dump部分信息如下
ADDITIONAL_DEBUG_TEXT:Use '!findthebuild' command to search for the target build information.If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
FAULTING_MODULE: fffff80228600000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x13A
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 1950e
LAST_CONTROL_TRANSFER: from fffff80228bb2c14 to fffff80228a16980
STACK_TEXT:fffff802`2be7f578 fffff802`28bb2c14 : 00000000`0000013a 00000000`00000011 ffff9685`30010140 ffff9685`4c0e6b40 : nt+0x416980fffff802`2be7f580 00000000`0000013a : 00000000`00000011 ffff9685`30010140 ffff9685`4c0e6b40 00000000`00000000 : nt+0x5b2c14fffff802`2be7f588 00000000`00000011 : ffff9685`30010140 ffff9685`4c0e6b40 00000000`00000000 00000000`00000020 : 0x13afffff802`2be7f590 ffff9685`30010140 : ffff9685`4c0e6b40 00000000`00000000 00000000`00000020 ffff9685`4c0e6b40 : 0x11fffff802`2be7f598 ffff9685`4c0e6b40 : 00000000`00000000 00000000`00000020 ffff9685`4c0e6b40 fffff802`28bb2c74 : 0xffff9685`30010140fffff802`2be7f5a0 00000000`00000000 : 00000000`00000020 ffff9685`4c0e6b40 fffff802`28bb2c74 00000000`00000011 : 0xffff9685`4c0e6b40
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner---------
*** Memory manager detected 103694 instance(s) of page corruption, target is likely to have memory corruption.
ADDITIONAL_DEBUG_TEXT:Use '!findthebuild' command to search for the target build information.If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
FAULTING_MODULE: fffff80228600000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x13A
CURRENT_IRQL: 0
BAD_PAGES_DETECTED: 1950e
LAST_CONTROL_TRANSFER: from fffff80228bb2c14 to fffff80228a16980
STACK_TEXT:fffff802`2be7f578 fffff802`28bb2c14 : 00000000`0000013a 00000000`00000011 ffff9685`30010140 ffff9685`4c0e6b40 : nt+0x416980fffff802`2be7f580 00000000`0000013a : 00000000`00000011 ffff9685`30010140 ffff9685`4c0e6b40 00000000`00000000 : nt+0x5b2c14fffff802`2be7f588 00000000`00000011 : ffff9685`30010140 ffff9685`4c0e6b40 00000000`00000000 00000000`00000020 : 0x13afffff802`2be7f590 ffff9685`30010140 : ffff9685`4c0e6b40 00000000`00000000 00000000`00000020 ffff9685`4c0e6b40 : 0x11fffff802`2be7f598 ffff9685`4c0e6b40 : 00000000`00000000 00000000`00000020 ffff9685`4c0e6b40 fffff802`28bb2c74 : 0xffff9685`30010140fffff802`2be7f5a0 00000000`00000000 : 00000000`00000020 ffff9685`4c0e6b40 fffff802`28bb2c74 00000000`00000011 : 0xffff9685`4c0e6b40
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner---------
*** Memory manager detected 103694 instance(s) of page corruption, target is likely to have memory corruption.

