win1010-15号的时候好像有一次蓝屏 这是当时的报错Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\101522-15796-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (24 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff806`6da00000 PsLoadedModuleList = 0xfffff806`6e62a270 Debug session time: Sat Oct 15 07:04:43.370 2022 (UTC - 7:00) System Uptime: 0 days 11:25:37.856 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................................... Loading User Symbols Loading unloaded module list ......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`6ddf90f0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffc404`93fb2f70=0000000000000139 16: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_SECURITY_CHECK_FAILURE (139) A kernel component has corrupted a critical data structure. The corruption could potentially allow a malicious user to gain control of this machine. Arguments: Arg1: 0000000000000004, The thread's stack pointer was outside the legal stack extents for the thread. Arg2: ffffc40493fb3290, Address of the trap frame for the exception that caused the BugCheck Arg3: ffffc40493fb31e8, Address of the exception record for the exception that caused the BugCheck Arg4: 0000000000000000, Reserved Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1906 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 9806 Key : Analysis.IO.Other.Mb Value: 2 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 25 Key : Analysis.Init.CPU.mSec Value: 781 Key : Analysis.Init.Elapsed.mSec Value: 17406 Key : Analysis.Memory.CommitPeak.Mb Value: 98 Key : Bugcheck.Code.DumpHeader Value: 0x139 Key : Bugcheck.Code.Register Value: 0x139 Key : FailFast.Name Value: INCORRECT_STACK Key : FailFast.Type Value: 4 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 101522-15796-01.dmp BUGCHECK_CODE: 139 BUGCHECK_P1: 4 BUGCHECK_P2: ffffc40493fb3290 BUGCHECK_P3: ffffc40493fb31e8 BUGCHECK_P4: 0 TRAP_FRAME: ffffc40493fb3290 -- (.trap 0xffffc40493fb3290) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff90fcc5d9000 rbx=0000000000000000 rcx=0000000000000004 rdx=fffff90fcc5e0000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8066de3d22f rsp=ffffc40493fb3420 rbp=ffffc40493fb3490 r8=fffff90fcc5e0000 r9=ffffc40493fb34a8 r10=ffffc40493fb35f0 r11=ffffc40493fb3660 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!RtlpGetStackLimitsEx 0x1c5b3f: fffff806`6de3d22f cd29 int 29h Resetting default scope EXCEPTION_RECORD: ffffc40493fb31e8 -- (.exr 0xffffc40493fb31e8) ExceptionAddress: fffff8066de3d22f (nt!RtlpGetStackLimitsEx 0x00000000001c5b3f) ExceptionCode: c0000409 (Security check failure or stack buffer overrun) ExceptionFlags: 00000001 NumberParameters: 1 Parameter[0]: 0000000000000004 Subcode: 0x4 FAST_FAIL_INCORRECT_STACK BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: launcher.exe ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application. EXCEPTION_CODE_STR: c0000409 EXCEPTION_PARAMETER1: 0000000000000004 EXCEPTION_STR: 0xc0000409 STACK_TEXT: ffffc404`93fb2f68 fffff806`6de0b069 : 00000000`00000139 00000000`00000004 ffffc404`93fb3290 ffffc404`93fb31e8 : nt!KeBugCheckEx ffffc404`93fb2f70 fffff806`6de0b490 : 20353039`2e39313a 63655220`32373638 20676e69`7265766f 320a3323`20676f6c : nt!KiBugCheckDispatch 0x69 ffffc404`93fb30b0 fffff806`6de09823 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch 0xd0 ffffc404`93fb3290 fffff806`6de3d22f : ffffc404`93fb36a0 ffffc404`93fb3e68 ffffc404`93fb3490 00000000`00000000 : nt!KiRaiseSecurityCheckFailure 0x323 ffffc404`93fb3420 fffff806`6dc778c1 : ffffc404`93fb36a0 00000000`00000000 00000000`00000000 00000000`00000003 : nt!RtlpGetStackLimitsEx 0x1c5b3f ffffc404`93fb3450 fffff806`6dc76676 : ffffc404`93fb3e68 ffffc404`93fb3ba0 ffffc404`93fb3e68 ffff8108`0b766080 : nt!RtlDispatchException 0xe1 ffffc404`93fb3670 fffff806`6de0b1ac : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException 0x186 ffffc404`93fb3d30 fffff806`6de06ee0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch 0x12c ffffc404`93fb3f10 fffff806`6e003a10 : 81080774`efb03095 00000000`001f0003 81080b79`5050fff7 00000000`001fffff : nt!KiGeneralProtectionFault 0x320 ffffc404`93fb40a0 81080774`efb03095 : 00000000`001f0003 81080b79`5050fff7 00000000`001fffff 810809c1`f6a0572d : nt!ExpLookupHandleTableEntry 0x30 ffffc404`93fb40a8 00000000`001f0003 : 81080b79`5050fff7 00000000`001fffff 810809c1`f6a0572d 00000000`001f0003 : 0x81080774`efb03095 ffffc404`93fb40b0 81080b79`5050fff7 : 00000000`001fffff 810809c1`f6a0572d 00000000`001f0003 81080b68`24a0fe6d : 0x1f0003 ffffc404`93fb40b8 00000000`001fffff : 810809c1`f6a0572d 00000000`001f0003 81080b68`24a0fe6d 00000000`001a019f : 0x81080b79`5050fff7 ffffc404`93fb40c0 810809c1`f6a0572d : 00000000`001f0003 81080b68`24a0fe6d 00000000`001a019f 81080adc`d050ff37 : 0x1fffff ffffc404`93fb40c8 00000000`001f0003 : 81080b68`24a0fe6d 00000000`001a019f 81080adc`d050ff37 00000000`001fffff : 0x810809c1`f6a0572d ffffc404`93fb40d0 81080b68`24a0fe6d : 00000000`001a019f 81080adc`d050ff37 00000000`001fffff 81080774`e7b0ffb5 : 0x1f0003 ffffc404`93fb40d8 00000000`001a019f : 81080adc`d050ff37 00000000`001fffff 81080774`e7b0ffb5 00000000`001f0003 : 0x81080b68`24a0fe6d ffffc404`93fb40e0 81080adc`d050ff37 : 00000000`001fffff 81080774`e7b0ffb5 00000000`001f0003 81080b79`4050fff9 : 0x1a019f ffffc404`93fb40e8 00000000`001fffff : 81080774`e7b0ffb5 00000000`001f0003 81080b79`4050fff9 00000000`001fffff : 0x81080adc`d050ff37 ffffc404`93fb40f0 81080774`e7b0ffb5 : 00000000`001f0003 81080b79`4050fff9 00000000`001fffff 810808c9`48c06b15 : 0x1fffff ffffc404`93fb40f8 00000000`001f0003 : 81080b79`4050fff9 00000000`001fffff 810808c9`48c06b15 00000000`001a019f : 0x81080774`e7b0ffb5 ffffc404`93fb4100 81080b79`4050fff9 : 00000000`001fffff 810808c9`48c06b15 00000000`001a019f 81080adc`d050ffe5 : 0x1f0003 ffffc404`93fb4108 00000000`001fffff : 810808c9`48c06b15 00000000`001a019f 81080adc`d050ffe5 00000000`001fffff : 0x81080b79`4050fff9 ffffc404`93fb4110 810808c9`48c06b15 : 00000000`001a019f 81080adc`d050ffe5 00000000`001fffff 81080adc`d050fff9 : 0x1fffff ffffc404`93fb4118 00000000`001a019f : 81080adc`d050ffe5 00000000`001fffff 81080adc`d050fff9 00000000`001fffff : 0x810808c9`48c06b15 ffffc404`93fb4120 81080adc`d050ffe5 : 00000000`001fffff 81080adc`d050fff9 00000000`001fffff 810809c1`e4107d83 : 0x1a019f ffffc404`93fb4128 00000000`001fffff : 81080adc`d050fff9 00000000`001fffff 810809c1`e4107d83 00000000`001f0003 : 0x81080adc`d050ffe5 ffffc404`93fb4130 81080adc`d050fff9 : 00000000`001fffff 810809c1`e4107d83 00000000`001f0003 81080b9a`1560fff9 : 0x1fffff ffffc404`93fb4138 00000000`001fffff : 810809c1`e4107d83 00000000`001f0003 81080b9a`1560fff9 00000000`00000804 : 0x81080adc`d050fff9 ffffc404`93fb4140 810809c1`e4107d83 : 00000000`001f0003 81080b9a`1560fff9 00000000`00000804 c40493aa`1460de47 : 0x1fffff ffffc404`93fb4148 00000000`001f0003 : 81080b9a`1560fff9 00000000`00000804 c40493aa`1460de47 00000000`00000008 : 0x810809c1`e4107d83 ffffc404`93fb4150 81080b9a`1560fff9 : 00000000`00000804 c40493aa`1460de47 00000000`00000008 81080b68`27c0fff3 : 0x1f0003 ffffc404`93fb4158 00000000`00000804 : c40493aa`1460de47 00000000`00000008 81080b68`27c0fff3 00000000`00120089 : 0x81080b9a`1560fff9 ffffc404`93fb4160 c40493aa`1460de47 : 00000000`00000008 81080b68`27c0fff3 00000000`00120089 c4048e50`c5a0fff7 : 0x804 ffffc404`93fb4168 00000000`00000008 : 81080b68`27c0fff3 00000000`00120089 c4048e50`c5a0fff7 00000000`000f0005 : 0xc40493aa`1460de47 ffffc404`93fb4170 81080b68`27c0fff3 : 00000000`00120089 c4048e50`c5a0fff7 00000000`000f0005 00000000`00000000 : 0x8 ffffc404`93fb4178 00000000`00120089 : c4048e50`c5a0fff7 00000000`000f0005 00000000`00000000 ffffc404`93efff00 : 0x81080b68`27c0fff3 ffffc404`93fb4180 c4048e50`c5a0fff7 : 00000000`000f0005 00000000`00000000 ffffc404`93efff00 81080adc`d050fff9 : 0x120089 ffffc404`93fb4188 00000000`000f0005 : 00000000`00000000 ffffc404`93efff00 81080adc`d050fff9 00000000`00101451 : 0xc4048e50`c5a0fff7 ffffc404`93fb4190 00000000`00000000 : ffffc404`93efff00 81080adc`d050fff9 00000000`00101451 81080adc`d050fff9 : 0xf0005 SYMBOL_NAME: nt!KiFastFailDispatch d0 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.2130 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: d0 FAILURE_BUCKET_ID: 0x139_MISSING_GSFRAME_nt!KiFastFailDispatch OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {1971a9b0-b7ec-89bf-0a51-10ac52818da5} Followup: MachineOwner --------- 请问下是什么原因

您的电脑有超频吗??如果有超频,试试还原出厂设置(Bios原厂设置),然后重启电脑看看。==================您电脑的型号是什么呢??可以到您电脑制造商的官网,下载所有最新版本的驱动更新一下。(蓝牙 芯片组 网卡 声卡 显卡 BIOS)(建议不要使用第三方软件更新驱动)如果您不了解您电脑的显卡型号,您可按左下角的查找》输入dxdiag》在“系统”下,点击“保存所有信息”按钮》设名为“您在这里的登入帐号名”(不是邮箱)》存档到桌面》然后上传到以下的任何一个连接吗??(之后留个信息说已经上传到哪个网站)1)https://1drv.ms/f/s!AiTKIv57sNr_c6F0FlWaJ3OyQTg或2)https://cowtransfer.com/(上传后,您会得到个连接,请把那连接发上来)或3)https://app.nihaocloud.com/u/d/4923135c313743fb.


点赞(16) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部