z13667152750 发表于 2012-8-5 14:39
你到底见过别人用debug分析dmp文件来定位蓝屏原因吗?
导致蓝屏的原因大多数都是驱动的问题,解决方 ...
这把这份dmp让360修修看,他到底是修显卡驱动还是卸载私-Fu传奇
dmp地址:https://att.kafan.cn/forum.php?mo ... 0NHxmY2NhNmZiYXwxMz
这只不过是其中之一,如果还有其它问题呢,360每次都能“智能的”正确的识别出来?可能么?
- Microsoft (R) Windows Debugger Version 6.11.0001.402 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Documents and Settings\Administrator\桌面\080512-21465-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*c:\symbolslocal*http://msdl.microsoft.com/download/symbols
- Executable search path is: C:\WINDOWS\system32
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.17803.x86fre.win7sp1_gdr.120330-1504
- Machine Name:
- Kernel base = 0x83e3b000 PsLoadedModuleList = 0x83f844d0
- Debug session time: Sun Aug 5 11:57:08.059 2012 (GMT+8)
- System Uptime: 0 days 3:37:08.041
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- .............................................................
- Loading User Symbols
- Loading unloaded module list
- .......
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 1000007F, {8, 801e6000, 0, 0}
- Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
- *** WARNING: Unable to verify timestamp for nvlddmkm.sys
- *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
- *** WARNING: Unable to verify timestamp for GamesGuardNet.dat
- *** ERROR: Module load completed but symbols could not be loaded for GamesGuardNet.dat
- *** WARNING: Unable to verify timestamp for TSKsp.sys
- *** ERROR: Module load completed but symbols could not be loaded for TSKsp.sys
- *** WARNING: Unable to verify timestamp for Hookport.sys
- *** ERROR: Module load completed but symbols could not be loaded for Hookport.sys
- *** WARNING: Unable to verify timestamp for TsFltMgr.sys
- *** ERROR: Module load completed but symbols could not be loaded for TsFltMgr.sys
- *** WARNING: Unable to verify timestamp for OEM02Dev.sys
- *** ERROR: Module load completed but symbols could not be loaded for OEM02Dev.sys
- Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiUpdateContextRunningTimeAtISR+3c )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
- This means a trap occurred in kernel mode, and it's a trap of a kind
- that the kernel isn't allowed to have/catch (bound trap) or that
- is always instant death (double fault). The first number in the
- bugcheck params is the number of the trap (8 = double fault, etc)
- Consult an Intel x86 family manual to learn more about what these
- traps are. Here is a *portion* of those codes:
- If kv shows a taskGate
- use .tss on the part before the colon, then kv.
- Else if kv shows a trapframe
- use .trap on that value
- Else
- .trap on the appropriate frame will show where the trap was taken
- (on x86, this will be the ebp that goes with the procedure KiTrap)
- Endif
- kb will then show the corrected stack.
- Arguments:
- Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
- Arg2: 801e6000
- Arg3: 00000000
- Arg4: 00000000
- Debugging Details:
- ------------------
- BUGCHECK_STR: 0x7f_8
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- PROCESS_NAME: rundll32.exe
- CURRENT_IRQL: 4
- LAST_CONTROL_TRANSFER: from 83e0c7a1 to 83e0c0d2
- STACK_TEXT:
- d401f004 83e0c7a1 d401f020 83e10b53 d401f018 hal!HalpHpetQueryCount+0x6
- d401f00c 83e10b53 d401f018 00da7a64 00000000 hal!HalpHpetQueryPerformanceCounter+0x1d
- d401f020 97134b24 d401f040 d401f084 8aef7000 hal!KeQueryPerformanceCounter+0x3d
- d401f054 9713669d d401f06c 8757e008 8aef7000 dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x3c
- d401f090 97138952 8757e008 000e8e5f 00000001 dxgmms1!VidSchiProcessIsrCompletedPacket+0x13d
- d401f0c0 97138f6d 8aef7000 d401f180 00000001 dxgmms1!VidSchDdiNotifyInterruptWorker+0x1b2
- d401f0dc 97076ea5 879eb920 d401f180 d401f104 dxgmms1!VidSchDdiNotifyInterrupt+0x7b
- d401f0ec 97076f0e 875e44b8 879eb920 d401f180 dxgkrnl!VIDSCH_EXPORT::VidSchDdiNotifyInterrupt+0x14
- d401f104 966b100b 879eb920 d401f180 d401f180 dxgkrnl!DxgNotifyInterruptCB+0x60
- WARNING: Stack unwind information not available. Following frames may be wrong.
- d401f12c 966b1262 d401f180 00000000 8ac5b648 nvlddmkm+0xac00b
- d401f168 966f934f 966b121f 8abbf000 8abbf638 nvlddmkm+0xac262
- d401f20c 966fa13e 00000000 000e8e5f 00000000 nvlddmkm+0xf434f
- d401f224 966b14f1 000e8e5f 00000000 00000000 nvlddmkm+0xf513e
- d401f278 966b17a8 96fce938 87b5b000 00000000 nvlddmkm+0xac4f1
- d401f2a4 97076b14 967551a6 00000000 d401f2c8 nvlddmkm+0xac7a8
- d401f2b4 97086d59 889aea00 879eb920 00000000 dxgkrnl!DpiFdoMessageInterruptRoutine+0x17
- d401f2c8 83e7581d 889aea00 879eb920 d401f2f4 dxgkrnl!DpiFdoLineInterruptRoutine+0x12
- d401f2c8 83ecd6c4 889aea00 879eb920 d401f2f4 nt!KiInterruptDispatch+0x6d
- d401f3c0 83ed9089 000000ef 00000004 00000002 nt!MiRemoveAnyPage+0xdd
- d401f3e8 83f5a844 00000087 00000004 00000000 nt!MiGetPage+0x290
- d401f450 83ed660d 00000000 00010000 00000ff0 nt!MiAllocatePoolPages+0x3dc
- d401f4a8 83f5b132 00000000 00000000 00010000 nt!ExpAllocateBigPool+0xa6
- d401f50c a0893406 00000000 0000fffe 6e726567 nt!ExAllocatePoolWithTag+0x12d
- d401f54c 840d8e5e 00000000 0000001b d401f5ec GamesGuardNet+0x4406
- d401f5c0 8406df28 0000001b c2af0e28 9fee4fd0 nt!CmpCallCallBacks+0x336
- d401f608 8406a371 0000001b a81fdb50 d401f6c0 nt!CmPostCallbackNotification+0x55
- d401f798 84060c2e d37debb8 86805728 d4d79008 nt!CmpParseKey+0x14b2
- d401f814 84071040 80001e98 d401f868 00000240 nt!ObpLookupObjectName+0x4fa
- d401f874 8403cafa d401fcd4 86805728 001db800 nt!ObOpenObjectByName+0x165
- d401f954 8403cf41 d401fcd0 000f003f d401fcd4 nt!CmCreateKey+0x2b2
- d401f97c a199d2aa d401fcd0 000f003f d401fcd4 nt!NtCreateKey+0x1f
- d401fa28 84b15230 d401fcd0 000f003f d401fcd4 TSKsp+0xd2aa
- d401fb04 84b3a595 d401fcd0 000f003f d401fcd4 Hookport+0x1230
- d401fc10 83e7927a d401fcd0 000f003f d401fcd4 TsFltMgr+0x2595
- d401fc10 83e76d5d d401fcd0 000f003f d401fcd4 nt!KiFastCallEntry+0x12a
- d401fca4 9ae396a7 d401fcd0 000f003f d401fcd4 nt!ZwCreateKey+0x11
- d401fcc4 00000000 d40211fc 00000000 00000018 OEM02Dev+0x316a7
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- dxgmms1!VidSchiUpdateContextRunningTimeAtISR+3c
- 97134b24 8945f4 mov dword ptr [ebp-0Ch],eax
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: dxgmms1!VidSchiUpdateContextRunningTimeAtISR+3c
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgmms1
- IMAGE_NAME: dxgmms1.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4d4a24c1
- FAILURE_BUCKET_ID: 0x7f_8_dxgmms1!VidSchiUpdateContextRunningTimeAtISR+3c
- BUCKET_ID: 0x7f_8_dxgmms1!VidSchiUpdateContextRunningTimeAtISR+3c
- Followup: MachineOwner
- ---------
复制代码 |