新装配的电脑,出现蓝屏现象。系统是LTSC2021,AMD5600G 还有鼠标无法唤醒休眠或睡眠中的系统,无论是系统本身设置还是Bios中进行设置,不清楚是否和蓝屏有关。 最新一次的蓝屏代码如下 【蓝奏云dmp原文件:https://iangelovery.lanzout.com/iovci08aa2md】 Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\iAngelovery\Desktop\072322-32875-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff805`21800000 PsLoadedModuleList = 0xfffff805`2242a230 Debug session time: Sat Jul 23 17:08:35.456 2022 (UTC 8:00) System Uptime: 0 days 18:12:25.274 Loading Kernel Symbols ............................................................... ................................................................ .............................................. Loading User Symbols Loading unloaded module list ............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`21bf8590 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffec0e`4078f150=000000000000000a 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000020, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80521a97682, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3203 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 104376 Key : Analysis.Init.CPU.mSec Value: 405 Key : Analysis.Init.Elapsed.mSec Value: 200507 Key : Analysis.Memory.CommitPeak.Mb Value: 96 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 072322-32875-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: 20 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80521a97682 READ_ADDRESS: fffff805224fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000020 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: AliWorkbench.exe TRAP_FRAME: ffffec0e4078f290 -- (.trap 0xffffec0e4078f290) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffd705a588d7f0 rdx=ffffd705a588d840 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80521a97682 rsp=ffffec0e4078f420 rbp=ffffec0e4078f519 r8=ffffd705a588d660 r9=ffffd705a588d7f1 r10=ffffd705a588ce90 r11=ffffd705a588d5c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!RtlAvlRemoveNode 0x2a2: fffff805`21a97682 48394f10 cmp qword ptr [rdi 10h],rcx ds:00000000`00000010=???????????????? Resetting default scope STACK_TEXT: ffffec0e`4078f148 fffff805`21c0a569 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffec0e`4078f150 fffff805`21c06869 : 00000000`00000000 fffff805`21a9c2e0 fffff805`21a9b420 ffffec0e`4078f2b0 : nt!KiBugCheckDispatch 0x69 ffffec0e`4078f290 fffff805`21a97682 : ffff8643`000003e0 ffffa9ce`38d89af0 ffffd705`a588d660 ffffd705`a34697c0 : nt!KiPageFault 0x469 ffffec0e`4078f420 fffff805`21aa689d : 00000000`00000000 ffffec0e`4078f519 ffffd705`a588d7f0 ffffffff`ffffffff : nt!RtlAvlRemoveNode 0x2a2 ffffec0e`4078f470 fffff805`21b1c177 : 00000000`00000000 00000000`00000000 ffffd705`00000000 fffff805`00000000 : nt!MiDeleteVad 0x84d ffffec0e`4078f580 fffff805`21e5ff7c : ffffec0e`00000000 00000000`00000000 ffffec0e`4078f6e0 00000000`0f990000 : nt!MiFreeVadRange 0xa3 ffffec0e`4078f5e0 fffff805`21e5fa55 : ffffd705`00000000 fffff805`21a32c7e 00000000`00000001 00000000`00000000 : nt!MmFreeVirtualMemory 0x4ec ffffec0e`4078f730 fffff805`21c09fb8 : ffffd705`a547a080 00000000`00000000 ffffc380`de503180 fffff805`31794d7b : nt!NtFreeVirtualMemory 0x95 ffffec0e`4078f790 fffff805`21bfc3f0 : fffff805`21e5901f ffffd705`a547a080 ffffd705`9e06dd60 00000000`00000001 : nt!KiSystemServiceCopyEnd 0x28 ffffec0e`4078f928 fffff805`21e5901f : ffffd705`a547a080 ffffd705`9e06dd60 00000000`00000001 00000000`00000000 : nt!KiServiceLinkage ffffec0e`4078f930 fffff805`21e568c3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00ff1000 : nt!PspExitThread 0x387 ffffec0e`4078fa30 fffff805`21e5684a : 00000000`00000000 00000000`00000000 ffffd705`a547a080 00000000`0f9cfda0 : nt!PspTerminateThreadByPointer 0x53 ffffec0e`4078fa70 fffff805`21c09fb8 : 00000000`00000000 ffffd705`a547a080 ffffec0e`4078fb40 ffffd705`00000000 : nt!NtTerminateThread 0x4a ffffec0e`4078fac0 00000000`77891cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x28 00000000`0f9ceb58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77891cfc SYMBOL_NAME: nt!RtlAvlRemoveNode 2a2 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1826 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 2a2 FAILURE_BUCKET_ID: AV_nt!RtlAvlRemoveNode OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7d1c253a-****-****-****-91fd0611af73} Followup: MachineOwner --------- 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000020, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80521a97682, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2562 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 6900 Key : Analysis.Init.CPU.mSec Value: 5655 Key : Analysis.Init.Elapsed.mSec Value: 306923 Key : Analysis.Memory.CommitPeak.Mb Value: 98 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 072322-32875-01.dmp BUGCHECK_CODE: a BUGCHECK_P1: 20 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80521a97682 READ_ADDRESS: Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 0000000000000020 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: AliWorkbench.exe TRAP_FRAME: ffffec0e4078f290 -- (.trap 0xffffec0e4078f290) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffd705a588d7f0 rdx=ffffd705a588d840 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80521a97682 rsp=ffffec0e4078f420 rbp=ffffec0e4078f519 r8=ffffd705a588d660 r9=ffffd705a588d7f1 r10=ffffd705a588ce90 r11=ffffd705a588d5c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!RtlAvlRemoveNode 0x2a2: fffff805`21a97682 48394f10 cmp qword ptr [rdi 10h],rcx ds:00000000`00000010=???????????????? Resetting default scope STACK_TEXT: ffffec0e`4078f148 fffff805`21c0a569 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffec0e`4078f150 fffff805`21c06869 : 00000000`00000000 fffff805`21a9c2e0 fffff805`21a9b420 ffffec0e`4078f2b0 : nt!KiBugCheckDispatch 0x69 ffffec0e`4078f290 fffff805`21a97682 : ffff8643`000003e0 ffffa9ce`38d89af0 ffffd705`a588d660 ffffd705`a34697c0 : nt!KiPageFault 0x469 ffffec0e`4078f420 fffff805`21aa689d : 00000000`00000000 ffffec0e`4078f519 ffffd705`a588d7f0 ffffffff`ffffffff : nt!RtlAvlRemoveNode 0x2a2 ffffec0e`4078f470 fffff805`21b1c177 : 00000000`00000000 00000000`00000000 ffffd705`00000000 fffff805`00000000 : nt!MiDeleteVad 0x84d ffffec0e`4078f580 fffff805`21e5ff7c : ffffec0e`00000000 00000000`00000000 ffffec0e`4078f6e0 00000000`0f990000 : nt!MiFreeVadRange 0xa3 ffffec0e`4078f5e0 fffff805`21e5fa55 : ffffd705`00000000 fffff805`21a32c7e 00000000`00000001 00000000`00000000 : nt!MmFreeVirtualMemory 0x4ec ffffec0e`4078f730 fffff805`21c09fb8 : ffffd705`a547a080 00000000`00000000 ffffc380`de503180 fffff805`31794d7b : nt!NtFreeVirtualMemory 0x95 ffffec0e`4078f790 fffff805`21bfc3f0 : fffff805`21e5901f ffffd705`a547a080 ffffd705`9e06dd60 00000000`00000001 : nt!KiSystemServiceCopyEnd 0x28 ffffec0e`4078f928 fffff805`21e5901f : ffffd705`a547a080 ffffd705`9e06dd60 00000000`00000001 00000000`00000000 : nt!KiServiceLinkage ffffec0e`4078f930 fffff805`21e568c3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00ff1000 : nt!PspExitThread 0x387 ffffec0e`4078fa30 fffff805`21e5684a : 00000000`00000000 00000000`00000000 ffffd705`a547a080 00000000`0f9cfda0 : nt!PspTerminateThreadByPointer 0x53 ffffec0e`4078fa70 fffff805`21c09fb8 : 00000000`00000000 ffffd705`a547a080 ffffec0e`4078fb40 ffffd705`00000000 : nt!NtTerminateThread 0x4a ffffec0e`4078fac0 00000000`77891cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x28 00000000`0f9ceb58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77891cfc SYMBOL_NAME: nt!RtlAvlRemoveNode 2a2 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1826 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 2a2 FAILURE_BUCKET_ID: AV_nt!RtlAvlRemoveNode OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {7d1c253a-****-****-****-91fd0611af73} Followup: MachineOwner ---------

欢迎咨询本站!。建议卸载千牛,然后到设备供应商的官网更新一下bios,覆盖安装一下芯片组驱动,显卡驱动,硬盘相关的驱动(例如英特尔快速存储技术驱动),请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)


点赞(49) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部