10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of the PTE. Parameters 3/4 contain the low/high parts of the PTE. Arg2: fffffabffc174610 Arg3: 5000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 875 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 875 Key : Analysis.IO.Other.Mb Value: 4 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 29 Key : Analysis.Init.CPU.mSec Value: 921 Key : Analysis.Init.Elapsed.mSec Value: 105884 Key : Analysis.Memory.CommitPeak.Mb Value: 96 Key : Bugcheck.Code.DumpHeader Value: 0x1a Key : Bugcheck.Code.Register Value: 0x1a Key : Dump.Attributes.AsUlong Value: 1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : MemoryManagement.PFN Value: 0 FILE_IN_CAB: 102422-8515-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage Dump BUGCHECK_CODE: 1a BUGCHECK_P1: 41792 BUGCHECK_P2: fffffabffc174610 BUGCHECK_P3: 5000000000000000 BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: mscorsvw.exe STACK_TEXT: fffff20a`c825efd8 fffff803`4dc5750d : 00000000`0000001a 00000000`00041792 fffffabf`fc174610 50000000`00000000 : nt!KeBugCheckEx fffff20a`c825efe0 fffff803`4dc55c6f : ffff818d`ab22a700 fffff20a`00000001 00000000`00000002 00007ff8`2e8b0000 : nt!MiDeleteVa 0x155d fffff20a`c825f0e0 fffff803`4dc367e2 : ffff818d`ac5627a0 fffff803`4dc36621 fffff20a`c825f490 ffff818d`00000000 : nt!MiDeletePagablePteRange 0x36f fffff20a`c825f3f0 fffff803`4e088d99 : 00000000`00000000 fffff20a`c825f4a9 ffff818d`ab22a080 ffff818d`ac5627a0 : nt!MiDeleteVirtualAddresses 0x52 fffff20a`c825f440 fffff803`4e131a89 : ffff818d`ab22a080 ffff818d`ac5627a0 ffff818d`00000000 00007ff8`2e8b0000 : nt!MiDeleteVad 0x199 fffff20a`c825f510 fffff803`4e131617 : ffff818d`ac5627a0 ffff818d`a7d82c40 ffff818d`a9c65040 00000000`00000000 : nt!MiUnmapVad 0x49 fffff20a`c825f540 fffff803`4e13148d : ffff818d`ac55dac0 ffff818d`ac55dac0 ffff818d`a9c65040 ffff818d`ab22a080 : nt!MiCleanVad 0x2f fffff20a`c825f570 fffff803`4e0b9ce7 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff818d`ab22a080 : nt!MmCleanProcessAddressSpace 0x10d fffff20a`c825f5f0 fffff803`4e0b054f : ffff818d`ab22a080 ffffb987`693b4060 fffff20a`c825f809 00000000`00000000 : nt!PspRundownSingleProcess 0x207 fffff20a`c825f680 fffff803`4e19ceb8 : 00000000`c0000005 fffff803`4dc6d301 ffffa981`e1f4a180 00000064`ab03a000 : nt!PspExitThread 0x613 fffff20a`c825f770 fffff803`4dc1876b : fffff20a`c8250101 00000000`00000000 ffff818d`aa2e2d10 00000000`00000000 : nt!KiSchedulerApcTerminate 0x38 fffff20a`c825f7b0 fffff803`4de1fc50 : 0000018d`f88aefc0 fffff20a`c825f870 00000000`00000004 00000000`00000000 : nt!KiDeliverApc 0x4db fffff20a`c825f870 fffff803`4de2d31f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc 0x70 fffff20a`c825f9b0 00007ff8`3e867734 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit 0x9f 00000064`ab6ff6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`3e867734 SYMBOL_NAME: nt!MiDeleteVa 155d MODULE_NAME: nt IMAGE_VERSION: 10.0.22000.1098 STACK_COMMAND: .cxr; .ecxr ; kb IMAGE_NAME: ntkrnlmp.exe BUCKET_ID_FUNC_OFFSET: 155d FAILURE_BUCKET_ID: 0x1a_41792_nt!MiDeleteVa OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5} Followup: MachineOwner --------- 10: kd> lmvm nt Browse full module list start end module name fffff803`4da00000 fffff803`4ea47000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\666A1F1CDEE669FCCBC9135C820012201\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\8530C8D31047000\ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 8530C8D3 (This is a reproducible build file hash, not a timestamp) CheckSum: 00B36AA7 ImageSize: 01047000 File version: 10.0.22000.1098 Product version: 10.0.22000.1098 File flags: 0 (Mask 3F) File OS: 40004 NT Win32 File type: 1.0 App File date: 00000000.00000000 Translations: 0409.04b0 Information from resource tables: CompanyName: Microsoft Corporation ProductName: Microsoft® Windows® Operating System InternalName: ntkrnlmp.exe OriginalFilename: ntkrnlmp.exe ProductVersion: 10.0.22000.1098 FileVersion: 10.0.22000.1098 (WinBuild.160101.0800) FileDescription: NT Kernel & System LegalCopyright: © Microsoft Corporation. All rights reserved.

您好,欢迎咨询Microsoft本站。根据您提供的信息可能是内存导致的,建议拔插内存条,擦拭金手指,更换接口,只使用一个内存条。


点赞(48) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部