找回密码
 立即注册
  • QQ空间
  • 回复
  • 收藏

大佬帮忙看看是咋会事,这是蓝屏文件,非常感谢

************* Preparing the environment for Debugger Extensions Gallery repositories **************   ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToV8JsProvider : false   -- Configuring repositories      ----> Repository : LocalInstalled, Enabled: true      ----> Repository : UserExtensions, Enabled: true>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
*************WAIting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 41
Microsoft (R) Windows Debugger Version 10.0.27553.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\地方\Desktop\031825-6156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response                         Time (ms)     LocationDeferred                                       srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSKernel base = 0xfffff804`03200000 PSLoadedModuleList = 0xfffff804`03e2a770Debug session time: Tue Mar 18 11:56:42.638 2025 (UTC + 8:00)System Uptime: 0 days 0:00:32.388Loading Kernel Symbols.....................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff804`035fd6f0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa809`9a88b410=000000000000000a8: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high.  This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: ffffbc5b82406068, memory referencedArg2: 00000000000000ff, IRQLArg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff80403607b84, address which referenced memoryDebugging Details:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 2625    Key  : Analysis.Elapsed.mSec    Value: 2675    Key  : Analysis.IO.Other.Mb    Value: 0    Key  : Analysis.IO.Read.Mb    Value: 0    Key  : Analysis.IO.Write.Mb    Value: 0    Key  : Analysis.Init.CPU.mSec    Value: 609    Key  : Analysis.Init.Elapsed.mSec    Value: 6624    Key  : Analysis.Memory.CommitPeak.Mb    Value: 91    Key  : Bugcheck.Code.LegacyAPI    Value: 0xa    Key  : Bugcheck.Code.TargetModel    Value: 0xa    Key  : Dump.Attributes.AsUlong    Value: 8    Key  : Dump.Attributes.KernelGeneratedTriageDump    Value: 1    Key  : Failure.Bucket    Value: AV_nt!guard_dispatch_icall    Key  : Failure.Hash    Value: {e05b71c3-29b2-bd38-ddcd-e2af02495127}BUGCHECK_CODE:  aBUGCHECK_P1: ffffbc5b82406068BUGCHECK_P2: ffBUGCHECK_P3: 0BUGCHECK_P4: fffff80403607b84FILE_IN_CAB:  031825-6156-01.dmpDUMP_FILE_ATTRIBUTES: 0x8  Kernel Generated Triage DumpREAD_ADDRESS: fffff80403efb390: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse ffffbc5b82406068
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXntfs: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  ffffa8099a88b550 -- (.trap 0xffffa8099a88b550)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=ff00000303529520 rbx=0000000000000000 rcx=0000000000000001rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=fffff80403607b84 rsp=ffffa8099a88b6e8 rbp=0000000000000000 r8=0000000000000000  r9=ffff8409f30a8110 r10=0000ff0000030352r11=ffff9c7b82400000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0         nv up di pl nz ac pe cynt!guard_dispatch_icall+0x44:fffff804`03607b84 4d0fa313        bt      qword ptr [r11],r10 ds:ffff9c7b`82400000=???????????????? Resetting default scope
STACK_TEXT:  ffffa809`9a88b408 fffff804`03611aa9     : 00000000`0000000a ffffbc5b`82406068 00000000`000000ff 00000000`00000000 : nt!KeBugCheckExffffa809`9a88b410 fffff804`0360d563     : fffff804`08198a10 fffff804`28ca2e03 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69ffffa809`9a88b550 fffff804`03607b84     : fffff804`03454b68 ffff8409`f30a8328 00000000`00000000 00000000`1371f4dd : nt!KiPageFault+0x463ffffa809`9a88b6e8 fffff804`03454b68     : ffff8409`f30a8328 00000000`00000000 00000000`1371f4dd 00000000`1371f4dd : nt!guard_dispatch_icall+0x44ffffa809`9a88b6f0 fffff804`03454194     : ffff9c7b`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x858ffffa809`9a88baf0 fffff804`036020a4     : ffffffff`00000000 ffffac80`2c133340 ffff840a`01ca5080 00000000`00000708 : nt!PoIdle+0x374ffffa809`9a88bc60 00000000`00000000     : ffffa809`9a88c000 ffffa809`9a886000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54SYMBOL_NAME:  nt!guard_dispatch_icall+44
MODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exeIMAGE_VERSION:  10.0.19041.3803STACK_COMMAND:  .cxr; .ecxr ; kbBUCKET_ID_FUNC_OFFSET:  44FAILURE_BUCKET_ID:  AV_nt!guard_dispatch_icallOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {e05b71c3-29b2-bd38-ddcd-e2af02495127}Followup:     MachineOwner---------
回复

使用道具 举报

说点什么

您需要登录后才可以回帖 登录 | 立即注册
HOT • 推荐