本帖最后由 dfcf437192 于 2023-1-29 09:07 编辑
没有一丝丝防备,你就这样蓝屏...内心是崩溃的
这是近几次的蓝屏,那位大佬帮我看一下
附件为下
Minidump.zip
(1.17 MB)
最近一次蓝屏
这是第二个蓝屏信息
这是第三个蓝屏信息
- Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\012723-17406-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 19041 MP (4 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
- Machine Name:
- Kernel base = 0xfffff800`52800000 PsLoadedModuleList = 0xfffff800`5342a2d0
- Debug session time: Fri Jan 27 21:02:41.054 2023 (UTC + 8:00)
- System Uptime: 6 days 3:35:35.522
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- ....................
- Loading User Symbols
- Loading unloaded module list
- ..........................
- For analysis of this file, run !analyze -v
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
- This is a very common BugCheck. Usually the exception address pinpoints
- the driver/function that caused the problem. Always note this address
- as well as the link date of the driver/image that contains this address.
- Some common problems are exception code 0x80000003. This means a hard
- coded breakpoint or assertion was hit, but this system was booted
- /NODEBUG. This is not supposed to happen as developers should never have
- hardcoded breakpoints in retail code, but ...
- If this happens, make sure a debugger gets connected, and the
- system is booted /DEBUG. This will let us see why this breakpoint is
- happening.
- Arguments:
- Arg1: ffffffffc0000005, The exception code that was not handled
- Arg2: fffff80052a2df30, The address that the exception occurred at
- Arg3: ffff8084351bf658, Exception Record Address
- Arg4: fffff800592b8920, Context Record Address
- Debugging Details:
- ------------------
- *** WARNING: Unable to verify timestamp for win32k.sys
- KEY_VALUES_STRING: 1
- Key : AV.Fault
- Value: Read
- Key : Analysis.CPU.mSec
- Value: 6015
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 154435
- Key : Analysis.Init.CPU.mSec
- Value: 2078
- Key : Analysis.Init.Elapsed.mSec
- Value: 7010
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 97
- Key : WER.OS.Branch
- Value: vb_release
- Key : WER.OS.Timestamp
- Value: 2019-12-06T14:06:00Z
- Key : WER.OS.Version
- Value: 10.0.19041.1
- FILE_IN_CAB: 012723-17406-01.dmp
- BUGCHECK_CODE: 7e
- BUGCHECK_P1: ffffffffc0000005
- BUGCHECK_P2: fffff80052a2df30
- BUGCHECK_P3: ffff8084351bf658
- BUGCHECK_P4: fffff800592b8920
- EXCEPTION_RECORD: ffff8084351bf658 -- (.exr 0xffff8084351bf658)
- ExceptionAddress: fffff80052a2df30 (nt!RtlpHpVsContextFree+0x0000000000000380)
- ExceptionCode: c0000005 (Access violation)
- ExceptionFlags: 00000000
- NumberParameters: 2
- Parameter[0]: 0000000000000000
- Parameter[1]: ffffffffffffffff
- Attempt to read from address ffffffffffffffff
- CONTEXT: fffff800592b8920 -- (.cxr 0xfffff800592b8920)
- rax=ca062da6bf08ffff rbx=ffffca0637396000 rcx=00000000a0e107ca
- rdx=ca062da6bf08ffff rsi=ffffca0627202280 rdi=3333333333333333
- rip=fffff80052a2df30 rsp=ffff8084351bf890 rbp=ffff8084351bf900
- r8=0000000000100000 r9=44025ef028ad519b r10=0000000000000000
- r11=ffffca0627202290 r12=0000000000000000 r13=ffffca063764fff0
- r14=ffffca063739aee0 r15=0000000000000000
- iopl=0 nv up ei ng nz na po nc
- cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010286
- nt!RtlpHpVsContextFree+0x380:
- fffff800`52a2df30 8b4af8 mov ecx,dword ptr [rdx-8] ds:002b:ca062da6`bf08fff7=????????
- Resetting default scope
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- PROCESS_NAME: System
- READ_ADDRESS: fffff800534fb390: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- ffffffffffffffff
- ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p 0x%p %s
- EXCEPTION_CODE_STR: c0000005
- EXCEPTION_PARAMETER1: 0000000000000000
- EXCEPTION_PARAMETER2: ffffffffffffffff
- EXCEPTION_STR: 0xc0000005
- STACK_TEXT:
- ffff8084`351bf890 fffff800`52a2c6c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x380
- ffff8084`351bf930 fffff800`531b5019 : 00000000`00000a10 ffffca06`3739b010 00000000`00000960 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
- ffff8084`351bfa10 fffff800`52e37654 : ffffca06`3739b050 ffffca06`3739b050 ffffca06`278d2820 fffff800`53453900 : nt!ExFreePool+0x9
- ffff8084`351bfa40 fffff800`52e37468 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpFreeObject+0x194
- ffff8084`351bfaa0 fffff800`52a173f7 : 00000000`00000000 00000000`00000000 fffff800`52a7b5c0 ffffca06`3739b080 : nt!ObpRemoveObjectRoutine+0x88
- ffff8084`351bfb00 fffff800`52a7b632 : 00000000`00000001 00000000`00000000 00000000`00000000 ffffca06`3739b4d8 : nt!ObfDereferenceObjectWithTag+0xc7
- ffff8084`351bfb40 fffff800`52a5b3d5 : ffffca06`33bab040 ffffca06`278adb40 ffffca06`278adb40 ffffca06`00000000 : nt!PspReaper+0x72
- ffff8084`351bfb70 fffff800`52b030e5 : ffffca06`33bab040 00000000`00000080 ffffca06`2789c040 00000000`00000000 : nt!ExpWorkerThread+0x105
- ffff8084`351bfc10 fffff800`52c02e08 : fffff800`5121e180 ffffca06`33bab040 fffff800`52b03090 00000000`00000246 : nt!PspSystemThreadStartup+0x55
- ffff8084`351bfc60 00000000`00000000 : ffff8084`351c0000 ffff8084`351ba000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
- SYMBOL_NAME: nt!RtlpHpVsContextFree+380
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.19041.2486
- STACK_COMMAND: .cxr 0xfffff800592b8920 ; kb
- BUCKET_ID_FUNC_OFFSET: 380
- FAILURE_BUCKET_ID: AV_nt!RtlpHpVsContextFree
- OS_VERSION: 10.0.19041.1
- BUILDLAB_STR: vb_release
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 10
- FAILURE_ID_HASH: {a3a70975-d33b-54e0-8fd5-b41d85acac01}
- Followup: MachineOwner
- ---------
复制代码
附件如上压缩包,请好心的大佬帮忙看一下,天天蓝屏我的内心是崩溃的...感谢你们!
|
|
|
|
评论
直达楼层