最近经常蓝屏困扰到我,我已经用winDbg Preview工具解包,附属解包代码,并告诉我怎么解决,本人看不懂代码Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64Copyright (c) Microsoft Corporation. All rights reserved.  Loading Dump File [C:\Windows\Minidump\090522-11453-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*Executable search path is:Windows 10 Kernel Version 19041 MP (8 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSMachine Name:Kernel base = 0xfffff800`3ba00000 PsLoadedModuleList = 0xfffff800`3c62a250Debug session time: Mon Sep  5 19:02:22.058 2022 (UTC + 8:00)System Uptime: 0 days 0:14:54.026Loading Kernel Symbols.. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.Run !sym noisy before .reload to track down problems loading symbols. .............................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list.........For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff800`3bdf88c0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffe601`b4196e00=000000000000000a2: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ******************************************************************************** IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high.  This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000000000002, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8003bc8f41e, address which referenced memory Debugging Details:------------------  KEY_VALUES_STRING: 1     Key  : Analysis.CPU.mSec    Value: 1906     Key  : Analysis.DebugAnalysisManager    Value: Create     Key  : Analysis.Elapsed.mSec    Value: 40393     Key  : Analysis.Init.CPU.mSec    Value: 640     Key  : Analysis.Init.Elapsed.mSec    Value: 405767     Key  : Analysis.Memory.CommitPeak.Mb    Value: 89     Key  : Bugcheck.Code.DumpHeader    Value: 0xa     Key  : Bugcheck.Code.Register    Value: 0xa     Key  : Dump.Attributes.AsUlong    Value: 8     Key  : Dump.Attributes.KernelGeneratedTriageDump    Value: 1  FILE_IN_CAB:  090522-11453-01.dmp DUMP_FILE_ATTRIBUTES: 0x8  Kernel Generated Triage Dump BUGCHECK_CODE:  a BUGCHECK_P1: 2 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8003bc8f41e WRITE_ADDRESS: fffff8003c6fb390: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse 0000000000000002 BLACKBOXBSD: 1 (!blackboxbsd)  BLACKBOXNTFS: 1 (!blackboxntfs)  BLACKBOXPNP: 1 (!blackboxpnp)  BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT:  1 PROCESS_NAME:  VSSVC.exe TRAP_FRAME:  ffffe601b4196f40 -- (.trap 0xffffe601b4196f40)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000 rcx=ffffe601b4197160rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000rip=fffff8003bc8f41e rsp=ffffe601b41970d0 rbp=ffff830c9536a080 r8=0000000000000000  r9=ffffe601b4197370 r10=0000000000000000r11=ffffe601b41970f0 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0         nv up ei ng nz na pe ncnt!KxWaitForLockOwnerShip+0xe:fffff800`3bc8f41e 48890a          mov     qword ptr [rdx],rcx ds:00000000`00000002=????????????????Resetting default scope STACK_TEXT:  ffffe601`b4196df8 fffff800`3be0a869     : 00000000`0000000a 00000000`00000002 00000000`00000002 00000000`00000001 : nt!KeBugCheckExffffe601`b4196e00 fffff800`3be06b69     : ffffc28c`32fa35a0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69ffffe601`b4196f40 fffff800`3bc8f41e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469ffffe601`b41970d0 fffff800`3bc8f3ff     : ffffc28c`32fa37b8 ffffc28c`32fa3700 ffffc28c`32fa35a0 fffff800`41423351 : nt!KxWaitForLockOwnerShip+0xeffffe601`b4197100 fffff800`3bcaebf0     : ffff830c`9954b200 ffff830c`9536a080 00000000`00000000 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7fffffe601`b4197130 fffff800`41400933     : 00000000`00000001 ffff830c`98ae5018 ffff830c`98ae5000 ffffc28c`32fa1010 : nt!ExAcquireResourceExclusiveLite+0xb0ffffe601`b41971c0 fffff800`4141a0cf     : 00000000`00000000 00000000`00000000 ffffc28c`32fa1010 ffff830c`98ae5018 : Ntfs!NtfsAcquirePagingResourceExclusive+0x5bffffe601`b4197200 fffff800`4155210b     : ffff830c`98ae5018 ffff830c`8dfee180 ffffc28c`32fa1010 ffffe601`b4197370 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x8fffffe601`b4197340 fffff800`415026d0     : 00000000`00000000 00000000`00000000 ffff830c`8dfee180 00000000`00000001 : Ntfs!NtfsFlushVolume+0x353ffffe601`b4197460 fffff800`41502b19     : ffff830c`98ae5018 ffff830c`986be7b0 ffff830c`98ae5001 ffffe601`b4197690 : Ntfs!NtfsCommonFlushBuffers+0x8ccffffe601`b4197580 fffff800`3bcdae28     : ffffe601`b4197690 ffff830c`98ae5018 0012019f`00000000 ffff830c`986be7b0 : Ntfs!NtfsCommonFlushBuffersCallout+0x19ffffe601`b41975b0 fffff800`3bcdad9d     : fffff800`41502b00 ffffe601`b4197690 00000000`00000000 ffff830c`8dfed010 : nt!KeExpandKernelStackAndCalloutInternal+0x78ffffe601`b4197620 fffff800`4154454b     : 00000000`00000000 ffff830c`9d564200 ffffe601`b4198000 00000000`00000310 : nt!KeExpandKernelStackAndCalloutEx+0x1dffffe601`b4197660 fffff800`41544475     : 00000000`00000000 ffff830c`8de182c0 ffffe601`b41976f8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67ffffe601`b41976d0 fffff800`3bcabac5     : ffff830c`9b0448a0 ffff830c`986be7b0 ffff830c`98ae5018 ffffe601`b41976f8 : Ntfs!NtfsFsdFlushBuffers+0xe5ffffe601`b4197740 fffff800`3b2370cf     : ffff830c`8aa00006 00000000`00000000 ffffe601`00000000 ffffe601`b4197a80 : nt!IofCallDriver+0x55ffffe601`b4197780 fffff800`3b234a03     : ffffe601`b4197810 00000000`00000000 00000000`00000000 ffff830c`8d7a00c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28fffffe601`b41977f0 fffff800`3bcabac5     : ffff830c`986be7b0 00000000`000000c0 00000000`000000c8 00007ff7`15701680 : FLTMGR!FltpDispatch+0xa3ffffe601`b4197850 fffff800`3c01b538     : ffff830c`986be7b0 00000000`00000000 00000000`00000000 fffff800`3c3b21c4 : nt!IofCallDriver+0x55ffffe601`b4197890 fffff800`3c0efe19     : ffff830c`00000000 ffffe601`b4197a80 00000000`00000000 ffffe601`b4197a80 : nt!IopSynchronousServiceTail+0x1a8ffffe601`b4197930 fffff800`3c0efc06     : ffff830c`9536a080 00007ff7`15701890 ffff830c`8dfecc40 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1f9ffffe601`b41979c0 fffff800`3be0a2b5     : ffff830c`9536a000 00000000`00000000 ffffe601`b4197a80 ffff830c`00000000 : nt!NtFlushBuffersFile+0x16ffffe601`b4197a00 00007ffb`b988d8a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x2500000035`df6ff178 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b988d8a4  SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e MODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exe IMAGE_VERSION:  10.0.19041.1889 STACK_COMMAND:  .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET:  e FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip OSPLATFORM_TYPE:  x64 OSNAME:  Windows 10 FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93} Followup:     MachineOwner--------- 2: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ******************************************************************************** IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high.  This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000000000002, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8003bc8f41e, address which referenced memory Debugging Details:------------------  KEY_VALUES_STRING: 1     Key  : Analysis.CPU.mSec    Value: 1561     Key  : Analysis.DebugAnalysisManager    Value: Create     Key  : Analysis.Elapsed.mSec    Value: 1563     Key  : Analysis.Init.CPU.mSec    Value: 4530     Key  : Analysis.Init.Elapsed.mSec    Value: 448197     Key  : Analysis.Memory.CommitPeak.Mb    Value: 89     Key  : Bugcheck.Code.DumpHeader    Value: 0xa     Key  : Bugcheck.Code.Register    Value: 0xa     Key  : Dump.Attributes.AsUlong    Value: 8     Key  : Dump.Attributes.KernelGeneratedTriageDump    Value: 1  FILE_IN_CAB:  090522-11453-01.dmp DUMP_FILE_ATTRIBUTES: 0x8  Kernel Generated Triage Dump BUGCHECK_CODE:  a BUGCHECK_P1: 2 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8003bc8f41e WRITE_ADDRESS: Unable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEnd 0000000000000002 BLACKBOXBSD: 1 (!blackboxbsd)  BLACKBOXNTFS: 1 (!blackboxntfs)  BLACKBOXPNP: 1 (!blackboxpnp)  BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT:  1 PROCESS_NAME:  VSSVC.exe TRAP_FRAME:  ffffe601b4196f40 -- (.trap 0xffffe601b4196f40)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000 rcx=ffffe601b4197160rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000rip=fffff8003bc8f41e rsp=ffffe601b41970d0 rbp=ffff830c9536a080 r8=0000000000000000  r9=ffffe601b4197370 r10=0000000000000000r11=ffffe601b41970f0 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0         nv up ei ng nz na pe ncnt!KxWaitForLockOwnerShip+0xe:fffff800`3bc8f41e 48890a          mov     qword ptr [rdx],rcx ds:00000000`00000002=????????????????Resetting default scope STACK_TEXT:  ffffe601`b4196df8 fffff800`3be0a869     : 00000000`0000000a 00000000`00000002 00000000`00000002 00000000`00000001 : nt!KeBugCheckExffffe601`b4196e00 fffff800`3be06b69     : ffffc28c`32fa35a0 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiBugCheckDispatch+0x69ffffe601`b4196f40 fffff800`3bc8f41e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469ffffe601`b41970d0 fffff800`3bc8f3ff     : ffffc28c`32fa37b8 ffffc28c`32fa3700 ffffc28c`32fa35a0 fffff800`41423351 : nt!KxWaitForLockOwnerShip+0xeffffe601`b4197100 fffff800`3bcaebf0     : ffff830c`9954b200 ffff830c`9536a080 00000000`00000000 00000000`00000000 : nt!KeAcquireInStackQueuedSpinLock+0x7fffffe601`b4197130 fffff800`41400933     : 00000000`00000001 ffff830c`98ae5018 ffff830c`98ae5000 ffffc28c`32fa1010 : nt!ExAcquireResourceExclusiveLite+0xb0ffffe601`b41971c0 fffff800`4141a0cf     : 00000000`00000000 00000000`00000000 ffffc28c`32fa1010 ffff830c`98ae5018 : Ntfs!NtfsAcquirePagingResourceExclusive+0x5bffffe601`b4197200 fffff800`4155210b     : ffff830c`98ae5018 ffff830c`8dfee180 ffffc28c`32fa1010 ffffe601`b4197370 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x8fffffe601`b4197340 fffff800`415026d0     : 00000000`00000000 00000000`00000000 ffff830c`8dfee180 00000000`00000001 : Ntfs!NtfsFlushVolume+0x353ffffe601`b4197460 fffff800`41502b19     : ffff830c`98ae5018 ffff830c`986be7b0 ffff830c`98ae5001 ffffe601`b4197690 : Ntfs!NtfsCommonFlushBuffers+0x8ccffffe601`b4197580 fffff800`3bcdae28     : ffffe601`b4197690 ffff830c`98ae5018 0012019f`00000000 ffff830c`986be7b0 : Ntfs!NtfsCommonFlushBuffersCallout+0x19ffffe601`b41975b0 fffff800`3bcdad9d     : fffff800`41502b00 ffffe601`b4197690 00000000`00000000 ffff830c`8dfed010 : nt!KeExpandKernelStackAndCalloutInternal+0x78ffffe601`b4197620 fffff800`4154454b     : 00000000`00000000 ffff830c`9d564200 ffffe601`b4198000 00000000`00000310 : nt!KeExpandKernelStackAndCalloutEx+0x1dffffe601`b4197660 fffff800`41544475     : 00000000`00000000 ffff830c`8de182c0 ffffe601`b41976f8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67ffffe601`b41976d0 fffff800`3bcabac5     : ffff830c`9b0448a0 ffff830c`986be7b0 ffff830c`98ae5018 ffffe601`b41976f8 : Ntfs!NtfsFsdFlushBuffers+0xe5ffffe601`b4197740 fffff800`3b2370cf     : ffff830c`8aa00006 00000000`00000000 ffffe601`00000000 ffffe601`b4197a80 : nt!IofCallDriver+0x55ffffe601`b4197780 fffff800`3b234a03     : ffffe601`b4197810 00000000`00000000 00000000`00000000 ffff830c`8d7a00c0 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28fffffe601`b41977f0 fffff800`3bcabac5     : ffff830c`986be7b0 00000000`000000c0 00000000`000000c8 00007ff7`15701680 : FLTMGR!FltpDispatch+0xa3ffffe601`b4197850 fffff800`3c01b538     : ffff830c`986be7b0 00000000`00000000 00000000`00000000 fffff800`3c3b21c4 : nt!IofCallDriver+0x55ffffe601`b4197890 fffff800`3c0efe19     : ffff830c`00000000 ffffe601`b4197a80 00000000`00000000 ffffe601`b4197a80 : nt!IopSynchronousServiceTail+0x1a8ffffe601`b4197930 fffff800`3c0efc06     : ffff830c`9536a080 00007ff7`15701890 ffff830c`8dfecc40 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1f9ffffe601`b41979c0 fffff800`3be0a2b5     : ffff830c`9536a000 00000000`00000000 ffffe601`b4197a80 ffff830c`00000000 : nt!NtFlushBuffersFile+0x16ffffe601`b4197a00 00007ffb`b988d8a4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x2500000035`df6ff178 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`b988d8a4  SYMBOL_NAME:  nt!KxWaitForLockOwnerShip+e MODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exe IMAGE_VERSION:  10.0.19041.1889 STACK_COMMAND:  .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET:  e FAILURE_BUCKET_ID:  AV_nt!KxWaitForLockOwnerShip OSPLATFORM_TYPE:  x64 OSNAME:  Windows 10 FAILURE_ID_HASH:  {724b07b1-4226-85fe-f372-16d33b9a3b93} Followup:     MachineOwner---------      欢迎访问本站!。可能和硬盘有关。建议参考以下链接,检测一下硬盘:https://answers.microsoft.com/zh-hans/windows/f.

点赞(78) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部