[硬件产品讨论] 电脑总是蓝屏,有dmp文件。请大佬们帮忙看一下,谢谢。

FireNova-avatar

FireNova

2021-03-13T12:51:16+00:00

不知道是主板还是cpu、内存的问题,用了半年,电脑每两天都会蓝屏1-2次。
想请各位帮忙分析一下,谢谢。
这是WINDBG的记录


Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ZTY\Desktop\032121-21562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff807`5dc00000 PsLoadedModuleList = 0xfffff807`5e82a490
Debug session time: Sun Mar 21 18:06:31.683 2021 (UTC + 8:00)
System Uptime: 0 days 2:33:11.716
Loading Kernel Symbols
...............................................................
................................................................
............................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`5dff5c50 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff807`642a5c50=0000000000000139
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff807642a5f70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff807642a5ec8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3765

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 220253

Key : Analysis.Init.CPU.mSec
Value: 671

Key : Analysis.Init.Elapsed.mSec
Value: 646475

Key : Analysis.Memory.CommitPeak.Mb
Value: 87

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff807642a5f70

BUGCHECK_P3: fffff807642a5ec8

BUGCHECK_P4: 0

TRAP_FRAME: fffff807642a5f70 -- (.trap 0xfffff807642a5f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8075dff76d0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075de4a8fd rsp=fffff807642a6100 rbp=ffffb8840bf8c080
r8=0000000000000001 r9=0000000000000006 r10=fffff8075de48700
r11=fffff8075c479180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x1ad:
fffff807`5de4a8fd cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff807642a5ec8 -- (.exr 0xfffff807642a5ec8)
ExceptionAddress: fffff8075de4a8fd (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: JX3ClientX64.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

DPC_STACK_BASE: FFFFF807642A6FB0

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff807`642a5c48 fffff807`5e007b69 : 00000000`00000139 00000000`00000003 fffff807`642a5f70 fffff807`642a5ec8 : nt!KeBugCheckEx
fffff807`642a5c50 fffff807`5e007f90 : 00000000`00000000 fffff807`642a5de0 00000000`00000000 00000000`00220003 : nt!KiBugCheckDispatch+0x69
fffff807`642a5d90 fffff807`5e006323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff807`642a5f70 fffff807`5de4a8fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`642a6100 fffff807`5de48c87 : ffffb884`0bf8c080 00000000`00000000 ffffb884`0bf8c080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`642a6170 fffff807`5de48727 : 00000000`00000000 fffff807`642a6206 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`642a6260 fffff807`74405056 : 00000000`00000018 fffff807`642a6300 ffffb884`139e8050 fffff807`642a6340 : nt!IofCompleteRequest+0x17
fffff807`642a6290 fffff807`743e3aa7 : 00000000`00000002 ffffb884`099fd460 ffffb884`098e9580 fffff807`642a6374 : mouclass!MouseClassServiceCallback+0x476
fffff807`642a6330 fffff807`5de4885e : 00000000`00000000 00000001`74484a00 fffff807`5c479101 ffff9b07`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`642a63d0 fffff807`5de48727 : 00000000`00000000 ffffb884`09953506 ffffb884`09624c70 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`642a64c0 fffff807`743aaef5 : ffffb884`0be7b358 ffffb884`09940102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff807`642a64f0 fffff807`743aa7ed : ffffb884`099401d0 ffffb884`09940102 ffffb884`099401d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`642a65f0 fffff807`5de4885e : ffffb884`099c5010 ffffb884`099c5010 fffff807`642a6701 ffffb884`099c53fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`642a6690 fffff807`5de48727 : 00000000`00000001 00000000`00000000 ffffb884`099035f0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`642a6780 fffff807`62bb811a : 00000000`00000000 ffffb884`093acc30 ffffb884`099c5010 fffff807`642a6860 : nt!IofCompleteRequest+0x17
fffff807`642a67b0 fffff807`62bb5bbf : ffffb884`0b029702 ffffb884`09946010 ffffb884`099c5010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`642a6840 fffff807`6f50b91c : 00000000`ffffff02 ffffb884`0b029630 ffffb884`099039d0 ffffb884`099039d0 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`642a68a0 fffff807`6f50b7e1 : ffffb884`0b0297d0 00000000`00000008 ffffb884`0b029860 fffff807`642a6ab8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`642a6900 fffff807`6f50b5d0 : 00000000`00000004 fffff807`642a6a70 00000000`00000000 ffffb884`09904050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`642a69b0 fffff807`6f506570 : 00000000`00000004 fffff807`642a6a88 00000000`00000008 fffff807`642a6a90 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`642a69e0 fffff807`6f5060a5 : 00000000`00000780 0000477b`f6d0d900 ffffb884`0982d520 ffffb884`09992470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`642a6a40 fffff807`6f505d7c : ffffb884`029efb28 ffffb884`027306c0 0000477b`f6d12fd8 ffffb884`029ef000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`642a6b40 fffff807`62bb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00001e28`7a7b2fa0 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`642a6b70 fffff807`5de0781e : fffff807`5c47c240 ffffb884`02853000 fffff807`642a6e70 ffffb884`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`642a6bb0 fffff807`5de06b04 : fffff807`00000007 00000000`00000000 00000000`00000008 00000000`000559c3 : nt!KiExecuteAllDpcs+0x30e
fffff807`642a6d20 fffff807`5dffcc95 : 00000000`00000000 fffff807`5c479180 ffffe481`75e7d000 00000215`f1e280e0 : nt!KiRetireDpcList+0x1f4
fffff807`642a6fb0 fffff807`5dffca80 : fffff807`5dff1d40 fffff807`5deec5ca ffffb884`0db11080 ffffe387`3383eb80 : nt!KxRetireDpcList+0x5
ffffe387`3383eac0 fffff807`5dffc335 : 00000215`f1e280e0 fffff807`5dff77c1 00000215`f2717230 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffe387`3383eaf0 fffff807`5dff77c1 : 00000215`f2717230 00000000`00000000 00000000`00000000 ffffb884`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe387`3383eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME: mouclass!MouseClassServiceCallback+476

MODULE_NAME: mouclass

IMAGE_NAME: mouclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 476

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffff807642a5f70, Address of the trap frame for the exception that caused the bugcheck
Arg3: fffff807642a5ec8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3250

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 3254

Key : Analysis.Init.CPU.mSec
Value: 4437

Key : Analysis.Init.Elapsed.mSec
Value: 866732

Key : Analysis.Memory.CommitPeak.Mb
Value: 92

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: fffff807642a5f70

BUGCHECK_P3: fffff807642a5ec8

BUGCHECK_P4: 0

TRAP_FRAME: fffff807642a5f70 -- (.trap 0xfffff807642a5f70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8075dff76d0 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8075de4a8fd rsp=fffff807642a6100 rbp=ffffb8840bf8c080
r8=0000000000000001 r9=0000000000000006 r10=fffff8075de48700
r11=fffff8075c479180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KiExitDispatcher+0x1ad:
fffff807`5de4a8fd cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: fffff807642a5ec8 -- (.exr 0xfffff807642a5ec8)
ExceptionAddress: fffff8075de4a8fd (nt!KiExitDispatcher+0x00000000000001ad)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: JX3ClientX64.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - <Unable to get error code text>

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

DPC_STACK_BASE: FFFFF807642A6FB0

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
fffff807`642a5c48 fffff807`5e007b69 : 00000000`00000139 00000000`00000003 fffff807`642a5f70 fffff807`642a5ec8 : nt!KeBugCheckEx
fffff807`642a5c50 fffff807`5e007f90 : 00000000`00000000 fffff807`642a5de0 00000000`00000000 00000000`00220003 : nt!KiBugCheckDispatch+0x69
fffff807`642a5d90 fffff807`5e006323 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
fffff807`642a5f70 fffff807`5de4a8fd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x323
fffff807`642a6100 fffff807`5de48c87 : ffffb884`0bf8c080 00000000`00000000 ffffb884`0bf8c080 00000000`00000000 : nt!KiExitDispatcher+0x1ad
fffff807`642a6170 fffff807`5de48727 : 00000000`00000000 fffff807`642a6206 00000000`00000000 00000000`00000000 : nt!IopfCompleteRequest+0x547
fffff807`642a6260 fffff807`74405056 : 00000000`00000018 fffff807`642a6300 ffffb884`139e8050 fffff807`642a6340 : nt!IofCompleteRequest+0x17
fffff807`642a6290 fffff807`743e3aa7 : 00000000`00000002 ffffb884`099fd460 ffffb884`098e9580 fffff807`642a6374 : mouclass!MouseClassServiceCallback+0x476
fffff807`642a6330 fffff807`5de4885e : 00000000`00000000 00000001`74484a00 fffff807`5c479101 ffff9b07`00000000 : mouhid!MouHid_ReadComplete+0x757
fffff807`642a63d0 fffff807`5de48727 : 00000000`00000000 ffffb884`09953506 ffffb884`09624c70 00000000`00000000 : nt!IopfCompleteRequest+0x11e
fffff807`642a64c0 fffff807`743aaef5 : ffffb884`0be7b358 ffffb884`09940102 00000000`00000000 00000000`00000009 : nt!IofCompleteRequest+0x17
fffff807`642a64f0 fffff807`743aa7ed : ffffb884`099401d0 ffffb884`09940102 ffffb884`099401d0 00000000`00000009 : HIDCLASS!HidpDistributeInterruptReport+0x3f5
fffff807`642a65f0 fffff807`5de4885e : ffffb884`099c5010 ffffb884`099c5010 fffff807`642a6701 ffffb884`099c53fb : HIDCLASS!HidpInterruptReadComplete+0x37d
fffff807`642a6690 fffff807`5de48727 : 00000000`00000001 00000000`00000000 ffffb884`099035f0 00000000`00000002 : nt!IopfCompleteRequest+0x11e
fffff807`642a6780 fffff807`62bb811a : 00000000`00000000 ffffb884`093acc30 ffffb884`099c5010 fffff807`642a6860 : nt!IofCompleteRequest+0x17
fffff807`642a67b0 fffff807`62bb5bbf : ffffb884`0b029702 ffffb884`09946010 ffffb884`099c5010 00000000`00000000 : Wdf01000!FxRequest::CompleteInternal+0x23a [minkernel\wdf\framework\shared\core\fxrequest.cpp @ 869]
fffff807`642a6840 fffff807`6f50b91c : 00000000`ffffff02 ffffb884`0b029630 ffffb884`099039d0 ffffb884`099039d0 : Wdf01000!imp_WdfRequestComplete+0x8f [minkernel\wdf\framework\shared\core\fxrequestapi.cpp @ 436]
fffff807`642a68a0 fffff807`6f50b7e1 : ffffb884`0b0297d0 00000000`00000008 ffffb884`0b029860 fffff807`642a6ab8 : USBXHCI!Bulk_Transfer_CompleteCancelable+0xc8
fffff807`642a6900 fffff807`6f50b5d0 : 00000000`00000004 fffff807`642a6a70 00000000`00000000 ffffb884`09904050 : USBXHCI!Bulk_ProcessTransferEventWithED1+0x1fd
fffff807`642a69b0 fffff807`6f506570 : 00000000`00000004 fffff807`642a6a88 00000000`00000008 fffff807`642a6a90 : USBXHCI!Bulk_EP_TransferEventHandler+0x10
fffff807`642a69e0 fffff807`6f5060a5 : 00000000`00000780 0000477b`f6d0d900 ffffb884`0982d520 ffffb884`09992470 : USBXHCI!Endpoint_TransferEventHandler+0xb0
fffff807`642a6a40 fffff807`6f505d7c : ffffb884`029efb28 ffffb884`027306c0 0000477b`f6d12fd8 ffffb884`029ef000 : USBXHCI!Interrupter_DeferredWorkProcessor+0x315
fffff807`642a6b40 fffff807`62bb38f5 : 00000000`00000f44 00000000`00400a02 00000000`00000000 00001e28`7a7b2fa0 : USBXHCI!Interrupter_WdfEvtInterruptDpc+0xc
fffff807`642a6b70 fffff807`5de0781e : fffff807`5c47c240 ffffb884`02853000 fffff807`642a6e70 ffffb884`00000002 : Wdf01000!FxInterrupt::_InterruptDpcThunk+0xa5 [minkernel\wdf\framework\shared\irphandlers\pnp\km\interruptobjectkm.cpp @ 404]
fffff807`642a6bb0 fffff807`5de06b04 : fffff807`00000007 00000000`00000000 00000000`00000008 00000000`000559c3 : nt!KiExecuteAllDpcs+0x30e
fffff807`642a6d20 fffff807`5dffcc95 : 00000000`00000000 fffff807`5c479180 ffffe481`75e7d000 00000215`f1e280e0 : nt!KiRetireDpcList+0x1f4
fffff807`642a6fb0 fffff807`5dffca80 : fffff807`5dff1d40 fffff807`5deec5ca ffffb884`0db11080 ffffe387`3383eb80 : nt!KxRetireDpcList+0x5
ffffe387`3383eac0 fffff807`5dffc335 : 00000215`f1e280e0 fffff807`5dff77c1 00000215`f2717230 00000000`00000000 : nt!KiDispatchInterruptContinue
ffffe387`3383eaf0 fffff807`5dff77c1 : 00000215`f2717230 00000000`00000000 00000000`00000000 ffffb884`00000000 : nt!KiDpcInterruptBypass+0x25
ffffe387`3383eb00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1


SYMBOL_NAME: mouclass!MouseClassServiceCallback+476

MODULE_NAME: mouclass

IMAGE_NAME: mouclass.sys

IMAGE_VERSION: 10.0.19041.1030

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 476

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_mouclass!MouseClassServiceCallback

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {19eabd28-80b6-28d3-485c-6d6a06644567}

Followup: MachineOwner
---------
FireNova-avatar

FireNova

本来以为会是系统的问题,在这期间也重装过不少系统,w7 w10都会蓝屏,
然后以为是显卡的问题,换了新的显卡还是会蓝屏,
再然后以为是使用的软件 比如在玩剑网三的时候会蓝屏,在看视频的时候会蓝屏,在玩雷电模拟器的时候会蓝屏。
试着都卸载后也会蓝屏....可能还是硬件的原因吧
FireNova-avatar

FireNova

已解决,使用BlueScreenView_v1.5.5这个软件找到了几个dll文件报错,网上下载后替换情况就减少很多了。
还有个报错显示amdppm.sys
不知道怎么解决,下次不买amd的东西了[s:ac:哭笑]
Anuqis変態-avatar

Anuqis変態

minidump 没什么好看的 看不出来的
看蓝屏至少需要kernel dump
Jsonloads-avatar

Jsonloads

这种log一般只有微软社区才有人喜欢看…