笔记本电脑

连接显示屏后,官方截图有拉伸

  • 使用shareX截屏软件,它的截屏可以解决显示屏比例不对等的问题。

电脑蓝屏,报错:system_thread_exception_not_handled

    • Win+R 输入 eventvwr.msc,打开事件查看器。导航到“Windows 日志” > “系统”,查看蓝屏发生时的错误详情。
      计算机已经从检测错误后重新启动。检测错误: 0x0000007e (0xffffffffc0000005, 0xfffff80075ee24da, 0xfffff50949215f88, 0xfffff509492157a0)。已将转储的数据保存在: C:\windows\Minidump\120224-13984-01.dmp。报告 ID: 7b793d86-ae00-4ef6-be9a-4b5653791bda。
      
  • 下载 WinDbg Preview,点击“File” > “Open Dump File”,选择转储文件 C:\Windows\Minidumsystem_thread_exception_not_handledp\120224-13984-01.dmp

    显示

    ``` SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common BugCheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80075ee24da, The address that the exception occurred at Arg3: fffff50949215f88, Exception Record Address Arg4: fffff509492157a0, Context Record Address Debugging Details:

KEY_VALUES_STRING: 1

Key  : AV.Fault
Value: Write

Key  : Analysis.CPU.mSec
Value: 484

Key  : Analysis.Elapsed.mSec
Value: 13226

Key  : Analysis.IO.Other.Mb
Value: 3

Key  : Analysis.IO.Read.Mb
Value: 1

Key  : Analysis.IO.Write.Mb
Value: 7

Key  : Analysis.Init.CPU.mSec
Value: 93

Key  : Analysis.Init.Elapsed.mSec
Value: 18045

Key  : Analysis.Memory.CommitPeak.Mb
Value: 109

Key  : Analysis.Version.DbgEng
Value: 10.0.27725.1000

Key  : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre

Key  : Analysis.Version.Ext
Value: 1.2408.27.1

Key  : Bugcheck.Code.LegacyAPI
Value: 0x1000007e

Key  : Bugcheck.Code.TargetModel
Value: 0x1000007e

Key  : Dump.Attributes.AsUlong
Value: 1008

Key  : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key  : Dump.Attributes.ErrorCode
Value: 0

Key  : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key  : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key  : Dump.Attributes.ProgressPercentage
Value: 0

Key  : Failure.Bucket
Value: AV_nt!RtlClearBitsEx

Key  : Failure.Hash
Value: {2f161bcd-eef7-a5da-06f3-04818da144fe}

BUGCHECK_CODE: 7e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff80639ae24da

BUGCHECK_P3: fffff987c45b4f88

BUGCHECK_P4: fffff987c45b47a0

FILE_IN_CAB: 120624-15781-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump

FAULTING_THREAD: ffffe681ca998080

EXCEPTION_RECORD: fffff987c45b4f88 – (.exr 0xfffff987c45b4f88) ExceptionAddress: fffff80639ae24da (nt!RtlClearBitsEx+0x000000000000004a) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: ffffafb440426308 Attempt to write to address ffffafb440426308

CONTEXT: fffff987c45b47a0 – (.cxr 0xfffff987c45b47a0) rax=00000000000000fd rbx=0000000002130000 rcx=0000000000000001 rdx=0000000000000001 rsi=ffffafb440426308 rdi=0000000000000001 rip=fffff80639ae24da rsp=fffff987c45b51c0 rbp=0000000000007658 r8=0000000000000001 r9=ffffe681ff0b92c0 r10=0000000000000000 r11=0000000000000000 r12=ffffe681ff0b92c0 r13=0000000000000000 r14=fffff80639800000 r15=fffff987c45b5290 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202 nt!RtlClearBitsEx+0x4a: fffff80639ae24da 2006 and byte ptr [rsi],al ds:002b:ffffafb440426308=?? Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: OverlayHelper.

WRITE_ADDRESS: fffff8063a51d470: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse ffffafb440426308

ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p %s

EXCEPTION_CODE_STR: c0000005

EXCEPTION_PARAMETER1: 0000000000000001

EXCEPTION_PARAMETER2: ffffafb440426308

EXCEPTION_STR: 0xc0000005

STACK_TEXT:
fffff987c45b51c0 fffff80639a576f0 : 0000000002130000 0000000000001841 0000000000001841 0000000000000000 : nt!RtlClearBitsEx+0x4a fffff987c45b51f0 fffff80639a575fd : ffffe681ff0b92c0 ffffe681ca998080 0000000002131841 fffff80639a1c449 : nt!MiClearVadCellBits+0xa0 fffff987c45b5240 fffff80639a572e0 : ffffe68100000000 ffffe681ff0b9bd0 ffffe681ff0b92c0 ffffe681cfdf6550 : nt!MiClearVadBits+0xcd fffff987c45b5290 fffff80639eb05d6 : 0000000000000000 0000000000000001 0000000000000000 0000000000000000 : nt!MiRemoveVad+0x2c0 fffff987c45b5340 fffff80639b1989f : 0000021318410000 0000000000000000 ffffe681cfdf6080 0000000000000000 : nt!MiDeleteVad+0x336 fffff987c45b5400 fffff80639f969ed : 0000000000000000 0000000000000000 fffff987c45b5560 fffff98700000000 : nt!MiFreeVadRange+0xa3 fffff987c45b5460 fffff80639f96605 : 0000000000000000 fffff80639f2c31d 0000000000000002 0000000000000000 : nt!MmFreeVirtualMemory+0x3ad fffff987c45b55a0 fffff80639c2a605 : ffffe681ca998080 ffffe681ef7e5000 0000000000000020 ffffe681e8ca9308 : nt!NtFreeVirtualMemory+0x95 fffff987c45b5600 fffff80639c1aa90 : fffff8063a1ec2c2 0000000000000000 fffff80639f2c31d 0000000000000010 : nt!KiSystemServiceCopyEnd+0x25 fffff987c45b5798 fffff8063a1ec2c2 : 0000000000000000 fffff80639f2c31d 0000000000000010 0000000000050246 : nt!KiServiceLinkage fffff987c45b57a0 fffff80639f2c370 : ffffe681e8ca92f0 000000000000ff18 0000021318410000 ffffe681e8ca9308 : nt!EtwpFreeUserBufferSpace+0x76 fffff987c45b57d0 fffff80639f2c11c : 0000000000000000 fffff80639a35d13 0000000200000000 fffff80600000000 : nt!EtwpRealtimeInjectEtwBuffer+0x170 fffff987c45b5880 fffff80639f592d8 : fffff987c45b5900 ffffe681ef7e5000 0000000000000000 ffffe681df3b39c0 : nt!EtwpRealtimeDeliverBuffer+0x7c fffff987c45b58e0 fffff80639f593a2 : ffffe681df3b39c0 00000000c0000001 ffffe681df3b39c0 0000000000000002 : nt!EtwpFlushBufferToRealtime+0x34 fffff987c45b5910 fffff80639f59a66 : 0000000000000000 0000000000000000 ffffe681df3b39c0 ffffe681ef7e5000 : nt!EtwpFlushBuffer+0x5a fffff987c45b5940 fffff80639f58f91 : ffffe681df3b39c0 ffffe681df3b39c0 ffffe681df3b3ba0 ffffe681df3b3b88 : nt!EtwpFlushActiveBuffers+0x22a fffff987c45b5ab0 fffff80639b4d4d7 : fffffffffffffffd ffffe681ca998080 0000000000000080 fffff80639f58dd0 : nt!EtwpLogger+0x1c1 fffff987c45b5b30 fffff80639c1a114 : ffff86817d993180 ffffe681ca998080 fffff80639b4d480 0000000000000246 : nt!PspSystemThreadStartup+0x57 fffff987c45b5b80 0000000000000000 : fffff987c45b6000 fffff987c45af000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: nt!RtlClearBitsEx+4a

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.4455

STACK_COMMAND: .cxr 0xfffff987c45b47a0 ; kb

BUCKET_ID_FUNC_OFFSET: 4a

FAILURE_BUCKET_ID: AV_nt!RtlClearBitsEx

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {2f161bcd-eef7-a5da-06f3-04818da144fe}

Followup: MachineOwner

### 电脑蓝屏终止代码:PAGE_FAULT_IN_NONPAGED_AREA
+ 情况:使用微信打视频电话的时候蓝屏,可能之前开了很多VScode
### 电脑蓝屏代码:DRIVER_VERIFIER_DETECTED_VIOLATION
+ 蓝屏后重启遇到系统更新,再次进入使用惠普助手检查驱动更新报错
#### 显示

Debugging Details: ——————

*** WARNING: Unable to verify timestamp for aswArPot.sys

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 781

Key  : Analysis.Elapsed.mSec
Value: 32956

Key  : Analysis.IO.Other.Mb
Value: 0

Key  : Analysis.IO.Read.Mb
Value: 1

Key  : Analysis.IO.Write.Mb
Value: 0

Key  : Analysis.Init.CPU.mSec
Value: 796

Key  : Analysis.Init.Elapsed.mSec
Value: 23110

Key  : Analysis.Memory.CommitPeak.Mb
Value: 88

Key  : Analysis.Version.DbgEng
Value: 10.0.27725.1000

Key  : Analysis.Version.Description
Value: 10.2408.27.01 amd64fre

Key  : Analysis.Version.Ext
Value: 1.2408.27.1

Key  : Bugcheck.Code.LegacyAPI
Value: 0xc4

Key  : Bugcheck.Code.TargetModel
Value: 0xc4

Key  : Dump.Attributes.AsUlong
Value: 1008

Key  : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key  : Dump.Attributes.ErrorCode
Value: 0

Key  : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key  : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key  : Dump.Attributes.ProgressPercentage
Value: 0

Key  : Failure.Bucket
Value: 0xc4_f6_aswArPot!unknown_function

Key  : Failure.Hash
Value: {e72fd478-aa81-5cc0-f962-3cf420a400ba}

BUGCHECK_CODE: c4

BUGCHECK_P1: f6

BUGCHECK_P2: 1c74

BUGCHECK_P3: ffff8183836960c0

BUGCHECK_P4: fffff8047acc6c10

FILE_IN_CAB: 121324-28484-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump

FAULTING_THREAD: ffff81837aa49080

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: msedge.exe

STACK_TEXT:
ffffc2007f3dc438 fffff802365d6b0b : 00000000000000c4 00000000000000f6 0000000000001c74 ffff8183836960c0 : nt!KeBugCheckEx ffffc2007f3dc440 fffff802365d5747 : 0000000000000000 fffff80236436930 fffff80236436930 0000000000000000 : nt!CarInitiateBugcheck+0x47 ffffc2007f3dc480 fffff80236acd34c : 00000000000000c4 0000000000000000 0000000000000004 0000000000001c01 : nt!CarReportRuleViolationForTriage+0x147 ffffc2007f3dc500 fffff80236ad3e7f : 0000000000000002 ffff81837d9f30c0 fffff8047acc6c00 ffff8183836960c0 : nt!VerifierBugCheckIfAppropriate+0xc8 ffffc2007f3dc5a0 fffff8023689f03a : 0000000000000000 0000000000000000 ffffc2007f3dc7f0 ffff818366ab81c0 : nt!VfCheckUserHandle+0x19b ffffc2007f3dc690 fffff802366cc45e : ffff8183836960c0 fffff80200000000 0000000000000000 0000000000001c00 : nt!ObpReferenceObjectByHandleWithTag+0x1d2bca ffffc2007f3dc720 fffff802365e9989 : 00007fff5bff0e30 fffff802376e3ccb 00007fff5bff0e30 000000a7bcffdc18 : nt!ObReferenceObjectByHandle+0x2e ffffc2007f3dc770 fffff8047acc6c10 : 000000a7bcffdcf0 000000a7bcffdca8 ffffc2007f3dc9c8 000000a7bcffdeb0 : nt!DifObReferenceObjectByHandleWrapper+0x109 ffffc2007f3dc820 000000a7bcffdcf0 : 000000a7bcffdca8 ffffc2007f3dc9c8 000000a7bcffdeb0 ffffc2007f3dc858 : aswArPot+0x16c10 ffffc2007f3dc828 000000a7bcffdca8 : ffffc2007f3dc9c8 000000a7bcffdeb0 ffffc2007f3dc858 0000000000000000 : 0x000000a7bcffdcf0 ffffc2007f3dc830 ffffc2007f3dc9c8 : 000000a7bcffdeb0 ffffc2007f3dc858 0000000000000000 00007fff00000000 : 0x000000a7bcffdca8 ffffc2007f3dc838 000000a7bcffdeb0 : ffffc2007f3dc858 0000000000000000 00007fff00000000 0000000000000080 : 0xffffc2007f3dc9c8 ffffc2007f3dc840 ffffc2007f3dc858 : 0000000000000000 00007fff00000000 0000000000000080 00000000002e002c : 0x000000a7bcffdeb0 ffffc2007f3dc848 0000000000000000 : 00007fff00000000 0000000000000080 00000000002e002c fffff8047acdb930 : 0xffffc200`7f3dc858

SYMBOL_NAME: aswArPot+16c10

MODULE_NAME: aswArPot

IMAGE_NAME: aswArPot.sys

STACK_COMMAND: .process /r /p 0xffff8183836960c0; .thread 0xffff81837aa49080 ; kb

BUCKET_ID_FUNC_OFFSET: 16c10

FAILURE_BUCKET_ID: 0xc4_f6_aswArPot!unknown_function

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e72fd478-aa81-5cc0-f962-3cf420a400ba}

Followup: MachineOwner




+ 在卸载了avast free antivirus之后,蓝屏暂时没有出现过。
### Dtsapo4service.exe占用CPU过高

+ https://candid.technology/dtsapo4service-high-memory-usage-fix/
  
### aida64 烤结果

  ![image.png](https://cdn.jsdelivr.net/gh/Thomas333333/MyPostImage/Images/20241213211751.png)
### 报错 ACE base.sys
确定了开机卡顿原因:
+ 之前问了GPT怎么解决蓝屏代码,他推荐了一种方案,要用系统的verifier 

2. 利用Driver Verifier针对性验证
使用Windows自带的Driver Verifier工具来针对有问题的驱动进行验证是一个有条理的方法。 步骤如下: 打开管理员权限的CMD或PowerShell输入: verifier /standard /driver <特定驱动名或通配符> 你可以针对某几个可疑驱动(如 aswArPot.sys, aswSP.sys, aswbidsdriver.sys, SdpNetFilter0.sys, AxUsbEth.sys, ace-game.sys等)启用。

+ 使用了之后发现一直卡卡的,偶然报错时GPT给了一种解决方法:

禁用驱动程序验证器

如果你在开发或测试中启用了驱动程序验证器,可以尝试禁用它:

  1. 以管理员身份打开 命令提示符
  2. 输入以下命令: verifier /reset
  3. 按 Enter。
  4. 重启电脑。 ```

PS和PR下载和激活(建议支持正版)

参考b站视频

  • 下载Adobe CC GenP v3.6.8.
  • 下载好Adobe CC注册好 打开GenP(建议管理员模式运行),search后进行patch
  • 重新打开Adobe CC,下载需要的软件
  • 等待软件下载完毕后,再次打开GenP,search后进行patch
  • 重新打开软件,即可正常使用

This line appears after every note.

Notes mentioning this note


Here are all the notes in this garden, along with their links, visualized as a graph.

Conda导出python环境加快访问github新闻稿实验1:ros入门实验3:自动驾驶实战实验4:ros2智能移动机器人实验5:ros1移动机器人动态避障(基于强化学习)实验6:轨迹跟踪仿真1最终实验自动驾驶辅助python函数Obsidian发布的免费替代方案Obsidian库解析TestYour first seedClip 串讲Icml'23 blip 2 bootstrapping language Image pre...Nips'17 attention is all you needSigir'22 cret cross Modal retrieval transformer...Arxiv 2306’unifying large language models and...Arxiv'21 how much can clip benefit vision And...⭐ ⭐ ⭐ ⭐ ⭐ arxiv 2311' llmsurveychinese⭐⭐⭐⭐eccv'22 slip:self Supervision meets language...⭐⭐⭐⭐⭐clip:learning transferable visual models from...⭐⭐⭐⭐⭐icml'22 blip bootstrapping language Image pre...Acl'25 a survey of mathematical reasoning in the...Arxiv'23 challenges and applications of large...Prl'20 retrieving quantum information with active...SIGIR'06 Laplacian Optimal Design for Image...Survey'09active learningTKDE'16Relevance Feedback Algorithms Inspired By...Arxiv'2501 ursa understanding and verifying chain...Cikm'24 infinitymath a scalable instruction tuning...Icml'25 cogmath assessing llms’ authentic...Icml'25 forest Of Thought scaling test Time...⭐⭐⭐arxiv'2502 hinteval a comprehensive framework...⭐⭐⭐arxiv'2506 scida scientific dynamic assessor of...⭐⭐⭐⭐acl'24 champ a competition Level dataset for...⭐⭐⭐⭐arxiv'2505 soft thinking unlocking the...⭐⭐⭐⭐⭐arxiv'2505 reasoning with omnithought a...⭐⭐⭐⭐⭐arxiv'2506 thought anchors which llm...Improving interpretable embeddings for ad Hoc...Access'17...Artif. intell. rev.‘23 a survey on ensemble...Fcs'20 a survey on ensemble learningTpmai'04 asymmetric bagging and random subspace...⭐⭐⭐⭐access'22 a survey of ensemble learning进化集成学习算法综述《黑客与画家》 为什么书呆子不受欢迎《黑客与画家》《黑客与画家》——黑客与画家黑客伦理250701 250708 阅读250709 250716 阅读250717 250723 阅读250722 250729 阅读250729 250805 阅读Avs检索流程Avs项目管理Avs speaker proposalAvs paper思路整理Presentation 思路整理Stable Diffusion检索流程2023avs交互使用flask快速构建浏览器实现图片交互Trecvid avs 个人感受2022交互情况统计2024avs交互情况统计Llm api测试Agi 比赛Lean(vs code)Agic TrickLlm相关论文Rtx 4090 部署大模型 20240306构建样题数据集调查开源大模型的数学能力想法计划231128调研Github下载Python调用javaVbs2024比赛复盘复现系统talkseeDiffusion扩散模型调研2023 mindspore量子计算黑客马拉松全国大赛热身题2023 mindspore量子计算黑客马拉松初赛——量子组合优化赛道代码集成进化算法Python使用Vscode使用Github问题HuggingfaceLinuxSlrum使用华为手机安装google框架工具推荐科研问题笔记本电脑视频生成调研20241002更换内存条(16g换到32g)24考研总结Reflection 大学四年的回顾及年终总结Fairymusicbox上手李沐讲座干眼症的习惯考研计划《周处除三害》观后感《奥本海默》观后感《白金数据》书评牛奶2023 mindspore量子计算黑客马拉松初赛——量子组合优化赛道排序融合动手学习深度学习算法笔记论文阅读模板算法知识生活Paper ReadingProjectsWeekly Summary