晚上电脑睡眠,第二天过来看发现重启了,看dump文件,应该是晚上11点半的时候出bug蓝屏了 ,不知道该咋解决debug分析结果如下全文如下 Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\D-814\Desktop\072922-6796-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff802`5f400000 PsLoadedModuleList = 0xfffff802`6002a230 Debug session time: Fri Jul 29 23:25:31.588 2022 (UTC 8:00) System Uptime: 0 days 13:57:28.359 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ...... Loading User Symbols Loading unloaded module list ........................ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`5f7f8590 48894c2408 mov qword ptr [rsp 8],rcx ss:fffff106`b94ca8e0=000000000000000a 12: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000f64, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8025f6ca562, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3156 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 21883 Key : Analysis.Init.CPU.mSec Value: 390 Key : Analysis.Init.Elapsed.mSec Value: 3325 Key : Analysis.Memory.CommitPeak.Mb Value: 90 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 072922-6796-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: f64 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8025f6ca562 READ_ADDRESS: fffff802600fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000f64 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: MATLAB.exe DPC_STACK_BASE: FFFFF106B94CAFB0 TRAP_FRAME: fffff106b94caa20 -- (.trap 0xfffff106b94caa20) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00006f4c9ac8fce9 rbx=0000000000000000 rcx=ffff8b87f83f400f rdx=00006f4c00000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8025f6ca562 rsp=fffff106b94cabb0 rbp=fffff106b94cacb0 r8=0000000000000008 r9=0000000000002010 r10=0000000000000000 r11=fffff8025f6645d0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!KiExecuteAllDpcs 0x342: fffff802`5f6ca562 4d2b7720 sub r14,qword ptr [r15 20h] ds:00000000`00000020=???????????????? Resetting default scope STACK_TEXT: fffff106`b94ca8d8 fffff802`5f80a569 : 00000000`0000000a 00000000`00000f64 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff106`b94ca8e0 fffff802`5f806869 : 00000000`00000000 ffffc480`81280180 ffff8b88`07454080 00000000`00000000 : nt!KiBugCheckDispatch 0x69 fffff106`b94caa20 fffff802`5f6ca562 : ffffc480`81283240 ffff8b87`f82f7000 fffff106`b94cae90 ffff8b88`00000002 : nt!KiPageFault 0x469 fffff106`b94cabb0 fffff802`5f6c9814 : ffffc480`81280180 00000000`00000000 00000000`00000000 00000000`001d3e8c : nt!KiExecuteAllDpcs 0x342 fffff106`b94cad20 fffff802`5f7ff5d5 : 00000000`00000000 ffffc480`81280180 00000000`00000000 000000ad`6bbff8a0 : nt!KiRetireDpcList 0x1f4 fffff106`b94cafb0 fffff802`5f7ff3c0 : 00000000`00000000 00000000`00000000 112e0be8`26d69400 000000ad`00000002 : nt!KxRetireDpcList 0x5 fffff106`bc653ad0 fffff802`5f7fea8e : 00000000`00000001 00000207`cb54e0e8 ffffffff`fffe7960 ffff8b88`00000001 : nt!KiDispatchInterruptContinue fffff106`bc653b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterrupt 0x2ee SYMBOL_NAME: nt!KiExecuteAllDpcs 342 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1826 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 342 FAILURE_BUCKET_ID: AV_nt!KiExecuteAllDpcs OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {b88a28a0-fcde-99e9-6174-619833d00ab9} Followup: MachineOwner ---------

欢迎咨询本站!。建议卸载一下MATLAB.exe然后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后重启电脑(不是关机再开机,得选择“重启”)。看下是否恢复正常。


点赞(92) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部