qingshuizilan
驱动牛犊
驱动牛犊
  • 注册日期2009-12-09
  • 最后登录2010-11-23
  • 粉丝0
  • 关注0
  • 积分23分
  • 威望171点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
阅读:7595回复:5

驱动蓝屏与ntkrnlpa.exe有关,不知如何分析dump文件

楼主#
更多 发布于:2010-05-26 16:12
我的驱动蓝屏了,从dump文件看是由于ntkrnlpa.exe的原因,再往下怎么做,是不是我的驱动里哪地方误用了内存,这类问题还没碰到过,大牛们能不能提个思路,我的dump文件如下:

Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Mini051910-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*d:\symbs*http://msdl.microsoft.com/download/symbols;E:\BigLocal\objchk_wxp_x86\i386;srv*C:\symb\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: E:\BigLocal\objchk_wxp_x86\i386
Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_rtm.040803-2158
Machine Name:
Kernel base = 0x804d8000 PsLoadedModuleList = 0x805541a0
Debug session time: Wed May 19 09:54:51.023 2010 (GMT+8)
System Uptime: 0 days 0:02:23.640
Loading Kernel Symbols
...............................................................
................................................................

Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {4, 2, 0, 804e4518}

Probably caused by : ntkrnlpa.exe ( nt!CcFlushCache+6c )

Followup: MachineOwner
---------

kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000004, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 804e4518, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  00000004

CURRENT_IRQL:  2

FAULTING_IP:
nt!CcFlushCache+6c
804e4518 8b7004          mov     esi,dword ptr [eax+4]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

LAST_CONTROL_TRANSFER:  from 804e4b40 to 804e4518

STACK_TEXT:  
f7a30ce8 804e4b40 00000000 00000000 00000001 nt!CcFlushCache+0x6c
f7a30d2c 804e716a 865b3218 8055b1c0 865b65b8 nt!CcWriteBehind+0xdc
f7a30d74 80534dd0 865b3218 00000000 865b65b8 nt!CcWorkerThread+0x126
f7a30dac 805c5a28 865b3218 00000000 00000000 nt!ExpWorkerThread+0x100
f7a30ddc 80541fa2 80534cd0 00000000 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP:
nt!CcFlushCache+6c
804e4518 8b7004          mov     esi,dword ptr [eax+4]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!CcFlushCache+6c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlpa.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  41107b0c

FAILURE_BUCKET_ID:  0xA_nt!CcFlushCache+6c

BUCKET_ID:  0xA_nt!CcFlushCache+6c

Followup: MachineOwner
---------

kd> lmvm nt
start    end        module name
804d8000 806ce100   nt         (pdb symbols)          d:\symbs\ntkrnlpa.pdb\BD8F451F3E754ED8A34B50560CEB08E31\ntkrnlpa.pdb
    Loaded symbol image file: ntkrnlpa.exe
    Mapped memory image file: d:\symbs\ntkrnlpa.exe\41107B0C1f6100\ntkrnlpa.exe
    Image path: ntkrnlpa.exe
    Image name: ntkrnlpa.exe
    Timestamp:        Wed Aug 04 13:58:36 2004 (41107B0C)
    CheckSum:         001F6612
    ImageSize:        001F6100
    File version:     5.1.2600.2180
    Product version:  5.1.2600.2180
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0804.04b0
    CompanyName:      Microsoft Corporation
    ProductName:      Microsoft(R) Windows(R) Operating System
    InternalName:     ntkrnlpa.exe
    OriginalFilename: ntkrnlpa.exe
    ProductVersion:   5.1.2600.2180
    FileVersion:      5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
    FileDescription:  NT Kernel & System
    LegalCopyright:   (C) Microsoft Corporation. All rights reserved.
dragonltx
驱动牛犊
驱动牛犊
  • 注册日期2010-02-25
  • 最后登录2010-08-04
  • 粉丝0
  • 关注0
  • 积分38分
  • 威望281点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
沙发#
发布于:2010-05-27 16:29
把出错的代码贴上来吧!关看这个不清楚哪里错了!
qingshuizilan
驱动牛犊
驱动牛犊
  • 注册日期2009-12-09
  • 最后登录2010-11-23
  • 粉丝0
  • 关注0
  • 积分23分
  • 威望171点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
板凳#
发布于:2010-05-28 08:57
回 1楼(dragonltx) 的帖子
我做的是文件过滤,在tooflat中sfilter的基础上改的,过滤u盘的文件正常,过滤硬盘的文件就蓝屏了,不知道是哪出错了,
wanghui219
禁止发言
禁止发言
  • 注册日期2007-08-28
  • 最后登录2019-07-29
  • 粉丝4
  • 关注3
  • 积分101166分
  • 威望505351点
  • 贡献值0点
  • 好评度137点
  • 原创分0分
  • 专家分4分
  • 社区居民
地板#
发布于:2010-05-28 09:02
用户被禁言,该主题自动屏蔽!
qingshuizilan
驱动牛犊
驱动牛犊
  • 注册日期2009-12-09
  • 最后登录2010-11-23
  • 粉丝0
  • 关注0
  • 积分23分
  • 威望171点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
地下室#
发布于:2010-05-28 10:58
回 3楼(wanghui219) 的帖子
应该是我的驱动的问题,不是ntkrnlpa.exe的问题
thinkevd
驱动牛犊
驱动牛犊
  • 注册日期2010-07-18
  • 最后登录2010-07-18
  • 粉丝0
  • 关注0
  • 积分1分
  • 威望11点
  • 贡献值0点
  • 好评度0点
  • 原创分0分
  • 专家分0分
5楼#
发布于:2010-07-18 08:57
和你一样的问题,奇怪的是都是symbols目录下的ntkrnlpa.exe文件。如果谁有答案了,不胜感激!

[QUOTE]
Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.
 
 
Loading Dump File [C:\Users\Gavin\Desktop\071810-18267-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
 
Symbol search path is:
SRV*c:\websymbols*////msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x84248000 PsLoadedModuleList = 0x84390810
Debug session time: Sun Jul 18 07:50:49.962 2010 (UTC + 8:00)
System Uptime: 0 days 0:53:16.024
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
......
0: kd> !analyze -v
*******************************************************************************
*
*
*                        Bugcheck
Analysis                                    *
*
*
*******************************************************************************
 
ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC
routine.
This is an illegal operation and the stack track will lead to the offending
code and original DPC routine.
Arguments:
Arg1: 860be5d8, Original thread which is the cause of the failure
Arg2: 86316030, New thread
Arg3: b0f2dfd0, Stack address of the original thread
Arg4: 00000000
 
Debugging Details:
------------------
 
 
FAULTING_THREAD:  860be5d8
 
CUSTOMER_CRASH_COUNT:  1
 
DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
 
BUGCHECK_STR:  0xB8
 
PROCESS_NAME:  iexplore.exe
 
CURRENT_IRQL:  2
 
LAST_CONTROL_TRANSFER:  from 842afcfd to 84324d10
 
STACK_TEXT:
99d17cc0 842afcfd 000000b8 860be5d8 86316030 nt!KeBugCheckEx+0x1e
99d17cec 84216924 99d17d34 86951284 00200006 nt!SwapContext_XRstorEnd+0x105
99d17d00 84216b29 84371c02 99d17d34 30a972d8
hal!HalpDispatchSoftwareInterrupt+0x5e
99d17d18 84216cc3 86d55008 99d17d34 842874f3
hal!HalpCheckForSoftwareInterrupt+0x83
99d17d24 842874f3 00000000 00000092 067cb728 hal!HalEndSystemInterrupt+0x67
99d17d24 6abea617 00000000 00000092 067cb728 nt!KiChainedDispatch+0x73
WARNING: Frame IP not in any known module. Following frames may be wrong.
067cb728 00000000 00000000 00000000 00000000 0x6abea617
 
 
STACK_COMMAND:  .thread 0xffffffff860be5d8 ; kb
 
FOLLOWUP_IP:
nt!SwapContext_XRstorEnd+105
842afcfd c3              ret
 
SYMBOL_STACK_INDEX:  1
 
SYMBOL_NAME:  nt!SwapContext_XRstorEnd+105
 
FOLLOWUP_NAME:  MachineOwner
 
MODULE_NAME: nt
 
 
 
IMAGE_NAME:  ntkrpamp.exe
 
DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cacf
 
FAILURE_BUCKET_ID:  0xB8_nt!SwapContext_XRstorEnd+105
 
BUCKET_ID:  0xB8_nt!SwapContext_XRstorEnd+105
 
Followup: MachineOwner
---------
 
0: kd> lmvm nt
start    end        module name
84248000 84658000   nt         (pdb symbols)
c:\websymbols\ntkrpamp.pdb\A0D85B412D774C83B08EF4AE749A8B582\ntkrpamp.pdb
      Loaded symbol image file: ntkrpamp.exe
      Mapped memory image file:
c:\websymbols\ntkrnlpa.exe\4B88CACF410000\ntkrnlpa.exe
      Image path: ntkrpamp.exe
      Image name: ntkrpamp.exe
      Timestamp:        Sat Feb 27 15:33:35 2010 (4B88CACF)
      CheckSum:         003C7867
      ImageSize:        00410000
      File version:     6.1.7600.16539
      Product version:  6.1.7600.16539
      File flags:       0 (Mask 3F)
      File OS:          40004 NT Win32
      File type:        1.0 App
      File date:        00000000.00000000
      Translations:     0409.04b0
      CompanyName:      Microsoft Corporation
      ProductName:      Microsoft? Windows? Operating System
      InternalName:     ntkrpamp.exe
      OriginalFilename: ntkrpamp.exe
      ProductVersion:   6.1.7600.16539
      FileVersion:      6.1.7600.16539 (win7_gdr.100226-1909)
      FileDescription:  NT Kernel & System
      LegalCopyright:   ? Microsoft Corporation. All rights reserved.
[/QUOTE]
游客

返回顶部