描述:
使用ndis6.0的lwf驱动,在某一台机器(Win7 32位)上运行一段时间后就会蓝屏,出现了好几次,高手帮忙分析下dump文件吧,万分感谢。
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: c8000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, value 0 = read operation, 1 = write operation
Arg4: 95a97bf8, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 7601.23572.x86fre.win7sp1_ldr.161011-0600
SYSTEM_MANUFACTURER: Dell Inc.
SYSTEM_PRODUCT_NAME: OptiPlex 380
BIOS_VENDOR: Dell Inc.
BIOS_VERSION: A07
BIOS_DATE: 06/13/2012
BASEBOARD_MANUFACTURER: Dell Inc.
BASEBOARD_PRODUCT: 0HN7XN
BASEBOARD_VERSION: A01
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc8000000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: ffffffff95a97bf8
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 85fbc850
Unable to get MmSystemRangeStart
c8000000
CURRENT_IRQL: 2
FAULTING_IP:
ndislwf+4bf8
95a97bf8 8907 mov dword ptr [edi],eax
CPU_COUNT: 2
CPU_MHZ: bb0
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 17
CPU_STEPPING: a
CPU_MICROCODE: 6,17,a,0 (F,M,S,R) SIG: A0B'00000000 (cache) A0B'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: NTSC.exe
ANALYSIS_SESSION_HOST: DUMING-PC
ANALYSIS_SESSION_TIME: 12-07-2016 18:29:53.0120
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
TRAP_FRAME: 8dd4ae94 -- (.trap 0xffffffff8dd4ae94)
ErrCode = 00000002
eax=fbcb4000 ebx=c7f61035 ecx=00000004 edx=c7fcd779 esi=0000b028 edi=c8000000
eip=95a97bf8 esp=8dd4af08 ebp=8dd4af14 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
ndislwf+0x4bf8:
95a97bf8 8907 mov dword ptr [edi],eax ds:0023:c8000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 95a97bf8 to 85e9006f
STACK_TEXT:
8dd4ae94 95a97bf8 badb0d00 c7fcd779 000001ff nt!KiTrap0E+0x1b3
WARNING: Stack unwind information not available. Following frames may be wrong.
8dd4af14 95a97a80 c7f61008 0000002d c7f94008 ndislwf+0x4bf8
8dd4af44 95a9d6b2 c7f61008 00000800 8dd4af98 ndislwf+0x4a80
8dd4af9c 95a9c09f 89ad1620 006835a0 c96811f8 ndislwf+0xa6b2
8dd4afec 8bd1be94 c96811f8 c96835a0 00000000 ndislwf+0x909f
8dd4b038 8bd195fe 027b40e0 8dd4b058 00000001 ndis!ndisMIndicatePacketsToNetBufferLists+0xea
8dd4b060 8bd1a467 897b40e0 004b6ae4 c7e43c00 ndis!ndisMLoopbackPacketX+0xfe
8dd4b088 8bd1a32a 8dd4b0a8 8dd4b0a8 00000000 ndis!ndisMSendPacketsXToMiniport+0xa4
8dd4b0f0 8bcb24ef 897b40e0 c7e43c18 00000000 ndis!ndisMSendNetBufferListsToPackets+0x84
8dd4b110 8bcb245f c7e43c18 c7e43c18 00000000 ndis!ndisFilterSendNetBufferLists+0x87
8dd4b128 95a9dbe8 89ad1008 c7e43c18 00000000 ndis!NdisFSendNetBufferLists+0x38
8dd4b144 95a9ba06 89ad1008 c7e43c18 00000000 ndislwf+0xabe8
8dd4b17c 8bcb24ef 00000000 8a63f288 00000000 ndislwf+0x8a06
8dd4b19c 8bcb245f 8a63f288 8a63f288 00000000 ndis!ndisFilterSendNetBufferLists+0x87
8dd4b1b4 95a68c20 89ad2c48 8a63f288 00000000 ndis!NdisFSendNetBufferLists+0x38
8dd4b230 8bcb262f 89ad2a20 8a63f288 00000000 pacer!PcFilterSendNetBufferLists+0x256
8dd4b25c 8bd16bad 897b40e0 8a63f288 00000000 ndis!ndisSendNBLToFilter+0xf2
8dd4b28c 8be8b77b 89ad5008 8a63f288 00000000 ndis!NdisSendNetBufferLists+0x162
8dd4b2d8 8beae1f4 89ad3950 00000000 00000000 tcpip!FlSendPackets+0x416
8dd4b32c 8bead280 8bf11ec0 00000000 00000000 tcpip!IppFragmentPackets+0x2e2
8dd4b364 8be8a853 8bf11ec0 88a19d54 88a19df0 tcpip!IppDispatchSendPacketHelper+0x266
8dd4b404 8be8b33e 00a19d54 00000000 c9715008 tcpip!IppPacketizeDatagrams+0x8d6
8dd4b484 8be88438 00000000 00000004 8bf11ec0 tcpip!IppSendDatagram