• Windows用WinDbg分析蓝屏dump文件查找原因(转)


    WinDbg官方下载: http://msdl.microsoft.com/download/symbols/debuggers/dbg_x86_6.11.1.404.msi http://msdl.microsoft.com/download/symbols/debuggers/dbg_amd64_6.11.1.404.msi 打开WinDbg设置Symbol File Path为:

    1
    
    SRV*http://msdl.microsoft.com/download/symbols


    然后将dump文件拖入WinDbg窗口等待片刻即有分析结果,dump文件在C:WindowsMinidump目录。
    windbg分析windows蓝屏原因.png
    输入!analyze -v查看详细分析结果:

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    75
    76
    77
    78
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
     
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff8811f7ffa80, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800042d2040, address which referenced memory
     
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800044ff100
     fffff8811f7ffa80 
     
    CURRENT_IRQL:  2
     
    FAULTING_IP: 
    nt!RtlCopyMemoryNonTemporal+40
    fffff800`042d2040 4c8b0c11        mov     r9,qword ptr [rcx+rdx]
     
    CUSTOMER_CRASH_COUNT:  1
     
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
     
    BUGCHECK_STR:  0xA
     
    PROCESS_NAME:  ThunderPlatfor
     
    TRAP_FRAME:  fffff88008a5e5c0 -- (.trap 0xfffff88008a5e5c0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
     
    STACK_COMMAND:  kb
     
    FOLLOWUP_IP: 
    L1C62x64+5534
    fffff880`05e6f534 ??              ???
     
    SYMBOL_STACK_INDEX:  c
     
    SYMBOL_NAME:  L1C62x64+5534
     
    FOLLOWUP_NAME:  MachineOwner
     
    MODULE_NAME: L1C62x64
     
    IMAGE_NAME:  L1C62x64.sys
     
    DEBUG_FLR_IMAGE_TIMESTAMP:  49d2f6fd
     
    FAILURE_BUCKET_ID:  X64_0xA_L1C62x64+5534
     
    BUCKET_ID:  X64_0xA_L1C62x64+5534
     
    Followup: MachineOwner
    ---------
     
    1: kd> lmvm L1C62x64
    start             end                 module name
    fffff880`05e6a000 fffff880`05e7c000   L1C62x64 T (no symbols)           
        Loaded symbol image file: L1C62x64.sys
        Image path: SystemRootsystem32DRIVERSL1C62x64.sys
        Image name: L1C62x64.sys
        Timestamp:        Wed Apr 01 13:09:17 2009 (49D2F6FD)
        CheckSum:         0001660A
        ImageSize:        00012000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4


    可见是L1C62x64.sys的问题,查看了下是Atheros千M网卡的驱动文件,是进程ThunderPlatfor引起的系统蓝屏,先升级下网卡驱动试试,再不行就升级迅雷,郁闷ING。。。

     


    http://blog.onovps.com/archives/windbg-bluescreen.html

  • 相关阅读:
    BOM操作
    重绘和回流
    css3动画 --- Transition
    css3动画 --- Animation
    flex布局
    读书笔记之python深入面向对象编程
    读书笔记之python面向对象编程的四大支柱
    git基础使用01
    python读取列表中的每个数据,@DDT,@Data(*data),@unpack使用
    python单元测试_读取excel表中的数据
  • 原文地址:https://www.cnblogs.com/qq78292959/p/3197724.html
Copyright © 2020-2023  润新知