為心導航 2023-11-04 22:23 采纳率: 50%
浏览 27

电脑蓝屏,分析dump文件

#电脑蓝屏
#下面是用windbg分析dump的结果,但是看不太懂,有人帮忙看看吗

Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\tmp\110423-13406-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff803`67200000 PsLoadedModuleList = 0xfffff803`67e2a2d0
Debug session time: Sat Nov  4 21:29:23.866 2023 (UTC + 8:00)
System Uptime: 0 days 9:50:12.556
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
..................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`675fc030 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff803`6b497db0=0000000000000139
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000000, A stack-based buffer has been overrun.
Arg2: 0000000000000000, Address of the trap frame for the exception that caused the bugcheck
Arg3: 0000000000000000, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2296

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 89027

    Key  : Analysis.Init.CPU.mSec
    Value: 593

    Key  : Analysis.Init.Elapsed.mSec
    Value: 262193

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 82


DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  139

BUGCHECK_P1: 0

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

TRAP_FRAME:  ffffc281e9da0500 -- (.trap 0xffffc281e9da0500)
Unable to read trap frame at ffffc281`e9da0500

EXCEPTION_RECORD:  0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
fffff803`6b497da8 fffff803`6760623b     : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff803`6b497db0 fffff803`69bc2853     : ffffc281`dd722000 ffffc281`dd722000 00000000`00000001 ffffc281`dd724dc8 : nt!guard_icall_bugcheck+0x1b
fffff803`6b497de0 fffff803`69bbe842     : ffffc281`e20d3110 00000000`00000001 ffffc281`e20d3130 ffffc281`dd724d88 : Wdf01000!FxThreadedEventQueue::QueueWorkItem+0x4f [minkernel\wdf\framework\shared\irphandlers\pnp\eventqueue.cpp @ 408] 
fffff803`6b497e10 fffff803`69c3b29a     : 00000000`00000000 ffffc281`e20d3110 fffff803`6b497f58 fffff803`67426399 : Wdf01000!FxThreadedEventQueue::QueueToThread+0x1a [minkernel\wdf\framework\shared\inc\private\common\FxEventQueue.hpp @ 359] 
fffff803`6b497e40 fffff803`69c3937e     : 00000000`00000000 ffffc281`e20d3000 ffffc281`e6d1a2b0 ffffd480`d0db7970 : Wdf01000!FxWakeInterruptMachine::ProcessEvent+0x16a [minkernel\wdf\framework\shared\irphandlers\pnp\wakeinterruptstatemachine.cpp @ 242] 
fffff803`6b497ec0 fffff803`69bcf470     : 00000000`00000000 fffff803`674ff7a1 00000000`00000000 ffffc281`d6bc6000 : Wdf01000!FxInterrupt::WakeInterruptIsr+0x1a [minkernel\wdf\framework\shared\irphandlers\pnp\interruptobject.cpp @ 313] 
fffff803`6b497f00 fffff803`6753ec65     : ffffd480`d0db78c0 00000000`00008501 fffff803`62ffd180 fffff803`6b497fc0 : Wdf01000!FxInterrupt::_InterruptThunk+0x1b840 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 346] 
fffff803`6b497f40 fffff803`675fdd4f     : fffff803`6b488b10 ffffd480`d0db78c0 00000000`000003a0 fffff803`676041d0 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`6b497f90 fffff803`675fe017     : fffff803`6b488bb0 00000000`00000001 00000000`00040046 fffff803`67481ba8 : nt!KiInterruptSubDispatch+0x11f
fffff803`6b488a90 fffff803`676008ea     : 00000000`00000000 fffff803`67f27a00 ffffc281`e9da0500 00000000`000003a0 : nt!KiInterruptDispatch+0x37
fffff803`6b488c20 00000000`00000000     : fffff803`6b489000 fffff803`6b482000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a


SYMBOL_NAME:  nt!guard_icall_bugcheck+1b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.3086

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1b

FAILURE_BUCKET_ID:  0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_bugcheck

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {9bee41a7-2ef9-07ca-7e59-7d5a0c6e2d05}

Followup:     MachineOwner
---------

0: kd> lmvm nt
Browse full module list
start             end                 module name
fffff803`67200000 fffff803`68246000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\822743A92D0786AB4FD541A4C8CBCAA91\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntoskrnl.exe\23C7FC511046000\ntoskrnl.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        23C7FC51 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A5D816
    ImageSize:        01046000
    File version:     10.0.19041.3086
    Product version:  10.0.19041.3086
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft Windows Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.19041.3086
        FileVersion:      10.0.19041.3086 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:    Microsoft Corporation. All rights reserved.


  • 写回答

2条回答 默认 最新

  • CSDN-Ada助手 CSDN-AI 官方账号 2023-11-06 01:15
    关注

    【以下回答由 GPT 生成】

    如何分析电脑蓝屏问题的dump文件?

    要分析电脑蓝屏问题的dump文件,可以使用Windbg工具。下面是一些步骤来进行分析:

    1. 下载和安装Windbg工具:你可以从Microsoft的官方网站上下载Windbg工具并进行安装。

    2. 打开Windbg工具并加载dump文件:双击运行Windbg,然后选择 "File" -> "Open Crash Dump",然后导航到你的dump文件并打开它。dump文件通常以.dmp或.mdmp为扩展名。

    3. 设置符号路径:在Windbg的命令行中,输入下面的命令来设置符号路径:

      .sympath srv*c:\symbols*https://msdl.microsoft.com/download/symbols

      这将设置符号路径为Microsoft的符号服务器。

    4. 分析dump文件:在Windbg中输入下面的命令来开始分析dump文件:

      !analyze -v

      这个命令将会执行一个自动分析,并输出有关蓝屏问题的信息。你可以查看分析结果并尝试理解问题的原因。

      ```

      ...

      ```

      解决该问题。

    如果你对分析结果不太清楚或有任何进一步的问题,请提供错误信息或相关截图,这样我才能更进一步帮助你。



    【相关推荐】



    如果你已经解决了该问题, 非常希望你能够分享一下解决方案, 写成博客, 将相关链接放在评论区, 以帮助更多的人 ^-^
    评论

报告相同问题?

问题事件

  • 创建了问题 11月4日