最近经常蓝屏困扰到我,我已经用winDbg Preview工具解包,附属解包代码,并告诉我怎么解决,本人看不懂代码Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\090522-11453-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*Executable search path is:Windows 10 Kernel Version 19041 MP (8 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSMachine Name:Kernel base = 0xfffff800`3ba00000 PsLoadedModuleList = 0xfffff800`3c62a250Debug session time: Mon Sep 5 19:02:22.058 2022 (UTC + 8:00)System Uptime: 0 days 0:14:54.026Loading Kernel Symbols.. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.Run !sym noisy before .reload to track down problems loading symbols. .............................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list.........For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff800`3bdf88c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe601`b4196e00=000000000000000a2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ******************************************************************************** IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000000000002, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8003bc8f41e, address which referenced memory Debugging Details:------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1906 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 40393 Key : Analysis.Init.CPU.mSec Value: 640 Key : Analysis.Init.Elapsed.mSec Value: 405767 Key : Analysis.Memory.CommitPeak.Mb Value: 89 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 090522-11453-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 2 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8003bc8f41e WRITE_ADDRESS: fffff8003c6fb390: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse 0000000000000002 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VSSVC.exe TRAP_FRAME: ffffe601b4196f40 -- (.trap 0xffffe601b4196f40)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000 rcx=ffffe601b4197160rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000rip=fffff8003bc8f41e rsp=ffffe601b41970d0 rbp=ffff830c9536a080 r8=0000000000000000 r9=ffffe601b4197370 r10=0000000000000000r11=ffffe601b41970f0 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei ng nz na pe ncnt!KxWaitForLockOwnerShip+0xe:fffff800`3bc8f41e 48890a mov qword ptr [rdx],rcx ds:00000000`00000002=????????????????Resetting default scope STACK_TEXT: ffffe601`b4196df8 fffff800`3be0a869 : 00000000`0000000a 00000000`00000002 00000000`00000002 00000000`00000001 : nt!KeBugCheckExffffe601`b4196e00 fffff800`3be06b69 : ffffc28c`32fa35a0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69ffffe601`b4196f40 fffff800`3bc8f41e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469ffffe601`b41970d0 fffff800`3bc8f3ff : ffffc28c`32fa37b8 ffffc28c`32fa3700 ffffc28c`32fa35a0 fffff800`41423351 : nt!KxWaitForLockOwnerShip+0xeffffe601`b4197100 fffff800`3bcaebf0 : ffff830c`9954b200 ffff830c`9536a080 00000000`00000000 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7fffffe601`b4197130 fffff800`41400933 : 00000000`00000001 ffff830c`98ae5018 ffff830c`98ae5000 ffffc28c`32fa1010 : nt!ExAcquireResourceExclusiveLite+0xb0ffffe601`b41971c0 fffff800`4141a0cf : 00000000`00000000 00000000`00000000 ffffc28c`32fa1010 ffff830c`98ae5018 : Ntfs!NtfsAcquirePagingResourceExclusive+0x5bffffe601`b4197200 fffff800`4155210b : ffff830c`98ae5018 ffff830c`8dfee180 ffffc28c`32fa1010 ffffe601`b4197370 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x8fffffe601`b4197340 fffff800`415026d0 : 00000000`00000000 00000000`00000000 ffff830c`8dfee180 00000000`00000001 : Ntfs!NtfsFlushVolume+0x353ffffe601`b4197460 fffff800`41502b19 : ffff830c`98ae5018 ffff830c`986be7b0 ffff830c`98ae5001 ffffe601`b4197690 : Ntfs!NtfsCommonFlushBuffers+0x8ccffffe601`b4197580 fffff800`3bcdae28 : ffffe601`b4197690 ffff830c`98ae5018 0012019f`00000000 ffff830c`986be7b0 : Ntfs!NtfsCommonFlushBuffersCallout+0x19ffffe601`b41975b0 fffff800`3bcdad9d : fffff800`41502b00 ffffe601`b4197690 00000000`00000000 ffff830c`8dfed010 : nt!KeExpandKernelStackAndCalloutInternal+0x78ffffe601`b4197620 fffff800`4154454b : 00000000`00000000 ffff830c`9d564200 ffffe601`b4198000 00000000`00000310 : nt!KeExpandKernelStackAndCalloutEx+0x1dffffe601`b4197660 fffff800`41544475 : 00000000`00000000 ffff830c`8de182c0 ffffe601`b41976f8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67ffffe601`b41976d0 fffff800`3bcabac5 : ffff830c`9b0448a0 ffff830c`986be7b0 ffff830c`98ae5018 ffffe601`b41976f8 : Ntfs!NtfsFsdFlushBuffers+0xe5ffffe601`b4197740 fffff800`3b2370cf : ffff830c`8aa00006 00000000`00000000 ffffe601`00000000 ffffe601`b4197a80 : nt!IofCallDriver+0x55ffffe601`b4197780 fffff800`3b234a03 : ffffe601`b4197810 00000000`00000000 00000000`00000000 ffff830c`8d7a00c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28fffffe601`b41977f0 fffff800`3bcabac5 : ffff830c`986be7b0 00000000`000000c0 00000000`000000c8 00007ff7`15701680 : FLTMGR!FltpDispatch+0xa3ffffe601`b4197850 fffff800`3c01b538 : ffff830c`986be7b0 00000000`00000000 00000000`00000000 fffff800`3c3b21c4 : nt!IofCallDriver+0x55ffffe601`b4197890 fffff800`3c0efe19 : ffff830c`00000000 ffffe601`b4197a80 00000000`00000000 ffffe601`b4197a80 : nt!IopSynchronousServiceTail+0x1a8ffffe601`b4197930 fffff800`3c0efc06 : ffff830c`9536a080 00007ff7`15701890 ffff830c`8dfecc40 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1f9ffffe601`b41979c0 fffff800`3be0a2b5 : ffff830c`9536a000 00000000`00000000 ffffe601`b4197a80 ffff830c`00000000 : nt!NtFlushBuffersFile+0x16ffffe601`b4197a00 00007ffb`b988d8a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x2500000035`df6ff178 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b988d8a4 SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e MODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1889 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: e FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93} Followup: MachineOwner--------- 2: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ******************************************************************************** IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000000000002, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8003bc8f41e, address which referenced memory Debugging Details:------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1561 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 1563 Key : Analysis.Init.CPU.mSec Value: 4530 Key : Analysis.Init.Elapsed.mSec Value: 448197 Key : Analysis.Memory.CommitPeak.Mb Value: 89 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 090522-11453-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 2 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8003bc8f41e WRITE_ADDRESS: Unable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEnd 0000000000000002 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: VSSVC.exe TRAP_FRAME: ffffe601b4196f40 -- (.trap 0xffffe601b4196f40)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000 rcx=ffffe601b4197160rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000rip=fffff8003bc8f41e rsp=ffffe601b41970d0 rbp=ffff830c9536a080 r8=0000000000000000 r9=ffffe601b4197370 r10=0000000000000000r11=ffffe601b41970f0 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei ng nz na pe ncnt!KxWaitForLockOwnerShip+0xe:fffff800`3bc8f41e 48890a mov qword ptr [rdx],rcx ds:00000000`00000002=????????????????Resetting default scope STACK_TEXT: ffffe601`b4196df8 fffff800`3be0a869 : 00000000`0000000a 00000000`00000002 00000000`00000002 00000000`00000001 : nt!KeBugCheckExffffe601`b4196e00 fffff800`3be06b69 : ffffc28c`32fa35a0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69ffffe601`b4196f40 fffff800`3bc8f41e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469ffffe601`b41970d0 fffff800`3bc8f3ff : ffffc28c`32fa37b8 ffffc28c`32fa3700 ffffc28c`32fa35a0 fffff800`41423351 : nt!KxWaitForLockOwnerShip+0xeffffe601`b4197100 fffff800`3bcaebf0 : ffff830c`9954b200 ffff830c`9536a080 00000000`00000000 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7fffffe601`b4197130 fffff800`41400933 : 00000000`00000001 ffff830c`98ae5018 ffff830c`98ae5000 ffffc28c`32fa1010 : nt!ExAcquireResourceExclusiveLite+0xb0ffffe601`b41971c0 fffff800`4141a0cf : 00000000`00000000 00000000`00000000 ffffc28c`32fa1010 ffff830c`98ae5018 : Ntfs!NtfsAcquirePagingResourceExclusive+0x5bffffe601`b4197200 fffff800`4155210b : ffff830c`98ae5018 ffff830c`8dfee180 ffffc28c`32fa1010 ffffe601`b4197370 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x8fffffe601`b4197340 fffff800`415026d0 : 00000000`00000000 00000000`00000000 ffff830c`8dfee180 00000000`00000001 : Ntfs!NtfsFlushVolume+0x353ffffe601`b4197460 fffff800`41502b19 : ffff830c`98ae5018 ffff830c`986be7b0 ffff830c`98ae5001 ffffe601`b4197690 : Ntfs!NtfsCommonFlushBuffers+0x8ccffffe601`b4197580 fffff800`3bcdae28 : ffffe601`b4197690 ffff830c`98ae5018 0012019f`00000000 ffff830c`986be7b0 : Ntfs!NtfsCommonFlushBuffersCallout+0x19ffffe601`b41975b0 fffff800`3bcdad9d : fffff800`41502b00 ffffe601`b4197690 00000000`00000000 ffff830c`8dfed010 : nt!KeExpandKernelStackAndCalloutInternal+0x78ffffe601`b4197620 fffff800`4154454b : 00000000`00000000 ffff830c`9d564200 ffffe601`b4198000 00000000`00000310 : nt!KeExpandKernelStackAndCalloutEx+0x1dffffe601`b4197660 fffff800`41544475 : 00000000`00000000 ffff830c`8de182c0 ffffe601`b41976f8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67ffffe601`b41976d0 fffff800`3bcabac5 : ffff830c`9b0448a0 ffff830c`986be7b0 ffff830c`98ae5018 ffffe601`b41976f8 : Ntfs!NtfsFsdFlushBuffers+0xe5ffffe601`b4197740 fffff800`3b2370cf : ffff830c`8aa00006 00000000`00000000 ffffe601`00000000 ffffe601`b4197a80 : nt!IofCallDriver+0x55ffffe601`b4197780 fffff800`3b234a03 : ffffe601`b4197810 00000000`00000000 00000000`00000000 ffff830c`8d7a00c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28fffffe601`b41977f0 fffff800`3bcabac5 : ffff830c`986be7b0 00000000`000000c0 00000000`000000c8 00007ff7`15701680 : FLTMGR!FltpDispatch+0xa3ffffe601`b4197850 fffff800`3c01b538 : ffff830c`986be7b0 00000000`00000000 00000000`00000000 fffff800`3c3b21c4 : nt!IofCallDriver+0x55ffffe601`b4197890 fffff800`3c0efe19 : ffff830c`00000000 ffffe601`b4197a80 00000000`00000000 ffffe601`b4197a80 : nt!IopSynchronousServiceTail+0x1a8ffffe601`b4197930 fffff800`3c0efc06 : ffff830c`9536a080 00007ff7`15701890 ffff830c`8dfecc40 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1f9ffffe601`b41979c0 fffff800`3be0a2b5 : ffff830c`9536a000 00000000`00000000 ffffe601`b4197a80 ffff830c`00000000 : nt!NtFlushBuffersFile+0x16ffffe601`b4197a00 00007ffb`b988d8a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x2500000035`df6ff178 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b988d8a4 SYMBOL_NAME: nt!KxWaitForLockOwnerShip+e MODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1889 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: e FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93} Followup: MachineOwner--------- 欢迎访问本站!。可能和硬盘有关。建议参考以下链接,检测一下硬盘:https://answers.microsoft.com/zh-hans/windows/f.