5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffffd80cc77d950 Arg3: 0000000000000010 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1718 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 1753 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 421 Key : Analysis.Init.Elapsed.mSec Value: 36109 Key : Analysis.Memory.CommitPeak.Mb Value: 97 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : MemoryManagement.PFN Value: 0 FILE_IN_CAB: 050123-6937-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: fffffd80cc77d950 BUGCHECK_P3: 10 BUGCHECK_P4: 0 MEMORY_CORRUPTOR: ONE_BIT BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: nvcontainer.ex STACK_TEXT: ffffd20e`972d6ea8 fffff803`7d9000e7 : 00000000`0000001a 00000000`00041792 fffffd80`cc77d950 00000000`00000010 : nt!KeBugCheckEx ffffd20e`972d6eb0 fffff803`7d8efa8d : 00000000`00000000 ffffd20e`972d73b0 00000000`00000000 00000000`00000000 : nt!MiDeleteVa 0x1597 ffffd20e`972d6fb0 fffff803`7d8ef88d : fffffd80`00000000 00000000`00000000 00000000`00000000 ffff8009`d6653700 : nt!MiWalkPageTablesRecursively 0xb2d ffffd20e`972d7040 fffff803`7d8ef88d : fffffdfe`00000000 00000000`00000000 00000000`00000001 ffff8009`d6653700 : nt!MiWalkPageTablesRecursively 0x92d ffffd20e`972d70d0 fffff803`7d8ef88d : fffffdfe`00000000 00000000`00000000 00000000`00000002 ffff8009`d6653700 : nt!MiWalkPageTablesRecursively 0x92d ffffd20e`972d7160 fffff803`7d912951 : ffffd20e`00000000 fffff803`00000000 ffffd58a`00000003 ffff8009`d6653700 : nt!MiWalkPageTablesRecursively 0x92d ffffd20e`972d71f0 fffff803`7d8fe937 : ffffd20e`972d73b0 ffffd58a`00000001 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables 0x371 ffffd20e`972d72f0 fffff803`7d857f42 : 00000000`00000000 fffff803`7d85810d ffffd20e`972d76b8 ffff8009`d6652580 : nt!MiDeletePagablePteRange 0x747 ffffd20e`972d7620 fffff803`7dcc4148 : 00000000`00000000 ffffd20e`00000001 ffff8009`d735e500 ffffd20e`972d76f0 : nt!MiDeleteVirtualAddresses 0x52 ffffd20e`972d7670 fffff803`7dd2e1c1 : ffff8009`d6653080 ffff8009`d7d97ed0 00000198`00000000 00000000`00000000 : nt!MiDeleteVad 0x1a8 ffffd20e`972d7730 fffff803`7dd2dfbe : ffff8009`d7d97ed0 00000000`00000000 00000198`efab0000 00000000`00000000 : nt!MiUnmapVad 0x49 ffffd20e`972d7760 fffff803`7dd2de2f : ffff8009`d6653080 00000000`00000008 ffff8009`c68a5560 00000000`00000000 : nt!MiUnmapViewOfSection 0x15e ffffd20e`972d7850 fffff803`7dd2dd7c : 00000000`00000000 00000198`efab0000 00000000`00000000 ffff8009`d6653080 : nt!NtUnmapViewOfSectionEx 0x9f ffffd20e`972d78a0 fffff803`95677ff2 : ffff8009`d6652580 00000000`00000046 ffffd20e`972d7900 00000006`e2cfbf00 : nt!NtUnmapViewOfSection 0xc ffffd20e`972d78d0 ffff8009`d6652580 : 00000000`00000046 ffffd20e`972d7900 00000006`e2cfbf00 ffffd20e`972d7910 : 360Hvm64 0x17ff2 ffffd20e`972d78d8 00000000`00000046 : ffffd20e`972d7900 00000006`e2cfbf00 ffffd20e`972d7910 ffffd20e`972d7a20 : 0xffff8009`d6652580 ffffd20e`972d78e0 ffffd20e`972d7900 : 00000006`e2cfbf00 ffffd20e`972d7910 ffffd20e`972d7a20 ffffffff`ffffffff : 0x46 ffffd20e`972d78e8 00000006`e2cfbf00 : ffffd20e`972d7910 ffffd20e`972d7a20 ffffffff`ffffffff 00000198`efab0000 : 0xffffd20e`972d7900 ffffd20e`972d78f0 ffffd20e`972d7910 : ffffd20e`972d7a20 ffffffff`ffffffff 00000198`efab0000 00000000`00000000 : 0x00000006`e2cfbf00 ffffd20e`972d78f8 ffffd20e`972d7a20 : ffffffff`ffffffff 00000198`efab0000 00000000`00000000 00000000`00000000 : 0xffffd20e`972d7910 ffffd20e`972d7900 ffffffff`ffffffff : 00000198`efab0000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffd20e`972d7a20 ffffd20e`972d7908 00000198`efab0000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffffff`ffffffff ffffd20e`972d7910 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000198`efab0000 MODULE_NAME: hardware IMAGE_NAME: memory_corruption STACK_COMMAND: .cxr; .ecxr ; kb FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7} Followup: MachineOwner ---------

您好,欢迎询问本站感谢您的分享,从您提供的log中可以看到,您遇到的是MEMORY_MANAGEMENT问题。这是一个常见的硬件问题,通常是内存或者主板引起的。请问您近期是否有更换或者增加过内存?如果有的话,请还原您的变更,看看问题是否消失。如果您近期没有进行过类似的操作,您也可以打开您的机箱清理一下电脑的灰尘(主要是内存和内存插槽附近)您还可以更换一下内存再插槽中的位置,比如从1槽换到2槽看看。如果您的电脑是笔记本电脑,或者您觉得以上操作有困难,建议您联系电脑厂商,或者专业的电脑维修店来协助您进行检查和维修。


点赞(76) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部