机器是DELL7420型号,系统是20H1,新机器使用一周。 请老师们帮忙分析一下,十分感谢。 链接:https://pan.baidu.com/s/1Asbxz6tqU89tE3uZry5Yhg?pwd=ditm 提取码:ditm Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\tt\Downloads\Minidump4\Minidump\071422-14531-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: nt!_EPROCESS *** *** *** ************************************************************************* Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff800`32000000 PsLoadedModuleList = 0xfffff800`32c2a2b0 Debug session time: Thu Jul 14 11:28:13.002 2022 (UTC 8:00) System Uptime: 1 days 20:07:39.978 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ............................................... Loading User Symbols Loading unloaded module list ........................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`323f7dd0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffc784`49287040=0000000000000018 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* REFERENCE_BY_POINTER (18) Arguments: Arg1: 0000000000000000, Object type of the object whose reference count is being lowered Arg2: ffff9985c52e4b40, Object whose reference count is being lowered Arg3: 0000000000000010, Reserved Arg4: 0000000000000001, Reserved The reference count of an object is illegal for the current state of the object. Each time a driver uses a pointer to an object the driver calls a kernel routine to increment the reference count of the object. When the driver is done with the pointer the driver calls another kernel routine to decrement the reference count. Drivers must match calls to the increment and decrement routines. This BugCheck can occur because an object's reference count goes to zero while there are still open handles to the object, in which case the fourth parameter indicates the number of opened handles. It may also occur when the object's reference count drops below zero whether or not there are open handles to the object, and in that case the fourth parameter contains the actual value of the pointer references count. Debugging Details: ------------------ *** WARNING: Unable to verify checksum for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5405 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 193327 Key : Analysis.Init.CPU.mSec Value: 1327 Key : Analysis.Init.Elapsed.mSec Value: 545543 Key : Analysis.Memory.CommitPeak.Mb Value: 100 Key : Bugcheck.Code.DumpHeader Value: 0x18 Key : Bugcheck.Code.Register Value: 0x18 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 071422-14531-01.dmp BUGCHECK_CODE: 18 BUGCHECK_P1: 0 BUGCHECK_P2: ffff9985c52e4b40 BUGCHECK_P3: 10 BUGCHECK_P4: 1 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System LOCK_ADDRESS: fffff80032c44bc0 -- (!locks fffff80032c44bc0) Resource @ nt!PiEngineLock (0xfffff80032c44bc0) Exclusively owned Contention Count = 40 NumberOfExclusiveWaiters = 1 Threads: ffff9985c36c6040-01<*> Threads Waiting On Exclusive Access: ffff9985c8a69040 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80032c44bc0 Thread Count : 1 Thread address: 0xffff9985c36c6040 Thread wait : 0x9b22fe STACK_TEXT: ffffc784`49287038 fffff800`3241539d : 00000000`00000018 00000000`00000000 ffff9985`c52e4b40 00000000`00000010 : nt!KeBugCheckEx ffffc784`49287040 fffff800`3236d642 : ffff9985`c3c38cc0 ffff9985`c52e4b40 00000000`00000028 00000000`00000000 : nt!ObfReferenceObject 0x1c472d ffffc784`49287080 fffff800`32734af2 : ffff9985`c3c38cc0 00000000`00000000 00000000`00000000 fffff800`32c44ac0 : nt!PnpRemoveLockedDeviceNode 0x112 ffffc784`492870e0 fffff800`32734827 : ffff9985`c3c38cc0 ffffc784`49287160 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNode 0x4e ffffc784`49287120 fffff800`32761019 : ffff9985`c6873b60 00000000`00000002 ffff9985`c8191c10 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes 0xf7 ffffc784`492871a0 fffff800`32760f44 : 00000000`00000000 ffffc784`49287220 ffff9985`c6873b60 00000000`00000000 : nt!PipRemoveDevicesInRelationList 0x8d ffffc784`492871f0 fffff800`32736185 : ffff9985`c8191c10 00000000`00000001 ffff9985`c8191c10 00000000`0000000c : nt!PnpDelayedRemoveWorker 0x114 ffffc784`49287230 fffff800`3236e284 : 00000000`0000000c 00000000`00000001 00000000`00000000 ffff9985`b8de7cc0 : nt!PnpChainDereferenceComplete 0xfd ffffc784`49287260 fffff800`32733022 : 00000000`0000000d ffffc784`49287359 ffffc905`492e2d20 00000000`00000001 : nt!PnpIsChainDereferenced 0xac ffffc784`492872e0 fffff800`3272d6bb : ffffc784`49287420 ffff9985`b8de7c00 ffffc784`49287400 ffffc905`0000000d : nt!PnpProcessQueryRemoveAndEject 0x28a ffffc784`492873c0 fffff800`3265596e : ffffc905`5d6aa260 ffffc905`70285cb0 ffff9985`9d0b3100 00000000`00000000 : nt!PnpProcessTargetDeviceEvent 0xeb ffffc784`492873f0 fffff800`322bfae5 : ffff9985`c36c6040 ffff9985`c36c6040 ffff9985`9d0b31f0 ffff9985`d02ea3f0 : nt!PnpDeviceEventWorker 0x2ce ffffc784`49287470 fffff800`322eea75 : ffff9985`c36c6040 00000000`00000080 ffff9985`9d102080 00000000`00000000 : nt!ExpWorkerThread 0x105 ffffc784`49287510 fffff800`323ff428 : ffffda81`2896c180 ffff9985`c36c6040 fffff800`322eea20 00000000`00000246 : nt!PspSystemThreadStartup 0x55 ffffc784`49287560 00000000`00000000 : ffffc784`49288000 ffffc784`49281000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread 0x28 SYMBOL_NAME: nt!PnpRemoveLockedDeviceNode 112 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1766 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 112 FAILURE_BUCKET_ID: 0x18_nt!PnpRemoveLockedDeviceNode OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8e11da50-3562-2f1d-8473-0d60ecd7372b} Followup: MachineOwner --------- NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\stl.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\windows.natvis' NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2206.19001.0_x64__8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis' Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\tt\Downloads\Minidump4\Minidump\071922-15765-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff802`43400000 PsLoadedModuleList = 0xfffff802`4402a2b0 Debug session time: Tue Jul 19 16:29:37.673 2022 (UTC 8:00) System Uptime: 4 days 1:53:37.816 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ........................................... Loading User Symbols Loading unloaded module list .................................................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`437f7dd0 48894c2408 mov qword ptr [rsp 8],rcx ss:ffffdb0d`a2a13280=0000000000000018 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* REFERENCE_BY_POINTER (18) Arguments: Arg1: 0000000000000000, Object type of the object whose reference count is being lowered Arg2: ffffe303de631b30, Object whose reference count is being lowered Arg3: 0000000000000010, Reserved Arg4: 0000000000000001, Reserved The reference count of an object is illegal for the current state of the object. Each time a driver uses a pointer to an object the driver calls a kernel routine to increment the reference count of the object. When the driver is done with the pointer the driver calls another kernel routine to decrement the reference count. Drivers must match calls to the increment and decrement routines. This BugCheck can occur because an object's reference count goes to zero while there are still open handles to the object, in which case the fourth parameter indicates the number of opened handles. It may also occur when the object's reference count drops below zero whether or not there are open handles to the object, and in that case the fourth parameter contains the actual value of the pointer references count. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4436 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 84012 Key : Analysis.Init.CPU.mSec Value: 811 Key : Analysis.Init.Elapsed.mSec Value: 191607 Key : Analysis.Memory.CommitPeak.Mb Value: 96 Key : Bugcheck.Code.DumpHeader Value: 0x18 Key : Bugcheck.Code.Register Value: 0x18 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 071922-15765-01.dmp BUGCHECK_CODE: 18 BUGCHECK_P1: 0 BUGCHECK_P2: ffffe303de631b30 BUGCHECK_P3: 10 BUGCHECK_P4: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System LOCK_ADDRESS: fffff80244044bc0 -- (!locks fffff80244044bc0) Incomplete: Could not read wait nt!_LIST_ENTRY (0xffffdb0da3fa0378) Resource @ nt!PiEngineLock (0xfffff80244044bc0) Exclusively owned Contention Count = 80 NumberOfExclusiveWaiters = 2 Threads: ffffe303dbe7d040-01<*> Threads Waiting On Exclusive Access: 1 total locks PNP_TRIAGE_DATA: Lock address : 0xfffff80244044bc0 Thread Count : 1 Thread address: 0xffffe303dbe7d040 Thread wait : 0x1582874 STACK_TEXT: ffffdb0d`a2a13278 fffff802`4381539d : 00000000`00000018 00000000`00000000 ffffe303`de631b30 00000000`00000010 : nt!KeBugCheckEx ffffdb0d`a2a13280 fffff802`4376d642 : ffffe303`e45cfcc0 ffffe303`de631b30 00000000`00000028 00000000`00000000 : nt!ObfReferenceObject 0x1c472d ffffdb0d`a2a132c0 fffff802`43b34af2 : ffffe303`e45cfcc0 ffffc480`00000000 00000000`00000000 fffff802`44044ac0 : nt!PnpRemoveLockedDeviceNode 0x112 ffffdb0d`a2a13320 fffff802`43b34827 : ffffe303`e45cfcc0 ffffdb0d`a2a133a0 00000000`00000000 00000000`00000000 : nt!PnpDeleteLockedDeviceNode 0x4e ffffdb0d`a2a13360 fffff802`43b61019 : ffffe303`debe6dd0 00000000`00000002 ffffe303`e9d2d910 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes 0xf7 ffffdb0d`a2a133e0 fffff802`43b60f44 : 00000000`00000000 ffffdb0d`a2a13460 ffffe303`b48caa20 00000000`00000000 : nt!PipRemoveDevicesInRelationList 0x8d ffffdb0d`a2a13430 fffff802`436bfae5 : ffffe303`dbe7d040 fffff802`44045260 ffffe303`b48caa20 00000000`00000000 : nt!PnpDelayedRemoveWorker 0x114 ffffdb0d`a2a13470 fffff802`436eea75 : ffffe303`dbe7d040 00000000`00000080 ffffe303`b4902080 ffffffff`ffffffff : nt!ExpWorkerThread 0x105 ffffdb0d`a2a13510 fffff802`437ff428 : fffff802`3eb7f180 ffffe303`dbe7d040 fffff802`436eea20 ffffffff`ffffffff : nt!PspSystemThreadStartup 0x55 ffffdb0d`a2a13560 00000000`00000000 : ffffdb0d`a2a14000 ffffdb0d`a2a0d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread 0x28 SYMBOL_NAME: nt!PnpRemoveLockedDeviceNode 112 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1766 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 112 FAILURE_BUCKET_ID: 0x18_nt!PnpRemoveLockedDeviceNode OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8e11da50-3562-2f1d-8473-0d60ecd7372b} Followup: MachineOwner
欢迎咨询本站!。若是有超频,降压等,建议恢复正常,xmp也关闭。然后参考以下链接,检测一下内存和硬盘:https://answers.microsoft.com/zh-hans/windows/f.
你好,。若是点击“”按钮后没有加载出输入框,无法内容,建议等待一会再尝试。很可能是网络等原因。可以参考以下链接的内容:https://answers.microsoft.com/zh-hans/windows/f.
