1.dump文件
2.程序對應的pdb
步驟一:安裝windbg
步驟二:通過windbg打開crash dump文件
步驟三:設置pdb文件路徑,即符號表路徑
步驟四:運行命令!analyze -v,這是windbg提供的一個自動分析命令,正常情況下,會顯示出導致崩潰的行為,其所在文件,以及其在文件中的具體行數
0:254> !analyze -v
..............(一些warnning信息)
FAULTING_IP:
GDrvStd!memcpy+b6
007642b6 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
ExceptionAddress: 007642b6 (GDrvStd!memcpy+0x000000b6)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 2b680000
Attempt to read from address 2b680000
PROCESS_NAME: IOServer.exe
MODULE_NAME: GDrvStd
FAULTING_MODULE: 7c930000 ntdll
DEBUG_FLR_IMAGE_TIMESTAMP: 4cbbd7a5
ERROR_CODE: (NTSTATUS) 0xc0000005 - "0x%08lx"
READ_ADDRESS: 2b680000
EXCEPTION_DOESNOT_MATCH_CODE: This indicates a hardware error.
Instruction at 007642b6 does not read/write to 2b680000
FAULTING_THREAD: 00005fe8
BUGCHECK_STR: APPLICATION_FAULT_CODE_ADDRESS_MISMATCH_WRONG_SYMBOLS
PRIMARY_PROBLEM_CLASS: CODE_ADDRESS_MISMATCH
DEFAULT_BUCKET_ID: WRONG_SYMBOLS
LAST_CONTROL_TRANSFER: from 00758cd5 to 007642b6
STACK_TEXT:
2b67f5dc 00758cd5 4c540026 2b67f76a 0e2f122a GDrvStd!memcpy+0xb6//導致崩潰的操作
2b67fd30 0075be78 00000033 4c540020 2b67fe18 GDrvStd!DrvIE::IEReceiveEx+0xc5 [d:\install-disk\macs6.1.5_release\plant_view\ͨÐÅ\´úÂë\macsgateway\drvstd\drvie.cpp @ 633]//定位出導致崩潰的memcpy操作是在drvie.cpp文件的633行
2b67ff2c 00755d3a 00000000 0eeafcd0 0eeafcd0 GDrvStd!DrvIE::ReceiveMessage+0x128 [d:\install-disk\macs6.1.5_release\plant_view\ͨÐÅ\´úÂë\macsgateway\drvstd\drvie.cpp @ 1245]
2b67ff84 00764f23 113fe008 00000000 00000000 GDrvStd!RecvThread+0x1a [d:\install-disk\macs6.1.5_release\plant_view\ͨÐÅ\´úÂë\macsgateway\drvstd\drvie.cpp @ 38]
2b67ffb8 7c824829 0eeafcd0 00000000 00000000 GDrvStd!_beginthread+0xce
WARNING: Stack unwind information not available. Following frames may be wrong.
2b67ffec 00000000 00764ecc 0eeafcd0 00000000 kernel32+0x24829
FOLLOWUP_IP:
GDrvStd!memcpy+b6
007642b6 f3a5 rep movs dword ptr es:[edi],dword ptr [esi]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: GDrvStd!memcpy+b6
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: GDrvStd.dll
STACK_COMMAND: ~254s; .ecxr ; kb
BUCKET_ID: WRONG_SYMBOLS
FAILURE_BUCKET_ID: CODE_ADDRESS_MISMATCH_c0000005_GDrvStd.dll!base_address
Followup: MachineOwner
---------
步驟五:根據錯誤代碼行,分析可能錯誤原因,解決之
windbg功能很多,命令很多,上面只是介紹了一般的崩潰簡單分析步驟與方法。
注:
windbg常用命令:
!analyze -v
崩潰智能分析,可以簡單定位到崩潰代碼行
!for_each_frame dv /t
通常想查看調用棧上每一個函數的信息,可以用'!for_each_frame dv /t'命令(/t選項要求'dv'顯示有用的類型信息)。(當然,我們必須記住,使用優化編譯時,在函數的整個生存期中,局部變量有可能會被取消,重注冊或被重用來保存其它的數據,因此,可能會導致'dv'命令輸出錯誤的值)。
.ecxr
要求調試器把當前的內容切換到保存在故障轉儲里的異常信息。我們執行這條命令后,將能訪問異常拋出時調用棧和局部變量的值。
~*kb
打印所有線程的調用棧
.cls (Clear Screen)
清屏
http://blog.csdn.net/lizheng308/article/details/6866284