Advanced Debugging
About AdvDbg Consult Train Services Products Tools Community Contact  
欢迎光临 高端调试 登录 | 注册 | FAQ
 
  ACPI调试
Linux内核调试
Windows内核调试
 
  调试战役
调试原理
新工具观察
 
  Linux
Windows Vista
Windows
 
  Linux驱动
WDF
WDM
 
  PCI Express
PCI/PCI-X
USB
无线通信协议
 
  64位CPU
ARM
IA-32
  CPU Info Center
 
  ACPI标准
系统认证
Desktop
服务器
 
  Embedded Linux
嵌入式开发工具
VxWorks
WinCE
嵌入式Windows
 
  格蠹调试套件(GDK)
  格蠹学院
  小朱书店
  老雷的微博
  《软件调试》
  《格蠹汇编》
  《软件调试(第二版)》
沪ICP备11027180号-1

Windows内核调试

帖子发起人: 风继续吹   发起时间: 2016-11-12 17:44 下午   回复: 2

Print Search
帖子排序:    
   2016-11-12, 17:44 下午
linkerrors 离线,最后访问时间: 2018/11/19 13:12:31 风继续吹

发帖数前50位
注册: 2014-09-27
发 贴: 23
加载驱动时蓝屏,dump信息如下,但是蓝屏时是栈里没有我的驱动,求各位老师帮忙看一下。
Reply Quote
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8015046dee0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff8015046dee0, address which referenced memory

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 0

BUILD_VERSION_STRING:  14393.0.amd64fre.rs1_release.160715-1616

DUMP_TYPE:  0

BUGCHECK_P1: fffff8015046dee0

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff8015046dee0

READ_ADDRESS:  fffff8015046dee0 

CURRENT_IRQL:  2

FAULTING_IP: 
dump_NDIS!NdisReleaseRWLock+0
fffff801`5046dee0 0fb64201        movzx   eax,byte ptr [rdx+1]

IP_IN_PAGED_CODE: 
dump_NDIS!NdisReleaseRWLock+0
fffff801`5046dee0 0fb64201        movzx   eax,byte ptr [rdx+1]

CPU_COUNT: 4

CPU_MHZ: cdc

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3c

CPU_STEPPING: 3

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-11K141K

ANALYSIS_SESSION_TIME:  11-12-2016 16:02:16.0745

ANALYSIS_VERSION: 10.0.14321.1024 amd64fre

TRAP_FRAME:  ffff8a80f0173480 -- (.trap 0xffff8a80f0173480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd8808c342d00
rdx=ffff8a80f0173658 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015046dee0 rsp=ffff8a80f0173618 rbp=0000000000000003
 r8=ffffd8808c342d00  r9=0000000000000000 r10=0000000000000000
r11=ffffd8808a4aa8b8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
dump_NDIS!NdisReleaseRWLock:
fffff801`5046dee0 0fb64201        movzx   eax,byte ptr [rdx+1] ds:ffff8a80`f0173659=04
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8009ba5c96a to fffff8009b9d8a60

FAILED_INSTRUCTION_ADDRESS: 
dump_NDIS!NdisReleaseRWLock+0
fffff801`5046dee0 0fb64201        movzx   eax,byte ptr [rdx+1]

STACK_TEXT:  
ffff8a80`f0172b88 fffff800`9ba5c96a : fffff801`5046dee0 00000000`0000000a ffff8a80`f0172cf0 fffff800`9b91fc88 : nt!DbgBreakPointWithStatus
ffff8a80`f0172b90 fffff800`9ba5c359 : 00000000`00000003 ffff8a80`f0172cf0 fffff800`9b9e0340 00000000`000000d1 : nt!KiBugCheckDebugBreak+0x12
ffff8a80`f0172bf0 fffff800`9b9d3094 : ffff88fc`00a82320 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheck2+0x8a5
ffff8a80`f0173300 fffff800`9b9de129 : 00000000`0000000a fffff801`5046dee0 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx+0x104
ffff8a80`f0173340 fffff800`9b9dc707 : 00000000`00000000 ffffd880`8c342d00 ffff8a80`f0173658 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8a80`f0173480 fffff801`5046dee0 : fffff801`4fa020ca 00000000`00000000 00000000`00000003 ffff8a80`f0173870 : nt!KiPageFault+0x247
ffff8a80`f0173618 fffff801`4fa020ca : 00000000`00000000 00000000`00000003 ffff8a80`f0173870 00000000`00000000 : dump_NDIS!NdisReleaseRWLock
ffff8a80`f0173620 fffff801`4fa22ee9 : 00000000`00000000 00000000`00000400 ffffa40d`0c3be9c0 ffffd880`8c3420b0 : dump_NETIO!KfdSetVisibleFilterState+0x46
ffff8a80`f0173650 fffff801`4fa6a77c : 00000000`00000000 ffff8a80`f0173870 00000000`00000090 ffff8a80`f01736d0 : dump_NETIO!KfdApplyBoottimePolicy+0x35
ffff8a80`f0173690 fffff800`9bd11069 : ffffa40d`0c54bf10 ffffa40d`0c54beb0 ffffd880`8c3420b0 ffff8a80`f01737a9 : dump_NETIO!KfdApplyBoottimePolicyCallback+0x4c
ffff8a80`f01736c0 fffff800`9bd10e06 : 00000000`00000000 ffff8a80`f01737a9 ffff8a80`f0173870 fffff800`9b9d6150 : nt!RtlpCallQueryRegistryRoutine+0x121
ffff8a80`f0173720 fffff800`9bd0f7fe : 00000000`00000000 00000000`00000007 00000000`00000005 00000000`00000000 : nt!RtlpQueryRegistryValues+0x356
ffff8a80`f0173800 fffff801`4fa6a70e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlQueryRegistryValuesEx+0xe
ffff8a80`f0173840 fffff801`4fa6a67b : 00000000`00000000 00000000`00000007 fffff801`4fa61b20 00000000`00000005 : dump_NETIO!KfdReadAndApplyBoottimePolicy+0x4e
ffff8a80`f01738f0 fffff801`4fa6a45e : fffff801`00000001 00000000`00000002 ffffffff`80000198 fffff801`4fa74080 : dump_NETIO!KfdProcessBoottimePolicy+0x57
ffff8a80`f0173920 fffff801`4fa6a40e : 00000000`00000000 fffff801`4fa740b0 ffffd880`8b1f40d0 00000000`00000001 : dump_NETIO!KfdStartModuleEx+0x3e
ffff8a80`f0173950 fffff801`4fa6a3ba : fffff801`4fa740c8 fffff801`50567014 00000000`00000010 00000000`00010282 : dump_NETIO!KfdStartModule+0x1e
ffff8a80`f0173980 fffff801`4fa75079 : 00000000`00000000 ffff8a80`f0173a30 ffffd880`8bcbb9c0 ffff8a80`f0173a30 : dump_NETIO!RtlInvokeStartRoutines+0x3a
ffff8a80`f01739c0 fffff800`9bdb2389 : 00000000`00000014 fffff800`9bb8e060 ffffd880`8bcbb9c0 ffffa40d`00000003 : dump_NETIO!DllInitialize+0x79
ffff8a80`f01739f0 fffff800`9bdb21e5 : ffffd880`8bcbb9c0 00000000`00000000 00000000`00000000 fffff800`00000000 : nt!MmCallDllInitialize+0x15d
ffff8a80`f0173a60 fffff800`9bcc1c4a : 00000000`00000002 ffff8a80`f0173c70 fffff800`9bb8e060 ffff8a80`f0174410 : nt!MiLoadImportDll+0x55
ffff8a80`f0173ab0 fffff800`9bd25092 : fffff801`50460000 ffff8a80`f0173c40 ffff8a80`f0173c70 ffff8a80`f0174410 : nt!MiResolveImageReferences+0x1f2
ffff8a80`f0173bc0 fffff800`9bdb21c6 : ffff8a80`f0173e20 ffff8a80`f0174410 00000000`00000002 fffff800`00000000 : nt!MmLoadSystemImage+0x2da
ffff8a80`f0173d60 fffff800`9bcc1c4a : 00000000`00000002 ffff8a80`f0173f70 fffff800`9bb8e060 ffff8a80`f0174410 : nt!MiLoadImportDll+0x36
ffff8a80`f0173db0 fffff800`9bd25092 : fffff801`4ee10000 ffff8a80`f0173f40 ffff8a80`f0173f70 ffff8a80`f0174410 : nt!MiResolveImageReferences+0x1f2
ffff8a80`f0173ec0 fffff800`9bdb21c6 : ffff8a80`f0174120 ffff8a80`f0174410 00000000`00000002 fffff800`00000000 : nt!MmLoadSystemImage+0x2da
ffff8a80`f0174060 fffff800`9bcc1c4a : 00000000`00000002 ffff8a80`f0174270 fffff800`9bb8e060 ffff8a80`f0174410 : nt!MiLoadImportDll+0x36
ffff8a80`f01740b0 fffff800`9bd25092 : fffff801`4ede0000 ffff8a80`f0174240 ffff8a80`f0174270 ffff8a80`f0174410 : nt!MiResolveImageReferences+0x1f2
ffff8a80`f01741c0 fffff801`4eda0eda : ffff8a80`f01743e8 ffff8a80`f0174410 00000000`00000000 ffffd880`00000002 : nt!MmLoadSystemImage+0x2da
ffff8a80`f0174360 fffff801`4eda07d1 : ffffffff`80000204 fffff801`4ed9c2a0 00000000`00000008 ffff8a80`f0174730 : crashdmp!CrashdmpLoadDumpStack+0x2ba
ffff8a80`f01745d0 fffff800`9bddaef8 : ffffffff`80000150 ffffd880`8c2df090 ffffa40d`0c408fc8 ffffffff`80000204 : crashdmp!CrashdmpInitialize+0x4a1
ffff8a80`f0174700 fffff800`9c035f56 : ffff8a80`f01749d0 fffff800`9bad4ed5 ffff8a80`00000003 ffff8a80`f01747c9 : nt!IopInitializeCrashDump+0x74
ffff8a80`f0174750 fffff800`9bd11194 : ffffa40d`0c408f98 ffffa40d`0c408f60 ffff8a80`f01749f0 ffff8a80`f0174909 : nt!IopInitCrashDumpRegCallback+0xfe

IP 地址: 已记录   报告
   2016-11-13, 14:47 下午
Raymond 离线,最后访问时间: 2020/7/3 3:40:25 格蠹老雷

发帖数前10位
注册: 2005-12-19
发 贴: 1,303
Re: 加载驱动时蓝屏,dump信息如下,但是蓝屏时是栈里没有我的驱动,求各位老师帮忙看一下。
Reply Quote
连环爆炸,在产生dump时又触发了异常,现在看到是产生dump时触发的,栈比较深,目前只看到一部分,还有,执行kv 1000


IP 地址: 已记录   报告
   2016-11-14, 15:21 下午
linkerrors 离线,最后访问时间: 2018/11/19 13:12:31 风继续吹

发帖数前50位
注册: 2014-09-27
发 贴: 23
Re: 加载驱动时蓝屏,dump信息如下,但是蓝屏时是栈里没有我的驱动,求各位老师帮忙看一下。
Reply Quote
多谢张老师解答! 已经找到问题!
IP 地址: 已记录   报告
高端调试 » 软件调试 » Windows内核调试 » Re: 加载驱动时蓝屏,dump信息如下,但是蓝屏时是栈里没有我的驱动,求各位老师帮忙看一下。

 
Legal Notice Privacy Statement Corporate Governance Corporate Governance
(C)2004-2020 ADVDBG.ORG All Rights Reserved.