阅读288 返回首页    go 微软 go windows


自从更新到秋季1709,鼠标拖拽操作时就经常蓝屏

内存检测正常,1703版不会出现这种情况,系统已经重装了好多次,每次都复现,也试过RS4预览版,问题依旧,刚刚还看到有一位跟我一样的情况,看来应该不是电脑硬件损坏

计算机已经从检测错误后重新启动。检测错误: 0x0000003b (0x00000000c0000005, 0xffff83101cde0edf, 0xfffff6813b4ae0c0, 0x0000000000000000)。已将转储的数据保存在: C:\WINDOWS\Minidump\110317-7046-01.dmp。报告 ID: f5527d5c-3e93-42c0-8972-f6e21c0b508c。

也不知道怎么上传DMP文件,直接上日志吧


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\110317-7046-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\Symbols*https://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 16299 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`8d61b000 PsLoadedModuleList = 0xfffff803`8d97cfd0
Debug session time: Fri Nov  3 08:21:26.930 2017 (UTC + 8:00)
System Uptime: 0 days 10:12:13.788
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, ffff83101cde0edf, fffff6813b4ae0c0, 0}

Probably caused by : Unknown_Image ( PAGE_NOT_ZERO )

Followup: MachineOwner
---------

 *** Memory manager detected 46811 instance(s) of page corruption, target is likely to have memory corruption.

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff83101cde0edf, Address of the instruction which caused the bugcheck
Arg3: fffff6813b4ae0c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%p

FAULTING_IP: 
win32kfull!xxxRealSleepThread+11065f
ffff8310`1cde0edf 488b02          mov     rax,qword ptr [rdx]

CONTEXT:  fffff6813b4ae0c0 -- (.cxr 0xfffff6813b4ae0c0)
rax=0000000000000010 rbx=ffff8358c01c1a50 rcx=fffffffffffd8f00
rdx=0000000000000000 rsi=0000000000000200 rdi=0000000000000000
rip=ffff83101cde0edf rsp=fffff6813b4aeab0 rbp=ffff8358c0a18b40
 r8=fffff78000000320  r9=fffff78000000004 r10=7ffffffffffffffc
r11=ffffc78285dfe700 r12=0000000000000001 r13=0000000002308355
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210286
win32kfull!xxxRealSleepThread+0x11065f:
ffff8310`1cde0edf 488b02          mov     rax,qword ptr [rdx] ds:002b:00000000`00000000=000000000000b6db
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

BAD_PAGES_DETECTED: b6db

LAST_CONTROL_TRANSFER:  from 0000000000000000 to ffff83101cde0edf

STACK_TEXT:  
fffff681`3b4aeab0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxRealSleepThread+0x11065f


SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff6813b4ae0c0 ; kb

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

 *** Memory manager detected 46811 instance(s) of page corruption, target is likely to have memory corruption.

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: ffff83101cde0edf, Address of the instruction which caused the bugcheck
Arg3: fffff6813b4ae0c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - 0x%p

FAULTING_IP: 
win32kfull!xxxRealSleepThread+11065f
ffff8310`1cde0edf 488b02          mov     rax,qword ptr [rdx]

CONTEXT:  fffff6813b4ae0c0 -- (.cxr 0xfffff6813b4ae0c0)
rax=0000000000000010 rbx=ffff8358c01c1a50 rcx=fffffffffffd8f00
rdx=0000000000000000 rsi=0000000000000200 rdi=0000000000000000
rip=ffff83101cde0edf rsp=fffff6813b4aeab0 rbp=ffff8358c0a18b40
 r8=fffff78000000320  r9=fffff78000000004 r10=7ffffffffffffffc
r11=ffffc78285dfe700 r12=0000000000000001 r13=0000000002308355
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210286
win32kfull!xxxRealSleepThread+0x11065f:
ffff8310`1cde0edf 488b02          mov     rax,qword ptr [rdx] ds:002b:00000000`00000000=000000000000b6db
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

BAD_PAGES_DETECTED: b6db

LAST_CONTROL_TRANSFER:  from 0000000000000000 to ffff83101cde0edf

STACK_TEXT:  
fffff681`3b4aeab0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32kfull!xxxRealSleepThread+0x11065f


SYMBOL_NAME:  PAGE_NOT_ZERO

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

STACK_COMMAND:  .cxr 0xfffff6813b4ae0c0 ; kb

BUCKET_ID:  PAGE_NOT_ZERO

Followup: MachineOwner
---------

 *** Memory manager detected 46811 instance(s) of page corruption, target is likely to have memory corruption.



最后更新:2017-11-03 10:03:36

  上一篇:go windows732位旗舰版错误代码0x80070035找不到网络路径
  下一篇:go 微软账户无法登陆