有人可以帮我解释一下这个 Windows 11 小型转储错误信息(通过 WinDbg)吗?

有人可以帮我解释一下这个 Windows 11 小型转储错误信息(通过 WinDbg)吗?

我的 W11 机器最近开始崩溃。所以是的,这是由“最近安装”的某些东西引起的。但我不确定是什么。

我有最近一次崩溃的迷你转储。尝试使用 WinDbg 给我一些线索(例如,它是更新的驱动程序吗?等等)。

编辑:这是转储文件(2.6MB)

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\121022-19562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 22621 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff807`4b000000 PsLoadedModuleList = 0xfffff807`4bc13410
Debug session time: Sat Dec 10 15:03:38.102 2022 (UTC + 10:00)
System Uptime: 1 days 22:06:43.278
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

...............................................................
Loading User Symbols
Loading unloaded module list
.............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`4b4283c0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffc01`74a0d510=000000000000003b
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff807527f20c8, Address of the instruction which caused the BugCheck
Arg3: fffffc0174a0de60, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1953

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 29759

    Key  : Analysis.IO.Other.Mb
    Value: 4

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 43

    Key  : Analysis.Init.CPU.mSec
    Value: 265

    Key  : Analysis.Init.Elapsed.mSec
    Value: 39439

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 112

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x3b

    Key  : Bugcheck.Code.Register
    Value: 0x3b

    Key  : Dump.Attributes.AsUlong
    Value: 1808

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.KernelGeneratedTriageDump
    Value: 1

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 0


FILE_IN_CAB:  121022-19562-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DUMP_FILE_ATTRIBUTES: 0x1808
  Kernel Generated Triage Dump

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff807527f20c8

BUGCHECK_P3: fffffc0174a0de60

BUGCHECK_P4: 0

CONTEXT:  fffffc0174a0de60 -- (.cxr 0xfffffc0174a0de60)
rax=0000000000000000 rbx=ffffab0d6f74af60 rcx=ffffab0d6f74ad00
rdx=0000000000000520 rsi=ffffab0d6f74af70 rdi=ffffab0d6f74ad00
rip=fffff807527f20c8 rsp=fffffc0174a0e880 rbp=fffffc0174a0e9f0
 r8=0000000000000400  r9=7ffffffffffffffc r10=fffff8074b2c93b0
r11=fffffc0174a0e8e8 r12=0000000000000000 r13=0000000000040002
r14=ffffab0d6f74ad00 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
dxgkrnl!DXGPROCESSVM::DestroyVmProcess+0x8c:
fffff807`527f20c8 488ba860020000  mov     rbp,qword ptr [rax+260h] ds:002b:00000000`00000260=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  vmwp.exe

STACK_TEXT:  
fffffc01`74a0e880 fffff807`527098f6     : 00000000`00000110 fffffc01`74a0e9f0 ffff9a84`371ff210 ffff9a84`41ff0080 : dxgkrnl!DXGPROCESSVM::DestroyVmProcess+0x8c
fffffc01`74a0e8f0 fffff807`5265f904     : ffffab0d`6f74ad00 fffff807`4b000000 00000000`00040002 ffffab0d`6c9b4660 : dxgkrnl!DXGPROCESS::Destroy+0xac566
fffffc01`74a0ea90 fffff807`52709650     : ffffab0d`6cc926a8 ffffab0d`6f74ad00 ffffab0d`6cc92668 00000000`00000002 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x13c
fffffc01`74a0ec20 fffff807`5281730e     : 00000000`00000000 00000000`00000000 ffff9a84`377c97e0 00000000`00000000 : dxgkrnl!DXGPROCESS::Destroy+0xac2c0
fffffc01`74a0edc0 fffff807`52818acc     : ffff9a84`2ed484d0 ffff9a84`377b3000 ffff0b7b`17a66d75 00000000`00000000 : dxgkrnl!ADAPTER_RENDER::ResetVirtualFunction+0x206
fffffc01`74a0ef10 fffff807`525275ff     : ffff9a84`416d2aa0 00000000`00224000 ffff9a84`00000000 ffff9a84`41f64bc8 : dxgkrnl!DxgkDdiResetVirtualFunction+0x5c
fffffc01`74a0ef70 fffff807`80911389     : 00000000`0000000c fffff807`808ee530 ffff9a84`2e9d9030 ffff9a84`41ab4df0 : dxgkrnl!DpiDdiResetVirtualFunction+0x2f
fffffc01`74a0efa0 fffff807`809027b9     : ffff9a84`41ab4df0 00000000`00000000 00000000`00000000 00000000`00224084 : vpcivsp!SriovProxy::ResetVf+0x49
fffffc01`74a0efe0 fffff807`8090432a     : ffff9a84`416d2aa0 fffff807`4fdc2fed 0000657b`be09b498 0000657b`d12b7c01 : vpcivsp!VirtualDeviceResetFunction+0xf5
fffffc01`74a0f050 fffff807`808fe037     : ffff9a84`416d2aa0 00000000`00000000 ffff9a84`3e9bd4f0 ffff9a84`41ab4d20 : vpcivsp!VirtualDeviceRemove+0x96
fffffc01`74a0f080 fffff807`808fb73d     : 0000657b`d12b7ce8 fffffc01`74a0f130 00000000`00224084 ffff9a84`41ab4d20 : vpcivsp!VpciIoctlRemoveDevice+0xab
fffffc01`74a0f0b0 fffff807`4fdc525b     : 00000000`00000000 00000000`00000001 ffff9a84`3e9bd4f0 fffffc01`74a0f240 : vpcivsp!VspEvtIoDeviceControl+0x2bd
fffffc01`74a0f170 fffff807`4fdc4f06     : 00000000`00000000 00000000`00000000 ffff9a84`2ed1ecd0 ffff9a84`2ed13880 : Wdf01000!FxIoQueue::DispatchRequestToDriver+0x16b [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 3325] 
fffffc01`74a0f1e0 fffff807`4fdc4c32     : ffff9a84`2ed13880 00000000`00000000 00000000`00000000 00000000`00000000 : Wdf01000!FxIoQueue::DispatchEvents+0x216 [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 3125] 
fffffc01`74a0f260 fffff807`4fdc63ac     : ffff9a84`3e9bd400 ffff9a84`2ed13880 80000000`00000001 ffff9a84`4de8fdc0 : Wdf01000!FxIoQueue::QueueRequestFromForward+0x172 [minkernel\wdf\framework\shared\irphandlers\io\fxioqueue.cpp @ 2496] 
fffffc01`74a0f2e0 fffff807`4fdc5e51     : ffff9a84`11ef0000 ffff9a84`2ed1ecd0 fffffc01`74a0f3d9 00000000`00000001 : Wdf01000!FxPkgIo::EnqueueRequest+0xb8 [minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 699] 
fffffc01`74a0f350 fffff807`808fb427     : ffff9a84`2ed48310 0000657b`c1642b08 ffff9a84`2ecd7b38 ffff9a84`3e9bd4f0 : Wdf01000!imp_WdfDeviceEnqueueRequest+0x81 [minkernel\wdf\framework\shared\core\fxdeviceapi.cpp @ 2104] 
fffffc01`74a0f380 fffff807`4fdc6654     : ffff9a84`3e9bd4f0 fffffc01`74a0f580 ffff9a84`3e9bd4f0 ffff9a84`2ecd79b0 : vpcivsp!VspEvtIoInCallerContext+0x167
fffffc01`74a0f440 fffff807`4fdc4910     : ffff9a84`3e9bd4f0 ffff9a84`2ed13880 00000000`00000000 00000000`00000000 : Wdf01000!FxPkgIo::DispatchToInCallerContextCallback+0x90 [minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 1757] 
fffffc01`74a0f480 fffff807`4fdc42ce     : 00000000`00000000 ffff9a84`4de8fdc0 00000000`00000001 ffff9a84`2ed1ecd0 : Wdf01000!FxPkgIo::DispatchStep1+0x630 [minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 324] 
fffffc01`74a0f550 fffff807`4fdc7b41     : ffff9a84`4de8fdc0 ffff9a84`00000000 00000000`000000c9 00000000`00000000 : Wdf01000!FxPkgIo::Dispatch+0x5e [minkernel\wdf\framework\shared\irphandlers\io\fxpkgio.cpp @ 119] 
fffffc01`74a0f5b0 fffff807`4b2cb875     : ffff9a84`4de8fdc0 ffff9a84`4de8fdc0 fffffc01`74a0f6a1 00000000`00000002 : Wdf01000!FxDevice::DispatchWithLock+0x81 [minkernel\wdf\framework\shared\core\fxdevice.cpp @ 1446] 
fffffc01`74a0f600 fffff807`4b6c2c70     : ffff9a84`4de8fdc0 00000000`00000002 ffff9a84`4de8fdc0 ffff9a84`40fdeee0 : nt!IofCallDriver+0x55
fffffc01`74a0f640 fffff807`4b6c123c     : 00000000`00000000 00000000`00224084 fffffc01`74a0fa60 ffff9a84`4de8fdc0 : nt!IopSynchronousServiceTail+0x1d0
fffffc01`74a0f6f0 fffff807`4b6bf516     : 00000000`00000000 fffffc01`74a0fa60 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x72c
fffffc01`74a0f900 fffff807`4b43d1e5     : ffff9a84`41ff0080 0000009f`1047f138 fffffc01`74a0f988 00000000`00224084 : nt!NtDeviceIoControlFile+0x56
fffffc01`74a0f970 00007ff8`6462eee4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000009f`1047f118 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`6462eee4


SYMBOL_NAME:  dxgkrnl!DXGPROCESSVM::DestroyVmProcess+8c

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.22621.815

STACK_COMMAND:  .cxr 0xfffffc0174a0de60 ; kb

BUCKET_ID_FUNC_OFFSET:  8c

FAILURE_BUCKET_ID:  AV_dxgkrnl!DXGPROCESSVM::DestroyVmProcess

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f8b784e7-4a0a-0c3e-6b99-2f965f88fe26}

Followup:     MachineOwner
---------

我猜测的 2x 线索是:

  • vmwp.exe(这是 Hyper-V 吗,因为我在这台笔记本电脑上安装了 docker?)
  • dxgkrnl.sys(与 DirectX 有关???)

我儿子说他在玩游戏……那么这可能是 DirectX 位?

是否值得将崩溃详细信息从小型转储更改为“内核”或“完整”转储以获取更多信息?

过去,当出现这种糟糕的情况时,我通常只是格式化 c:/。但这一次,我很想真正了解一下,看看我是否能找出原因……甚至看看我是否可以尝试修复它……而不是完全格式化。(旁注:格式化可能更快,但对我来说,学习真的很重要,等等)。

有人可以帮忙吗?

请不要认为我在要求某人“修理我的电脑”,因为那是

相关内容