大佬们,电脑开机有小概率蓝屏,重启就好了,开机后正常使用也没问题,这是什么情况啊

jammerz-avatar

jammerz

2021-12-07T12:29:41+00:00

Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\121021-7281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff805`7d600000 PsLoadedModuleList = 0xfffff805`7e22a190
Debug session time: Fri Dec 10 20:22:29.463 2021 (UTC + 8:00)
System Uptime: 1 days 9:15:10.131
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
jammerz-avatar

jammerz

Dmp文件打开以后是这样的
jammerz-avatar

jammerz

[s:ac:哭1]
jammerz-avatar

jammerz

KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: ffff8f8ab21389b0, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000010, error status (normally i/o status code)
Arg3: 00000002e3fb9880, current process (virtual address for lock type 3, or PTE)
Arg4: fffff805cdd46000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 1609

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 8580

Key : Analysis.Init.CPU.mSec
Value: 1499

Key : Analysis.Init.Elapsed.mSec
Value: 584474

Key : Analysis.Memory.CommitPeak.Mb
Value: 86


DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 7a

BUGCHECK_P1: ffff8f8ab21389b0

BUGCHECK_P2: ffffffffc0000010

BUGCHECK_P3: 2e3fb9880

BUGCHECK_P4: fffff805cdd46000

ERROR_CODE: (NTSTATUS) 0xc0000010 - <Unable to get error code text>

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

TRAP_FRAME: ffffb08405fdf0c0 -- (.trap 0xffffb08405fdf0c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff805cdd35c00 rbx=0000000000000000 rcx=fffff805cdd46010
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057da0a337 rsp=ffffb08405fdf258 rbp=ffffb08405fdf311
r8=000000000001d770 r9=00000000000001a6 r10=7ffffffffffffffc
r11=fffffa7d3e9f47f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz n