蓝屏问题请教
Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff807`15400000 PsLoadedModuleList = 0xfffff807`1602a290
Debug session time: Sat Oct1 11:26:46.286 2022 (UTC + 8:00)
System Uptime: 0 days 3:17:49.082
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`157f8fa0 48894c2408 mov qword ptr ,rcx ss:0018:fffff10f`27b96c10=00000000000000ef
3: kd> !analyze -v
ERROR: FindPlugIns 8007007b
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
CRITICAL_PROCESS_DIED (ef)
A critical system process died
Arguments:
Arg1: ffffc905031f0080, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000, The process object that initiated the termination.
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key: Analysis.CPU.mSec
Value: 3780
Key: Analysis.DebugAnalysisManager
Value: Create
Key: Analysis.Elapsed.mSec
Value: 12591
Key: Analysis.Init.CPU.mSec
Value: 1233
Key: Analysis.Init.Elapsed.mSec
Value: 257180
Key: Analysis.Memory.CommitPeak.Mb
Value: 94
Key: Bugcheck.Code.DumpHeader
Value: 0xef
Key: Bugcheck.Code.Register
Value: 0xef
Key: CriticalProcessDied.ExceptionCode
Value: 4964040
Key: CriticalProcessDied.Process
Value: svchost.exe
Key: Dump.Attributes.AsUlong
Value: 8
Key: Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB:100122-17218-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE:ef
BUGCHECK_P1: ffffc905031f0080
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
PROCESS_NAME:svchost.exe
CRITICAL_PROCESS:svchost.exe
EXCEPTION_RECORD:ffffc905031f07c0 -- (.exr 0xffffc905031f07c0)
ExceptionAddress: 0000000000000000
ExceptionCode: 00000000
ExceptionFlags: 00000000
NumberParameters: 0
ERROR_CODE: (NTSTATUS) 0x4964040 -<Unable to get error code text>
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:1
EXCEPTION_STR:0x0
STACK_TEXT:
fffff10f`27b96c08 fffff807`15d089d2 : 00000000`000000ef ffffc905`031f0080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff10f`27b96c10 fffff807`15bf4783 : 00000000`00000001 fffff807`156062c5 00000000`00000002 fffff807`156061ef : nt!PspCatchCriticalBreak+0x10e
fffff10f`27b96cb0 fffff807`159d5da0 : ffffc905`00000000 00000000`00000000 ffffc905`031f0080 ffffc905`031f04b8 : nt!PspTerminateAllThreads+0x1ad1d7
fffff10f`27b96d20 fffff807`159d5b9c : ffffc905`031f0080 00000000`00000001 ffffffff`ffffffff 00000000`00000000 : nt!PspTerminateProcess+0xe0
fffff10f`27b96d60 fffff807`1580a9b5 : ffffc905`031f0080 ffffc905`04964040 fffff10f`27b96e50 fffff807`15b23d32 : nt!NtTerminateProcess+0x9c
fffff10f`27b96dd0 fffff807`157fce30 : fffff807`1583cd8f fffff10f`27b97958 fffff10f`27b97958 ffffffff`ffffffff : nt!KiSystemServiceCopyEnd+0x25
fffff10f`27b96f68 fffff807`1583cd8f : fffff10f`27b97958 fffff10f`27b97958 ffffffff`ffffffff 00007ffc`791edc98 : nt!KiServiceLinkage
fffff10f`27b96f70 fffff807`1580b0ac : ffffc905`031f07c0 fffff807`15689916 00000000`00005000 fffff10f`27b97a00 : nt!KiDispatchException+0x1c689f
fffff10f`27b97820 fffff807`15807243 : 00000046`5dc826b0 ffffc905`00000001 00000000`00000017 fffff10f`27b97a80 : nt!KiExceptionDispatch+0x12c
fffff10f`27b97a00 00007ffc`7dda0f64 : 00007ffc`7dd70000 00007ffc`7de10e8e 00007ffc`7de10e8e 00007ffc`7ddc1d73 : nt!KiPageFault+0x443
00000046`5dc815b0 00007ffc`7dd70000 : 00007ffc`7de10e8e 00007ffc`7de10e8e 00007ffc`7ddc1d73 00000046`5dc816f0 : 0x00007ffc`7dda0f64
00000046`5dc815b8 00007ffc`7de10e8e : 00007ffc`7de10e8e 00007ffc`7ddc1d73 00000046`5dc816f0 00000000`00000000 : 0x00007ffc`7dd70000
00000046`5dc815c0 00007ffc`7de10e8e : 00007ffc`7ddc1d73 00000046`5dc816f0 00000000`00000000 00000046`5dc81648 : 0x00007ffc`7de10e8e
00000046`5dc815c8 00007ffc`7ddc1d73 : 00000046`5dc816f0 00000000`00000000 00000046`5dc81648 00000046`5dc81688 : 0x00007ffc`7de10e8e
00000046`5dc815d0 00000046`5dc816f0 : 00000000`00000000 00000046`5dc81648 00000046`5dc81688 00007ffc`7916a688 : 0x00007ffc`7ddc1d73
00000046`5dc815d8 00000000`00000000 : 00000046`5dc81648 00000046`5dc81688 00007ffc`7916a688 00000000`00000001 : 0x00000046`5dc816f0
SYMBOL_NAME:nt!PspCatchCriticalBreak+10e
MODULE_NAME: nt
IMAGE_NAME:ntkrnlmp.exe
IMAGE_VERSION:10.0.19041.2006
STACK_COMMAND:.cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET:10e
FAILURE_BUCKET_ID:0xEF_svchost.exe_BUGCHECK_CRITICAL_PROCESS_4964040_nt!PspCatchCriticalBreak
OSPLATFORM_TYPE:x64
OSNAME:Windows 10
FAILURE_ID_HASH:{26655353-fac4-7f63-7a96-161d19cfdd05}
Followup: MachineOwner 最近电脑莫名其妙的蓝屏,目前发现四个个蓝屏代码,有没有大佬知道什么原因 蓝屏代码 CEITICAL-PROCESS-DIED KERNEL-DATA-INPAGE-ERROR SYSTEM-SERVICE-EXCEPTION 0xc000021a 您好,请看一下在C:\Windows\Minidump文件夹中是否有文件,如果有压缩后挂附件上传到本帖;在C:\Windows文件夹里边有没有一个叫memory.dmp的文件,如果有请压缩后上传网盘,把分享链接发一下。 https://wwt.lanzouj.com/iz8aP0cqv32f
页:
[1]