还没有真正找到这个问题的令人满意的解决方案。
我有 Windows 10 Home x64。
我安装了 Google Drive 和 Drive File Stream,并正在同步我的驱动器。大多数文件都在线,直到我与它们交互,然后它会将它们下载到本地(相当标准)。
当我双击.exe
文件, 视窗蓝屏死机马上。
SYSTEM_SERVICE_EXCEPTION (0x0000003B)
当我右键单击该文件并选择:Drive File Stream>“可离线使用”,
然后双击,它也会蓝屏死机。
我尝试过从 Windows 中完全删除 DFS 并重新安装。
我现在已经将它用在了两个 Windows 安装上,结果是一样的。
尝试向 Google 提出此问题,他们说不支持从 DFS 运行可执行文件,并建议改用备份和同步。
我还没有尝试过,但我觉得这是倒退。他们说这不是 Drive File Stream 的 bug,而是 Windows 的 bug。
如果我向微软提出这个问题,他们只会责怪谷歌。
有人有什么想法吗?
提前致谢!
答案1
好的,在运行并分析 WinDbg 后,我发现安装了一个与崩溃相关的程序。卸载此程序已解决问题。
以下是已删除信息的 WinDbg 输出。您可以看到我已写入 SuspectProgram 的区域。
Microsoft (R) Windows Debugger Version 10.0.19041.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\User\Desktop\052220-6984-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff806`15200000 PsLoadedModuleList = 0xfffff806`15648170
Debug session time: Fri May 22 15:45:40.875 2020 (UTC + 10:00)
System Uptime: 0 days 21:04:23.193
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff806153a0cb6, Address of the instruction which caused the bugcheck
Arg3: ffff9e8f9d6bde60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for SuspectProgram.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on COMPUTERNAME
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 10
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff806153a0cb6
BUGCHECK_P3: ffff9e8f9d6bde60
BUGCHECK_P4: 0
CONTEXT: ffff9e8f9d6bde60 -- (.cxr 0xffff9e8f9d6bde60)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffff9e8f9d6b005c rsi=ffffa20fcd3f9990 rdi=00000000000031e0
rip=fffff806153a0cb6 rsp=ffff9e8f9d6be858 rbp=ffff9e8f9d6beb89
r8=0000000000000000 r9=0000000000000000 r10=ffff9e8f9d6be8f0
r11=ffffa20fe0c5e080 r12=0000000000000001 r13=0000000000000000
r14=000000000000000a r15=fffff80615705ef0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
nt!wcsrchr+0x6:
fffff806`153a0cb6 0fb701 movzx eax,word ptr [rcx] ds:002b:00000000`00000000=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
BAD_PAGES_DETECTED: 1
STACK_TEXT:
ffff9e8f`9d6be858 fffff806`2f322201 : ffffa20f`dc94a080 ffffd80d`4ea09b80 ffffa20f`c72b9040 fffff806`158d35c1 : nt!wcsrchr+0x6
ffff9e8f`9d6be860 ffffa20f`dc94a080 : ffffd80d`4ea09b80 ffffa20f`c72b9040 fffff806`158d35c1 00000000`00000000 : SuspectProgram+0x2201
ffff9e8f`9d6be868 ffffd80d`4ea09b80 : ffffa20f`c72b9040 fffff806`158d35c1 00000000`00000000 00000000`00000000 : 0xffffa20f`dc94a080
ffff9e8f`9d6be870 ffffa20f`c72b9040 : fffff806`158d35c1 00000000`00000000 00000000`00000000 ffffffff`80003f0c : 0xffffd80d`4ea09b80
ffff9e8f`9d6be878 fffff806`158d35c1 : 00000000`00000000 00000000`00000000 ffffffff`80003f0c 00000000`000031e0 : 0xffffa20f`c72b9040
ffff9e8f`9d6be880 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpCloseHandle+0x85
SYMBOL_NAME: PAGE_NOT_ZERO
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .cxr 0xffff9e8f9d6bde60 ; kb
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0x3B_c0000005
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e53488a4-f53d-5828-4e8b-03e3e9cba4c2}
Followup: MachineOwner
---------
*** Memory manager detected 1 instance(s) of page corruption, target is likely to have memory corruption.