win7 32位系统运行TGL.EXE程序中突然黑屏重启,且此种情况一年内多次发生,目前只能看到引发DEBUG的进程是TGL.EXE,每次原因不尽相同,但是每个DUMP文件都会指向这个TGL.EXE进程,所以想请教大家是否代表TGL.EXE有兼容性或存在BUG问题,还是说与系统驱动程序有关从而导致重启?希望能够定位故障的原因:
DUMP 1:
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\故障\重启故障文件\重启故障文件\112722-7285-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.x86fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0x8404b000 PsLoadedModuleList = 0x84193810
Debug session time: Sun Nov 27 14:12:52.623 2022 (UTC + 8:00)
System Uptime: 0 days 9:21:34.274
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
For analysis of this file, run !analyze -v
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fd9f43f4, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 84089e80, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 0
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-606A3D2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 0
Key : Analysis.Memory.CommitPeak.Mb
Value: 127
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffffffd9f43f4
BUGCHECK_P2: 1
BUGCHECK_P3: ffffffff84089e80
BUGCHECK_P4: 0
WRITE_ADDRESS: 84173c00: Unable to get Flags value from nt!KdVersionBlock
84173c00: Unable to get Flags value from nt!KdVersionBlock
84173c00: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from 841b3128
GetUlongPtrFromAddress: unable to read from 841b35d0
Unable to get NonPagedPoolStart
Unable to get PagedPoolStart
fd9f43f4
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TGL.exe
TRAP_FRAME: 9ba827d0 -- (.trap 0xffffffff9ba827d0)
ErrCode = 00000002
eax=00c0c0c0 ebx=00000001 ecx=000000ad edx=00000117 esi=fd9f424c edi=fd9f43f4
eip=84089e80 esp=9ba82844 ebp=9ba82878 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
nt!RtlFillMemoryUlong+0x10:
84089e80 f3ab rep stos dword ptr es:[edi]
Resetting default scope
STACK_TEXT:
9ba827b8 84090928 00000001 fd9f43f4 00000000 nt!MmAccessFault+0x104
9ba827b8 84089e80 00000001 fd9f43f4 00000000 nt!KiTrap0E+0xdc
9ba82844 9a35a4cb fd9f43f4 000002b4 00c0c0c0 nt!RtlFillMemoryUlong+0x10
9ba82878 9a3a66c2 9ba82bdc 0000000c fd9f514c win32k!vSolidFillRect1+0x107
9ba82898 9a39c162 9ba82bdc 0000000c 9ba82f50 win32k!vPaintPathEnum+0x1c
9ba82dbc 9a3a669b 0000000a 00000000 00000002 win32k!bFill+0x3c9
9ba82f2c 9a3a6589 9ba83a64 00000000 00000002 win32k!bEngFastFillEnum+0x108
9ba82f68 9a3a8208 fd9f5000 9ba83a64 00000000 win32k!bPaintPath+0x11d
9ba82f94 9a3a82f9 fd9f5010 9ba83a64 00000000 win32k!EngFastFill+0x1be
9ba8311c 9a3c499a fd9f5010 9ba83150 9ba8314c win32k!EngFillPath+0xe1
9ba831d0 9a3c5892 fd9f5010 9ba83a64 9ba8314c win32k!EngStrokePath+0xa0
9ba83210 9a3c6693 9a3c48fa fffffd78 fd9f5010 win32k!OffStrokePath+0x62
9ba83720 9a3c5892 ffb6e8b0 9ba83a64 fd259908 win32k!SpStrokePath+0x317
9ba83760 00000000 00000000 00000000 00000000 win32k!OffStrokePath+0x62
SYMBOL_NAME: win32k!vSolidFillRect1+107
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
IMAGE_VERSION: 6.1.7600.17633
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x50_win32k!vSolidFillRect1+107
OS_VERSION: 7.0.7600.17795
BUILDLAB_STR: win7_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {ace1dd8e-ff18-5026-2e76-f4143e07d82e}
Followup: MachineOwner
---------
DUMP 2:
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\故障\重启故障文件\重启故障文件\052023-7176-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.17795.x86fre.win7_gdr.150318-1623
Machine Name:
Kernel base = 0x84012000 PsLoadedModuleList = 0x8415a810
Debug session time: Sat May 20 13:48:25.271 2023 (UTC + 8:00)
System Uptime: 0 days 8:25:08.629
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 00000003, the pool freelist is corrupt.
Arg2: fda95358, the pool entry being checked.
Arg3: 00c0c0c0, the read back flink freelist value (should be the same as 2).
Arg4: fda95358, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 0
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-606A3D2
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 0
Key : Analysis.Memory.CommitPeak.Mb
Value: 128
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 19
BUGCHECK_P1: 3
BUGCHECK_P2: fffffffffda95358
BUGCHECK_P3: c0c0c0
BUGCHECK_P4: fffffffffda95358
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: TGL.exe
STACK_TEXT:
9c827968 9a3cf8a3 fda8c000 00000000 9c827a10 nt!ExFreePoolWithTag+0x1b1
9c827978 9a3df6fd fda8c000 00000005 ffb6f790 win32k!FreeObject+0x2e
9c827a10 9a3e09ff 00000000 00000000 ff0522fd win32k!SURFACE::bDeleteSurface+0x32d
9c827a24 9a3c03a7 00000000 ff0522fd fda8c000 win32k!SURFREF::bDeleteSurface+0x14
9c827a38 9a432d35 ff0522fd fe484978 9c827ad0 win32k!bDeleteSurface+0x20
9c827a48 9a414663 fda8c010 ff452b98 ffb4e050 win32k!vSpDeleteSurface+0x1c
9c827ad0 9a415953 fe484978 00000000 00000000 win32k!vSpDeleteSprite+0xbf
9c827b04 9a37e69b ffb4e008 005e137e 00000000 win32k!GdiDeleteSprite+0x115
9c827b34 9a37e862 ffb4e008 005e137e 00000000 win32k!GreDeleteSpriteInternal+0x16d
9c827b54 9a37e9a4 ffb4e008 005e137e 00000000 win32k!GreDeleteSprite+0x26
9c827b78 9a3b24fc fe88fc40 00000001 00000000 win32k!UnsetLayeredWindow+0xa5
9c827bc0 9a3b2f1d fe88fc40 9c827c00 00000000 win32k!xxxFreeWindow+0x40a
9c827c14 9a3b12c3 00000000 fe8248f0 fc2c09d8 win32k!xxxDestroyWindow+0x534
9c827c28 9a39f868 fe8248f0 fe800618 9a53b760 win32k!xxxRemoveShadow+0x3e
9c827c50 9a37faab 9a53b760 00000000 fe8248f0 win32k!xxxSendChangedMsgs+0x89
9c827ca8 9a384d25 00000000 00000000 00000000 win32k!xxxEndDeferWindowPosEx+0x2cc
9c827cc8 9a3ae6d8 fe8248f0 00000000 00000000 win32k!xxxSetWindowPos+0xf6
9c827d04 9a387266 00000018 00010000 018a6fa4 win32k!xxxShowWindow+0x25a
9c827d24 84054746 00010392 00000000 018a6fac win32k!NtUserShowWindow+0x8b
9c827d24 77c96344 00010392 00000000 018a6fac nt!KiSystemServicePostCall
WARNING: Frame IP not in any known module. Following frames may be wrong.
018a6fac 00000000 00000000 00000000 00000000 0x77c96344
SYMBOL_NAME: win32k!FreeObject+2e
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
IMAGE_VERSION: 6.1.7600.17633
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x19_3_win32k!FreeObject+2e
OS_VERSION: 7.0.7600.17795
BUILDLAB_STR: win7_gdr
OSPLATFORM_TYPE: x86
OSNAME: Windows 7
FAILURE_ID_HASH: {6eaac38e-2b4c-b817-021b-35e31c5b2e8e}
Followup: MachineOwner
---------