最近经常蓝屏,蓝屏代码每次都一样,但是又不怎么会用 Windbg。
求大神指教一下如何使用 Windbg。
顺便附上 DMP 文件:
链接: https://pan.baidu.com/s/1k0MyWlv-cmdes7Bm7I2Viw
提取码:53c9
在顺便贴点 DMP 信息:
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8015eddfbae, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff8015eddfbae, address which referenced memory
TRAP_FRAME: ffffb78a58ba9450 -- (.trap 0xffffb78a58ba9450)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000334000 rbx=0000000000000000 rcx=00000000c0000100
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8015eddfbae rsp=ffffb78a58ba95e0 rbp=000024edbd9bbfff
r8=ffffb98be2cc3080 r9=0000000000000002 r10=0000000100000092
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
fffff801`5eddfbae ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80118ddd869 to fffff80118dcc130
FAILED_INSTRUCTION_ADDRESS:
+0
fffff801`5eddfbae ?? ???
STACK_TEXT:
ffffb78a`58ba9308 fffff801`18ddd869 : 00000000`0000000a fffff801`5eddfbae 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffb78a`58ba9310 fffff801`18dd9c8e : 000024ed`bd9bbfff ffffb78a`58ba9600 ffffb98b`00000001 ffffb98b`00000000 : nt!KiBugCheckDispatch+0x69
ffffb78a`58ba9450 fffff801`5eddfbae : 000024ed`bd9bbfff 00000000`00000000 fffff801`00000001 ffffa700`00000000 : nt!KiPageFault+0x44e
ffffb78a`58ba95e0 000024ed`bd9bbfff : 00000000`00000000 fffff801`00000001 ffffa700`00000000 fffff801`18c1b000 : 0xfffff801`5eddfbae
ffffb78a`58ba95e8 00000000`00000000 : fffff801`00000001 ffffa700`00000000 fffff801`18c1b000 00000000`00000000 : 0x000024ed`bd9bbfff
THREAD_SHA1_HASH_MOD_FUNC: bf99962f16aee8a6a536cfcc5454c0cd4db15ac9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 2053c9cd60dcbe7f477419e6aee8664b1711298a
THREAD_SHA1_HASH_MOD: 2a7ca9d3ab5386d53fea7498e1d81b9c4a4c036b
FOLLOWUP_IP:
nt!KiPageFault+44e
fffff801`18dd9c8e 33c0 xor eax,eax
FAULT_INSTR_CODE: ffb0c033
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+44e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
这是一个专为移动设备优化的页面(即为了让你能够在 Google 搜索结果里秒开这个页面),如果你希望参与 V2EX 社区的讨论,你可以继续到 V2EX 上打开本讨论主题的完整版本。
V2EX 是创意工作者们的社区,是一个分享自己正在做的有趣事物、交流想法,可以遇见新朋友甚至新机会的地方。
V2EX is a community of developers, designers and creative people.