none
蓝屏重启 频繁 一日多次 RRS feed

  • 问题

  • 经常会出现内存爆满 然后导致重启  即使在待机无操作情况下 也会出现内存爆满 蓝屏重启

    用任务管理器观察并未发现异常软件 

    错误代码是 KERNEL_SECURITY_CHECK_FAILURE

    dmp文件地址为http://pan.baidu.com/s/1mikgS2k

    2017年8月8日 2:24

全部回复

  • 你好,

    查看dump文件可能是Netwtw04.sys引起的。

    通常是因为内存或者驱动的原因。

    如果你最近更改过驱动的设置,建议升级到最新或者回滚到之前版本的网卡驱动(无线网卡)。

    下面是dump文件分析。

    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {10, 2, 1, fffff802754c1ef7}
    
    *** WARNING: Unable to verify timestamp for Netwtw04.sys
    *** ERROR: Module load completed but symbols could not be loaded for Netwtw04.sys
    Probably caused by : Netwtw04.sys ( Netwtw04+21ef7 )
    
    Followup:     MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000010, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
    Arg4: fffff802754c1ef7, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    DUMP_CLASS: 1
    
    DUMP_QUALIFIER: 400
    
    BUILD_VERSION_STRING:  10.0.15063.483 (WinBuild.160101.0800)
    
    DUMP_TYPE:  2
    
    DUMP_FILE_ATTRIBUTES: 0x8
      Kernel Generated Triage Dump
    
    BUGCHECK_P1: 10
    
    BUGCHECK_P2: 2
    
    BUGCHECK_P3: 1
    
    BUGCHECK_P4: fffff802754c1ef7
    
    WRITE_ADDRESS: fffff8015cdec358: Unable to get MiVisibleState
     0000000000000010 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    Netwtw04+21ef7
    fffff802`754c1ef7 48897010        mov     qword ptr [rax+10h],rsi
    
    CPU_COUNT: 8
    
    CPU_MHZ: a20
    
    CPU_VENDOR:  GenuineIntel
    
    CPU_FAMILY: 6
    
    CPU_MODEL: 5e
    
    CPU_STEPPING: 3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  System
    
    ANALYSIS_SESSION_HOST:  VDI-V-JINXIL
    
    ANALYSIS_SESSION_TIME:  08-09-2017 13:17:22.0084
    
    ANALYSIS_VERSION: 10.0.14321.1024 x86fre
    
    TRAP_FRAME:  ffffe681ecd38390 -- (.trap 0xffffe681ecd38390)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=ffff9e040c492c30
    rdx=ffff9e040c10a2e0 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff802754c1ef7 rsp=ffffe681ecd38520 rbp=0000000000000000
     r8=0000000000000240  r9=ffff9e040c10a2fc r10=000000000000001c
    r11=ffff9e040c10a000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    Netwtw04+0x21ef7:
    fffff802`754c1ef7 48897010        mov     qword ptr [rax+10h],rsi ds:00000000`00000010=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8015cb828a9 to fffff8015cb774c0
    
    STACK_TEXT:  
    ffffe681`ecd38248 fffff801`5cb828a9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    ffffe681`ecd38250 fffff801`5cb80e7d : ffff9e04`09d41800 00000000`00000000 ffff9e04`094f8000 00000002`a103441e : nt!KiBugCheckDispatch+0x69
    ffffe681`ecd38390 fffff802`754c1ef7 : ffffe681`ed4075d4 ffff9e04`0d133720 ffff9e04`0b9a4000 ffffe681`ecd38628 : nt!KiPageFault+0x23d
    ffffe681`ecd38520 ffffe681`ed4075d4 : ffff9e04`0d133720 ffff9e04`0b9a4000 ffffe681`ecd38628 ffff9e05`e37cfc20 : Netwtw04+0x21ef7
    ffffe681`ecd38528 ffff9e04`0d133720 : ffff9e04`0b9a4000 ffffe681`ecd38628 ffff9e05`e37cfc20 fffff802`70afd581 : 0xffffe681`ed4075d4
    ffffe681`ecd38530 ffff9e04`0b9a4000 : ffffe681`ecd38628 ffff9e05`e37cfc20 fffff802`70afd581 ffffe681`ed4075d4 : 0xffff9e04`0d133720
    ffffe681`ecd38538 ffffe681`ecd38628 : ffff9e05`e37cfc20 fffff802`70afd581 ffffe681`ed4075d4 00000000`00000001 : 0xffff9e04`0b9a4000
    ffffe681`ecd38540 ffff9e05`e37cfc20 : fffff802`70afd581 ffffe681`ed4075d4 00000000`00000001 ffff9e04`0cfd7b50 : 0xffffe681`ecd38628
    ffffe681`ecd38548 fffff802`70afd581 : ffffe681`ed4075d4 00000000`00000001 ffff9e04`0cfd7b50 ffff9e04`0c118048 : 0xffff9e05`e37cfc20
    ffffe681`ecd38550 ffffe681`ecd38628 : ffff9e04`0b9a4000 000002bc`00000000 ffff9e04`00000000 ffff9e04`0d133720 : ndis!NdisAllocateMdl+0x31
    ffffe681`ecd38590 ffff9e04`0b9a4000 : 000002bc`00000000 ffff9e04`00000000 ffff9e04`0d133720 ffff9e04`0d133720 : 0xffffe681`ecd38628
    ffffe681`ecd38598 000002bc`00000000 : ffff9e04`00000000 ffff9e04`0d133720 ffff9e04`0d133720 fffff802`7550a9cb : 0xffff9e04`0b9a4000
    ffffe681`ecd385a0 ffff9e04`00000000 : ffff9e04`0d133720 ffff9e04`0d133720 fffff802`7550a9cb 00000000`00000000 : 0x000002bc`00000000
    ffffe681`ecd385a8 ffff9e04`0d133720 : ffff9e04`0d133720 fffff802`7550a9cb 00000000`00000000 ffffe681`ecd38628 : 0xffff9e04`00000000
    ffffe681`ecd385b0 ffff9e04`0d133720 : fffff802`7550a9cb 00000000`00000000 ffffe681`ecd38628 ffff9e04`0b9a4000 : 0xffff9e04`0d133720
    ffffe681`ecd385b8 fffff802`7550a9cb : 00000000`00000000 ffffe681`ecd38628 ffff9e04`0b9a4000 00000000`00000004 : 0xffff9e04`0d133720
    ffffe681`ecd385c0 00000000`00000000 : ffffe681`ecd38628 ffff9e04`0b9a4000 00000000`00000004 00000000`00000000 : Netwtw04+0x6a9cb
    
    
    STACK_COMMAND:  kb
    
    THREAD_SHA1_HASH_MOD_FUNC:  b1a51da7a5e6a11c0ceddb40ace80a2ad5b0e78e
    
    THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  d777f623309a273ce31aefa7f30fee6857fcd6ac
    
    THREAD_SHA1_HASH_MOD:  0ef49b272512d8e22ddbff32def97c21ef48e47d
    
    FOLLOWUP_IP: 
    Netwtw04+21ef7
    fffff802`754c1ef7 48897010        mov     qword ptr [rax+10h],rsi
    
    FAULT_INSTR_CODE:  10708948
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  Netwtw04+21ef7
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: Netwtw04
    
    IMAGE_NAME:  Netwtw04.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5796646f
    
    BUCKET_ID_FUNC_OFFSET:  21ef7
    
    FAILURE_BUCKET_ID:  AV_Netwtw04!unknown_function
    
    BUCKET_ID:  AV_Netwtw04!unknown_function
    
    PRIMARY_PROBLEM_CLASS:  AV_Netwtw04!unknown_function
    
    TARGET_TIME:  2017-08-07T12:40:04.000Z
    
    OSBUILD:  15063
    
    OSSERVICEPACK:  483
    
    SERVICEPACK_NUMBER: 0
    
    OS_REVISION: 0
    
    SUITE_MASK:  272
    
    PRODUCT_TYPE:  1
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS
    
    OS_LOCALE:  
    
    USER_LCID:  0
    
    OSBUILD_TIMESTAMP:  2017-07-07 14:06:35
    
    BUILDDATESTAMP_STR:  160101.0800
    
    BUILDLAB_STR:  WinBuild
    
    BUILDOSVER_STR:  10.0.15063.483
    
    ANALYSIS_SESSION_ELAPSED_TIME: 1a74
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_netwtw04!unknown_function
    
    FAILURE_ID_HASH:  {8e2b3625-3e82-e650-20da-4d566c34b67a}
    
    Followup:     MachineOwner

    希望对你有帮助

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    2017年8月9日 6:40
    版主
  • 你好 ,

    几天没有得到你的消息,请问问题是否解决?

    我正在建议作为答案,如果您感觉有帮助,请标记为答案。帮助更多的遇到相同问题的人快速找到有用的信息。

    如果有问题请随时回复


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    2017年8月14日 8:28
    版主
  • I have the same crash dump analysis. Are we sure that it is because of the Intel WiFi driver ?
    2017年12月29日 5:52