хай есть проблема - может что посоветуете. драйвер падает на даблфолт. дамп получаю, но походу он не юзабельный. 16.0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 00000008, EXCEPTION_DOUBLE_FAULT Arg2: 801e7000 Arg3: 00000000 Arg4: 00000000 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 00000000 to 00000000 STACK_TEXT: 00000000 00000000 00000000 00000000 00000000 0x0 STACK_COMMAND: kb SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: INVALID_KERNEL_CONTEXT Followup: MachineOwner --------- 16.0: kd> kb ChildEBP RetAddr Args to Child WARNING: Frame IP not in any known module. Following frames may be wrong. 00000000 00000000 00000000 00000000 00000000 0x0 16.0: kd> !thread THREAD 881ca9d0 Cid 0004.149c Teb: 00000000 Win32Thread: 00000000 RUNNING on processor 0 Not impersonating DeviceMap 89208960 Owning Process 0 Image: <Unknown> Attached Process 859bfad0 Image: System Wait Start TickCount 61141 Ticks: 5 (0:00:00:00.078) Context Switch Count 116 UserTime 00:00:00.000 KernelTime 00:00:00.717 Win32 Start Address nt!ExpWorkerThread (0x840ba2be) Stack Init a5d6ced0 Current a5d6aa78 Base a5d6d000 Limit a5d6a000 Call 0 Priority 13 BasePriority 13 PriorityDecrement 0 IoPriority 2 PagePriority 5 ChildEBP RetAddr Args to Child 00000000 00000000 00000000 00000000 00000000 0x0
будем идти по мере поступления вопросов. https://mega.nz/file/zdpzRCZb#NFcZKqVrH9V0_ASOh7HsFf-aIHsFrDqxDceuIDSmz9o
Вроде нормальный дамп Код (Text): 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 00000008, EXCEPTION_DOUBLE_FAULT Arg2: 801e7000 Arg3: 00000000 Arg4: 00000000 Debugging Details: ------------------ *** ERROR: Module load completed but symbols could not be loaded for mBVUSBBUS.sys KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 402 BUILD_VERSION_STRING: 7601.23915.x86fre.win7sp1_ldr.170913-0600 SYSTEM_MANUFACTURER: VMware, Inc. VIRTUAL_MACHINE: VMware SYSTEM_PRODUCT_NAME: VMware Virtual Platform SYSTEM_VERSION: None BIOS_VENDOR: Phoenix Technologies LTD BIOS_VERSION: 6.00 BIOS_DATE: 02/27/2020 BASEBOARD_MANUFACTURER: Intel Corporation BASEBOARD_PRODUCT: 440BX Desktop Reference Platform BASEBOARD_VERSION: None DUMP_TYPE: 0 BUGCHECK_P1: 8 BUGCHECK_P2: ffffffff801e7000 BUGCHECK_P3: 0 BUGCHECK_P4: 0 BUGCHECK_STR: 0x7f_8 TSS: 00000028 -- (.tss 0x28) eax=a5d69000 ebx=00000000 ecx=00000000 edx=840b6a8b esi=840b6a8b edi=a5d69000 eip=8411c358 esp=a5d69cf4 ebp=a5d6a0a4 iopl=0 nv up ei ng nz ac po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010292 nt!KeBugCheck2+0x11: 8411c358 89442428 mov dword ptr [esp+28h],eax ss:0010:a5d69d1c=???????? Resetting default scope CPU_COUNT: 2 CPU_MHZ: da4 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3a CPU_STEPPING: 9 CPU_MICROCODE: 6,3a,9,0 (F,M,S,R) SIG: 1B'00000000 (cache) 1B'00000000 (init) DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 2 ANALYSIS_SESSION_HOST: DELLXPS-SIN ANALYSIS_SESSION_TIME: 12-06-2020 13:17:22.0219 ANALYSIS_VERSION: 10.0.17763.132 amd64fre TRAP_FRAME: a5d6a0c4 -- (.trap 0xffffffffa5d6a0c4) ErrCode = 00000000 eax=a5d69000 ebx=a5d6a288 ecx=a5d69e4c edx=00000001 esi=a5d6a378 edi=0000002d eip=840b6a8b esp=a5d6a138 ebp=a5d6a258 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 nt!_chkstk+0x27: 840b6a8b 8500 test dword ptr [eax],eax ds:0023:a5d69000=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 8411c358 to 8407bfdc BAD_STACK_POINTER: 84163fe4 STACK_OVERFLOW: Stack Limit: a5d6a000. Use (kF) and (!stackusage) to investigate stack usage. STACKUSAGE_IMAGE: The module at base 0xFFFFFFFFA3416000 was blamed for the stack overflow. It is using 2360 bytes of stack. STACK_COMMAND: .tss 0x28 ; kb THREAD_SHA1_HASH_MOD_FUNC: 37eee8e557bb5ed327cd054249228c46f1ebd31d THREAD_SHA1_HASH_MOD_FUNC_OFFSET: eff46ead7a2f271275b547835fc3db5c0cfdfe0f THREAD_SHA1_HASH_MOD: a36dcfdb20e3837b7dd3b85ef75c864783c0935b FOLLOWUP_NAME: MachineOwner MODULE_NAME: USBSTOR IMAGE_NAME: USBSTOR.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 56b2401e FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_IMAGE_USBSTOR.SYS BUCKET_ID: 0x7f_8_STACK_USAGE_IMAGE_USBSTOR.SYS PRIMARY_PROBLEM_CLASS: 0x7f_8_STACK_USAGE_IMAGE_USBSTOR.SYS TARGET_TIME: 2020-12-03T20:09:21.000Z OSBUILD: 7601 OSSERVICEPACK: 1000 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x86 OSNAME: Windows 7 OSEDITION: Windows 7 WinNt (Service Pack 1) TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2017-09-13 17:47:57 BUILDDATESTAMP_STR: 170913-0600 BUILDLAB_STR: win7sp1_ldr BUILDOSVER_STR: 6.1.7601.23915.x86fre.win7sp1_ldr.170913-0600 ANALYSIS_SESSION_ELAPSED_TIME: 44fd ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x7f_8_stack_usage_image_usbstor.sys FAILURE_ID_HASH: {3632428d-57cf-59df-d589-39e9ef040081} Followup: MachineOwner Ну и стек , вроде достаточно говорящий Код (Text): 0: kd> kb # ChildEBP RetAddr Args to Child 00 00000000 8411c358 00000000 00000000 00000000 nt!KiTrap08+0x75 01 a5d6a0a4 8407d0bf 0000000a a5d69000 00000002 nt!KeBugCheck2+0x11 02 a5d6a0a4 840b6a8b 0000000a a5d69000 00000002 nt!KiTrap0E+0x1b3 03 a5d6a258 8407a9e6 a5d6a274 00000000 a5d6a2c8 nt!_chkstk+0x27 04 a5d6a2c0 8407b288 a5d6a598 8410245c badb0d00 nt!CommonDispatchException+0x4a 05 a5d6a2c0 8410245d a5d6a598 8410245c badb0d00 nt!KiTrap03+0xb8 06 a5d6a598 8404b58c 00000065 00000003 83d8f3ba nt!vDbgPrintExWithPrefixInternal+0x2b2 07 a5d6a5b8 83d8cac3 83d8f3ba 00000028 7fd9f000 nt!DbgPrint+0x1d WARNING: Stack unwind information not available. Following frames may be wrong. 08 a5d6a818 83d8e76c 881e8c88 0000001f a5d6ab80 mBVUSBBUS+0x1ac3 09 a5d6a828 83dd31cd 881e8c88 0000001f 260b54c0 mBVUSBBUS+0x376c 0a a5d6ab80 83dd363e aa4f1120 a5d6abb0 864d6008 mBVUSBBUS+0x481cd 0b a5d6abc0 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x4863e 0c a5d6abd8 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63 0d a5d6abf8 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 0e a5d6ac34 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7 0f a5d6ac68 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208 10 a5d6ac8c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85 11 a5d6acb0 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0 12 a5d6acc8 84750308 a5d6ad28 86485190 868cb450 nt!IofCallDriver+0x63 13 a5d6acf4 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c 14 a5d6ad28 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef 15 a5d6ad4c 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6 16 a5d6ad78 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298 17 a5d6ada0 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1 18 a5d6adcc 8474d0ae aa530ed8 85a31798 a5d6ae04 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140 19 a5d6addc 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33 1a a5d6ae04 840b5063 00000000 864d6008 85a31798 nt!IopUnloadSafeCompletion+0x4a 1b a5d6ae48 83dd32a2 881e8b98 aa4f1030 a5d6b454 nt!IopfCompleteRequest+0x128 1c a5d6ae7c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 1d a5d6ae94 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63 1e a5d6aeb4 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 1f a5d6aee8 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b 20 a5d6af0c 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6 21 a5d6af50 83dd32a2 881e8b98 aa4f1030 ed25b8cc nt!IopfCompleteRequest+0x128 22 a5d6af84 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 23 a5d6af9c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63 24 a5d6afbc a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 25 a5d6b000 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104 26 a5d6b024 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173 27 a5d6b06c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128 28 a5d6b0a0 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 29 a5d6b0b8 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63 2a a5d6b0d8 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 2b a5d6b114 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7 2c a5d6b148 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208 2d a5d6b16c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85 2e a5d6b190 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0 2f a5d6b1a8 84750308 a5d6b208 86485190 868cb428 nt!IofCallDriver+0x63 30 a5d6b1d4 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c 31 a5d6b208 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef 32 a5d6b22c 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6 33 a5d6b258 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298 34 a5d6b280 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1 35 a5d6b2ac 8474d0ae aa530ed8 868bfb78 a5d6b2e4 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140 36 a5d6b2bc 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33 37 a5d6b2e4 840b5063 00000000 864d6008 868bfb78 nt!IopUnloadSafeCompletion+0x4a 38 a5d6b328 83dd32a2 881e8b98 aa4f1030 a5d6b934 nt!IopfCompleteRequest+0x128 39 a5d6b35c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 3a a5d6b374 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63 3b a5d6b394 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 3c a5d6b3c8 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b 3d a5d6b3ec 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6 3e a5d6b430 83dd32a2 881e8b98 aa4f1030 ed25a3ec nt!IopfCompleteRequest+0x128 3f a5d6b464 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 40 a5d6b47c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63 41 a5d6b49c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 42 a5d6b4e0 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104 43 a5d6b504 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173 44 a5d6b54c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128 45 a5d6b580 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 46 a5d6b598 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63 47 a5d6b5b8 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 48 a5d6b5f4 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7 49 a5d6b628 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208 4a a5d6b64c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85 4b a5d6b670 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0 4c a5d6b688 84750308 a5d6b6e8 86485190 868cb400 nt!IofCallDriver+0x63 4d a5d6b6b4 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c 4e a5d6b6e8 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef 4f a5d6b70c 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6 50 a5d6b738 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298 51 a5d6b760 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1 52 a5d6b78c 8474d0ae aa530ed8 86802d10 a5d6b7c4 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140 53 a5d6b79c 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33 54 a5d6b7c4 840b5063 00000000 864d6008 86802d10 nt!IopUnloadSafeCompletion+0x4a 55 a5d6b808 83dd32a2 881e8b98 aa4f1030 a5d6be14 nt!IopfCompleteRequest+0x128 56 a5d6b83c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 57 a5d6b854 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63 58 a5d6b874 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 59 a5d6b8a8 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b 5a a5d6b8cc 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6 5b a5d6b910 83dd32a2 881e8b98 aa4f1030 ed25ae8c nt!IopfCompleteRequest+0x128 5c a5d6b944 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 5d a5d6b95c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63 5e a5d6b97c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 5f a5d6b9c0 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104 60 a5d6b9e4 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173 61 a5d6ba2c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128 62 a5d6ba60 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 63 a5d6ba78 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63 64 a5d6ba98 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 65 a5d6bad4 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7 66 a5d6bb08 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208 67 a5d6bb2c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85 68 a5d6bb50 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0 69 a5d6bb68 84750308 a5d6bbc8 86485190 868cb3d8 nt!IofCallDriver+0x63 6a a5d6bb94 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c 6b a5d6bbc8 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef 6c a5d6bbec 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6 6d a5d6bc18 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298 6e a5d6bc40 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1 6f a5d6bc6c 8474d0ae aa530ed8 87e82380 a5d6bca4 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140 70 a5d6bc7c 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33 71 a5d6bca4 840b5063 00000000 864d6008 87e82380 nt!IopUnloadSafeCompletion+0x4a 72 a5d6bce8 83dd32a2 881e8b98 aa4f1030 a5d6c2f4 nt!IopfCompleteRequest+0x128 73 a5d6bd1c 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 74 a5d6bd34 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63 75 a5d6bd54 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 76 a5d6bd88 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b 77 a5d6bdac 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6 78 a5d6bdf0 83dd32a2 881e8b98 aa4f1030 ed25a9ac nt!IopfCompleteRequest+0x128 79 a5d6be24 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 7a a5d6be3c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63 7b a5d6be5c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 7c a5d6bea0 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104 7d a5d6bec4 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173 7e a5d6bf0c 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128 7f a5d6bf40 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 80 a5d6bf58 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63 81 a5d6bf78 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 82 a5d6bfb4 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7 83 a5d6bfe8 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208 84 a5d6c00c a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85 85 a5d6c030 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0 86 a5d6c048 84750308 a5d6c0a8 86485190 868cb3b0 nt!IofCallDriver+0x63 87 a5d6c074 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c 88 a5d6c0a8 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef 89 a5d6c0cc 90c403cb 86485101 00000001 90c40133 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6 8a a5d6c0f8 84751008 797347a0 55acf120 87e06a9c cdrom!ScratchBuffer_ReadWriteCompletionRoutine+0x298 8b a5d6c120 8474ced1 864d6008 aa530ed8 881b9a80 Wdf01000!FxRequestBase::CompleteSubmitted+0xf1 8c a5d6c14c 8474d0ae aa530ed8 87c22b30 a5d6c184 Wdf01000!FxIoTarget::RequestCompletionRoutine+0x140 8d a5d6c15c 840c0182 00000000 864d6008 868cb858 Wdf01000!FxIoTarget::_RequestCompletionRoutine+0x33 8e a5d6c184 840b5063 00000000 864d6008 87c22b30 nt!IopUnloadSafeCompletion+0x4a 8f a5d6c1c8 83dd32a2 881e8b98 aa4f1030 00000000 nt!IopfCompleteRequest+0x128 90 a5d6c1fc 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 91 a5d6c214 a3418050 881e8c88 a341f000 88138960 nt!IofCallDriver+0x63 92 a5d6c234 a341a5c9 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 93 a5d6c268 a34194f0 f7849712 864d6008 864d607b USBSTOR!USBSTOR_CswTransfer+0x7b 94 a5d6c28c 840b5063 881e8ae0 864d6008 00000000 USBSTOR!USBSTOR_DataCompletion+0x1c6 95 a5d6c2d0 83dd32a2 881e8b98 aa4f1030 a5d6c3f8 nt!IopfCompleteRequest+0x128 96 a5d6c304 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 97 a5d6c31c a3418050 864d6008 88138960 85a2dd68 nt!IofCallDriver+0x63 98 a5d6c33c a34196c8 881e8ae0 864d6008 f7849712 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 99 a5d6c380 a3419b0b 881e8ae0 864d6008 864d607b USBSTOR!USBSTOR_DataTransfer+0x104 9a a5d6c3a4 840b5063 86872320 88138960 00000000 USBSTOR!USBSTOR_CbwCompletion+0x173 9b a5d6c3ec 83dd32a2 881e8b98 aa4f1030 840c5e03 nt!IopfCompleteRequest+0x128 9c a5d6c420 84073169 aa4f1030 864d6008 881e8c24 mBVUSBBUS+0x482a2 9d a5d6c438 a3418050 881e8ca7 881389a0 8813890a nt!IofCallDriver+0x63 9e a5d6c458 a3419d71 881e8ae0 864d6008 f881db38 USBSTOR!USBSTOR_IssueBulkOrInterruptRequest+0xcc 9f a5d6c494 a341b0fc 881e8ae0 864d6008 881e8ae0 USBSTOR!USBSTOR_CbwTransfer+0xb7 a0 a5d6c4c8 8404f5ae 881e8ae0 004d6008 868723d8 USBSTOR!USBSTOR_StartIo+0x208 a1 a5d6c4ec a341893e 881e8ae0 864d6008 8813898c nt!IoStartPacket+0x85 a2 a5d6c510 84073169 86872320 864d6008 aa530ed8 USBSTOR!USBSTOR_Scsi+0x2e0 a3 a5d6c528 84750308 a5d6c588 86485190 868cb388 nt!IofCallDriver+0x63 a4 a5d6c554 90c3dcdd 8691cb70 868cb858 aa530ed8 Wdf01000!imp_WdfRequestSend+0x33c a5 a5d6c588 90c3fc09 88138960 00000000 864854b4 cdrom!ScratchBuffer_SendSrb+0xef a6 a5d6c5ac 90c3fb37 86485101 00000001 a5d6c5f8 cdrom!ScratchBuffer_PerformNextReadWrite+0xc6 a7 a5d6c5d0 90c3f9f4 00000009 78e29d00 00000018 cdrom!RequestHandleReadWrite+0x127 a8 a5d6c61c 8474dce7 55b0bfe8 78e29d00 00084000 cdrom!SequentialQueueEvtIoReadWrite+0x190 a9 a5d6c654 8474d9d4 78e29d00 a5d6c694 aa4e3010 Wdf01000!FxIoQueue::DispatchRequestToDriver+0x1d4 aa a5d6c670 847529df 8474b200 00000000 aa4f4010 Wdf01000!FxIoQueue::DispatchEvents+0x4af ab a5d6c69c 84752122 aa4f4010 aa4e3010 86485010 Wdf01000!FxIoQueue::QueueRequestFromForward+0x19f ac a5d6c6cc 8475261b 86822650 86485010 a5d6c72c Wdf01000!FxPkgIo::EnqueueRequest+0x213 ad a5d6c6f4 90c3c31f aa4e3010 86485010 55b1cfe8 Wdf01000!imp_WdfDeviceEnqueueRequest+0x17e ae a5d6c730 8474f853 79b7afe8 55b1cfe8 aa4e3010 cdrom!DeviceEvtIoInCallerContext+0x1b6 af a5d6c748 8474d480 86822650 86822714 864850d4 Wdf01000!FxPkgIo::DispathToInCallerContextCallback+0xa3 b0 a5d6c77c 8475052e 868bd9d0 881b9a80 868bd9d0 Wdf01000!FxPkgIo::Dispatch+0x331 b1 a5d6c7a4 8475039f 001b9a80 868bd9d0 a5d6c80c Wdf01000!FxDevice::Dispatch+0x155 b2 a5d6c7c0 84073169 881b9a80 868bd9d0 87fcd638 Wdf01000!FxDevice::DispatchWithLock+0x77 b3 a5d6c7d8 a3408786 0001f000 87fcd638 a5d6c910 nt!IofCallDriver+0x63 b4 a5d6c7e8 a3408e62 87fcd638 a5d6c80c 92deebb0 cdfs!CdSingleAsync+0xae b5 a5d6c910 a3408a64 87fcd638 92deebb0 00001000 cdfs!CdNonCachedRead+0x184 b6 a5d6c9b0 a340118a 87fcd638 868bd9d0 06962f97 cdfs!CdCommonRead+0x2d3 b7 a5d6ca04 84073169 868a9b50 868bd9d0 868bd9d0 cdfs!CdFsdDispatch+0xd2 b8 a5d6ca1c 8848b20c aa4cb230 868bd9d0 00000000 nt!IofCallDriver+0x63 b9 a5d6ca40 8848b3cb a5d6ca60 aa4cb230 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa ba a5d6ca78 84073169 aa4cb230 868bd9d0 868bd9d0 fltmgr!FltpDispatch+0xc5 bb a5d6ca90 84101e4f 87ce7df9 873e72c8 87e5556a nt!IofCallDriver+0x63 bc a5d6caac 842c2513 87e55568 881ca9d0 873e7300 nt!IoPageRead+0x1f5 bd a5d6cae0 842c2825 868378c8 00000001 00020000 nt!MiPfExecuteReadList+0x10c be a5d6cb08 84071d9e 00000000 00000000 00020000 nt!MmPrefetchForCacheManager+0xa4 bf a5d6cba8 840d6888 87e55568 ed25dbb0 859dcd20 nt!CcPerformReadAhead+0x1ab c0 a5d6cc00 840ba3cb 859dcd20 00000000 881ca9d0 nt!CcWorkerThread+0x18d c1 a5d6cc50 8424963d 80000000 ed25db20 00000000 nt!ExpWorkerThread+0x10d c2 a5d6cc90 840edab9 840ba2be 80000000 00000000 nt!PspSystemThreadStartup+0x9e c3 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 судя по всему, кто то криво вызывает дебажный вывод Код (Text): 07 a5d6a5b8 83d8cac3 83d8f3ba 00000028 7fd9f000 nt!DbgPrint+0x1d WARNING: Stack unwind information not available. Following frames may be wrong. 08 a5d6a818 83d8e76c 881e8c88 0000001f a5d6ab80 mBVUSBBUS+0x1ac3 У вас кстати уже есть тема, https://wasm.in/threads/pomosch-nuzhna-s-zwreadfile.33367/#post-411141 С похоже проблемкой, и с символами
да, было оно. тогда подскажите в чем я ошибся - мой вывод windbg отличен от вашего. пользовал версию 6.10.0003.223.X86
FoxB, у меня версия 10.0.17763.132 AMD64 Вероятно ошибка была в неправильном указании символов должно быть типа того
да он вроде подгружает символы Код (Text): Microsoft (R) Windows Debugger Version 6.10.0003.233 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [c:\0\MEMORY.DMP] Kernel Complete Dump File: Full address space is available Symbol search path is: srv*c:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.23915.x86fre.win7sp1_ldr.170913-0600 Machine Name: Kernel base = 0x8403c000 PsLoadedModuleList = 0x84188e30 Debug session time: Fri Dec 4 01:09:21.521 2020 (GMT+5) System Uptime: 0 days 0:15:53.889 Loading Kernel Symbols ............................................................... ................................................................ ................................. Loading User Symbols Loading unloaded module list .............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7F, {8, 801e7000, 0, 0} Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE ) Followup: MachineOwner --------- add: на Microsoft (R) Windows Debugger Version 10.0.10240.9 AMD64 получилось
FoxB, чтоб убедиться в валидности подгрузки символов, надо включать verbose mod Код (Text): : kd> .symopt+0x80000000 Symbol options are 0x80030337: 0x00000001 - SYMOPT_CASE_INSENSITIVE 0x00000002 - SYMOPT_UNDNAME 0x00000004 - SYMOPT_DEFERRED_LOADS 0x00000010 - SYMOPT_LOAD_LINES 0x00000020 - SYMOPT_OMAP_FIND_NEAREST 0x00000100 - SYMOPT_NO_UNQUALIFIED_LOADS 0x00000200 - SYMOPT_FAIL_CRITICAL_ERRORS 0x00010000 - SYMOPT_AUTO_PUBLICS 0x00020000 - SYMOPT_NO_IMAGE_SEARCH 0x80000000 - SYMOPT_DEBUG ************* Path validation summary ************** Response Time (ms) Location Deferred srv*c:\localsymbols*http://msdl.microsoft.com/download/symbols DBGHELP: Symbol Search Path: srv*c:\localsymbols*http://msdl.microsoft.com/download/symbols SYMSRV: BYINDEX: 0x14 c:\localsymbols*http://msdl.microsoft.com/download/symbols ntkrpamp.pdb 92D32EE7188A4CB3AB23EDA0CB0F9D7B2 SYMSRV: PATH: c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: nt - public symbols c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb 0: kd> .reload SYMSRV: BYINDEX: 0x15 c:\localsymbols*http://msdl.microsoft.com/download/symbols ntkrpamp.pdb 92D32EE7188A4CB3AB23EDA0CB0F9D7B2 SYMSRV: PATH: c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb SYMSRV: RESULT: 0x00000000 DBGHELP: nt - public symbols c:\localsymbols\ntkrpamp.pdb\92D32EE7188A4CB3AB23EDA0CB0F9D7B2\ntkrpamp.pdb
TermoSINteZ, Всё ведь сразу ясно: Код (Text): 8.05 a5d6a2c0 8410245d a5d6a598 8410245c badb0d00 nt!KiTrap03+0xb8 9.06 a5d6a598 8404b58c 00000065 00000003 83d8f3ba nt!vDbgPrintExWithPrefixInternal+0x2b2 10.07 a5d6a5b8 83d8cac3 83d8f3ba 00000028 7fd9f000 nt!DbgPrint+0x1d 11.WARNING: Stack unwind information not available. Following frames may be wrong. 12.08 a5d6a818 83d8e76c 881e8c88 0000001f a5d6ab80 mBVUSBBUS+0x1ac3 DbgPrint это и есть останов #BP, соответственно int3(bp), далее следует серия исключений приводящая к #DF - невозможность обработать фаулт, рекурсивный фаулт, это приводит к сбросу процика после сообщения про данное исключение. Следует посмотреть mBVUSBBUS+0x1ac3, тогда всё станет ясно. Это примитивная детская задача - с кд взял адрес и дизь его.
Indy_, ну у ТС была проблема в чтении дампа - он не читался. После открытие дампа все само собой понятно стало