我有一个应用程序,我已经转换为Delphi 2009我有“字符串格式检查”开和标准内存管理器。我在http://www.microsoft.com/whdc/devtools/debugging/install64bit.mspx下载了MS调试工具,并获得了一些调试文件,但我不知道该怎么做。我想了解一下从这里开始的地方。下面是调试文件的顶部(底部已加载所有驱动程序);
Opened log file 'c:\debuglog.txt' 1: kd> .sympath srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols Expanded Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/downloads/symbols 1: kd> .reload;!analyze -v;r;kv;lmnt;.logclose;q Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050033 Arg3: 00000000000006f8 Arg4: fffff80001ee1678 Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 CUSTOMER_CRASH_COUNT: 4 DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT PROCESS_NAME: SomeApplication.e CURRENT_IRQL: 1 EXCEPTION_RECORD: fffffa60087b43c8 -- (.exr 0xfffffa60087b43c8) .exr 0xfffffa60087b43c8 ExceptionAddress: fffff80001ed0150 (nt!RtlVirtualUnwind+0x0000000000000250) ExceptionCode: 10000004 ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 00000000000000d8 TRAP_FRAME: fffffa60087b4470 -- (.trap 0xfffffa60087b4470) .trap 0xfffffa60087b4470 NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000050 rbx=0000000000000000 rcx=0000000000000004 rdx=00000000000000d8 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80001ed0150 rsp=fffffa60087b4600 rbp=fffffa60087b4840 r8=0000000000000006 r9=fffff80001e4e000 r10=ffffffffffffff88 r11=fffff8000204c000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!RtlVirtualUnwind+0x250: fffff800`01ed0150 488b02 mov rax,qword ptr [rdx] ds:00000000`000000d8=???????????????? .trap Resetting default scope LAST_CONTROL_TRANSFER: from fffff80001ea81ee to fffff80001ea8450 STACK_TEXT: fffffa60`005f1a68 fffff800`01ea81ee : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx fffffa60`005f1a70 fffff800`01ea6a38 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x6e fffffa60`005f1bb0 fffff800`01ee1678 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb8 fffffa60`087b3c90 fffff800`01ea82a9 : fffffa60`087b43c8 00000000`00000001 fffffa60`087b4470 00000000`0000023b : nt!KiDispatchException+0x34 fffffa60`087b4290 fffff800`01ea70a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xa9 fffffa60`087b4470 fffff800`01ed0150 : fffffa60`087b5498 fffffa60`087b4e70 fffff800`01f95190 fffff800`01e4e000 : nt!KiPageFault+0x1e5 fffffa60`087b4600 fffff800`01ed3f78 : fffffa60`00000001 00000000`00000000 00000000`00000000 ffffffff`ffffff88 : nt!RtlVirtualUnwind+0x250 fffffa60`087b4670 fffff800`01ee1706 : fffffa60`087b5498 fffffa60`087b4e70 fffffa60`00000000 00000000`00000000 : nt!RtlDispatchException+0x118 fffffa60`087b4d60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0xc2 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiDoubleFaultAbort+b8 fffff800`01ea6a38 90 nop SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: nt!KiDoubleFaultAbort+b8 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 49e0237f FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b8 BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b8 Followup: MachineOwner --------- rax=fffffa60005f1b70 rbx=fffffa60087b43c8 rcx=000000000000007f rdx=0000000000000008 rsi=fffffa60087b4470 rdi=fffff80001f9bfa4 rip=fffff80001ea8450 rsp=fffffa60005f1a68 rbp=fffffa60005f1c30 r8=0000000080050033 r9=00000000000006f8 r10=fffff80001ee1678 r11=fffffa60087b4468 r12=0000000000000000 r13=fffffa60087b4290 r14=fffff8000205149c r15=fffff80001e4e000 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282 nt!KeBugCheckEx: fffff800`01ea8450 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa60`005f1a70=000000000000007f Child-SP RetAddr : Args to Child : Call Site fffffa60`005f1a68 fffff800`01ea81ee : 00000000`0000007f 00000000`00000008 00000000`80050033 00000000`000006f8 : nt!KeBugCheckEx fffffa60`005f1a70 fffff800`01ea6a38 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x6e fffffa60`005f1bb0 fffff800`01ee1678 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb8 (TrapFrame @ fffffa60`005f1bb0) fffffa60`087b3c90 fffff800`01ea82a9 : fffffa60`087b43c8 00000000`00000001 fffffa60`087b4470 00000000`0000023b : nt!KiDispatchException+0x34 fffffa60`087b4290 fffff800`01ea70a5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiExceptionDispatch+0xa9 fffffa60`087b4470 fffff800`01ed0150 : fffffa60`087b5498 fffffa60`087b4e70 fffff800`01f95190 fffff800`01e4e000 : nt!KiPageFault+0x1e5 (TrapFrame @ fffffa60`087b4470) fffffa60`087b4600 fffff800`01ed3f78 : fffffa60`00000001 00000000`00000000 00000000`00000000 ffffffff`ffffff88 : nt!RtlVirtualUnwind+0x250 fffffa60`087b4670 fffff800`01ee1706 : fffffa60`087b5498 fffffa60`087b4e70 fffffa60`00000000 00000000`00000000 : nt!RtlDispatchException+0x118 fffffa60`087b4d60 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0xc2
答案 0 :(得分:1)
windbg的帮助文件详细介绍了各种内核模式错误检查,以及如何处理它们。我真的不知道你的专业水平或你在这里期待什么,但一般来说,在用户模式程序(如delphi)中你无法做任何事情都会导致错误检查。因此,我们通常会假设驱动程序错误或某种硬件故障。
我将UNEXPECTED_KERNEL_MODE_TRAP
输入帮助索引并获得此页面:
Windows驱动程序工具包:调试工具 错误检查0x7F: UNEXPECTED_KERNEL_MODE_TRAP UNEXPECTED_KERNEL_MODE_TRAP错误检查 的值为0x0000007F。这个bug 检查表明是Intel CPU 生成陷阱,内核失败 抓住这个陷阱。
这个陷阱可能是一个约束陷阱(a 不允许陷阱内核 捕获)或双重故障(故障) 处理较早时发生 故障,总是导致一个 系统故障)。
...消隐
0x00000008或Double Fault表示 在通话期间发生异常 到先前异常的处理程序。 通常,两个例外是 连续处理。但是,有 几个不可能的例外 连续处理,并在此 处理器发出信号的情况 双重错误。有两种常见的 双重错误的原因:
内核 堆栈溢出。发生这种溢出 当一个警卫页面被击中时,和 内核尝试推送陷阱帧。 因为没有堆栈,a 堆栈溢出结果,导致 双重错误。如果你这么想的话 已发生概述,请使用!thread to 确定堆栈限制,然后 使用kb(显示堆栈回溯) 一个大参数(例如,kb 100)显示完整的堆栈。
一个 硬件问题。
原因通常会发生错误检查0x7F 安装故障后或 不匹配的硬件(特别是 内存)或安装硬件 失败。
当发生双重故障时 内核堆栈溢出。这个溢出 如果有多个驱动程序会发生 附在同一堆栈上。对于 例如,如果两个文件系统过滤 驱动程序连接到同一堆栈 然后文件系统递归回来 在,堆栈溢出。
...消隐
它详细介绍了相关内容,以及各种调试技巧以及解决问题的方法。