Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\110424-6890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRVC:\Symbolshttp://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff80102800000 PsLoadedModuleList = 0xfffff801
0342a7c0
Debug session time: Mon Nov 4 12:14:33.396 2024 (UTC + 8:00)
System Uptime: 0 days 0:21:17.062
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
Loading unloaded module list
......
Use !analyze -v to get detailed debugging information.
BugCheck 101, {10, 0, ffff99004a15d180, 3}
Probably caused by : Unknown_Image ( PAGE_NOT_ZERO )
Followup: MachineOwner
*** Memory manager detected 95744 instance(s) of page corruption, target is likely to have memory corruption.
10: kd> !analyze -v
CLOCK_WATCHDOG_TIMEOUT (101)
An expected clock interrupt was not received on a secondary processor in an
MP system within the allocated interval. This indicates that the specified
processor is hung and not processing interrupts.
Arguments:
Arg1: 0000000000000010, Clock interrupt time out interval in nominal clock ticks.
Arg2: 0000000000000000, 0.
Arg3: ffff99004a15d180, The PRCB address of the hung processor.
Arg4: 0000000000000003, 0.
Debugging Details:
BUGCHECK_STR: CLOCK_WATCHDOG_TIMEOUT_c_PROC
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: steam.exe
CURRENT_IRQL: d
BAD_PAGES_DETECTED: 17600
STACK_TEXT:
ffff99004a988c88 fffff801
02c4123a : 0000000000000101 00000000
00000010 0000000000000000 ffff9900
4a15d180 : nt!KeBugCheckEx
ffff99004a988c90 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KeAccumulateTicks+0x1d5fca
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
*** Memory manager detected 95744 instance(s) of page corruption, target is likely to have memory corruption.
这是dmp文件的链接:https://pan.quark.cn/s/4d25e1cf9b3a