Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\110822-11812-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff807`19000000 PsLoadedModuleList = 0xfffff807`19c133d0 Debug session time: Tue Nov 8 18:17:20.605 2022 (UTC 8:00) System Uptime: 1 days 2:31:10.581 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ................................... Loading User Symbols Loading unloaded module list .................................................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`194280f0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffff8007`34da5a90=000000000000003b 6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the BugCheck Arg2: fffff8071cb2b8b1, Address of the instruction which caused the BugCheck Arg3: ffff800734da63e0, Address of the context record for the exception that caused the BugCheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1546 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 3378 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 1 Key : Analysis.Init.CPU.mSec Value: 93 Key : Analysis.Init.Elapsed.mSec Value: 15842 Key : Analysis.Memory.CommitPeak.Mb Value: 91 Key : Bugcheck.Code.DumpHeader Value: 0x3b Key : Bugcheck.Code.Register Value: 0x3b Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 110822-11812-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff8071cb2b8b1 BUGCHECK_P3: ffff800734da63e0 BUGCHECK_P4: 0 CONTEXT: ffff800734da63e0 -- (.cxr 0xffff800734da63e0) rax=0000000000000000 rbx=7eff818daaaa5e98 rcx=ffffc087b793e310 rdx=ffffc087cd7ae1a0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8071cb2b8b1 rsp=ffff800734da6e00 rbp=ffffc087cd7ae1a0 r8=ffffffffffffffff r9=7ffffffffffffffc r10=fffff807192ffe70 r11=0000000000000001 r12=0000000000000000 r13=fffff8071cb4b060 r14=ffffc087b793e310 r15=ffffc087ae334964 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202 FLTMGR!TreeUnlinkMulti 0x31: fffff807`1cb2b8b1 483b6b20 cmp rbp,qword ptr [rbx 20h] ds:002b:7eff818d`aaaa5eb8=???????????????? Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: msedge.exe STACK_TEXT: ffff8007`34da6e00 fffff807`1cb6040f : ffffc087`ae3342c0 ffffc087`00000000 ffffc087`b793e260 fffff807`1cb6023b : FLTMGR!TreeUnlinkMulti 0x31 ffff8007`34da6e50 fffff807`1cb297f5 : 00000000`00000000 ffffc087`cd7ae1a0 ffffc087`00004000 00000000`00000000 : FLTMGR!FltpRemoveAllNamesCachedForFileObject 0x15f ffff8007`34da6ed0 fffff807`1cb28e21 : ffff8007`34da70f0 00000000`00000002 ffffc087`00000000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacksWorker 0x7d5 ffff8007`34da6fe0 fffff807`1cb27da9 : ffff8007`34da8000 ffff8007`34da1000 ffffc087`c4193aa0 ffff8007`34da7100 : FLTMGR!FltpPassThroughInternal 0xd1 ffff8007`34da7030 fffff807`1cb27b8b : ffffffff`fffe7960 00000000`00000000 00000000`00000000 ffffc087`ae192da0 : FLTMGR!FltpPassThrough 0x179 ffff8007`34da70d0 fffff807`192cb875 : ffffc087`cd7ae1a0 fffff807`192d4468 ffffc087`c4193aa0 00000000`00000000 : FLTMGR!FltpDispatch 0x8b ffff8007`34da7130 fffff807`196c7bcc : ffffc087`cd7ae1a0 ffff8007`34da7560 ffffc087`ae33e030 00000000`00000000 : nt!IofCallDriver 0x55 ffff8007`34da7170 fffff807`196c254e : ffffc087`a45b0c40 ffff8007`34da7780 ffffc087`cd7ae170 ffff8007`34da7560 : nt!IopDeleteFile 0x13c ffff8007`34da71f0 fffff807`192cd3ff : 00000000`00000000 00000000`00000000 ffff8007`34da7560 ffffc087`cd7ae1a0 : nt!ObpRemoveObjectRoutine 0x7e ffff8007`34da7250 fffff807`196c5f4f : ffffc087`ae192da0 00000000`00000001 ffffc087`c4193aa0 ffffc087`ae192da0 : nt!ObfDereferenceObject 0x8f ffff8007`34da7290 fffff807`196c1181 : 00000000`00000000 ffff818d`a262d680 ffff8007`34da7600 ffff818d`a262d650 : nt!IopParseDevice 0x122f ffff8007`34da7460 fffff807`196c0162 : ffffc087`bdedca00 ffff8007`34da7690 00000000`00000040 ffffc087`a45b0c40 : nt!ObpLookupObjectName 0xae1 ffff8007`34da7600 fffff807`197607de : 00000000`00000000 00000022`c3dfedc0 00000000`00000001 00000022`c3dfed90 : nt!ObOpenObjectByNameEx 0x1f2 ffff8007`34da7730 fffff807`1943aa65 : ffffc087`aea4b080 ffffc087`c35d4ce0 ffffc087`aea4b080 00004ea8`00068b40 : nt!NtQueryFullAttributesFile 0x1ce ffff8007`34da79e0 00007fff`4d5d1744 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x25 00000022`c3dfed38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`4d5d1744 SYMBOL_NAME: FLTMGR!TreeUnlinkMulti 31 MODULE_NAME: FLTMGR IMAGE_NAME: FLTMGR.SYS IMAGE_VERSION: 10.0.22621.741 STACK_COMMAND: .cxr 0xffff800734da63e0 ; kb BUCKET_ID_FUNC_OFFSET: 31 FAILURE_BUCKET_ID: AV_FLTMGR!TreeUnlinkMulti OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ca6fc98c-5b37-6c44-6983-7e23d46c66bf} Followup: MachineOwner ---------
您好欢迎来到本站!查看了一下您的蓝屏日志,请问一下您这里出现蓝屏是否是在使用Edge浏览器时出现的如果是的话请您点开Edge浏览器的设置界面,点击左侧的“系统和性能”选项卡,将其中的“使用硬件加速(如可用)”关闭以后再正常使用,查看一下是否还会出现该蓝屏。Edward
您好欢迎来到本站!查看了一下您的蓝屏日志,请问一下您这里出现蓝屏是否是在使用Edge浏览器时出现的如果是的话请您点开Edge浏览器的设置界面,点击左侧的“系统和性能”选项卡,将其中的“使用硬件加速(如可用)”关闭以后再正常使用,查看一下是否还会出现该蓝屏。Edward
感谢你的,确实是在使用edge浏览器时发生的问题此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。
如果确认您的问题已经解决,该帖子将会在短时间内关闭后续有其他系统上的问题欢迎您再次提交至本站。Edward