win7 程序运行中突然重启,如何通过DUMP文件判断是程序BUG还是驱动问题

win7 32位系统运行TGL.EXE程序中突然黑屏重启,且此种情况一年内多次发生,目前只能看到引发DEBUG的进程是TGL.EXE,每次原因不尽相同,但是每个DUMP文件都会指向这个TGL.EXE进程,所以想请教大家是否代表TGL.EXE有兼容性或存在BUG问题,还是说与系统驱动程序有关从而导致重启?希望能够定位故障的原因:

DUMP 1:

Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [D:\故障\重启故障文件\重启故障文件\112722-7285-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*

Executable search path is:

Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 7600.17795.x86fre.win7_gdr.150318-1623

Machine Name:

Kernel base = 0x8404b000 PsLoadedModuleList = 0x84193810

Debug session time: Sun Nov 27 14:12:52.623 2022 (UTC + 8:00)

System Uptime: 0 days 9:21:34.274

Loading Kernel Symbols

...............................................................

................................................................

...............

Loading User Symbols

Loading unloaded module list

....

For analysis of this file, run !analyze -v

1: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)

Invalid system memory was referenced. This cannot be protected by try-except.

Typically the address is just plain bad or it is pointing at freed memory.

Arguments:

Arg1: fd9f43f4, memory referenced.

Arg2: 00000001, value 0 = read operation, 1 = write operation.

Arg3: 84089e80, If non-zero, the instruction address which referenced the bad memory

address.

Arg4: 00000000, (reserved)

Debugging Details:

------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec

Value: 0

Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-606A3D2

Key : Analysis.DebugData

Value: CreateObject

Key : Analysis.DebugModel

Value: CreateObject

Key : Analysis.Elapsed.Sec

Value: 0

Key : Analysis.Memory.CommitPeak.Mb

Value: 127

Key : Analysis.System

Value: CreateObject

BUGCHECK_CODE: 50

BUGCHECK_P1: fffffffffd9f43f4

BUGCHECK_P2: 1

BUGCHECK_P3: ffffffff84089e80

BUGCHECK_P4: 0

WRITE_ADDRESS: 84173c00: Unable to get Flags value from nt!KdVersionBlock

84173c00: Unable to get Flags value from nt!KdVersionBlock

84173c00: Unable to get Flags value from nt!KdVersionBlock

Unable to get MmSystemRangeStart

GetUlongPtrFromAddress: unable to read from 841b3128

GetUlongPtrFromAddress: unable to read from 841b35d0

Unable to get NonPagedPoolStart

Unable to get PagedPoolStart

fd9f43f4

MM_INTERNAL_CODE: 0

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: TGL.exe

TRAP_FRAME: 9ba827d0 -- (.trap 0xffffffff9ba827d0)

ErrCode = 00000002

eax=00c0c0c0 ebx=00000001 ecx=000000ad edx=00000117 esi=fd9f424c edi=fd9f43f4

eip=84089e80 esp=9ba82844 ebp=9ba82878 iopl=0 nv up ei pl nz na po nc

cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202

nt!RtlFillMemoryUlong+0x10:

84089e80 f3ab rep stos dword ptr es:[edi]

Resetting default scope

STACK_TEXT:

9ba827b8 84090928 00000001 fd9f43f4 00000000 nt!MmAccessFault+0x104

9ba827b8 84089e80 00000001 fd9f43f4 00000000 nt!KiTrap0E+0xdc

9ba82844 9a35a4cb fd9f43f4 000002b4 00c0c0c0 nt!RtlFillMemoryUlong+0x10

9ba82878 9a3a66c2 9ba82bdc 0000000c fd9f514c win32k!vSolidFillRect1+0x107

9ba82898 9a39c162 9ba82bdc 0000000c 9ba82f50 win32k!vPaintPathEnum+0x1c

9ba82dbc 9a3a669b 0000000a 00000000 00000002 win32k!bFill+0x3c9

9ba82f2c 9a3a6589 9ba83a64 00000000 00000002 win32k!bEngFastFillEnum+0x108

9ba82f68 9a3a8208 fd9f5000 9ba83a64 00000000 win32k!bPaintPath+0x11d

9ba82f94 9a3a82f9 fd9f5010 9ba83a64 00000000 win32k!EngFastFill+0x1be

9ba8311c 9a3c499a fd9f5010 9ba83150 9ba8314c win32k!EngFillPath+0xe1

9ba831d0 9a3c5892 fd9f5010 9ba83a64 9ba8314c win32k!EngStrokePath+0xa0

9ba83210 9a3c6693 9a3c48fa fffffd78 fd9f5010 win32k!OffStrokePath+0x62

9ba83720 9a3c5892 ffb6e8b0 9ba83a64 fd259908 win32k!SpStrokePath+0x317

9ba83760 00000000 00000000 00000000 00000000 win32k!OffStrokePath+0x62

SYMBOL_NAME: win32k!vSolidFillRect1+107

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

IMAGE_VERSION: 6.1.7600.17633

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x50_win32k!vSolidFillRect1+107

OS_VERSION: 7.0.7600.17795

BUILDLAB_STR: win7_gdr

OSPLATFORM_TYPE: x86

OSNAME: Windows 7

FAILURE_ID_HASH: {ace1dd8e-ff18-5026-2e76-f4143e07d82e}

Followup: MachineOwner

---------

DUMP 2:

Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [D:\故障\重启故障文件\重启故障文件\052023-7176-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*

Executable search path is:

Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 7600.17795.x86fre.win7_gdr.150318-1623

Machine Name:

Kernel base = 0x84012000 PsLoadedModuleList = 0x8415a810

Debug session time: Sat May 20 13:48:25.271 2023 (UTC + 8:00)

System Uptime: 0 days 8:25:08.629

Loading Kernel Symbols

...............................................................

................................................................

...............

Loading User Symbols

Loading unloaded module list

....

For analysis of this file, run !analyze -v

0: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

BAD_POOL_HEADER (19)

The pool is already corrupt at the time of the current request.

This may or may not be due to the caller.

The internal pool links must be walked to figure out a possible cause of

the problem, and then special pool applied to the suspect tags or the driver

verifier to a suspect driver.

Arguments:

Arg1: 00000003, the pool freelist is corrupt.

Arg2: fda95358, the pool entry being checked.

Arg3: 00c0c0c0, the read back flink freelist value (should be the same as 2).

Arg4: fda95358, the read back blink freelist value (should be the same as 2).

Debugging Details:

------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.Sec

Value: 0

Key : Analysis.DebugAnalysisProvider.CPP

Value: Create: 8007007e on DESKTOP-606A3D2

Key : Analysis.DebugData

Value: CreateObject

Key : Analysis.DebugModel

Value: CreateObject

Key : Analysis.Elapsed.Sec

Value: 0

Key : Analysis.Memory.CommitPeak.Mb

Value: 128

Key : Analysis.System

Value: CreateObject

BUGCHECK_CODE: 19

BUGCHECK_P1: 3

BUGCHECK_P2: fffffffffda95358

BUGCHECK_P3: c0c0c0

BUGCHECK_P4: fffffffffda95358

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: TGL.exe

STACK_TEXT:

9c827968 9a3cf8a3 fda8c000 00000000 9c827a10 nt!ExFreePoolWithTag+0x1b1

9c827978 9a3df6fd fda8c000 00000005 ffb6f790 win32k!FreeObject+0x2e

9c827a10 9a3e09ff 00000000 00000000 ff0522fd win32k!SURFACE::bDeleteSurface+0x32d

9c827a24 9a3c03a7 00000000 ff0522fd fda8c000 win32k!SURFREF::bDeleteSurface+0x14

9c827a38 9a432d35 ff0522fd fe484978 9c827ad0 win32k!bDeleteSurface+0x20

9c827a48 9a414663 fda8c010 ff452b98 ffb4e050 win32k!vSpDeleteSurface+0x1c

9c827ad0 9a415953 fe484978 00000000 00000000 win32k!vSpDeleteSprite+0xbf

9c827b04 9a37e69b ffb4e008 005e137e 00000000 win32k!GdiDeleteSprite+0x115

9c827b34 9a37e862 ffb4e008 005e137e 00000000 win32k!GreDeleteSpriteInternal+0x16d

9c827b54 9a37e9a4 ffb4e008 005e137e 00000000 win32k!GreDeleteSprite+0x26

9c827b78 9a3b24fc fe88fc40 00000001 00000000 win32k!UnsetLayeredWindow+0xa5

9c827bc0 9a3b2f1d fe88fc40 9c827c00 00000000 win32k!xxxFreeWindow+0x40a

9c827c14 9a3b12c3 00000000 fe8248f0 fc2c09d8 win32k!xxxDestroyWindow+0x534

9c827c28 9a39f868 fe8248f0 fe800618 9a53b760 win32k!xxxRemoveShadow+0x3e

9c827c50 9a37faab 9a53b760 00000000 fe8248f0 win32k!xxxSendChangedMsgs+0x89

9c827ca8 9a384d25 00000000 00000000 00000000 win32k!xxxEndDeferWindowPosEx+0x2cc

9c827cc8 9a3ae6d8 fe8248f0 00000000 00000000 win32k!xxxSetWindowPos+0xf6

9c827d04 9a387266 00000018 00010000 018a6fa4 win32k!xxxShowWindow+0x25a

9c827d24 84054746 00010392 00000000 018a6fac win32k!NtUserShowWindow+0x8b

9c827d24 77c96344 00010392 00000000 018a6fac nt!KiSystemServicePostCall

WARNING: Frame IP not in any known module. Following frames may be wrong.

018a6fac 00000000 00000000 00000000 00000000 0x77c96344

SYMBOL_NAME: win32k!FreeObject+2e

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

IMAGE_VERSION: 6.1.7600.17633

STACK_COMMAND: .thread ; .cxr ; kb

FAILURE_BUCKET_ID: 0x19_3_win32k!FreeObject+2e

OS_VERSION: 7.0.7600.17795

BUILDLAB_STR: win7_gdr

OSPLATFORM_TYPE: x86

OSNAME: Windows 7

FAILURE_ID_HASH: {6eaac38e-2b4c-b817-021b-35e31c5b2e8e}

Followup: MachineOwner

---------

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值