网页资讯视频图片知道文库贴吧地图采购
进入贴吧全吧搜索

 
 
 
日一二三四五六
       
       
       
       
       
       

签到排名:今日本吧第个签到,

本吧因你更精彩,明天继续来努力!

本吧签到人数:0

一键签到
成为超级会员,使用一键签到
一键签到
本月漏签0次!
0
成为超级会员,赠送8张补签卡
如何使用?
点击日历上漏签日期,即可进行补签。
连续签到:天  累计签到:天
0
超级会员单次开通12个月以上,赠送连续签到卡3张
使用连续签到卡
06月03日漏签0天
蓝屏吧 关注:27,990贴子:154,503
  • 看贴

  • 图片

  • 吧主推荐

  • 游戏

  • 8回复贴,共1页
<<返回蓝屏吧
>0< 加载中...

【蓝屏求助】14-11-110xB8蓝屏,windbg说是ntkrnlmp.exe的原因

  • 只看楼主
  • 收藏

  • 回复
  • 水·哥
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [H:\Windows\Minidump\111114-15428-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\mysymbol* http://msdl.microsoft.com/download/symbols;SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18526.amd64fre.win7sp1_gdr.140706-1506
Machine Name:
Kernel base = 0xfffff800`04a18000 PsLoadedModuleList = 0xfffff800`04c5b890
Debug session time: Tue Nov 11 11:41:44.994 2014 (UTC + 8:00)
System Uptime: 0 days 0:27:34.270
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck B8, {fffffa800bf8fb50, fffff80004c16cc0, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt!SwapContext_PatchXRstor+120 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending
code and original DPC routine.
Arguments:
Arg1: fffffa800bf8fb50, Original thread which is the cause of the failure
Arg2: fffff80004c16cc0, New thread
Arg3: 0000000000000000, Stack address of the original thread
Arg4: 0000000000000000
Debugging Details:
------------------
FAULTING_THREAD: fffffa800bf8fb50
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xB8
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80004a90fb4 to fffff80004a8dbc0
STACK_TEXT:
fffff800`00b9abf8 fffff800`04a90fb4 : 00000000`000000b8 fffffa80`0bf8fb50 fffff800`04c16cc0 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9ac00 00000000`000000b8 : fffffa80`0bf8fb50 fffff800`04c16cc0 00000000`00000000 00000000`00000000 : nt!SwapContext_PatchXRstor+0x120
fffff800`00b9ac08 fffffa80`0bf8fb50 : fffff800`04c16cc0 00000000`00000000 00000000`00000000 00000000`00000201 : 0xb8
fffff800`00b9ac10 fffff800`04c16cc0 : 00000000`00000000 00000000`00000000 00000000`00000201 00000000`00000007 : 0xfffffa80`0bf8fb50
fffff800`00b9ac18 00000000`00000000 : 00000000`00000000 00000000`00000201 00000000`00000007 fffff800`04a8597d : nt!KiInitialThread
STACK_COMMAND: .thread 0xfffffa800bf8fb50 ; kb
FOLLOWUP_IP:
nt!SwapContext_PatchXRstor+120
fffff800`04a90fb4 c3 ret
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!SwapContext_PatchXRstor+120
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53b9f073
FAILURE_BUCKET_ID: X64_0xB8_nt!SwapContext_PatchXRstor+120
BUCKET_ID: X64_0xB8_nt!SwapContext_PatchXRstor+120
Followup: MachineOwner
---------
0: kd> !process
GetPointerFromAddress: unable to read from fffff80004cc5000
PROCESS fffffa8003c6c740
SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
DirBase: 00187000 ObjectTable: fffff8a000001170 HandleCount: <Data Not Accessible>
Image: System
VadRoot fffffa8006f4dcf0 Vads 5 Clone 0 Private 9. Modified 1134388. Locked 0.
DeviceMap fffff8a0000084a0
Token fffff8a000004520
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
fffff78000000000: Unable to get shared data
ElapsedTime 00:00:00.000
UserTime 00:00:00.000
KernelTime 00:00:00.000
QuotaPoolUsage[PagedPool] 0
QuotaPoolUsage[NonPagedPool] 0
Working Set Sizes (now,min,max) (97, 0, 0) (388KB, 0KB, 0KB)
PeakWorkingSetSize 3385
VirtualSize 3 Mb
PeakVirtualSize 16 Mb
PageFaultCount 63226
MemoryPriority BACKGROUND
BasePriority 8
CommitCharge 28
*** Error in reading nt!_ETHREAD @ fffffa8003cf2040


  • Re:inorin
  • 笑而不语
    12
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
更新显卡驱动=__=


2025-06-03 20:45:46
广告
  • 贴吧用户_0aGMVDR
  • 内牛满面
    13
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
b8没见过


  • 郑敏敏
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
我也是 怎么解决


  • 小樱
  • 1L喂熊
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
ntkrnlmp引起蓝屏是内存读写错误导致的,可能是软件本身问题,或者是内存硬件导致,你可以用内存测试软件检测一下
https://1265578519.lanzoui.com/iCPhmi3jgxe
如果遇到任何内存错误的提示,代表内存条硬件问题,需要更换内存来解决。
如下图,代表内存已经彻底报废损坏,需要售后返厂换新


登录百度账号

扫二维码下载贴吧客户端

下载贴吧APP
看高清直播、视频!
  • 贴吧页面意见反馈
  • 违规贴吧举报反馈通道
  • 贴吧违规信息处理公示
  • 8回复贴,共1页
<<返回蓝屏吧
分享到:
©2025 Baidu贴吧协议|隐私政策|吧主制度|意见反馈|网络谣言警示