UNEXPECTED_KERNEL_MODE_TRAP (7f)

Тема в разделе "WASM.WIN32", создана пользователем FoxB, 5 дек 2020.

  1. FoxB

    FoxB Member

    Публикаций:
    0
    Регистрация:
    10 июл 2003
    Сообщения:
    105
    хай
    есть проблема - может что посоветуете.
    драйвер падает на даблфолт. дамп получаю, но походу он не юзабельный.

    16.0: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: 801e7000
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------
    BUGCHECK_STR: 0x7f_8
    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
    PROCESS_NAME: System
    CURRENT_IRQL: 2
    LAST_CONTROL_TRANSFER: from 00000000 to 00000000
    STACK_TEXT:
    00000000 00000000 00000000 00000000 00000000 0x0

    STACK_COMMAND: kb
    SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
    FOLLOWUP_NAME: MachineOwner
    MODULE_NAME: Unknown_Module
    IMAGE_NAME: Unknown_Image
    DEBUG_FLR_IMAGE_TIMESTAMP: 0
    BUCKET_ID: INVALID_KERNEL_CONTEXT

    Followup: MachineOwner
    ---------
    16.0: kd> kb
    ChildEBP RetAddr Args to Child
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    00000000 00000000 00000000 00000000 00000000 0x0
    16.0: kd> !thread
    THREAD 881ca9d0 Cid 0004.149c Teb: 00000000 Win32Thread: 00000000 RUNNING on processor 0
    Not impersonating
    DeviceMap 89208960
    Owning Process 0 Image: <Unknown>
    Attached Process 859bfad0 Image: System
    Wait Start TickCount 61141 Ticks: 5 (0:00:00:00.078)
    Context Switch Count 116
    UserTime 00:00:00.000
    KernelTime 00:00:00.717
    Win32 Start Address nt!ExpWorkerThread (0x840ba2be)
    Stack Init a5d6ced0 Current a5d6aa78 Base a5d6d000 Limit a5d6a000 Call 0
    Priority 13 BasePriority 13 PriorityDecrement 0 IoPriority 2 PagePriority 5
    ChildEBP RetAddr Args to Child
    00000000 00000000 00000000 00000000 00000000 0x0
     
  2. TermoSINteZ

    TermoSINteZ Синоби даоса Команда форума

    Публикаций:
    2
    Регистрация:
    11 июн 2004
    Сообщения:
    3.546
    Адрес:
    Russia
    FoxB,
    прикрепите дамп, или закачайте куда-нибудь .
     
  3. HoShiMin

    HoShiMin Well-Known Member

    Публикаций:
    5
    Регистрация:
    17 дек 2016
    Сообщения:
    1.422
    Адрес:
    Россия, Нижний Новгород
    ...и вместе с дампом - символы и исходники
     
  4. FoxB

    FoxB Member

    Публикаций:
    0
    Регистрация:
    10 июл 2003
    Сообщения:
    105
  5. TermoSINteZ

    TermoSINteZ Синоби даоса Команда форума

    Публикаций:
    2
    Регистрация:
    11 июн 2004
    Сообщения:
    3.546
    Адрес:
    Russia
    Вроде нормальный дамп
    Код (Text):
    1.  
    2. 0: kd> !analyze -v
    3. *******************************************************************************
    4. *                                                                             *
    5. *                        Bugcheck Analysis                                    *
    6. *                                                                             *
    7. *******************************************************************************
    8.  
    9. UNEXPECTED_KERNEL_MODE_TRAP (7f)
    10. This means a trap occurred in kernel mode, and it's a trap of a kind
    11. that the kernel isn't allowed to have/catch (bound trap) or that
    12. is always instant death (double fault).  The first number in the
    13. bugcheck params is the number of the trap (8 = double fault, etc)
    14. Consult an Intel x86 family manual to learn more about what these
    15. traps are. Here is a *portion* of those codes:
    16. If kv shows a taskGate
    17.         use .tss on the part before the colon, then kv.
    18. Else if kv shows a trapframe
    19.         use .trap on that value
    20. Else
    21.         .trap on the appropriate frame will show where the trap was taken
    22.         (on x86, this will be the ebp that goes with the procedure KiTrap)
    23. Endif
    24. kb will then show the corrected stack.
    25. Arguments:
    26. Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    27. Arg2: 801e7000
    28. Arg3: 00000000
    29. Arg4: 00000000
    30.  
    31. Debugging Details:
    32. ------------------
    33.  
    34. *** ERROR: Module load completed but symbols could not be loaded for mBVUSBBUS.sys
    35.  
    36. KEY_VALUES_STRING: 1
    37.  
    38.  
    39. STACKHASH_ANALYSIS: 1
    40.  
    41. TIMELINE_ANALYSIS: 1
    42.  
    43.  
    44. DUMP_CLASS: 1
    45.  
    46. DUMP_QUALIFIER: 402
    47.  
    48. BUILD_VERSION_STRING:  7601.23915.x86fre.win7sp1_ldr.170913-0600
    49.  
    50. SYSTEM_MANUFACTURER:  VMware, Inc.
    51.  
    52. VIRTUAL_MACHINE:  VMware
    53.  
    54. SYSTEM_PRODUCT_NAME:  VMware Virtual Platform
    55.  
    56. SYSTEM_VERSION:  None
    57.  
    58. BIOS_VENDOR:  Phoenix Technologies LTD
    59.  
    60. BIOS_VERSION:  6.00
    61.  
    62. BIOS_DATE:  02/27/2020
    63.  
    64. BASEBOARD_MANUFACTURER:  Intel Corporation
    65.  
    66. BASEBOARD_PRODUCT:  440BX Desktop Reference Platform
    67.  
    68. BASEBOARD_VERSION:  None
    69.  
    70. DUMP_TYPE:  0
    71.  
    72. BUGCHECK_P1: 8
    73.  
    74. BUGCHECK_P2: ffffffff801e7000
    75.  
    76. BUGCHECK_P3: 0
    77.  
    78. BUGCHECK_P4: 0
    79.  
    80. BUGCHECK_STR:  0x7f_8
    81.  
    82. TSS:  00000028 -- (.tss 0x28)
    83. eax=a5d69000 ebx=00000000 ecx=00000000 edx=840b6a8b esi=840b6a8b edi=a5d69000
    84. eip=8411c358 esp=a5d69cf4 ebp=a5d6a0a4 iopl=0         nv up ei ng nz ac po nc
    85. cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010292
    86. nt!KeBugCheck2+0x11:
    87. 8411c358 89442428        mov     dword ptr [esp+28h],eax ss:0010:a5d69d1c=????????
    88. Resetting default scope
    89.  
    90. CPU_COUNT: 2
    91.  
    92. CPU_MHZ: da4
    93.  
    94. CPU_VENDOR:  GenuineIntel
    95.  
    96. CPU_FAMILY: 6
    97.  
    98. CPU_MODEL: 3a
    99.  
    100. CPU_STEPPING: 9
    101.  
    102. CPU_MICROCODE: 6,3a,9,0 (F,M,S,R)  SIG: 1B'00000000 (cache) 1B'00000000 (init)
    103.  
    104. DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT
    105.  
    106. PROCESS_NAME:  System
    107.  
    108. CURRENT_IRQL:  2
    109.  
    110. ANALYSIS_SESSION_HOST:  DELLXPS-SIN
    111.  
    112. ANALYSIS_SESSION_TIME:  12-06-2020 13:17:22.0219
    113.  
    114. ANALYSIS_VERSION: 10.0.17763.132 amd64fre
    115.  
    116. TRAP_FRAME:  a5d6a0c4 -- (.trap 0xffffffffa5d6a0c4)
    117. ErrCode = 00000000
    118. eax=a5d69000 ebx=a5d6a288 ecx=a5d69e4c edx=00000001 esi=a5d6a378 edi=0000002d
    119. eip=840b6a8b esp=a5d6a138 ebp=a5d6a258 iopl=0         nv up ei ng nz na pe nc
    120. cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    121. nt!_chkstk+0x27:
    122. 840b6a8b 8500            test    dword ptr [eax],eax  ds:0023:a5d69000=????????
    123. Resetting default scope
    124.  
    125. LAST_CONTROL_TRANSFER:  from 8411c358 to 8407bfdc
    126.  
    127. BAD_STACK_POINTER:  84163fe4
    128.  
    129. STACK_OVERFLOW: Stack Limit: a5d6a000. Use (kF) and (!stackusage) to investigate stack usage.
    130.  
    131. STACKUSAGE_IMAGE: The module at base 0xFFFFFFFFA3416000 was blamed for the stack overflow. It is using 2360 bytes of stack.
    132.  
    133. STACK_COMMAND:  .tss 0x28 ; kb
    134.  
    135. THREAD_SHA1_HASH_MOD_FUNC:  37eee8e557bb5ed327cd054249228c46f1ebd31d
    136.  
    137. THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  eff46ead7a2f271275b547835fc3db5c0cfdfe0f
    138.  
    139. THREAD_SHA1_HASH_MOD:  a36dcfdb20e3837b7dd3b85ef75c864783c0935b
    140.  
    141. FOLLOWUP_NAME:  MachineOwner
    142.  
    143. MODULE_NAME: USBSTOR
    144.  
    145. IMAGE_NAME:  USBSTOR.SYS
    146.  
    147. DEBUG_FLR_IMAGE_TIMESTAMP:  56b2401e
    148.  
    149. FAILURE_BUCKET_ID:  0x7f_8_STACK_USAGE_IMAGE_USBSTOR.SYS
    150.  
    151. BUCKET_ID:  0x7f_8_STACK_USAGE_IMAGE_USBSTOR.SYS
    152.  
    153. PRIMARY_PROBLEM_CLASS:  0x7f_8_STACK_USAGE_IMAGE_USBSTOR.SYS
    154.  
    155. TARGET_TIME:  2020-12-03T20:09:21.000Z
    156.  
    157. OSBUILD:  7601
    158.  
    159. OSSERVICEPACK:  1000
    160.  
    161. SERVICEPACK_NUMBER: 0
    162.  
    163. OS_REVISION: 0
    164.  
    165. SUITE_MASK:  272
    166.  
    167. PRODUCT_TYPE:  1
    168.  
    169. OSPLATFORM_TYPE:  x86
    170.  
    171. OSNAME:  Windows 7
    172.  
    173. OSEDITION:  Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS
    174.  
    175. OS_LOCALE:
    176.  
    177. USER_LCID:  0
    178.  
    179. OSBUILD_TIMESTAMP:  2017-09-13 17:47:57
    180.  
    181. BUILDDATESTAMP_STR:  170913-0600
    182.  
    183. BUILDLAB_STR:  win7sp1_ldr
    184.  
    185. BUILDOSVER_STR:  6.1.7601.23915.x86fre.win7sp1_ldr.170913-0600
    186.  
    187. ANALYSIS_SESSION_ELAPSED_TIME:  44fd
    188.  
    189. ANALYSIS_SOURCE:  KM
    190.  
    191. FAILURE_ID_HASH_STRING:  km:0x7f_8_stack_usage_image_usbstor.sys
    192.  
    193. FAILURE_ID_HASH:  {3632428d-57cf-59df-d589-39e9ef040081}
    194.  
    195. Followup:     MachineOwner
    196.  
    Ну и стек , вроде достаточно говорящий

    Код (Text):
    1. 0: kd> kb
    2. #   ChildEBP    RetAddr    Args to Child            
    3. 00 00000000 8411c358 00000000 00000000 00000000 nt!KiTrap08+0x75
    4. 01 a5d6a0a4 8407d0bf 0000000a a5d69000 00000002 nt!KeBugCheck2+0x11
    5. 02 a5d6a0a4 840b6a8b 0000000a a5d69000 00000002 nt!KiTrap0E+0x1b3
    6. 03 a5d6a258 8407a9e6 a5d6a274 00000000 a5d6a2c8 nt!_chkstk+0x27
    7. 04 a5d6a2c0 8407b288 a5d6a598 8410245c badb0d00 nt!CommonDispatchException+0x4a
    8. 05 a5d6a2c0 8410245d a5d6a598 8410245c badb0d00 nt!KiTrap03+0xb8
    9. 06 a5d6a598 8404b58c 00000065 00000003 83d8f3ba nt!vDbgPrintExWithPrefixInternal+0x2b2
    10. 07 a5d6a5b8 83d8cac3 83d8f3ba 00000028 7fd9f000 nt!DbgPrint+0x1d
    11. WARNING: Stack unwind information not available. Following frames may be wrong.
    12. 08 a5d6a818 83d8e76c 881e8c88 0000001f a5d6ab80 mBVUSBBUS+0x1ac3
    13. 09 a5d6a828 83dd31cd 881e8c88 0000001f 260b54c0 mBVUSBBUS+0x376c
    14. 0a a5d6ab80 83dd363e aa4f1120 a5d6abb0 864d6008 mBVUSBBUS+0x481cd
    15. 0b a5d6abc0 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x4863e
    16. 0c a5d6abd8 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63
    17. 0d a5d6abf8 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    18. 0e a5d6ac34 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7
    19. 0f a5d6ac68 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208
    20. 10 a5d6ac8c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85
    21. 11 a5d6acb0 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0
    22. 12 a5d6acc8 84750308 a5d6ad28 86485190 868cb450 nt!IofCallDriver+0x63
    23. 13 a5d6acf4 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c
    24. 14 a5d6ad28 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef
    25. 15 a5d6ad4c 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6
    26. 16 a5d6ad78 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298
    27. 17 a5d6ada0 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1
    28. 18 a5d6adcc 8474d0ae aa530ed8 85a31798 a5d6ae04 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140
    29. 19 a5d6addc 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33
    30. 1a a5d6ae04 840b5063 00000000 864d6008 85a31798 nt!IopUnloadSafeCompletion+0x4a
    31. 1b a5d6ae48 83dd32a2 881e8b98 aa4f1030 a5d6b454 nt!IopfCompleteRequest+0x128
    32. 1c a5d6ae7c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    33. 1d a5d6ae94 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63
    34. 1e a5d6aeb4 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    35. 1f a5d6aee8 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b
    36. 20 a5d6af0c 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6
    37. 21 a5d6af50 83dd32a2 881e8b98 aa4f1030 ed25b8cc nt!IopfCompleteRequest+0x128
    38. 22 a5d6af84 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    39. 23 a5d6af9c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63
    40. 24 a5d6afbc a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    41. 25 a5d6b000 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104
    42. 26 a5d6b024 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173
    43. 27 a5d6b06c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128
    44. 28 a5d6b0a0 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    45. 29 a5d6b0b8 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63
    46. 2a a5d6b0d8 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    47. 2b a5d6b114 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7
    48. 2c a5d6b148 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208
    49. 2d a5d6b16c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85
    50. 2e a5d6b190 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0
    51. 2f a5d6b1a8 84750308 a5d6b208 86485190 868cb428 nt!IofCallDriver+0x63
    52. 30 a5d6b1d4 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c
    53. 31 a5d6b208 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef
    54. 32 a5d6b22c 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6
    55. 33 a5d6b258 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298
    56. 34 a5d6b280 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1
    57. 35 a5d6b2ac 8474d0ae aa530ed8 868bfb78 a5d6b2e4 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140
    58. 36 a5d6b2bc 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33
    59. 37 a5d6b2e4 840b5063 00000000 864d6008 868bfb78 nt!IopUnloadSafeCompletion+0x4a
    60. 38 a5d6b328 83dd32a2 881e8b98 aa4f1030 a5d6b934 nt!IopfCompleteRequest+0x128
    61. 39 a5d6b35c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    62. 3a a5d6b374 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63
    63. 3b a5d6b394 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    64. 3c a5d6b3c8 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b
    65. 3d a5d6b3ec 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6
    66. 3e a5d6b430 83dd32a2 881e8b98 aa4f1030 ed25a3ec nt!IopfCompleteRequest+0x128
    67. 3f a5d6b464 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    68. 40 a5d6b47c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63
    69. 41 a5d6b49c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    70. 42 a5d6b4e0 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104
    71. 43 a5d6b504 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173
    72. 44 a5d6b54c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128
    73. 45 a5d6b580 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    74. 46 a5d6b598 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63
    75. 47 a5d6b5b8 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    76. 48 a5d6b5f4 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7
    77. 49 a5d6b628 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208
    78. 4a a5d6b64c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85
    79. 4b a5d6b670 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0
    80. 4c a5d6b688 84750308 a5d6b6e8 86485190 868cb400 nt!IofCallDriver+0x63
    81. 4d a5d6b6b4 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c
    82. 4e a5d6b6e8 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef
    83. 4f a5d6b70c 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6
    84. 50 a5d6b738 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298
    85. 51 a5d6b760 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1
    86. 52 a5d6b78c 8474d0ae aa530ed8 86802d10 a5d6b7c4 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140
    87. 53 a5d6b79c 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33
    88. 54 a5d6b7c4 840b5063 00000000 864d6008 86802d10 nt!IopUnloadSafeCompletion+0x4a
    89. 55 a5d6b808 83dd32a2 881e8b98 aa4f1030 a5d6be14 nt!IopfCompleteRequest+0x128
    90. 56 a5d6b83c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    91. 57 a5d6b854 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63
    92. 58 a5d6b874 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    93. 59 a5d6b8a8 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b
    94. 5a a5d6b8cc 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6
    95. 5b a5d6b910 83dd32a2 881e8b98 aa4f1030 ed25ae8c nt!IopfCompleteRequest+0x128
    96. 5c a5d6b944 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    97. 5d a5d6b95c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63
    98. 5e a5d6b97c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    99. 5f a5d6b9c0 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104
    100. 60 a5d6b9e4 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173
    101. 61 a5d6ba2c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128
    102. 62 a5d6ba60 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    103. 63 a5d6ba78 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63
    104. 64 a5d6ba98 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    105. 65 a5d6bad4 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7
    106. 66 a5d6bb08 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208
    107. 67 a5d6bb2c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85
    108. 68 a5d6bb50 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0
    109. 69 a5d6bb68 84750308 a5d6bbc8 86485190 868cb3d8 nt!IofCallDriver+0x63
    110. 6a a5d6bb94 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c
    111. 6b a5d6bbc8 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef
    112. 6c a5d6bbec 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6
    113. 6d a5d6bc18 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298
    114. 6e a5d6bc40 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1
    115. 6f a5d6bc6c 8474d0ae aa530ed8 87e82380 a5d6bca4 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140
    116. 70 a5d6bc7c 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33
    117. 71 a5d6bca4 840b5063 00000000 864d6008 87e82380 nt!IopUnloadSafeCompletion+0x4a
    118. 72 a5d6bce8 83dd32a2 881e8b98 aa4f1030 a5d6c2f4 nt!IopfCompleteRequest+0x128
    119. 73 a5d6bd1c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    120. 74 a5d6bd34 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63
    121. 75 a5d6bd54 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    122. 76 a5d6bd88 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b
    123. 77 a5d6bdac 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6
    124. 78 a5d6bdf0 83dd32a2 881e8b98 aa4f1030 ed25a9ac nt!IopfCompleteRequest+0x128
    125. 79 a5d6be24 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    126. 7a a5d6be3c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63
    127. 7b a5d6be5c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    128. 7c a5d6bea0 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104
    129. 7d a5d6bec4 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173
    130. 7e a5d6bf0c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128
    131. 7f a5d6bf40 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    132. 80 a5d6bf58 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63
    133. 81 a5d6bf78 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    134. 82 a5d6bfb4 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7
    135. 83 a5d6bfe8 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208
    136. 84 a5d6c00c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85
    137. 85 a5d6c030 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0
    138. 86 a5d6c048 84750308 a5d6c0a8 86485190 868cb3b0 nt!IofCallDriver+0x63
    139. 87 a5d6c074 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c
    140. 88 a5d6c0a8 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef
    141. 89 a5d6c0cc 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6
    142. 8a a5d6c0f8 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298
    143. 8b a5d6c120 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1
    144. 8c a5d6c14c 8474d0ae aa530ed8 87c22b30 a5d6c184 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140
    145. 8d a5d6c15c 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33
    146. 8e a5d6c184 840b5063 00000000 864d6008 87c22b30 nt!IopUnloadSafeCompletion+0x4a
    147. 8f a5d6c1c8 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128
    148. 90 a5d6c1fc 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    149. 91 a5d6c214 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63
    150. 92 a5d6c234 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    151. 93 a5d6c268 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b
    152. 94 a5d6c28c 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6
    153. 95 a5d6c2d0 83dd32a2 881e8b98 aa4f1030 a5d6c3f8 nt!IopfCompleteRequest+0x128
    154. 96 a5d6c304 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    155. 97 a5d6c31c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63
    156. 98 a5d6c33c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    157. 99 a5d6c380 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104
    158. 9a a5d6c3a4 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173
    159. 9b a5d6c3ec 83dd32a2 881e8b98 aa4f1030 840c5e03 nt!IopfCompleteRequest+0x128
    160. 9c a5d6c420 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2
    161. 9d a5d6c438 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63
    162. 9e a5d6c458 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc
    163. 9f a5d6c494 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7
    164. a0 a5d6c4c8 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208
    165. a1 a5d6c4ec a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85
    166. a2 a5d6c510 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0
    167. a3 a5d6c528 84750308 a5d6c588 86485190 868cb388 nt!IofCallDriver+0x63
    168. a4 a5d6c554 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c
    169. a5 a5d6c588 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef
    170. a6 a5d6c5ac 90c3fb37 86485101 00000001 a5d6c5f8 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6
    171. a7 a5d6c5d0 90c3f9f4 00000009 78e29d00 00000018 cdrom!RequestHandleReadWrite+0x127
    172. a8 a5d6c61c 8474dce7 55b0bfe8 78e29d00 00084000 cdrom!SequentialQueueEvtIoReadWrite+0x190
    173. a9 a5d6c654 8474d9d4 78e29d00 a5d6c694 aa4e3010 Wdf01000!FxIoQueue::DispatchRequestToDriver+0x1d4
    174. aa a5d6c670 847529df 8474b200 00000000 aa4f4010 Wdf01000!FxIoQueue::DispatchEvents+0x4af
    175. ab a5d6c69c 84752122 aa4f4010 aa4e3010 86485010 Wdf01000!FxIoQueue::QueueRequestFromForward+0x19f
    176. ac a5d6c6cc 8475261b 86822650 86485010 a5d6c72c Wdf01000!FxPkgIo::EnqueueRequest+0x213
    177. ad a5d6c6f4 90c3c31f aa4e3010 86485010 55b1cfe8 Wdf01000!imp_WdfDeviceEnqueueRequest+0x17e
    178. ae a5d6c730 8474f853 79b7afe8 55b1cfe8 aa4e3010 cdrom!DeviceEvtIoInCallerContext+0x1b6
    179. af a5d6c748 8474d480 86822650 86822714 864850d4 Wdf01000!FxPkgIo::DispathToInCallerContextCallback+0xa3
    180. b0 a5d6c77c 8475052e 868bd9d0 881b9a80 868bd9d0 Wdf01000!FxPkgIo::Dispatch+0x331
    181. b1 a5d6c7a4 8475039f 001b9a80 868bd9d0 a5d6c80c Wdf01000!FxDevice::Dispatch+0x155
    182. b2 a5d6c7c0 84073169 881b9a80 868bd9d0 87fcd638 Wdf01000!FxDevice::DispatchWithLock+0x77
    183. b3 a5d6c7d8 a3408786 0001f000 87fcd638 a5d6c910 nt!IofCallDriver+0x63
    184. b4 a5d6c7e8 a3408e62 87fcd638 a5d6c80c 92deebb0 cdfs!CdSingleAsync+0xae
    185. b5 a5d6c910 a3408a64 87fcd638 92deebb0 00001000 cdfs!CdNonCachedRead+0x184
    186. b6 a5d6c9b0 a340118a 87fcd638 868bd9d0 06962f97 cdfs!CdCommonRead+0x2d3
    187. b7 a5d6ca04 84073169 868a9b50 868bd9d0 868bd9d0 cdfs!CdFsdDispatch+0xd2
    188. b8 a5d6ca1c 8848b20c aa4cb230 868bd9d0 00000000 nt!IofCallDriver+0x63
    189. b9 a5d6ca40 8848b3cb a5d6ca60 aa4cb230 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa
    190. ba a5d6ca78 84073169 aa4cb230 868bd9d0 868bd9d0 fltmgr!FltpDispatch+0xc5
    191. bb a5d6ca90 84101e4f 87ce7df9 873e72c8 87e5556a nt!IofCallDriver+0x63
    192. bc a5d6caac 842c2513 87e55568 881ca9d0 873e7300 nt!IoPageRead+0x1f5
    193. bd a5d6cae0 842c2825 868378c8 00000001 00020000 nt!MiPfExecuteReadList+0x10c
    194. be a5d6cb08 84071d9e 00000000 00000000 00020000 nt!MmPrefetchForCacheManager+0xa4
    195. bf a5d6cba8 840d6888 87e55568 ed25dbb0 859dcd20 nt!CcPerformReadAhead+0x1ab
    196. c0 a5d6cc00 840ba3cb 859dcd20 00000000 881ca9d0 nt!CcWorkerThread+0x18d
    197. c1 a5d6cc50 8424963d 80000000 ed25db20 00000000 nt!ExpWorkerThread+0x10d
    198. c2 a5d6cc90 840edab9 840ba2be 80000000 00000000 nt!PspSystemThreadStartup+0x9e
    199. c3 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    200.  
    судя по всему, кто то криво вызывает дебажный вывод
    Код (Text):
    1. 07 a5d6a5b8 83d8cac3 83d8f3ba 00000028 7fd9f000 nt!DbgPrint+0x1d
    2. WARNING: Stack unwind information not available. Following frames may be wrong.
    3. 08 a5d6a818 83d8e76c 881e8c88 0000001f a5d6ab80 mBVUSBBUS+0x1ac3
    У вас кстати уже есть тема,
    https://wasm.in/threads/pomosch-nuzhna-s-zwreadfile.33367/#post-411141

    С похоже проблемкой, и с символами
     
    FoxB нравится это.
  6. FoxB

    FoxB Member

    Публикаций:
    0
    Регистрация:
    10 июл 2003
    Сообщения:
    105
    да, было оно.
    тогда подскажите в чем я ошибся - мой вывод windbg отличен от вашего. пользовал версию 6.10.0003.223.X86
     
  7. TermoSINteZ

    TermoSINteZ Синоби даоса Команда форума

    Публикаций:
    2
    Регистрация:
    11 июн 2004
    Сообщения:
    3.546
    Адрес:
    Russia
    FoxB, у меня версия 10.0.17763.132 AMD64
    Вероятно ошибка была в неправильном указании символов
    должно быть типа того
     
  8. FoxB

    FoxB Member

    Публикаций:
    0
    Регистрация:
    10 июл 2003
    Сообщения:
    105
    да он вроде подгружает символы

    Код (Text):
    1.  
    2. Microsoft (R) Windows Debugger Version 6.10.0003.233 X86
    3. Copyright (c) Microsoft Corporation. All rights reserved.
    4.  
    5.  
    6. Loading Dump File [c:\0\MEMORY.DMP]
    7. Kernel Complete Dump File: Full address space is available
    8.  
    9. Symbol search path is: srv*c:\Symbols*http://msdl.microsoft.com/download/symbols
    10. Executable search path is:
    11. Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible
    12. Product: WinNt, suite: TerminalServer SingleUserTS
    13. Built by: 7601.23915.x86fre.win7sp1_ldr.170913-0600
    14. Machine Name:
    15. Kernel base = 0x8403c000 PsLoadedModuleList = 0x84188e30
    16. Debug session time: Fri Dec  4 01:09:21.521 2020 (GMT+5)
    17. System Uptime: 0 days 0:15:53.889
    18. Loading Kernel Symbols
    19. ...............................................................
    20. ................................................................
    21. .................................
    22. Loading User Symbols
    23.  
    24. Loading unloaded module list
    25. ..............
    26. *******************************************************************************
    27. *  *
    28. *  Bugcheck Analysis  *
    29. *  *
    30. *******************************************************************************
    31.  
    32. Use !analyze -v to get detailed debugging information.
    33.  
    34. BugCheck 7F, {8, 801e7000, 0, 0}
    35.  
    36. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
    37.  
    38. Followup: MachineOwner
    39. ---------
    40.  
    add: на
    Microsoft (R) Windows Debugger Version 10.0.10240.9 AMD64

    получилось
     
    Последнее редактирование: 6 дек 2020
  9. TermoSINteZ

    TermoSINteZ Синоби даоса Команда форума

    Публикаций:
    2
    Регистрация:
    11 июн 2004
    Сообщения:
    3.546
    Адрес:
    Russia
    FoxB, чтоб убедиться в валидности подгрузки символов, надо включать verbose mod
    Код (Text):
    1. : kd> .symopt+0x80000000
    2. Symbol options are 0x80030337:
    3.   0x00000001 - SYMOPT_CASE_INSENSITIVE
    4.   0x00000002 - SYMOPT_UNDNAME
    5.   0x00000004 - SYMOPT_DEFERRED_LOADS
    6.   0x00000010 - SYMOPT_LOAD_LINES
    7.   0x00000020 - SYMOPT_OMAP_FIND_NEAREST
    8.   0x00000100 - SYMOPT_NO_UNQUALIFIED_LOADS
    9.   0x00000200 - SYMOPT_FAIL_CRITICAL_ERRORS
    10.   0x00010000 - SYMOPT_AUTO_PUBLICS
    11.   0x00020000 - SYMOPT_NO_IMAGE_SEARCH
    12.   0x80000000 - SYMOPT_DEBUG
    13.  
    14. ************* Path validation summary **************
    15. Response                         Time (ms)     Location
    16. Deferred                                       srv*c:\localsymbols*http://msdl.microsoft.com/download/symbols
    17. DBGHELP: Symbol Search Path: srv*c:\localsymbols*http://msdl.microsoft.com/download/symbols
    18. SYMSRV:  BYINDEX: 0x14
    19.          c:\localsymbols*http://msdl.microsoft.com/download/symbols
    20.          ntkrpamp.pdb
    21.          92D32EE7188A4CB3AB23EDA0CB0F9D7B2
    22. SYMSRV:  PATH: c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb
    23. SYMSRV:  RESULT: 0x00000000
    24. DBGHELP: nt - public symbols
    25.         c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb
    26. 0: kd> .reload
    27. SYMSRV:  BYINDEX: 0x15
    28.          c:\localsymbols*http://msdl.microsoft.com/download/symbols
    29.          ntkrpamp.pdb
    30.          92D32EE7188A4CB3AB23EDA0CB0F9D7B2
    31. SYMSRV:  PATH: c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb
    32. SYMSRV:  RESULT: 0x00000000
    33. DBGHELP: nt - public symbols
    34.         c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb
    35.  
     
  10. Indy_

    Indy_ Well-Known Member

    Публикаций:
    4
    Регистрация:
    29 апр 2011
    Сообщения:
    4.775
    TermoSINteZ,

    Всё ведь сразу ясно:

    Код (Text):
    1. 8.05 a5d6a2c0 8410245d a5d6a598 8410245c badb0d00 nt!KiTrap03+0xb8
    2. 9.06 a5d6a598 8404b58c 00000065 00000003 83d8f3ba nt!vDbgPrintExWithPrefixInternal+0x2b2
    3. 10.07 a5d6a5b8 83d8cac3 83d8f3ba 00000028 7fd9f000 nt!DbgPrint+0x1d
    4. 11.WARNING: Stack unwind information not available. Following frames may be wrong.
    5. 12.08 a5d6a818 83d8e76c 881e8c88 0000001f a5d6ab80 mBVUSBBUS+0x1ac3
    6.  
    DbgPrint это и есть останов #BP, соответственно int3(bp), далее следует серия исключений приводящая к #DF - невозможность обработать фаулт, рекурсивный фаулт, это приводит к сбросу процика после сообщения про данное исключение.

    Следует посмотреть mBVUSBBUS+0x1ac3, тогда всё станет ясно. Это примитивная детская задача - с кд взял адрес и дизь его.
     
    q2e74 нравится это.
  11. TermoSINteZ

    TermoSINteZ Синоби даоса Команда форума

    Публикаций:
    2
    Регистрация:
    11 июн 2004
    Сообщения:
    3.546
    Адрес:
    Russia
    Indy_,
    ну у ТС была проблема в чтении дампа - он не читался.

    После открытие дампа все само собой понятно стало
     
  12. FoxB

    FoxB Member

    Публикаций:
    0
    Регистрация:
    10 июл 2003
    Сообщения:
    105
    за это TermoSINteZ отдельное спасибо.