登录workspace,连接云桌面,使用十几分钟后,我的电脑就蓝屏,终止代码:KERNEL-SECURITY-CHECK-FAILUR
DMP文件
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\041124-40578-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols****.***/download/symbols
Executable search path is:
Windows 7 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff800`2ac00000 PsLoadedModuleList = 0xfffff800`2b82a730
Debug session time: Thu Apr 11 15:55:37.607 2024 (UTC + 8:00)
System Uptime: 0 days 0:16:35.373
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
....................
Cannot read PEB32 from WOW64 TEB32 0000eea6 - Win32 error 0n30
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, fffff40431620130, fffff40431620088, 0}
Probably caused by : Unknown_Image ( PAGE_NOT_ZERO )
Followup: MachineOwner
---------
*** Memory manager detected 61094 instance(s) of page corruption, target is likely to have memory corruption.
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Unknown bugcheck code (139)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000003
Arg2: fffff40431620130
Arg3: fffff40431620088
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x139
PROCESS_NAME: System
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: eea6
LAST_CONTROL_TRANSFER: from fffff8002b011e29 to fffff8002affd890
STACK_TEXT:
fffff404`3161fe08 fffff800`2b011e29 : 00000000`00000139 00000000`00000003 fffff404`31620130 fffff404`31620088 : nt!KeBugCheckEx
fffff404`3161fe10 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 61094 instance(s) of page corruption, target is likely to have memory corruption.
(0)
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
不是这个问题