玩《守望先锋》时出现 MEMORY_MANAGEMENT 蓝屏

玩《守望先锋》时出现 MEMORY_MANAGEMENT 蓝屏

我想知道是什么导致了这个问题以及如何解决它。

Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`20c00000 PsLoadedModuleList = 0xfffff800`2182a230
Debug session time: Fri Jun 11 09:06:17.029 2021 (UTC - 7:00)
System Uptime: 0 days 9:23:38.882
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................................................
.............................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000030`22fc3018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`20ff6c20 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffd80c`c1a7d2d0=000000000000001a
10: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
    the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffff930114c69f08
Arg3: ff00065a00000000
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7467

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7861

    Key  : Analysis.Init.CPU.mSec
    Value: 2139

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12983

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : MemoryManagement.PFN
    Value: 65a00000

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 41792

BUGCHECK_P2: ffff930114c69f08

BUGCHECK_P3: ff00065a00000000

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  Overwatch.exe

STACK_TEXT:  
ffffd80c`c1a7d2c8 fffff800`20e4423a     : 00000000`0000001a 00000000`00041792 ffff9301`14c69f08 ff00065a`00000000 : nt!KeBugCheckEx
ffffd80c`c1a7d2d0 fffff800`20e42a6f     : ffff9603`1607f700 00000000`00000000 00000000`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffffd80c`c1a7d3d0 fffff800`20e12c10     : 00000000`00000001 ffffd80c`00000000 ffff9603`1607f550 ffff9603`0f3e3080 : nt!MiDeletePagablePteRange+0x48f
ffffd80c`c1a7d6e0 fffff800`20e52277     : 00000000`2298d3ff 00000000`00000000 ffff9603`00000000 fffff800`00000000 : nt!MiDeleteVad+0x360
ffffd80c`c1a7d7f0 fffff800`211f906c     : ffffd80c`00000000 00000000`00000000 ffffd80c`c1a7d950 00000229`8d3e0000 : nt!MiFreeVadRange+0xa3
ffffd80c`c1a7d850 fffff800`211f8b45     : 00000000`00000000 ffff9603`0df7c1c0 ffffd80c`c1a7da18 00000000`00000000 : nt!MmFreeVirtualMemory+0x4ec
ffffd80c`c1a7d9a0 fffff800`210085b5     : ffff9603`0f3e3080 ffff9603`14695080 00000000`00000000 ffff9603`00000000 : nt!NtFreeVirtualMemory+0x95
ffffd80c`c1a7da00 00007ff8`1a20d1e4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000030`248fd6e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`1a20d1e4


SYMBOL_NAME:  nt!MiDeleteVa+153a

MODULE_NAME: nt

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET:  153a

FAILURE_BUCKET_ID:  0x1a_41792_nt!MiDeleteVa

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ad6dfca3-101b-35a8-d6e1-12de9ecbc1f5}

Followup:     MachineOwner
---------

更新:刚刚收到这个,希望这有助于识别问题,我也检查了我的内存,实际上它没问题

Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`55000000 PsLoadedModuleList = 0xfffff804`55c2a230
Debug session time: Sat Jun 19 05:21:12.568 2021 (UTC - 7:00)
System Uptime: 0 days 3:43:50.421
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................................................................
.............................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000037`e21e2018).  Type ".hh dbgerr001" for details
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`553f6c20 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffffec08`6d547860=000000000000001a
11: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: 0000016f22f50000
Arg3: 000000000000000f
Arg4: ffffec086d547a00

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3265

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12903

    Key  : Analysis.Init.CPU.mSec
    Value: 327

    Key  : Analysis.Init.Elapsed.mSec
    Value: 8751

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 80

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  1a

BUGCHECK_P1: 61941

BUGCHECK_P2: 16f22f50000

BUGCHECK_P3: f

BUGCHECK_P4: ffffec086d547a00

PROCESS_NAME:  msedge.exe

STACK_TEXT:  
ffffec08`6d547858 fffff804`55487c62     : 00000000`0000001a 00000000`00061941 0000016f`22f50000 00000000`0000000f : nt!KeBugCheckEx
ffffec08`6d547860 fffff804`55404d5e     : ffffdc0c`874d9000 00000000`00000000 ffffec08`6d547a80 00000000`00000000 : nt!MmAccessFault+0x15fe52
ffffec08`6d547a00 00007ff9`8e56b44e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
00000037`e71ff250 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8e56b44e


MODULE_NAME: hardware

IMAGE_NAME:  hardware_ram

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {c6e5c6cf-692e-7852-5dc5-b74944540fc0}

Followup:     MachineOwner
---------

我有一台华硕 GL504GW,如果需要更多规格,我会添加它们

相关内容