Windows Dump日志分析

工具

Windbg Preview

Dump日志查看

Windows生成Dump后,系统日志一般会有如下信息记录:
Windows os日志中的记录位置:
Error 07/11/2020 11:22:40 BugCheck none 0x0000001e (0xffffffffc0000094, 0xfffff801a7614256, 0xffffd00021fff7e0, 0x000000000000000c)C:\Windows\MEMORY.DMP071120-25390-01

Dump解析过程

使用Windbg Preview工具对Dump文件进行分析:


image.png

解析结果

    Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
    Loading Dump File [D:\\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
    ************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 8.1 Kernel Version 9600 MP (32 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Edition build lab: 9600.18589.amd64fre.winblue_ltsb.170204-0600
Machine Name:
Kernel base = 0xfffff803`90207000 PsLoadedModuleList = 0xfffff803`904da670
Debug session time: Sat Jul 11 10:26:34.305 2020 (UTC + 8:00)
System Uptime: 539 days 19:57:39.511
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
    Loading unloaded module list
...............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`903552a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffd000`21ffe5e0=000000000000001e
12: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
    KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000094, The exception code that was not handled
Arg2: fffff801a7614256, The address that the exception occurred at
Arg3: ffffd00021fff7e0, Parameter 0 of the exception
Arg4: 000000000000000c, Parameter 1 of the exception
    Debugging Details:
------------------
    KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 2108
    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-N75119D
    Key  : Analysis.DebugData
    Value: CreateObject
    Key  : Analysis.DebugModel
    Value: CreateObject
    Key  : Analysis.Elapsed.mSec
    Value: 2844
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80
    Key  : Analysis.System
    Value: CreateObject
    Key  : WER.OS.Branch
    Value: winblue_ltsb
    Key  : WER.OS.Timestamp
    Value: 2017-02-04T06:00:00Z
    Key  : WER.OS.Version
    Value: 8.1.9600.18589
    ADDITIONAL_XML: 1
    OS_BUILD_LAYERS: 1
    BUGCHECK_CODE:  1e
    BUGCHECK_P1: ffffffffc0000094
    BUGCHECK_P2: fffff801a7614256
    BUGCHECK_P3: ffffd00021fff7e0
    BUGCHECK_P4: c
    EXCEPTION_PARAMETER1:  ffffd00021fff7e0
    EXCEPTION_PARAMETER2:  000000000000000c
    PROCESS_NAME:  System
    STACK_TEXT:  
ffffd000`21ffe5d8 fffff803`903e1b02     : 00000000`0000001e ffffffff`c0000094 fffff801`a7614256 ffffd000`21fff7e0 : nt!KeBugCheckEx
ffffd000`21ffe5e0 fffff803`9035c7ed     : ffffd000`21ffed50 00000000`00000000 ffffd000`21fff548 ffffd000`21ffe750 : nt!KiFatalExceptionHandler+0x22
ffffd000`21ffe620 fffff803`9027f369     : 00000000`00000001 fffff803`90207000 ffffd000`21fff500 fffff801`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffffd000`21ffe650 fffff803`9028372e     : ffffd000`21fff548 ffffd000`21fff250 ffffd000`21fff548 ffffe000`24945000 : nt!RtlDispatchException+0x1a5
ffffd000`21ffed20 fffff803`90360ec2     : 00000000`00000701 ffffe000`21622248 00000000`00000001 ffffe000`251191b0 : nt!KiDispatchException+0x646
ffffd000`21fff410 fffff803`9035e2e8     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffffd000`21fff5f0 fffff801`a7614256     : ffffe000`220b0ac0 015b295a`79c6c6a3 00000000`00000001 ffffd000`21cc6400 : nt!KiDivideErrorFault+0xe8
ffffd000`21fff780 fffff801`a62c7e02     : ffffe000`220f41a0 ffffd000`21fff829 00000000`00000000 ffffe000`2541c000 : ocnd64!BeMessageInterruptDpc+0x146
ffffd000`21fff7b0 fffff803`902376f0     : 00000000`00000000 00000000`00000001 00000000`00000001 fffff803`9099958f : NDIS!ndisInterruptDpc+0x1a3
ffffd000`21fff890 fffff803`90236a37     : ffffe000`42861300 ffffe000`42861300 00000000`00000000 ffffd000`0000000e : nt!KiExecuteAllDpcs+0x1b0
ffffd000`21fff9e0 fffff803`90358dea     : ffffd000`21fe9180 ffffd000`21fe9180 ffffd000`21ff59c0 ffffe000`3f439880 : nt!KiRetireDpcList+0xd7
ffffd000`21fffc60 00000000`00000000     : ffffd000`22000000 ffffd000`21ff9000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
    SYMBOL_NAME:  ocnd64!BeMessageInterruptDpc+146
    MODULE_NAME: ocnd64
    IMAGE_NAME:  ocnd64.sys
    STACK_COMMAND:  .thread ; .cxr ; kb
    BUCKET_ID_FUNC_OFFSET:  146
    FAILURE_BUCKET_ID:  0x1E_c0000094_ocnd64!BeMessageInterruptDpc
    OS_VERSION:  8.1.9600.18589
    BUILDLAB_STR:  winblue_ltsb
    OSPLATFORM_TYPE:  x64
    OSNAME:  Windows 8.1
    FAILURE_ID_HASH:  {f4a2857c-b106-5a17-c81e-d5cedab523c6}
    Followup:     MachineOwner
---------
    
©著作权归作者所有,转载或内容合作请联系作者
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。

推荐阅读更多精彩内容