时不时就蓝屏死机,时间没有规律日志: Loading Dump File [C:\Windows\Minidump\062822-5453-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff807`60000000 PsLoadedModuleList = 0xfffff807`60c2a230 Debug session time: Tue Jun 28 13:03:17.064 2022 (UTC 8:00) System Uptime: 0 days 2:47:33.836 Loading Kernel Symbols ............................................................... ................................................................ ............................................................... Loading User Symbols Loading unloaded module list .................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000007F, {8, ffffb801c2486e70, ffffc88ffdb38ef0, fffff8076029f17d} Probably caused by : memory_corruption Followup: memory_corruption --------- *** Memory manager detected 132677 instance(s) of page corruption, target is likely to have memory corruption. 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: ffffb801c2486e70 Arg3: ffffc88ffdb38ef0 Arg4: fffff8076029f17d Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: QLMsgGate.exe CURRENT_IRQL: 0 BAD_PAGES_DETECTED: 20645 TRAP_FRAME: ffffc88ffdb39a20 -- (.trap 0xffffc88ffdb39a20) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffe70000000000 rbx=0000000000000000 rcx=ffffe773b9dcec88 rdx=ffffe70000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8076029f23d rsp=ffffc88ffdb39bb0 rbp=ffffc88ffdb39dd0 r8=0000007ffffffff8 r9=ffffc88ffdb39d50 r10=ffffca89b87d4080 r11=ffffc88ffdb39d48 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!MmAccessFault 0xed: fffff807`6029f23d 8b8c2410010000 mov ecx,dword ptr [rsp 110h] ss:ffffc88f`fdb39cc0=00000000 Resetting default scope LAST_CONTROL_TRANSFER: from fffff80760405a5e to fffff8076029f17d STACK_TEXT: ffffc88f`fdb38ef0 fffff807`60405a5e : 00000001`114d6d48 16385f78`16381894 16385f78`00000000 000018b0`000103d3 : nt!MmAccessFault 0x2d ffffc88f`fdb39090 fffff807`6029f23d : 00800000`00000003 00000000`163861ec 2800cdec`00060002 11155d54`16386254 : nt!KiPageFault 0x35e ffffc88f`fdb39220 fffff807`60405a5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb393c0 fffff807`6029f23d : 163865a4`1638658c 00000000`00000008 16386594`00000001 00000000`00000000 : nt!KiPageFault 0x35e ffffc88f`fdb39550 fffff807`60405a5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb396f0 fffff807`6029f23d : 11c90140`11c90134 11c90158`11c9014c 11c90170`11c90164 11c9017c`11c90188 : nt!KiPageFault 0x35e ffffc88f`fdb39880 fffff807`60405a5e : 00000000`00000000 01020d9a`00000000 000419bf`1637a9fc 00000000`00000021 : nt!MmAccessFault 0xed ffffc88f`fdb39a20 fffff807`6029f23d : 00000000`00000000 08000002`1637aa5c 16386bc8`00002000 00000000`00060002 : nt!KiPageFault 0x35e ffffc88f`fdb39bb0 fffff807`60405a5e : 765f7469`63696c70 7574243f`56406c61 3f564141`40656c70 40726f74`63657624 : nt!MmAccessFault 0xed ffffc88f`fdb39d50 fffff807`6029f23d : 113186e8`16387468 163818d4`00000001 16386f00`16386e38 16386f20`16386f20 : nt!KiPageFault 0x35e ffffc88f`fdb39ee0 fffff807`60405a5e : 1630a000`111bb814 00000001`03100800 00000000`1630822c 2000c1b6`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3a080 fffff807`6029f23d : 06c162b4`1f01312e 116bc8f4`00000000 23000a00`1630a254 163075ec`00000000 : nt!KiPageFault 0x35e ffffc88f`fdb3a210 fffff807`60405a5e : 163075ec`00000000 00000000`00000000 115ffc70`2001314c 00000003`000413b2 : nt!MmAccessFault 0xed ffffc88f`fdb3a3b0 fffff807`6029f23d : 000098ad`00000000 2001315a`000098ad 1630a574`00000000 00000000`1630a574 : nt!KiPageFault 0x35e ffffc88f`fdb3a540 fffff807`60405a5e : 1630a6e8`1630a6e8 00000000`1630a48c 155bb6f4`15c3c548 00000000`168cfee8 : nt!MmAccessFault 0xed ffffc88f`fdb3a6e0 fffff807`6029f23d : 000098b3`00000000 20013166`000098b3 1630a8a4`00000000 00000000`1630a8a4 : nt!KiPageFault 0x35e ffffc88f`fdb3a870 fffff807`60405a5e : 00001500`1630ae7c 163075ec`00000000 00000000`00000000 1630a9bc`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3aa10 fffff807`6029f23d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault 0x35e ffffc88f`fdb3aba0 fffff807`60405a5e : 1630ad58`00000000 00020000`0000000d 00000000`00000000 162f83ec`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3ad40 fffff807`6029f23d : 162f84c4`00000000 162f84f0`162f84d0 162f8508`162f84fc 162f84ac`162f8514 : nt!KiPageFault 0x35e ffffc88f`fdb3aed0 fffff807`60405a5e : 0000879c`00000000 01010f38`0000879c 1643b0a4`00000000 00000000`1643b0a4 : nt!MmAccessFault 0xed ffffc88f`fdb3b070 fffff807`6029f23d : 1642d488`1642d47c 1642d4a0`1642d494 1642d4b8`1642d4ac 1642d4d0`1642d4c4 : nt!KiPageFault 0x35e ffffc88f`fdb3b200 fffff807`60405a5e : 16432894`01010f44 00000164`0004239b 00000000`115f2f58 00002378`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3b3a0 fffff807`6029f23d : 00000000`00000000 1643bac4`115cfcc0 00000000`00001500 00000000`16439d84 : nt!KiPageFault 0x35e ffffc88f`fdb3b530 fffff807`60405a5e : 00000000`00000000 1642d60c`00000000 1642d638`1642d618 1642d650`1642d644 : nt!MmAccessFault 0xed ffffc88f`fdb3b6d0 fffff807`6029f23d : 115f0718`115f070c 115f0730`115f0724 1642d70c`1642d6f4 00000000`1642d718 : nt!KiPageFault 0x35e ffffc88f`fdb3b860 fffff807`60405a5e : 00000000`00000000 00000000`1643b900 115f2298`00000006 1643b908`16439d84 : nt!MmAccessFault 0xed ffffc88f`fdb3ba00 fffff807`6029f23d : 00000000`00000000 00000000`1643ba6c 115f2298`00000006 1643ba74`16439d84 : nt!KiPageFault 0x35e ffffc88f`fdb3bb90 fffff807`60405a5e : 1643bae8`1643ba74 1643bc24`1643bbd4 1643bda8`1643bd58 00000000`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3bd30 fffff807`6029f23d : 00000000`00000000 0000226f`00000000 00b30000`00000000 00000600`00000009 : nt!KiPageFault 0x35e ffffc88f`fdb3bec0 fffff807`60405a5e : ffffca89`baa2c000 fffff807`6028d5b9 ffffffff`ffffffff ffffc88f`0000000a : nt!MmAccessFault 0xed ffffc88f`fdb3c060 fffff807`6029f23d : ffffca89`9cc02340 00000000`48706657 00000000`00000090 00000000`00000099 : nt!KiPageFault 0x35e ffffc88f`fdb3c1f0 fffff807`60405a5e : 00000000`00000000 00000001`6600ff02 ffffca89`00000000 ffffc88f`fdb3c570 : nt!MmAccessFault 0xed ffffc88f`fdb3c390 fffff807`6029f23d : 00000000`0000000f 00000000`00000002 00000001`00000000 00000000`00000000 : nt!KiPageFault 0x35e ffffc88f`fdb3c520 fffff807`60405a5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3c6c0 fffff807`6029f23d : 00000000`00000000 ffffca89`9d7fd040 00000000`0000ffd1 ffffc88f`fdb3ccc8 : nt!KiPageFault 0x35e ffffc88f`fdb3c850 fffff807`60405a5e : 00000000`ffffffec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3c9f0 fffff807`6029f23d : 00000000`00000003 ffffc88f`fdb3d070 00000000`0000000c ffffca89`a3d17a30 : nt!KiPageFault 0x35e ffffc88f`fdb3cb80 fffff807`60405a5e : 00000000`00000002 00000000`00000001 00000000`00000000 00000000`00000001 : nt!MmAccessFault 0xed ffffc88f`fdb3cd20 fffff807`6029f23d : ffffc87f`a35770b2 00000000`00000006 00000000`00000014 00000000`f1728c00 : nt!KiPageFault 0x35e ffffc88f`fdb3ceb0 fffff807`60405a5e : ffffca89`00000000 ffffc88f`fdb3d050 00000000`00000000 00000000`00000000 : nt!MmAccessFault 0xed ffffc88f`fdb3d050 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault 0x35e STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff8076029f039-fffff8076029f03a 2 bytes - nt!MiGetNextPageTablePte 1c9 [ 80 f6:00 e7 ] fffff8076029f0d2-fffff8076029f0d3 2 bytes - nt!MiGetNextPageTablePte 262 ( 0x99) [ 80 f6:00 e7 ] fffff8076029f1e1-fffff8076029f1e2 2 bytes - nt!MmAccessFault 91 ( 0x10f) [ 80 f6:00 e7 ] fffff8076029fc09-fffff8076029fc0d 5 bytes - nt!MiUserFault 3d9 ( 0xa28) [ d7 be 7d fb f6:e7 dc b9 73 e7 ] fffff8076029fc16-fffff8076029fc17 2 bytes - nt!MiUserFault 3e6 ( 0x0d) [ 80 f6:00 e7 ] fffff8076029fc20-fffff8076029fc21 2 bytes - nt!MiUserFault 3f0 ( 0x0a) [ ff f6:7f e7 ] fffff8076029fc79-fffff8076029fc7e 6 bytes - nt!MiUserFault 449 ( 0x59) [ 68 df be 7d fb f6:70 ee dc b9 73 e7 ] fffff8076029fca6-fffff8076029fcaa 5 bytes - nt!MiUserFault 476 ( 0x2d) [ d0 be 7d fb f6:e0 dc b9 73 e7 ] fffff8076029fcb9-fffff8076029fcbd 5 bytes - nt!MiUserFault 489 ( 0x13) [ d7 be 7d fb f6:e7 dc b9 73 e7 ] fffff8076029fd51-fffff8076029fd55 5 bytes - nt!MiUserFault 521 ( 0x98) [ d7 be 7d fb f6:e7 dc b9 73 e7 ] fffff8076029fd5b-fffff8076029fd5f 5 bytes - nt!MiUserFault 52b ( 0x0a) [ d0 be 7d fb f6:e0 dc b9 73 e7 ] fffff8076029feaa-fffff8076029feab 2 bytes - nt!MiUserFault 67a ( 0x14f) [ 80 f6:00 e7 ] fffff8076029febc-fffff8076029febd 2 bytes - nt!MiUserFault 68c ( 0x12) [ ff f6:7f e7 ] fffff8076029ff35-fffff8076029ff36 2 bytes - nt!MiUserFault 705 ( 0x79) [ ff f6:7f e7 ] fffff8076029ff3c-fffff8076029ff40 5 bytes - nt!MiUserFault 70c ( 0x07) [ d7 be 7d fb f6:e7 dc b9 73 e7 ] fffff8076029ff4b-fffff8076029ff4f 5 bytes - nt!MiUserFault 71b ( 0x0f) [ d0 be 7d fb f6:e0 dc b9 73 e7 ] 57 errors : !nt (fffff8076029f039-fffff8076029ff4f) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: LARGE FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE Followup: memory_corruption --------- *** Memory manager detected 132677 instance(s) of page corruption, target is likely to have memory corruption. 3: kd> lmvm memory_corruption start end module name

欢迎咨询本站!。若是有超频,降压等,建议恢复正常。然后在任务栏搜索框输入内存打开内存诊断工具,看下是否有异常。


点赞(76) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部