不止一次出现问题,每次使用WinDbg检查都是此问题。出现频繁蓝屏前最后的错误操作是使用NVIDIAGameReady更新驱动时电源线脱落。在此问题后尝试过自己修理:两次重置电脑,第一次重置系统配置和设置,保留了个人文件;第二次重置了所有的个人文件和系统配置和设置。此次问题出现在下载游戏时如1图以太网跑满再打开新软件时。下图有配置表单,如图2附上WinDbg分析:Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\bai\Desktop\102322-3953-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22000 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 22000.1.amd64fre.co_release.210604-1628 Machine Name: Kernel base = 0xfffff806`46000000 PsLoadedModuleList = 0xfffff806`46c29770 Debug session time: Sun Oct 23 16:57:38.835 2022 (UTC 8:00) System Uptime: 0 days 0:22:26.384 Loading Kernel Symbols ............................................................... ................................................................ ........................................... Loading User Symbols Loading unloaded module list ......... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`4641ac90 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffe30b`2f9c3b70=000000000000001a 8: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000061948, The subtype of the BugCheck. Arg2: 000000000049833e Arg3: 0000000000000001 Arg4: 000000000049833e Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1405 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4875 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 296 Key : Analysis.Init.Elapsed.mSec Value: 3405 Key : Analysis.Memory.CommitPeak.Mb Value: 89 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: 102322-3953-01.dmp BUGCHECK_CODE: 1a BUGCHECK_P1: 61948 BUGCHECK_P2: 49833e BUGCHECK_P3: 1 BUGCHECK_P4: 49833e BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe STACK_TEXT: ffffe30b`2f9c3b68 fffff806`464b4e0e : 00000000`0000001a 00000000`00061948 00000000`0049833e 00000000`00000001 : nt!KeBugCheckEx ffffe30b`2f9c3b70 fffff806`46286dbf : 00000000`0030e802 ffff9b00`0a302900 00000000`00000001 ffff813f`00000000 : nt!MiDereferenceIoPages 0x18ef76 ffffe30b`2f9c3c20 fffff806`46256046 : 00000000`00000000 ffffe30b`2f9c42e0 ffffe30b`2f9c4230 ffffe30b`2f9c4230 : nt!MiDeletePteRun 0xddf ffffe30b`2f9c3e10 fffff806`462641c3 : 00000000`00000000 00000000`00000000 ffff813f`ff2ff000 ffffe30b`2f9c4230 : nt!MiDeleteVaTail 0x56 ffffe30b`2f9c3e40 fffff806`462642e9 : 00000000`00000000 ffffe58a`14edd740 ffff8140`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively 0x503 ffffe30b`2f9c3ed0 fffff806`462642e9 : 00000000`00000000 ffffe58a`14edd740 ffff8140`00000000 00000000`00000010 : nt!MiWalkPageTablesRecursively 0x629 ffffe30b`2f9c3f60 fffff806`462642e9 : ffffe30b`2f9c4230 ffffe58a`14edd740 ffffe30b`00000000 00000000`00000020 : nt!MiWalkPageTablesRecursively 0x629 ffffe30b`2f9c3ff0 fffff806`4620a1e1 : ffffe30b`2f9c40a8 ffffe58a`14edd740 00007ff6`00000000 00000000`00000030 : nt!MiWalkPageTablesRecursively 0x629 ffffe30b`2f9c4080 fffff806`46257560 : ffffe30b`2f9c4230 00007ff6`00000001 ffff8140`00000002 00000000`00000000 : nt!MiWalkPageTables 0x381 ffffe30b`2f9c4180 fffff806`46237e72 : ffffe58a`18fe6990 fffff806`46237cb1 ffffe30b`2f9c4530 fffff806`00000000 : nt!MiDeletePagablePteRange 0x5d0 ffffe30b`2f9c4490 fffff806`4668f7c9 : 00000000`00000000 ffffe30b`2f9c4549 ffffe58a`14edd0c0 ffffe58a`18fe6990 : nt!MiDeleteVirtualAddresses 0x52 ffffe30b`2f9c44e0 fffff806`4675ce6a : ffffe58a`14edd0c0 ffffe58a`18fe6990 ffffe58a`00000000 00007ffe`3fff0000 : nt!MiDeleteVad 0x199 ffffe30b`2f9c45b0 fffff806`4675cccd : ffffe58a`2083a520 ffffe58a`2083a520 ffffe58a`144f0080 ffffe58a`14edd0c0 : nt!MiCleanVad 0x42 ffffe30b`2f9c45e0 fffff806`466c06e7 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffe58a`14edd0c0 : nt!MmCleanProcessAddressSpace 0x10d ffffe30b`2f9c4660 fffff806`466b6f57 : ffffe58a`14edd0c0 ffffab8e`b15d02d0 ffffe30b`2f9c4879 00000000`00000000 : nt!PspRundownSingleProcess 0x207 ffffe30b`2f9c46f0 fffff806`467b6a98 : 00000000`c0000005 00000000`ffffff01 ffff8281`abfd7440 000000e5`42b0d000 : nt!PspExitThread 0x613 ffffe30b`2f9c47e0 fffff806`46219dab : 00000000`00000000 ffffe58a`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate 0x38 ffffe30b`2f9c4820 fffff806`4641fca0 : 000022c8`002bbe70 ffffe30b`2f9c48e0 00000000`0000000f 00000000`0000000d : nt!KiDeliverApc 0x4db ffffe30b`2f9c48e0 fffff806`4642d31f : ffffe58a`144f0080 00000000`00000000 00000000`00000000 ffffe58a`00000000 : nt!KiInitiateUserApc 0x70 ffffe30b`2f9c4a20 00007fff`280476d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit 0x9f 000000e5`4a3ff4f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`280476d4 SYMBOL_NAME: nt!MiDereferenceIoPages 18ef76 MODULE_NAME: nt IMAGE_VERSION: 10.0.22000.1042 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 18ef76 FAILURE_BUCKET_ID: 0x1a_61948_nt!MiDereferenceIoPages OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {16899f95-043e-78ea-0aba-e664d76c4fc5} Followup: MachineOwner --------- 8: kd> lmvm nt Browse full module list start end module name fffff806`46000000 fffff806`47047000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\FDCBA251C28BD5935DB2F7AEE341482A1\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\B745976F1047000\ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: B745976F (This is a reproducible build file hash, not a timestamp) CheckSum: 00B39E2B ImageSize: 01047000 File version: 10.0.22000.1042 Product version: 10.0.22000.1042 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 10.0.22000.1042 FileVersion: 10.0.22000.1042 (WinBuild.160101.0800) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

欢迎访问本站!。建议参考以下链接,检测一下内存和硬盘:https://answers.microsoft.com/zh-hans/windows/f.


是需要我在干净启动后再输入命令?此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


感谢,是的。建议先查看内存和硬盘是否有异常。


感谢,是的。建议先查看内存和硬盘是否有异常。


我做完这一切后怎么做?此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(36) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部