffa80036aeb30 WMIC.exeProcess fffffa WMIC.exe以上,请各位大神帮忙分析,小弟想知道是什么原因导致taskmgr.exe去结束了smss.exe.或者恳请大神,指点一下,如何去排错,给个方向。另外,各位大神能否帮忙,给下在STACK_TEXT中出现几个函数的原码,我想了解一下各函数中的参数代表的含义。想从这些参数中找到一些头绪。小弟在此先谢谢了。
Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析
, 22:29 下午
很有意思的问题
何种类型的dump?如果是完全转储,那么可以切换到taskmgr进程,观察用户态的栈回溯,看是如何发起系统调用来杀SMSS的...
Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析
, 10:01 上午
大神:& & &dump应是完整内存dump文件(不知道这样说对不对,约280M),另外切换到taskmgr进程,我不知道是不使用!process命令,所以现把内容贴上来,请帮忙查阅.& & &1: kd& !process fffffa taskmgr.exePROCESS fffffa& & SessionId: 1 &Cid: 0e40 & &Peb: 7fffffdb000 &ParentCid: 026c& & DirBase:
&ObjectTable: fffff8a001a1f2b0 &HandleCount: 131.& & Image: taskmgr.exe& & VadRoot fffffa80035bbb10 Vads 100 Clone 0 Private 817. Modified 110380. Locked 0.& & DeviceMap fffff8a00171fd70& & Token & & & & & & & & & & & & & & fffff8a& & ElapsedTime & & & & & & & & & & & 00:41:38.473& & UserTime & & & & & & & & & & & & &00:00:00.046& & KernelTime & & & & & & & & & & & &00:00:01.653& & QuotaPoolUsage[PagedPool] & & & & 165992& & QuotaPoolUsage[NonPagedPool] & & &11944& & Working Set Sizes (now,min,max) &(5) (11488KB, 200KB, 1380KB)& & PeakWorkingSetSize & & & & & & & &2872& & VirtualSize & & & & & & & & & & & 86 Mb& & PeakVirtualSize & & & & & & & & & 151 Mb& & PageFaultCount & & & & & & & & & &5922& & MemoryPriority & & & & & & & & & &BACKGROUND& & BasePriority & & & & & & & & & & &13& & CommitCharge & & & & & & & & & & &973& & & & THREAD fffffa &Cid 0e40.0e44 &Teb: 000007fffffde000 Win32Thread: fffff900c4dc8c30 RUNNING on processor 1& & & & Impersonation token: &fffff8a (Level Impersonation)& & & & DeviceMap & & & & & & & & fffff8a00171fd70& & & & Owning Process & & & & & &fffffa & & & Image: & & & & taskmgr.exe& & & & Attached Process & & & & &N/A & & & & & &Image: & & & & N/A& & & & Wait Start TickCount & & &190441 & & & & Ticks: 2 (0:00:00:00.031)& & & & Context Switch Count & & &165510 & & & & IdealProcessor: 0 & & & & & & & & LargeStack& & & & UserTime & & & & & & & & &00:00:08.954& & & & KernelTime & & & & & & & &00:18:25.703& & & & Win32 Start Address 0xffd62b9c& & & & Stack Init fffff Current fffff& & & & Base fffff Limit fffff Call 0& & & & Priority 15 BasePriority 13 UnusualBoost 0 ForegroundBoost 2 IoPriority 2 PagePriority 5& & & & Child-SP & & & & &RetAddr & & & & & Call Site& & & & fffff880`05012ac8 fffff800`01a0b982 nt!KeBugCheckEx& & & & fffff880`05012ad0 fffff800`019b90ab nt!PspCatchCriticalBreak+0x92& & & & fffff880`05012b10 fffff800` nt! ?? ::NNGAKEGL::`string'+0x17ad6& & & & fffff880`05012b60 fffff800` nt!NtTerminateProcess+0xf4& & & & fffff880`0da nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`05012be0)& & & & dece8 e115da& & & & THREAD fffffa8 &Cid 0e40.0e48 &Teb: 000007fffffdc000 Win32Thread: fffff900c462ec30 WAIT: (WrUserRequest) UserMode Non-Alertable& & & & & & fffffa &SynchronizationEvent& & & & Not impersonating& & & & DeviceMap & & & & & & & & fffff8a00171fd70& & & & Owning Process & & & & & &fffffa & & & Image: & & & & taskmgr.exe& & & & Attached Process & & & & &N/A & & & & & &Image: & & & & N/A& & & & Wait Start TickCount & & &190432 & & & & Ticks: 11 (0:00:00:00.171)& & & & Context Switch Count & & &22545 & & & & &IdealProcessor: 0 & & & & & & & & LargeStack& & & & UserTime & & & & & & & & &00:00:00.031& & & & KernelTime & & & & & & & &00:00:00.624& & & & Win32 Start Address 0xffd5df20& & & & Stack Init fffff Current fffff& & & & Base fffff Limit fffff Call 0& & & & Priority 15 BasePriority 13 UnusualBoost 0 ForegroundBoost 1 IoPriority 2 PagePriority 5Page 6edd3 not present in the dump file. Type ".hh dbgerr004" for details& & & & Child-SP & & & & &RetAddr & & & & & Call Site& & & & fffff880` fffff800` nt!KiSwapContext+0x7a& & & & fffff880` fffff800`0168b1af nt!KiCommitThreadWait+0x1d2& & & & fffff880` fffff800`01b1d5b1 nt!KeWaitForSingleObject+0x19f& & & & fffff880` fffff960` nt!VerifierKeWaitForSingleObject+0x151& & & & fffff880` fffff960` win32k!xxxRealSleepThread+0x257& & & & fffff880`0504fa00 fffff960`00159f20 win32k!xxxSleepThread+0x59& & & & fffff880`0504fa30 fffff960` win32k!xxxRealInternalGetMessage+0x7dc& & & & fffff880`0504fb10 fffff960`0015ba05 win32k!xxxInternalGetMessage+0x35& & & & fffff880`0504fb50 fffff800` win32k!NtUserGetMessage+0x75& & & & fffff880`0504fbe0 bb9e6a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`0504fbe0)& & & & eedc8 bb9e6a& & & & THREAD fffffa &Cid 0e40.0e4c &Teb: 000007fffffd9000 Win32Thread: 0000 WAIT: (UserRequest) UserMode Alertable& & & & & & fffffa &SynchronizationTimer& & & & & & fffffa8002eae350 &SynchronizationTimer& & & & & & fffffa &SynchronizationTimer& & & & & & fffffa &SynchronizationEvent& & & & Not impersonating& & & & DeviceMap & & & & & & & & fffff8a00171fd70& & & & Owning Process & & & & & &fffffa & & & Image: & & & & taskmgr.exe& & & & Attached Process & & & & &N/A & & & & & &Image: & & & & N/A& & & & Wait Start TickCount & & &185867 & & & & Ticks: :01:11.386)& & & & Context Switch Count & & &47 & & & & & & IdealProcessor: 0 & & & & & &&& & & & UserTime & & & & & & & & &00:00:00.000& & & & KernelTime & & & & & & & &00:00:00.000& & & & Win32 Start Address 0xddaec0& & & & Stack Init fffffd70 Current fffff880053eff80& & & & Base fffff0 Limit fffff0 Call 0& & & & Priority 15 BasePriority 13 UnusualBoost 0 ForegroundBoost 2 IoPriority 2 PagePriority 5& & & & Kernel stack not resident.& & & & Child-SP & & & & &RetAddr & & & & & Call Site& & & & fffff880`053effc0 fffff800` nt!KiSwapContext+0x7a& & & & fffff880`053f0100 fffff800`01687eaa nt!KiCommitThreadWait+0x1d2& & & & fffff880`053f0190 fffff800`01979ccf nt!KeWaitForMultipleObjects+0x272& & & & fffff880`053f0450 fffff800`0197a03e nt!ObpWaitForMultipleObjects+0x294& & & & fffff880`053f0920 fffff800` nt!NtWaitForMultipleObjects+0xe5& & & & fffff880`053f0b70 e118ca nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`053f0be0)& & & & 7f5d8 e118ca& & & & THREAD fffffa &Cid 0e40.0e54 &Teb: 000007fffffd5000 Win32Thread: fffff900c4c54c30 WAIT: (UserRequest) UserMode Non-Alertable& & & & & & fffffa &SynchronizationEvent& & & & Not impersonating& & & & DeviceMap & & & & & & & & fffff8a00171fd70& & & & Owning Process & & & & & &fffffa & & & Image: & & & & taskmgr.exe& & & & Attached Process & & & & &N/A & & & & & &Image: & & & & N/A& & & & Wait Start TickCount & & &190387 & & & & Ticks: 56 (0:00:00:00.873)& & & & Context Switch Count & & &58408 & & & & &IdealProcessor: 0 & & & & & & & & LargeStack& & & & UserTime & & & & & & & & &00:00:00.218& & & & KernelTime & & & & & & & &00:00:00.826& & & & Win32 Start Address 0xffd5ba7c& & & & Stack Init fffff Current fffff& & & & Base fffff Limit fffff0 Call 0& & & & Priority 15 BasePriority 13 UnusualBoost 0 ForegroundBoost 2 IoPriority 2 PagePriority 5& & & & Child-SP & & & & &RetAddr & & & & & Call Site& & & & fffff880` fffff800` nt!KiSwapContext+0x7a& & & & fffff880`05102a40 fffff800`0168b1af nt!KiCommitThreadWait+0x1d2& & & & fffff880`05102ad0 fffff800`0197999e nt!KeWaitForSingleObject+0x19f& & & & fffff880`05102b70 fffff800` nt!NtWaitForSingleObject+0xde& & & & fffff880`05a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`05102be0)& & & & 8f9a8 e1135a& & & & THREAD fffffa &Cid 0e40.133c &Teb: 000007fffffd7000 Win32Thread: fffff900c64a2c30 WAIT: (WrQueue) UserMode Alertable& & & & & & fffffa &QueueObject& & & & Not impersonating& & & & DeviceMap & & & & & & & & fffff8a00171fd70& & & & Owning Process & & & & & &fffffa & & & Image: & & & & taskmgr.exe& & & & Attached Process & & & & &N/A & & & & & &Image: & & & & N/A& & & & Wait Start TickCount & & &189673 & & & & Ticks: 770 (0:00:00:12.012)& & & & Context Switch Count & & &978 & & & & & &IdealProcessor: 0 & & & & & & & & LargeStack& & & & UserTime & & & & & & & & &00:00:00.000& & & & KernelTime & & & & & & & &00:00:00.093& & & & Win32 Start Address 0xddfbc0& & & & Stack Init fffff8 Current fffff8& & & & Base fffff8 Limit fffff8 Call 0& & & & Priority 13 BasePriority 13 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5& & & & Child-SP & & & & &RetAddr & & & & & Call Site& & & & fffff880`06af87c0 fffff800` nt!KiSwapContext+0x7a& & & & fffff880`06af8900 fffff800` nt!KiCommitThreadWait+0x1d2& & & & fffff880`06af8990 fffff800`0196bb97 nt!KeRemoveQueueEx+0x323& & & & fffff880`06af8a50 fffff800` nt!IoRemoveIoCompletion+0x47& & & & fffff880`06af8ae0 fffff800` nt!NtWaitForWorkViaWorkerFactory+0x285& & & & fffff880`06af8be0 e12c1a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`06af8be0)& & & & 1f6c8 e12c1a& & & & THREAD fffffa &Cid 0e40.127c &Teb: 000007fffffd3000 Win32Thread: fffff900c6440c30 WAIT: (WrQueue) UserMode Alertable& & & & & & fffffa &QueueObject& & & & Not impersonating& & & & DeviceMap & & & & & & & & fffff8a00171fd70& & & & Owning Process & & & & & &fffffa & & & Image: & & & & taskmgr.exe& & & & Attached Process & & & & &N/A & & & & & &Image: & & & & N/A& & & & Wait Start TickCount & & &189673 & & & & Ticks: 770 (0:00:00:12.012)& & & & Context Switch Count & & &69 & & & & & & IdealProcessor: 0 & & & & & & & & LargeStack& & & & UserTime & & & & & & & & &00:00:00.000& & & & KernelTime & & & & & & & &00:00:00.046& & & & Win32 Start Address 0xddfbc0& & & & Stack Init fffff Current fffff& & & & Base fffff Limit fffff Call 0& & & & Priority 15 BasePriority 13 UnusualBoost 0 ForegroundBoost 2 IoPriority 2 PagePriority 5& & & & Child-SP & & & & &RetAddr & & & & & Call Site& & & & fffff880`05c9e7c0 fffff800` nt!KiSwapContext+0x7a& & & & fffff880`05c9e900 fffff800` nt!KiCommitThreadWait+0x1d2& & & & fffff880`05c9e990 fffff800`0196bb97 nt!KeRemoveQueueEx+0x323& & & & fffff880`05c9ea50 fffff800` nt!IoRemoveIoCompletion+0x47& & & & fffff880`05c9eae0 fffff800` nt!NtWaitForWorkViaWorkerFactory+0x285& & & & fffff880`05c9ebe0 e12c1a nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`05c9ebe0)& & & & bfad8 e12c1a感谢!
Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析
, 21:31 下午
280MB,多半是Kernel dump,不是Complete dump
可以参考下面这个KB来产生complete dump
Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析
, 08:56 上午
收到.感谢大神指点...谢谢
Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析
, 19:21 下午
师傅: 依照您昨天说的,今天到公司设置了一下。得到的新dump文件有3.9G(物理内存4G)应该是完整的转存文件了。& & & & 重新运行windbg,发现堆栈中多了很多函数调用记录,只是不知道这些函数的参数都代表什么含义,不知道师傅能否告知一下,在哪里能查到这些函数的说明。以下为windbg显示内容:0: kd& kvChild-SP & & & & &RetAddr & & & & & : Args to Child & & & & & & & & & & & & & & & & & & & & & & & & & & & & & : Call Sitefffff880`05eb7ac8 fffff800`01a57892 : 000f4 00003 fffffa80` fffffa80` : nt!KeBugCheckExfffff880`05eb7ad0 fffff800`01a03e8b : ffffffff`ffffffff fffffa80`05aa5b50 fffffa80` fffffa80`057b4060 : nt!PspCatchCriticalBreak+0x92fffff880`05eb7b10 fffff800`01982f74 : ffffffff`ffffffff 00001 fffffa80`08 : nt! ?? ::NNGAKEGL::`string'+0x176d6fffff880`05eb7b60 fffff800`016cf453 : fffffa80` fffff880` fffffa80`05aa5b50 00000 : nt!NtTerminateProcess+0xf4fffff880`05eb7be0 915da : 000007fe`fd7234ff 00`00 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`05eb7be0)5ebe8 000007fe`fd7234ff : 00`00 d68b0 : ntdll!NtTerminateProcess+0xa5ebf0 `ffea6904 : 00`b0 00200 : KERNELBASE!TerminateProcess+0x2f5ec20 `ffea8d08 : 607f0 00`01 : taskmgr!CProcPage::KillProcess+0x12c5ec80 `ffea8efc : d68b0 00c2c 00` : taskmgr!CProcPage::KillAllChildren+0x985ed00 `ffea7c58 : 00` 00`00009ca6 : taskmgr!CProcPage::RecursiveKill+0x1705f1b0 `ffea81d8 : 00`000 00000 : taskmgr!CProcPage::HandleWMCOMMAND+0x3185f230 679b7 : 00`00 00001 : taskmgr!ProcPageProc+0x47c5f300 67792 : 00`ffea7d5c e7ee0 09ca6 : USER32!UserCallDlgProcCheckWow+0x1b65f3c0 676c2 : 00`f6a8 00111 : USER32!DefDlgProcWorker+0xf15f440 59bd1 : 00`00 b6200 : USER32!DefDlgProcW+0x365f480 598da : 5f6a8 00`00af4a60 e7ee0 : USER32!UserCallWinProcCheckWow+0x1ad5f540 567c2 : 00`84 00001 : USER32!DispatchMessageWorker+0x3b55f5c0 `ffe9ab0d : d6d60 00`ffe00`ffe90000 : USER32!IsDialogMessageW+0x1535f650 `ffeb2a2a : 00`00 00000 : taskmgr!wWinMain+0x9215fca0 3652d : 00`00 00000 : taskmgr!DelayLoadFailureHook+0x2060: kd& !apc*** Enumerating APCs in all processesProcess fffffa SystemProcess fffffa smss.exeProcess fffffa csrss.exeProcess fffffa csrss.exeProcess fffffa wininit.exeProcess fffffa winlogon.exeProcess fffffa services.exeProcess fffffa lsass.exeProcess fffffa lsm.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa spoolsv.exeProcess fffffa svchost.exeProcess fffffa MsDtsSrvr.exeProcess fffffa sqlservr.exe& & Thread fffffa8 ApcStateIndex 0 ApcListHead fffffa8 [KERNEL]& & & & KAPC @ fffff980274cebb8& & & & & Type & & & & & 12& & & & & KernelRoutine &fffff0 nt!IopCompleteRequest+0& & & & & RundownRoutine fffff nt!IopAbortRequest+0Process fffffa8004dbbb30 msmdsrv.exeProcess fffffa8004ddfb30 SMSvcHost.exeProcess fffffa svchost.exeProcess fffffa ReportingServiProcess fffffa httpd.exeProcess fffffa conhost.exeProcess fffffa sqlwriter.exeProcess fffffa svchost.exeProcess fffffa java.exeProcess fffffa taskhost.exeProcess fffffa dwm.exeProcess fffffa8004fbfb30 explorer.exeProcess fffffa fdlauncher.exeProcess fffffa svchost.exeProcess fffffa svchost.exeProcess fffffa fdhost.exeProcess fffffa conhost.exeProcess fffffa mmc.exeProcess fffffa TrustedInstallProcess fffffa sppsvc.exeProcess fffffa WMIC.exeProcess fffffa svchost.exeProcess fffffad0 msdtc.exeProcess fffffa wuauclt.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa8005aebb30 WMIC.exeProcess fffffaf0 WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa8005aad060 WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa taskmgr.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa8005dfb0f0 WMIC.exeProcess fffffa8005badb30 WMIC.exeProcess fffffa WMIC.exeProcess fffffa8005afe620 WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa8005bdd0f0 WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa8 WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa Ssms.exeProcess fffffa WmiPrvSE.exeProcess fffffa WMIC.exeProcess fffffaf0 WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa iexplore.exeProcess fffffa iexplore.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa WMIC.exeProcess fffffa8005ddb060 WMIC.exe& & & & & & & & & & & & & & & & & & &感谢!
Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析
, 21:18 下午
很完美的栈回溯,很有意思的问题。这样论坛上交流效率太低了,可以通过下面网页中的邮件地址联系我
Re: 工作中遇一OA服务器间歇蓝屏,恳请各位大神帮忙分析
, 09:29 上午
若分析有结果,也希望能看看分析过程。

我要回帖

更多关于 想吃苹果的鼠小弟教案 的文章

 

随机推荐