本帖最后由 卡朗 于 2014-2-20 13:51 编辑
上一次发的关于蓝屏帖子是:http://bbs.kafan.cn/thread-1686747-1-1.html
系统是Win 7 SP1 旗舰版
插上电源通电,按下主机电源按钮,本应该正常进入Win7的,但是蓝屏出现了。
蓝屏文件:http://pan.baidu.com/s/1mgHPdJM
以下是WinDbg的分析结果,我自己分析得出是QQProtect.sys这个引起的,好像每次蓝屏绝大多数有这个身影,但是不是由它引起的就不清楚了,不知道我有没有分析错误了。@伊川书院
- Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\MEMORY.DMP]
- Kernel Summary Dump File: Only kernel address space is available
- Symbol search path is: *** Invalid ***
- ****************************************************************************
- * Symbol loading may be unreliable without a symbol search path. *
- * Use .symfix to have the debugger choose a symbol path. *
- * After setting your symbol path, use .reload to refresh symbol locations. *
- ****************************************************************************
- Executable search path is:
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrpamp.exe -
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.18247.x86fre.win7sp1_gdr.130828-1532
- Machine Name:
- Kernel base = 0x84c1c000 PsLoadedModuleList = 0x84d654d0
- Debug session time: Thu Feb 20 12:39:09.746 2014 (UTC + 8:00)
- System Uptime: 0 days 0:00:13.119
- *********************************************************************
- * Symbols can not be loaded because symbol path is not initialized. *
- * *
- * The Symbol Path can be set by: *
- * using the _NT_SYMBOL_PATH environment variable. *
- * using the -y <symbol_path> argument when starting the debugger. *
- * using .sympath and .sympath+ *
- *********************************************************************
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrpamp.exe -
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..............
- Loading User Symbols
- PEB is paged out (Peb.Ldr = 7ffd700c). Type ".hh dbgerr001" for details
- Loading unloaded module list
- ...
- 3: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- KERNEL_MODE_EXCEPTION_NOT_HANDLED (8e)
- This is a very common bugcheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: c0000005, The exception code that was not handled
- Arg2: 84d3c008, The address that the exception occurred at
- Arg3: 926ab838, Trap Frame
- Arg4: 00000000
- Debugging Details:
- ------------------
- *** ERROR: Module load completed but symbols could not be loaded for QQProtect.sys
- ***** Kernel symbols are WRONG. Please fix symbols to do analysis.
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- *************************************************************************
- *** ***
- *** ***
- *** Your debugger is not using the correct symbols ***
- *** ***
- *** In order for this command to work properly, your symbol path ***
- *** must point to .pdb files that have full type information. ***
- *** ***
- *** Certain .pdb files (such as the public OS symbols) do not ***
- *** contain the required information. Contact the group that ***
- *** provided you with these symbols if you need this command to ***
- *** work. ***
- *** ***
- *** Type referenced: nt!_KPRCB ***
- *** ***
- *************************************************************************
- ADDITIONAL_DEBUG_TEXT:
- Use '!findthebuild' command to search for the target build information.
- If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
- FAULTING_MODULE: 84c1c000 nt
- DEBUG_FLR_IMAGE_TIMESTAMP: 526e6145
- EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%08lx
- FAULTING_IP:
- nt!ExAllocatePoolWithTag+3
- 84d3c008 8bec mov ebp,esp
- TRAP_FRAME: 926ab838 -- (.trap 0xffffffff926ab838)
- ErrCode = 00000000
- eax=00000078 ebx=8bc5d9e8 ecx=84e51154 edx=8bc52580 esi=8bc5db78 edi=926abb6c
- eip=84d3c008 esp=926ab8ac ebp=926ab990 iopl=0 nv up ei ng nz na po cy
- cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010283
- nt!ExAllocatePoolWithTag+0x3:
- 84d3c008 8bec mov ebp,esp
- Resetting default scope
- DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
- BUGCHECK_STR: 0x8E
- CURRENT_IRQL: 0
- LAST_CONTROL_TRANSFER: from 84cd03ce to 84cfabfc
- STACK_TEXT:
- WARNING: Stack unwind information not available. Following frames may be wrong.
- 926ab3a4 84cd03ce 0000008e c0000005 84d3c008 nt!KeBugCheckEx+0x1e
- 926ab7c8 84c5a4a6 926ab7e4 00000000 926ab838 nt!RtlAppendUnicodeToString+0x45d
- 926ab858 84e5ee48 84e51009 00000000 00000000 nt!Kei386EoiHelper+0x1de
- 926ab990 84e41d1e 8a357e20 c5736938 8bb87008 nt!TmCurrentTransaction+0x6f
- 926aba0c 84e52147 00000000 926aba60 00000040 nt!ObCreateObject+0x90b
- 926aba68 84e74e6e 08ffcbc4 87736938 00000001 nt!ObOpenObjectByName+0x165
- 926abc14 92efd9d4 08ffcbc4 08ffcb9c 926abc34 nt!ObGetObjectType+0x306
- 926abc24 84c598c6 08ffcbc4 08ffcb9c 08ffcbf4 QQProtect+0x159d4
- 926abc34 776170f4 badb0d00 08ffcb88 00000000 nt!ZwYieldExecution+0xb86
- 926abc38 badb0d00 08ffcb88 00000000 00000000 0x776170f4
- 926abc3c 08ffcb88 00000000 00000000 00000000 0xbadb0d00
- 926abc40 00000000 00000000 00000000 00000000 0x8ffcb88
- STACK_COMMAND: kb
- FOLLOWUP_IP:
- QQProtect+159d4
- 92efd9d4 85c0 test eax,eax
- SYMBOL_STACK_INDEX: 7
- SYMBOL_NAME: QQProtect+159d4
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: QQProtect
- IMAGE_NAME: QQProtect.sys
- BUCKET_ID: WRONG_SYMBOLS
- Followup: MachineOwner
- ---------
- 3: kd> !process
- NT symbols are incorrect, please fix symbols
- 3: kd> lmvm QQProtect
- start end module name
- 92ee8000 92f13900 QQProtect (no symbols)
- Loaded symbol image file: QQProtect.sys
- Image path: \??\C:\Windows\system32\drivers\QQProtect.sys
- Image name: QQProtect.sys
- Timestamp: Mon Oct 28 21:06:13 2013 (526E6145)
- CheckSum: 000350D5
- ImageSize: 0002B900
- Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
复制代码 |