又蓝屏了,求大神支招

Henry韩-avatar

Henry韩

2020-12-17T03:55:20+00:00

配置i5-10400f 主板b460迫击炮 阿斯加特2666 8*2 老显卡750ti
之前内存插在2 4位 一天基本蓝屏一次 然后换了1 3位 三天吧今天又来了
查dump如下 不知道哪里原因 之前蓝屏从20h2系统装回1909 还是这样
Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\minidump\122120-4984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
mareslzy-avatar

mareslzy

蓝屏代码是啥
Henry韩-avatar

Henry韩

用winDbg 查了只有上面我发的这个 刚刚我重启下又出来了 minidump文件dump还是跟上面我发的一样
mareslzy-avatar

mareslzy

你试试插一条内存,这个蓝屏代码最大的可能就是内存不稳定了。
Henry韩-avatar

Henry韩

Reply to [pid=478461036,24747142,1]Reply[/pid] Post by [uid=2095136]yoloh[/uid] (2020-12-21 12:32)
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff803`77a00000 PsLoadedModuleList = 0xfffff803`77e461b0
Debug session time: Mon Dec 21 12:16:04.257 2020 (UTC + 8:00)
System Uptime: 0 days 0:41:34.154
Henry韩-avatar

Henry韩

Reply to [pid=478453428,24747142,1]Reply[/pid] Post by [uid=2095136]yoloh[/uid] (2020-12-21 12:09)

Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff9e0d0ac07170, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffff9e0d0ac070c8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------