Advanced Debugging
About AdvDbg Consult Train Services Products Tools Community Contact  
欢迎光临 高端调试 登录 | 注册 | FAQ
 
  ACPI调试
Linux内核调试
Windows内核调试
 
  调试战役
调试原理
新工具观察
 
  Linux
Windows Vista
Windows
 
  Linux驱动
WDF
WDM
 
  PCI Express
PCI/PCI-X
USB
无线通信协议
 
  64位CPU
ARM
IA-32
  CPU Info Center
 
  ACPI标准
系统认证
Desktop
服务器
 
  Embedded Linux
嵌入式开发工具
VxWorks
WinCE
嵌入式Windows
 
  格蠹调试套件(GDK)
  格蠹学院
  小朱书店
  老雷的微博
  《软件调试》
  《格蠹汇编》
  《软件调试(第二版)》
沪ICP备11027180号-1

Windows内核调试

帖子发起人: Will.Wong   发起时间: 2014-10-21 14:20 下午   回复: 2

Print Search
帖子排序:    
   2014-10-21, 14:20 下午
vopvcp 离线,最后访问时间: 2014/10/21 6:18:49 Will.Wong

无等级
注册: 2014-10-21
发 贴: 1
Stick out tongue [:P] 帮忙分析dump file,张老师在就更好了
Reply Quote

是在run 3Dmark ice storm时蓝屏


Microsoft (R) Windows Debugger Version 6.3.9600.17200 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [J:\G70-80\ics_storm_BSOD\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*c:\websymbol* http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\websymbol* http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17236.amd64fre.winblue_gdr.140714-1919
Machine Name:
Kernel base = 0xfffff801`17a0a000 PsLoadedModuleList = 0xfffff801`17cd4350
Debug session time: Mon Oct 20 20:31:40.393 2014 (UTC + 8:00)
System Uptime: 0 days 10:03:22.291
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
...........................................
Loading unloaded module list
.........................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {41287, 0, 0, 0}

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for nvwgf2umx.dll - 
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::AllocateSmallAllocation+145 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, An illegal page fault occurred while holding working set synchronization.
Parameter 2 contains the referenced virtual address.
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41287

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  3DMarkICFWorkl

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  ffffd000b18d8890 -- (.trap 0xffffd000b18d8890)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000fffffffff
rdx=fffff6fb7da00000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80117a6205e rsp=ffffd000b18d8a20 rbp=0000000004c59000
 r8=fffff6fb40000130  r9=00000000ffffffff r10=0000000000000011
r11=0000000000000020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!MiCommitExistingVad+0x5ae:
fffff801`17a6205e 897c2438        mov     dword ptr [rsp+38h],edi ss:0018:ffffd000`b18d8a58=00000000
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80117b7e9e7 to fffff80117b5dca0

STACK_TEXT:  
ffffd000`b18d8748 fffff801`17b7e9e7 : 00000000`0000001a 00000000`00041287 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd000`b18d8750 fffff801`17b67f2f : 00000000`00000001 00000000`00000380 00000000`c1d04c00 ffffd000`b18d8890 : nt! ?? ::FNODOBFM::`string'+0x10837
ffffd000`b18d8890 fffff801`17a6205e : 00000000`00000000 00000000`00000000 00000000`00000001 ffffe001`0ddd4468 : nt!KiPageFault+0x12f
ffffd000`b18d8a20 fffff801`17dea5bc : ffffe001`0d955360 00000000`00000001 ffffd000`b18d8e30 00000000`00000404 : nt!MiCommitExistingVad+0x5ae
ffffd000`b18d8b40 fffff801`17b694b3 : ffffd000`0c007082 ffffd000`0c007082 ffffd000`9ddb7000 00000000`00000801 : nt!NtAllocateVirtualMemory+0x46c
ffffd000`b18d8d40 fffff801`17b61900 : fffff800`c8457295 ffffc001`633e9d58 ffffc001`633f8960 ffffc001`633a3600 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`b18d8f48 fffff800`c8457295 : ffffc001`633e9d58 ffffc001`633f8960 ffffc001`633a3600 00000000`00000010 : nt!KiServiceLinkage
ffffd000`b18d8f50 fffff800`c844f118 : ffffd000`9ddb7000 00000000`00020000 00000000`00001000 ffffe001`0efa6900 : dxgmms1!VIDMM_PROCESS_HEAP::AllocateSmallAllocation+0x145
ffffd000`b18d9010 fffff800`c84509e7 : 00000000`00000000 00000000`00020000 00000000`00000001 00000000`000007ff : dxgmms1!VIDMM_PROCESS_HEAP::Allocate+0x90
ffffd000`b18d90b0 fffff800`c8451ca0 : ffffe001`0e994000 ffffc001`629267b0 ffffd000`9ddab320 ffffc001`5cd3c6a0 : dxgmms1!VIDMM_GLOBAL::OpenLocalAllocation+0x147
ffffd000`b18d9150 fffff800`c84501e3 : ffffc001`6aee7e60 ffffc001`6298a520 ffffc001`6298a520 ffffc001`61abd450 : dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+0xc0
ffffd000`b18d9240 fffff800`c88dd713 : ffffc001`632163f0 ffffc001`621456b0 ffffc001`62aa8000 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::OpenAllocation+0xb7
ffffd000`b18d92a0 fffff800`c88dcb9d : ffffc001`00000000 ffffd000`b18d9b10 ffffd000`b18d9860 ffffd000`b18d95b0 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations<_DXGK_ALLOCATIONINFO>+0x2d3
ffffd000`b18d9380 fffff800`c88dc431 : ffffc001`00000799 00000000`00136201 ffffd000`b18d9b70 00000000`00000700 : dxgkrnl!DXGDEVICE::CreateAllocation+0x56d
ffffd000`b18d9a90 fffff801`17b694b3 : ffffe001`112b0480 ffffc001`62aa8000 ffffc001`62aa8000 ffffc001`62aa8000 : dxgkrnl!DxgkCreateAllocation+0x391
ffffd000`b18d9c00 00007ff8`4c9b138a : 00007ff8`4c9c257b 00000000`001362e0 00000000`00136788 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x13
00000000`00136208 00007ff8`4c9c257b : 00000000`001362e0 00000000`00136788 00000000`00000001 00000000`00000000 : GDI32!NtGdiDdDDICreateAllocation+0xa
00000000`00136210 00007ff8`46dec3f6 : 00000000`00136830 00000000`01bb2db8 00000000`01c2db90 00000000`00000000 : GDI32!D3DKMTCreateAllocation+0x5b
00000000`001362c0 00007ff8`20c398c5 : 00000000`00000000 00007ff8`2070a838 00000000`000001d0 00007ff8`4cecb3b2 : d3d11!NDXGI::CDevice::AllocateCB+0xb2
00000000`00136490 00000000`00000000 : 00007ff8`2070a838 00000000`000001d0 00007ff8`4cecb3b2 00000000`00020000 : nvwgf2umx!NVAPI_Thunk+0x11f75


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::AllocateSmallAllocation+145
fffff800`c8457295 448bf8          mov     r15d,eax

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::AllocateSmallAllocation+145

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  53183e46

IMAGE_VERSION:  6.3.9600.17041

BUCKET_ID_FUNC_OFFSET:  145

FAILURE_BUCKET_ID:  0x1a_41287_dxgmms1!VIDMM_PROCESS_HEAP::AllocateSmallAllocation

BUCKET_ID:  0x1a_41287_dxgmms1!VIDMM_PROCESS_HEAP::AllocateSmallAllocation

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1a_41287_dxgmms1!vidmm_process_heap::allocatesmallallocation

FAILURE_ID_HASH:  {0dba43bd-ed66-b892-314d-f9c5856ddfde}

Followup: MachineOwner
---------

1: kd> !process
PROCESS ffffe0010efa6900
    SessionId: 2  Cid: 1280    Peb: 7ff5ffffc000  ParentCid: 1268
    DirBase: 21b489000  ObjectTable: ffffc001622b1940  HandleCount: <Data Not Accessible>
    Image: 3DMarkICFWorkload.exe
    VadRoot ffffe001117a5780 Vads 119 Clone 0 Private 4786. Modified 6586. Locked 2240.
    DeviceMap ffffc0015c12de00
    Token                             ffffc00162aa7060
    ElapsedTime                       00:00:02.774
    UserTime                          00:00:00.000
    KernelTime                        00:00:00.000
    QuotaPoolUsage[PagedPool]         295160
    QuotaPoolUsage[NonPagedPool]      15472
    Working Set Sizes (now,min,max)  (8938, 50, 345) (35752KB, 200KB, 1380KB)
    PeakWorkingSetSize                10120
    VirtualSize                       174 Mb
    PeakVirtualSize                   174 Mb
    PageFaultCount                    34664
    MemoryPriority                    BACKGROUND
    BasePriority                      8
    CommitCharge                      10555
    Job                               ffffe00109056620

        THREAD ffffe001112b0480  Cid 1280.09d0  Teb: 00007ff5ffffd000 Win32Thread: fffff90143e0d390 RUNNING on processor 1
        THREAD ffffe001098a4080  Cid 1280.0810  Teb: 00007ff5ffffa000 Win32Thread: fffff9014404b010 WAIT: (UserRequest) UserMode Non-Alertable
            ffffe001098a06d0  Semaphore Limit 0x7fffffff

        THREAD ffffe0011106d480  Cid 1280.061c  Teb: 00007ff5ffff8000 Win32Thread: 0000000000000000 WAIT: (UserRequest) UserMode Non-Alertable
            ffffe00109500ab0  NotificationEvent

        THREAD ffffe0010ff09880  Cid 1280.033c  Teb: 00007ff5ffff6000 Win32Thread: fffff90140876b60 WAIT: (UserRequest) UserMode Non-Alertable
            ffffe00109500ab0  NotificationEvent

        THREAD ffffe00112cdf080  Cid 1280.0494  Teb: 00007ff5ffff4000 Win32Thread: 0000000000000000 WAIT: (UserRequest) UserMode Non-Alertable
            ffffe0011289bb90  NotificationEvent

        THREAD ffffe001124b3500  Cid 1280.09c8  Teb: 00007ff5ffece000 Win32Thread: 0000000000000000 WAIT: (UserRequest) UserMode Non-Alertable
            ffffe0011289bb90  NotificationEvent

        THREAD ffffe0011175b880  Cid 1280.00e8  Teb: 00007ff5ffecc000 Win32Thread: fffff90143e4f010 WAIT: (UserRequest) UserMode Non-Alertable
            ffffe001129b2210  NotificationEvent



IP 地址: 已记录   报告
   2014-10-22, 20:33 下午
Raymond 离线,最后访问时间: 2020/7/3 3:40:25 格蠹老雷

发帖数前10位
注册: 2005-12-19
发 贴: 1,303
Re: 帮忙分析dump file,张老师在就更好了
Reply Quote
建议使用verifier开启内核池验证,然后再重现
IP 地址: 已记录   报告
   2014-10-24, 15:35 下午
Thomson 离线,最后访问时间: 2013/3/31 11:42:42 Thomson

发帖数前10位
注册: 2008-07-03
发 贴: 211
Re: 帮忙分析dump file,张老师在就更好了
Reply Quote
能把dump上传上来吗?
IP 地址: 已记录   报告
高端调试 » 软件调试 » Windows内核调试 » Re: 帮忙分析dump file,张老师在就更好了

 
Legal Notice Privacy Statement Corporate Governance Corporate Governance
(C)2004-2020 ADVDBG.ORG All Rights Reserved.