win10 64位,频繁蓝屏 dmp显示原因是ntkrnlmp.exe在我分析一下是那里的问题,谢谢我想把DMP文件上传这个是微云的网盘 https://share.weiyun.com/Ca2kUSPDMicrosoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\HEDONG\Desktop\102522-11390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff805`39200000 PsLoadedModuleList = 0xfffff805`39e2a270
Debug session time: Tue Oct 25 18:50:34.458 2022 (UTC + 8:00)
System Uptime: 0 days 0:02:19.202
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`395f90f0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9980`4743db50=0000000000000050
12: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffafd40000000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
    bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the processor decided the fault was due to a corrupted PTE.
    bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
    - ARM64: bit 1 is set if the fault was due to a write, clear if a read.
    bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 0000000000000006, (reserved)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : AV.Type
    Value: Read

    Key  : Analysis.CPU.mSec
    Value: 5233

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 6354

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 1156

    Key  : Analysis.Init.Elapsed.mSec
    Value: 16735

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x50

    Key  : Bugcheck.Code.Register
    Value: 0x50

    Key  : Dump.Attributes.AsUlong
    Value: 8

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1


FILE_IN_CAB:  102522-11390-01.dmp

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump

BUGCHECK_CODE:  50

BUGCHECK_P1: fffffafd40000000

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 6

READ_ADDRESS: fffff80539efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffffafd40000000

MM_INTERNAL_CODE:  6

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  WmiPrvSE.exe

TRAP_FRAME:  ffff99804743de70 -- (.trap 0xffff99804743de70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8000000000 rbx=0000000000000000 rcx=fffffafd40000000
rdx=fffffa8000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053f4997bd rsp=ffff99804743e008 rbp=ffff860b2022ba30
 r8=0000007ffffffff8  r9=0000000000000000 r10=fffff8053951ccb0
r11=ffff99804743e2f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
Ntfs!NtfsInitializeIrpContextInternal+0x11d:
fffff805`3f4997bd 85c0            test    eax,eax
Resetting default scope

STACK_TEXT: 
ffff9980`4743db48 fffff805`3962b62c     : 00000000`00000050 fffffafd`40000000 00000000`00000000 fffffafd`7ea00000 : nt!KeBugCheckEx
ffff9980`4743db50 fffff805`3943a4cd     : ffff9980`4743dd90 ffff9980`4743dcd0 ffff9980`4743dcd8 ffff9980`4743dce8 : nt!MiZeroFault+0x1f416c
ffff9980`4743dc40 fffff805`3943974a     : 4f9e5305`1138b001 00000000`00000000 ffff9980`4743def0 00000000`00000000 : nt!MiUserFault+0x80d
ffff9980`4743dcd0 fffff805`3960725e     : 00000000`00000120 00000000`00000000 ffff860b`0000000d 00000000`00000a9a : nt!MmAccessFault+0x16a
ffff9980`4743de70 fffff805`3f4997bd     : fffff805`3951cd4a ffff860b`1c2698c8 00000000`00000000 ffff9980`4743f000 : nt!KiPageFault+0x35e
ffff9980`4743e008 ffff860b`2022ba30     : fffff805`3f57bd72 ffff860b`2022ba00 00000000`00000000 ffff860b`2022ba00 : Ntfs!NtfsInitializeIrpContextInternal+0x11d
ffff9980`4743e078 fffff805`3f57bd72     : ffff860b`2022ba00 00000000`00000000 ffff860b`2022ba00 00000000`00000002 : 0xffff860b`2022ba30
ffff9980`4743e080 fffff805`3942a6b5     : ffff860b`100f0030 ffff860b`2022ba30 ffff9980`4743e300 ffff860b`220c77e0 : Ntfs!NtfsFsdCreate+0xb2
ffff9980`4743e300 fffff805`37e370cf     : ffff860b`220c7800 ffff9980`4743e3f0 ffff9980`4743e3f9 fffff805`37e35f3a : nt!IofCallDriver+0x55
ffff9980`4743e340 fffff805`37e69f54     : ffff9980`4743e3f0 ffff860b`220c7838 ffff860b`08f3c2b0 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff9980`4743e3b0 fffff805`3942a6b5     : 00000000`00000000 ffff860b`100a6060 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
ffff9980`4743e460 fffff805`3942bcb4     : 00000000`00000003 ffff860b`2022ba30 ffff860b`6d4e6f49 fffff805`3942b8e3 : nt!IofCallDriver+0x55
ffff9980`4743e4a0 fffff805`39817bdd     : ffff9980`4743e760 ffff860b`100a6060 ffff860b`220c7878 00000000`00000000 : nt!IoCallDriverWithTracing+0x34
ffff9980`4743e4f0 fffff805`397ffb0e     : ffff860b`100a6060 00000000`00000060 ffff860b`20fee6c0 ffff860b`20fee601 : nt!IopParseDevice+0x117d
ffff9980`4743e660 fffff805`3982a86a     : ffff860b`20fee600 ffff9980`4743e8c8 ffff860b`00000040 ffff860b`08fd7380 : nt!ObpLookupObjectName+0x3fe
ffff9980`4743e830 fffff805`39874a9f     : ffffd680`00000000 000000fc`9f3fb068 00000000`00000000 00000000`00000001 : nt!ObOpenObjectByNameEx+0x1fa
ffff9980`4743e960 fffff805`398745e8     : 000000fc`9f3faff0 00000000`00000000 000000fc`9f3fb068 000000fc`9f3fb058 : nt!IopCreateFile+0x40f
ffff9980`4743ea00 fffff805`3960aab8     : 00000000`000007c0 ffff860b`1efb4080 000000fc`9f3fc768 000002bf`5f60c5a0 : nt!NtOpenFile+0x58
ffff9980`4743ea90 00007ff9`5898d724     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000fc`9f3faf98 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`5898d724


SYMBOL_NAME:  nt!MiZeroFault+1f416c

MODULE_NAME: nt

IMAGE_VERSION:  10.0.19041.2130

STACK_COMMAND:  .cxr; .ecxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  1f416c

FAILURE_BUCKET_ID:  AV_R_(null)_nt!MiZeroFault

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {b7319d6a-58d6-1ac2-09d4-37a3afdc2ea9}

Followup:     MachineOwner
---------

12: kd> lmvm nt
Browse full module list
start             end                 module name
fffff805`39200000 fffff805`3a246000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\87A327C6C356B7E2BAC1D75E779701651\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\C103E0DA1046000\ntkrnlmp.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        C103E0DA (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A5F358
    ImageSize:        01046000
    File version:     10.0.19041.2130
    Product version:  10.0.19041.2130
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.19041.2130
        FileVersion:      10.0.19041.2130 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.      您好东何,非常欢迎您来技术支持本站咨询。让我为您解决电脑蓝屏问题。通过您的日志文件分析来看,导致蓝屏的进程为:ntkrnlmp.exe、WmiPrvSE.exe,这两个进程为系统进程,出现这个问题的原因可能是某些驱动程序不兼容触发了这两个进程。请问出现这个问题之前你是更新过硬件驱动?建议您尝试通过设备品牌官网(不要通过任何第三方软件)下载对应设备型号的主要驱动程序BIOS、独立显卡、核心显卡驱动程序的安装包,覆盖安装到设备中,安装完毕后重启设备,照常使用一段时间电脑,看是否还会出现相同的问题。如果以上操作问题依然存在,请使用DISM命令修复下系统镜像。同时按Windows徽标键+X,启动WindowsPowerShell(管理员),分别执行以下命令,请务必在上一条完成后再执行下一条命令,执行后重启电脑确认.DISM/Online/Cleanup-Image/ScanHealthDISM/Online/Cleanup-Image/CheckHealthDISM/Online/Cleanup-image/RestoreHealthSFC/scannowLenka
        您好东何,您是否仍然遇到这个问题?如果有任何进展,请让我知道。最好的问候。Lenka

点赞(72) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部