Windows 10 崩溃多次,特别是在唤醒时

Windows 10 崩溃多次,特别是在唤醒时

我的工作笔记本电脑是装有 Windows 10 的戴尔 Latitude 3540,我已经多次重新安装了 Windows,但问题仍然存在。

这款笔记本电脑型号有一个与英特尔管理引擎接口 (IMEI) 相关的常见问题,即如果您使用 Windows 安装的版本 10.x,它会在进入睡眠模式后冻结。如果您安装 IMEI 9.x,睡眠模式可以工作,但计算机似乎运行得更慢,如果您安装版本 11.x(我目前的情况),它也可以工作,似乎比 9.x 快一点,但是这些版本都无法解决崩溃错误。虽然我不确定这是否是崩溃的原因。

我从 NirSoft 安装了 BlueScreenView 并得到了此报告https://gist.github.com/julianonunes/1ac3602ebe0722d7cf754585a9e5e19f

以下是 WinDbg 的输出:

Microsoft (R) Windows Debugger Version 10.0.10240.9 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.




Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.




************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
No .natvis files found at C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\Visualizers.
Windows 10 Kernel Version 10586 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 10586.420.amd64fre.th2_release_sec.160527-1834
Machine Name:
Kernel base = 0xfffff803`c2684000 PsLoadedModuleList = 0xfffff803`c2962cf0
Debug session time: Tue Jul  5 15:17:55.891 2016 (UTC - 3:00)
System Uptime: 0 days 8:03:48.713
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000054`8137f018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************



Use !analyze -v to get detailed debugging information.



BugCheck 139, {3, ffffd000255f84d0, ffffd000255f8428, 0}



Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+f3c )



Followup:     Pool_corruption
---------



0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************



KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd000255f84d0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd000255f8428, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved



Debugging Details:
------------------



Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details
Page 1c0 not present in the dump file. Type ".hh dbgerr004" for details



SYSTEM_SKU:  Latitude 3540



SYSTEM_VERSION:  A10



BIOS_DATE:  01/28/2015



BASEBOARD_PRODUCT:  0RV82X



BASEBOARD_VERSION:  A02



BUGCHECK_P1: 3



BUGCHECK_P2: ffffd000255f84d0



BUGCHECK_P3: ffffd000255f8428



BUGCHECK_P4: 0



TRAP_FRAME:  ffffd000255f84d0 -- (.trap 0xffffd000255f84d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc0004db33620 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc00051f7c230 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803c28b66ec rsp=ffffd000255f8660 rbp=0000000000000000
 r8=ffffc0004db33da0  r9=ffffc000399aa010 r10=ffffc00051e23010
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe cy
nt!ExDeferredFreePool+0xf3c:
fffff803`c28b66ec cd29            int     29h
Resetting default scope



EXCEPTION_RECORD:  ffffd000255f8428 -- (.exr 0xffffd000255f8428)
ExceptionAddress: fffff803c28b66ec (nt!ExDeferredFreePool+0x0000000000000f3c)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY



CPU_COUNT: 4



CPU_MHZ: a22



CPU_VENDOR:  GenuineIntel



CPU_FAMILY: 6



CPU_MODEL: 45



CPU_STEPPING: 1



DEFAULT_BUCKET_ID:  LIST_ENTRY_CORRUPT



BUGCHECK_STR:  0x139



PROCESS_NAME:  dwm.exe



CURRENT_IRQL:  1



ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.



EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.



EXCEPTION_PARAMETER1:  0000000000000003



ANALYSIS_VERSION: 10.0.10240.9 amd64fre



LAST_CONTROL_TRANSFER:  from fffff803c27d13e9 to fffff803c27c67a0



STACK_TEXT:  
ffffd000`255f81a8 fffff803`c27d13e9 : 00000000`00000139 00000000`00000003 ffffd000`255f84d0 ffffd000`255f8428 : nt!KeBugCheckEx
ffffd000`255f81b0 fffff803`c27d1710 : 93b00001`5cfda921 00000000`00000000 fffffa80`05ab1101 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`255f82f0 fffff803`c27d08f3 : fffff803`c2a17340 ffffd001`33480180 00000000`0000000c ffffe001`b06cc180 : nt!KiFastFailDispatch+0xd0
ffffd000`255f84d0 fffff803`c28b66ec : ffffc000`49ac8680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0xf3
ffffd000`255f8660 fffff803`c28b477d : ffffc000`4976a840 ffffc000`49ac8680 00000000`00000000 00000000`00000001 : nt!ExDeferredFreePool+0xf3c
ffffd000`255f86e0 fffff800`e811a219 : ffffe001`b3b6f910 ffffc000`379588c0 ffffe001`b16fc510 00000194`32306956 : nt!ExFreePoolWithTag+0x76d
ffffd000`255f87c0 fffff800`e811d440 : ffffe001`b2051bc0 00000000`00000000 ffffc000`379588c0 ffffe001`b16fb000 : dxgmms2!VIDMM_GLOBAL::CloseLocalAllocation+0x21d
ffffd000`255f87f0 fffff800`e811fc67 : ffffc000`4725c010 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x2a0
ffffd000`255f8920 fffff800`e80e1a1a : ffffd001`33480180 fffff800`e54949d8 ffffd000`00000008 ffffc000`ffffffff : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0x2f
ffffd000`255f8960 fffff800`e548bcc1 : ffffc000`2dedb440 00000000`00000000 ffffc000`393608c0 ffffe001`b484c400 : dxgmms2!VidMmCloseAllocation+0x1a
ffffd000`255f89a0 fffff800`e5488621 : fffff800`e54884f0 ffffe001`b05da010 ffffe001`b05da010 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyDeferredAllocations+0x131
ffffd000`255f8b10 fffff803`c26c6c59 : fffff803`c2a17200 ffffe001`b484c2c0 ffffe001`b05da3b8 00000000`01baee23 : dxgkrnl!DxgkpDeferredDestructionWork+0x131
ffffd000`255f8b80 fffff803`c2771b75 : ff5081b9`ff5081b9 00000000`00000080 ffffe001`aba72680 ffffe001`b484c2c0 : nt!ExpWorkerThread+0xe9
ffffd000`255f8c10 fffff803`c27cb946 : ffffd001`33480180 ffffe001`b484c2c0 fffff803`c2771b34 ff5786bc`ff5685bb : nt!PspSystemThreadStartup+0x41
ffffd000`255f8c60 00000000`00000000 : ffffd000`255f9000 ffffd000`255f3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16




STACK_COMMAND:  kb



FOLLOWUP_IP: 
nt!ExDeferredFreePool+f3c
fffff803`c28b66ec cd29            int     29h



SYMBOL_STACK_INDEX:  4



SYMBOL_NAME:  nt!ExDeferredFreePool+f3c



FOLLOWUP_NAME:  Pool_corruption



IMAGE_NAME:  Pool_Corruption



DEBUG_FLR_IMAGE_TIMESTAMP:  0



IMAGE_VERSION:  10.0.10586.420



MODULE_NAME: Pool_Corruption



BUCKET_ID_FUNC_OFFSET:  f3c



FAILURE_BUCKET_ID:  0x139_3_nt!ExDeferredFreePool



BUCKET_ID:  0x139_3_nt!ExDeferredFreePool



PRIMARY_PROBLEM_CLASS:  0x139_3_nt!ExDeferredFreePool



ANALYSIS_SOURCE:  KM



FAILURE_ID_HASH_STRING:  km:0x139_3_nt!exdeferredfreepool



FAILURE_ID_HASH:  {14bfade4-e1ed-98c0-40bb-116f20a8dfc3}



Followup:     Pool_corruption
---------

您对于这些崩溃的可能原因有何建议?

谢谢

答案1

编辑

正如评论我的人指出的那样,这可能是驱动器问题。我坚持使用 sfc.exe 命令来找出可能导致崩溃的操作系统文件。

这可能是驱动程序试图覆盖不应该覆盖的内存。修复这个问题可能很简单,只需旋转内存条即可。

如果旋转内存不起作用,我建议使用驱动程序验证程序。如果您不知道那是什么,这里有一个视频网址,可引导您完成整个过程。

http://channel9.msdn.com/Shows/Defrag-Tools/Defrag-Tools-16-WinDbg-Driver-Verifier

除非您有需要,否则 IME 也不是必需的(您有个人需要,而不是操作需要)。我祈祷您卸载它能成功。如果这样能解决问题,请告诉我们!

相关内容