<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>该主题</title>
    <link>https://h30471.www3.hp.com/t5/you-xi-ben/xi-tong-zui-jin-pin-fan-lan-ping/m-p/1200079#M75149</link>
    <description>&lt;P&gt;系统最近频繁蓝屏&lt;/P&gt;&lt;P&gt;Windows Debugger 分析结果如下：&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64&lt;BR /&gt;Copyright (c) Microsoft Corporation. All rights reserved.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Loading Dump File [C:\Windows\MEMORY.DMP]&lt;BR /&gt;Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.&lt;/P&gt;&lt;P&gt;Dump completed successfully, progress percentage: 100&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;************* Path validation summary **************&lt;BR /&gt;Response Time (ms) Location&lt;BR /&gt;Deferred SRV*C:\Symbols*&lt;A href="http://msdl.microsoft.com/download/symbols" target="_blank"&gt;http://msdl.microsoft.com/download/symbols&lt;/A&gt;&lt;BR /&gt;Symbol search path is: SRV*C:\Symbols*&lt;A href="http://msdl.microsoft.com/download/symbols" target="_blank"&gt;http://msdl.microsoft.com/download/symbols&lt;/A&gt;&lt;BR /&gt;Executable search path is:&lt;BR /&gt;Windows 10 Kernel Version 22000 MP (12 procs) Free x64&lt;BR /&gt;Product: WinNt, suite: TerminalServer SingleUserTS&lt;BR /&gt;Edition build lab: 22000.1.amd64fre.co_release.210604-1628&lt;BR /&gt;Machine Name:&lt;BR /&gt;Kernel base = 0xfffff805`13000000 PsLoadedModuleList = 0xfffff805`13c29a40&lt;BR /&gt;Debug session time: Thu Nov 17 15:29:37.747 2022 (UTC + 8:00)&lt;BR /&gt;System Uptime: 0 days 22:00:23.557&lt;BR /&gt;Loading Kernel Symbols&lt;BR /&gt;...............................................................&lt;BR /&gt;................................................................&lt;BR /&gt;.................................................Page 4464da not present in the dump file. Type ".hh dbgerr004" for details&lt;BR /&gt;.....Page 12eab3 not present in the dump file. Type ".hh dbgerr004" for details&lt;BR /&gt;..........&lt;BR /&gt;.............................................&lt;BR /&gt;Loading User Symbols&lt;BR /&gt;PEB is paged out (Peb.Ldr = 00000000`002b8018). Type ".hh dbgerr001" for details&lt;BR /&gt;Loading unloaded module list&lt;BR /&gt;..................................................&lt;BR /&gt;For analysis of this file, run !analyze -v&lt;BR /&gt;1: kd&amp;gt; !analyze -v&lt;BR /&gt;*******************************************************************************&lt;BR /&gt;* *&lt;BR /&gt;* Bugcheck Analysis *&lt;BR /&gt;* *&lt;BR /&gt;*******************************************************************************&lt;/P&gt;&lt;P&gt;DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)&lt;BR /&gt;An attempt was made to access a pageable (or completely invalid) address at an&lt;BR /&gt;interrupt request level (IRQL) that is too high. This is usually&lt;BR /&gt;caused by drivers using improper addresses.&lt;BR /&gt;If kernel debugger is available get stack backtrace.&lt;BR /&gt;Arguments:&lt;BR /&gt;Arg1: 0000000000000000, memory referenced&lt;BR /&gt;Arg2: 0000000000000002, IRQL&lt;BR /&gt;Arg3: 0000000000000008, value 0 = read operation, 1 = write operation&lt;BR /&gt;Arg4: 0000000000000000, address which referenced memory&lt;/P&gt;&lt;P&gt;Debugging Details:&lt;BR /&gt;------------------&lt;/P&gt;&lt;P&gt;Unable to load image \??\C:\WINDOWS\system32\Drivers\SURE_Engine.sys, Win32 error 0n2&lt;BR /&gt;Unable to load image \SystemRoot\system32\DRIVERS\rtf64x64.sys, Win32 error 0n2&lt;BR /&gt;Unable to load image \SystemRoot\System32\drivers\SangforVnic.sys, Win32 error 0n2&lt;/P&gt;&lt;P&gt;KEY_VALUES_STRING: 1&lt;/P&gt;&lt;P&gt;Key : Analysis.CPU.mSec&lt;BR /&gt;Value: 9155&lt;/P&gt;&lt;P&gt;Key : Analysis.DebugAnalysisManager&lt;BR /&gt;Value: Create&lt;/P&gt;&lt;P&gt;Key : Analysis.Elapsed.mSec&lt;BR /&gt;Value: 43132&lt;/P&gt;&lt;P&gt;Key : Analysis.Init.CPU.mSec&lt;BR /&gt;Value: 2562&lt;/P&gt;&lt;P&gt;Key : Analysis.Init.Elapsed.mSec&lt;BR /&gt;Value: 179369&lt;/P&gt;&lt;P&gt;Key : Analysis.Memory.CommitPeak.Mb&lt;BR /&gt;Value: 138&lt;/P&gt;&lt;P&gt;Key : WER.OS.Branch&lt;BR /&gt;Value: co_release&lt;/P&gt;&lt;P&gt;Key : WER.OS.Timestamp&lt;BR /&gt;Value: 2021-06-04T16:28:00Z&lt;/P&gt;&lt;P&gt;Key : WER.OS.Version&lt;BR /&gt;Value: 10.0.22000.1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;FILE_IN_CAB: MEMORY.DMP&lt;/P&gt;&lt;P&gt;DUMP_FILE_ATTRIBUTES: 0x1000&lt;/P&gt;&lt;P&gt;BUGCHECK_CODE: d1&lt;/P&gt;&lt;P&gt;BUGCHECK_P1: 0&lt;/P&gt;&lt;P&gt;BUGCHECK_P2: 2&lt;/P&gt;&lt;P&gt;BUGCHECK_P3: 8&lt;/P&gt;&lt;P&gt;BUGCHECK_P4: 0&lt;/P&gt;&lt;P&gt;READ_ADDRESS: 0000000000000000&lt;/P&gt;&lt;P&gt;PROCESS_NAME: SangforServiceClient.exe&lt;/P&gt;&lt;P&gt;BLACKBOXBSD: 1 (!blackboxbsd)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BLACKBOXNTFS: 1 (!blackboxntfs)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BLACKBOXPNP: 1 (!blackboxpnp)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BLACKBOXWINLOGON: 1&lt;/P&gt;&lt;P&gt;TRAP_FRAME: ffff9c09067d5a20 -- (.trap 0xffff9c09067d5a20)&lt;BR /&gt;NOTE: The trap frame does not contain all registers.&lt;BR /&gt;Some register values may be zeroed or incorrect.&lt;BR /&gt;rax=ffff810646e5d0a0 rbx=0000000000000000 rcx=0000000000000000&lt;BR /&gt;rdx=0000000000000016 rsi=0000000000000000 rdi=0000000000000000&lt;BR /&gt;rip=0000000000000000 rsp=ffff9c09067d5bb8 rbp=0000000000000016&lt;BR /&gt;r8=ffff9c09067d5d80 r9=0000000000000018 r10=0000000000000016&lt;BR /&gt;r11=0000000000000001 r12=0000000000000000 r13=0000000000000000&lt;BR /&gt;r14=0000000000000000 r15=0000000000000000&lt;BR /&gt;iopl=0 nv up ei ng nz ac po cy&lt;BR /&gt;00000000`00000000 ?? ???&lt;BR /&gt;Resetting default scope&lt;/P&gt;&lt;P&gt;IP_IN_FREE_BLOCK: 0&lt;/P&gt;&lt;P&gt;FAILED_INSTRUCTION_ADDRESS:&lt;BR /&gt;+0&lt;BR /&gt;STACK_TEXT:&lt;BR /&gt;ffff9c09`067d5bb8 fffff805`4da93707 : 00000000`00000000 ffff8106`46e5d0a0 ffff8106`420ac390 ffff8106`46e5d0a0 : 0x0&lt;BR /&gt;ffff9c09`067d5bc0 fffff805`2944175e : ffff8106`46e5d010 ffff8106`3c7c3a50 ffff9c09`067d5d60 ffff8106`1fd18470 : SURE_Engine+0x3707&lt;BR /&gt;ffff9c09`067d5c60 fffff805`16b222cb : 00000000`00000000 00000000`00000000 ffff8106`1feb5000 00000000`00000000 : tdx!TdxEventReceiveMessagesTransportAddress+0x34e&lt;BR /&gt;ffff9c09`067d5e60 fffff805`16b2099d : ffff8106`4a0a9210 ffff9c09`067d6180 ffff8106`4a0a9211 ffff8106`1fd18470 : tcpip!UdpDeliverDatagrams+0x2fb&lt;BR /&gt;ffff9c09`067d6080 fffff805`16b1fd70 : ffff8106`418ef7c0 00000000`00000000 ffff8106`1fdb9c20 00000000`00000001 : tcpip!UdpReceiveDatagrams+0xc1d&lt;BR /&gt;ffff9c09`067d62e0 fffff805`16af4063 : 00000000`00000001 ffff6211`112bc056 00000000`00009411 fffff805`16ced250 : tcpip!UdpNlClientReceiveDatagrams+0x10&lt;BR /&gt;ffff9c09`067d6310 fffff805`16af3e59 : ffff8106`1feb5000 ffff9c09`00000011 ffff8106`418ef940 ffff9c09`067d6460 : tcpip!IppProcessDeliverList+0xb3&lt;BR /&gt;ffff9c09`067d6400 fffff805`16af50aa : fffff805`16ced250 ffff8106`1fe748a0 ffff8106`1feb5000 ffff8106`1feb5000 : tcpip!IppReceiveHeaderBatch+0x3a9&lt;BR /&gt;ffff9c09`067d64f0 fffff805`16b4700e : ffff8106`37fbff00 00000000`00000000 ffff9c09`067d6600 00000000`00000000 : tcpip!IppReceivePackets+0x36a&lt;BR /&gt;ffff9c09`067d6600 fffff805`16b44f78 : ffff8106`37fbff00 ffff8106`37792700 fffff805`16b535f0 ffff9c09`067d69d0 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e&lt;BR /&gt;ffff9c09`067d6700 fffff805`132a3f48 : 00000000`00000001 fffff805`16b44de0 ffff8106`47c0d080 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x198&lt;BR /&gt;ffff9c09`067d6840 fffff805`132a3ebd : fffff805`16b44de0 ffff9c09`067d69f0 ffff8106`1fcc9130 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x78&lt;BR /&gt;ffff9c09`067d68b0 fffff805`16b52e9d : 00000029`87980009 ffff8106`426ff560 ffff8106`426ff3d0 ffff8106`426ff3d0 : nt!KeExpandKernelStackAndCalloutEx+0x1d&lt;BR /&gt;ffff9c09`067d68f0 fffff805`16b5261c : 00000000`00000001 ffff9c09`067d6a50 ffff8106`37792770 ffff8106`426ff6f0 : tcpip!NetioExpandKernelStackAndCallout+0x8d&lt;BR /&gt;ffff9c09`067d6950 fffff805`16872d6c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0x5ec&lt;BR /&gt;ffff9c09`067d6c40 fffff805`168727f0 : ffff8106`37d93460 ffff8106`418ef700 ffff8106`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x15c&lt;BR /&gt;ffff9c09`067d6d20 fffff805`168a48dc : ffff8106`378e51a0 ffff8106`00000000 ffff8106`378e51a0 fffff805`13424216 : ndis!ndisMTopReceiveNetBufferLists+0x240&lt;BR /&gt;ffff9c09`067d6e00 fffff805`168a6da9 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x54&lt;BR /&gt;ffff9c09`067d6e60 fffff805`295c14c7 : 00000000`00000000 00000000`00000000 ffff8106`00000000 00000000`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0x305b9&lt;BR /&gt;ffff9c09`067d6f10 fffff805`168a4869 : 00000000`00000000 ffff8106`23e320d0 00000000`00000000 ffff9c09`067d7188 : rtf64x64+0x14c7&lt;BR /&gt;ffff9c09`067d6fb0 fffff805`168a42eb : 00000000`000060e8 ffff9c09`067d70d0 00000000`00000000 fffff805`13268ea5 : ndis!ndisCallReceiveHandler+0xb9&lt;BR /&gt;ffff9c09`067d7000 fffff805`168a8be0 : ffff9c09`067d70e8 00000000`00000000 ffff9c09`067d7140 ffff9c09`067d7190 : ndis!ndisCallNextDatapathHandler&amp;lt;2,void * __ptr64 &amp;amp; __ptr64,void (__cdecl*&amp;amp; __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 &amp;amp; __ptr64,_NET_BUFFER_LIST * __ptr64 &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64&amp;gt;+0x3f&lt;BR /&gt;ffff9c09`067d7050 fffff805`168a4963 : ffff8106`418ef7c0 fffff805`00000000 00000000`00000001 00000000`00000000 : ndis!ndisExpandDataPathStack&amp;lt;2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)&amp;gt;+0xae&lt;BR /&gt;ffff9c09`067d70f0 fffff805`168a6da9 : 00000000`00000000 ffff9c09`067d7261 00000000`00000001 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb&lt;BR /&gt;ffff9c09`067d7150 fffff805`16e912dc : ffff8106`418ef700 ffff8106`1ff5a080 ffff9c09`00000000 ffff8106`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0x305b9&lt;BR /&gt;ffff9c09`067d7200 fffff805`168a4869 : ffffc6d1`00000001 ffff8106`418ef7c0 ffff8106`378e5100 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0x14c&lt;BR /&gt;ffff9c09`067d72c0 fffff805`168a42eb : 00000000`000063f8 ffff9c09`067d73e0 00000000`00000000 fffff805`13268ea5 : ndis!ndisCallReceiveHandler+0xb9&lt;BR /&gt;ffff9c09`067d7310 fffff805`168a8be0 : ffff9c09`067d73f8 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallNextDatapathHandler&amp;lt;2,void * __ptr64 &amp;amp; __ptr64,void (__cdecl*&amp;amp; __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 &amp;amp; __ptr64,_NET_BUFFER_LIST * __ptr64 &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64&amp;gt;+0x3f&lt;BR /&gt;ffff9c09`067d7360 fffff805`168a4963 : ffff8106`418ef7c0 00000000`00000000 00000000`00000001 00000000`00000000 : ndis!ndisExpandDataPathStack&amp;lt;2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)&amp;gt;+0xae&lt;BR /&gt;ffff9c09`067d7400 fffff805`16934341 : 00000000`00000000 ffff9c09`067d74d8 ffff8106`418ef7c0 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb&lt;BR /&gt;ffff9c09`067d7460 fffff805`16935f9f : ffff9c09`067d7500 ffff9c09`067d7568 00000000`00000000 00000000`00000001 : ndis!ndisMIndicatePacketsToNetBufferLists+0x171&lt;BR /&gt;ffff9c09`067d7520 fffff805`16935c11 : ffffc6e3`00000000 ffff8106`3792f650 ffffa201`f3688a2d ffff9c09`0000000e : ndis!ndisLWM5IndicateReceive+0x37f&lt;BR /&gt;ffff9c09`067d75d0 fffff805`29b73938 : ffff8106`3792f650 ffff8106`00000000 fffff805`1695b050 00000000`00000000 : ndis!EthIndicateReceive+0x31&lt;BR /&gt;ffff9c09`067d7620 fffff805`16878030 : ffff8106`37d93a50 fffff805`1695b050 ffff8106`37d93a50 ffff8106`37d93900 : SangforVnic+0x3938&lt;BR /&gt;ffff9c09`067d7730 fffff805`13242665 : ffff8106`48c13c40 ffff9c09`067d7821 00000000`00000001 00000000`00000001 : ndis!ndisDummyIrpHandler+0x100&lt;BR /&gt;ffff9c09`067d7780 fffff805`136941b2 : ffff8106`48c13c40 00000000`00000001 ffff9c09`067d7821 ffff8106`40dd2080 : nt!IofCallDriver+0x55&lt;BR /&gt;ffff9c09`067d77c0 fffff805`136cbf28 : ffff8106`37d93900 ffff8106`48c13d58 00000000`06f2f100 ffff8106`48c13c40 : nt!IopSynchronousServiceTail+0x1d2&lt;BR /&gt;ffff9c09`067d7870 fffff805`1342f985 : ffff8106`45b7bee0 00000000`000003ec 00000000`00000001 00000000`06f2f264 : nt!NtWriteFile+0x8d8&lt;BR /&gt;ffff9c09`067d7970 00000000`772a1cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25&lt;BR /&gt;00000000`06e3f0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772a1cf3&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;STACK_COMMAND: .trap 0xffff9c09067d5a20 ; kb&lt;/P&gt;&lt;P&gt;SYMBOL_NAME: SURE_Engine+3707&lt;/P&gt;&lt;P&gt;MODULE_NAME: SURE_Engine&lt;/P&gt;&lt;P&gt;IMAGE_NAME: SURE_Engine.sys&lt;/P&gt;&lt;P&gt;BUCKET_ID_FUNC_OFFSET: 3707&lt;/P&gt;&lt;P&gt;FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_SURE_Engine!unknown_function&lt;/P&gt;&lt;P&gt;OS_VERSION: 10.0.22000.1&lt;/P&gt;&lt;P&gt;BUILDLAB_STR: co_release&lt;/P&gt;&lt;P&gt;OSPLATFORM_TYPE: x64&lt;/P&gt;&lt;P&gt;OSNAME: Windows 10&lt;/P&gt;&lt;P&gt;FAILURE_ID_HASH: {97bef196-986b-49da-ec97-da0f34c38224}&lt;/P&gt;&lt;P&gt;Followup: MachineOwner&lt;BR /&gt;---------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Nov 2022 08:20:37 GMT</pubDate>
    <dc:creator>刚子qwadsad</dc:creator>
    <dc:date>2022-11-17T08:20:37Z</dc:date>
    <item>
      <title>系统最近频繁蓝屏</title>
      <link>https://h30471.www3.hp.com/t5/you-xi-ben/xi-tong-zui-jin-pin-fan-lan-ping/m-p/1200079#M75149</link>
      <description>&lt;P&gt;系统最近频繁蓝屏&lt;/P&gt;&lt;P&gt;Windows Debugger 分析结果如下：&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Microsoft (R) Windows Debugger Version 10.0.22621.755 AMD64&lt;BR /&gt;Copyright (c) Microsoft Corporation. All rights reserved.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Loading Dump File [C:\Windows\MEMORY.DMP]&lt;BR /&gt;Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.&lt;/P&gt;&lt;P&gt;Dump completed successfully, progress percentage: 100&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;************* Path validation summary **************&lt;BR /&gt;Response Time (ms) Location&lt;BR /&gt;Deferred SRV*C:\Symbols*&lt;A href="http://msdl.microsoft.com/download/symbols" target="_blank"&gt;http://msdl.microsoft.com/download/symbols&lt;/A&gt;&lt;BR /&gt;Symbol search path is: SRV*C:\Symbols*&lt;A href="http://msdl.microsoft.com/download/symbols" target="_blank"&gt;http://msdl.microsoft.com/download/symbols&lt;/A&gt;&lt;BR /&gt;Executable search path is:&lt;BR /&gt;Windows 10 Kernel Version 22000 MP (12 procs) Free x64&lt;BR /&gt;Product: WinNt, suite: TerminalServer SingleUserTS&lt;BR /&gt;Edition build lab: 22000.1.amd64fre.co_release.210604-1628&lt;BR /&gt;Machine Name:&lt;BR /&gt;Kernel base = 0xfffff805`13000000 PsLoadedModuleList = 0xfffff805`13c29a40&lt;BR /&gt;Debug session time: Thu Nov 17 15:29:37.747 2022 (UTC + 8:00)&lt;BR /&gt;System Uptime: 0 days 22:00:23.557&lt;BR /&gt;Loading Kernel Symbols&lt;BR /&gt;...............................................................&lt;BR /&gt;................................................................&lt;BR /&gt;.................................................Page 4464da not present in the dump file. Type ".hh dbgerr004" for details&lt;BR /&gt;.....Page 12eab3 not present in the dump file. Type ".hh dbgerr004" for details&lt;BR /&gt;..........&lt;BR /&gt;.............................................&lt;BR /&gt;Loading User Symbols&lt;BR /&gt;PEB is paged out (Peb.Ldr = 00000000`002b8018). Type ".hh dbgerr001" for details&lt;BR /&gt;Loading unloaded module list&lt;BR /&gt;..................................................&lt;BR /&gt;For analysis of this file, run !analyze -v&lt;BR /&gt;1: kd&amp;gt; !analyze -v&lt;BR /&gt;*******************************************************************************&lt;BR /&gt;* *&lt;BR /&gt;* Bugcheck Analysis *&lt;BR /&gt;* *&lt;BR /&gt;*******************************************************************************&lt;/P&gt;&lt;P&gt;DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)&lt;BR /&gt;An attempt was made to access a pageable (or completely invalid) address at an&lt;BR /&gt;interrupt request level (IRQL) that is too high. This is usually&lt;BR /&gt;caused by drivers using improper addresses.&lt;BR /&gt;If kernel debugger is available get stack backtrace.&lt;BR /&gt;Arguments:&lt;BR /&gt;Arg1: 0000000000000000, memory referenced&lt;BR /&gt;Arg2: 0000000000000002, IRQL&lt;BR /&gt;Arg3: 0000000000000008, value 0 = read operation, 1 = write operation&lt;BR /&gt;Arg4: 0000000000000000, address which referenced memory&lt;/P&gt;&lt;P&gt;Debugging Details:&lt;BR /&gt;------------------&lt;/P&gt;&lt;P&gt;Unable to load image \??\C:\WINDOWS\system32\Drivers\SURE_Engine.sys, Win32 error 0n2&lt;BR /&gt;Unable to load image \SystemRoot\system32\DRIVERS\rtf64x64.sys, Win32 error 0n2&lt;BR /&gt;Unable to load image \SystemRoot\System32\drivers\SangforVnic.sys, Win32 error 0n2&lt;/P&gt;&lt;P&gt;KEY_VALUES_STRING: 1&lt;/P&gt;&lt;P&gt;Key : Analysis.CPU.mSec&lt;BR /&gt;Value: 9155&lt;/P&gt;&lt;P&gt;Key : Analysis.DebugAnalysisManager&lt;BR /&gt;Value: Create&lt;/P&gt;&lt;P&gt;Key : Analysis.Elapsed.mSec&lt;BR /&gt;Value: 43132&lt;/P&gt;&lt;P&gt;Key : Analysis.Init.CPU.mSec&lt;BR /&gt;Value: 2562&lt;/P&gt;&lt;P&gt;Key : Analysis.Init.Elapsed.mSec&lt;BR /&gt;Value: 179369&lt;/P&gt;&lt;P&gt;Key : Analysis.Memory.CommitPeak.Mb&lt;BR /&gt;Value: 138&lt;/P&gt;&lt;P&gt;Key : WER.OS.Branch&lt;BR /&gt;Value: co_release&lt;/P&gt;&lt;P&gt;Key : WER.OS.Timestamp&lt;BR /&gt;Value: 2021-06-04T16:28:00Z&lt;/P&gt;&lt;P&gt;Key : WER.OS.Version&lt;BR /&gt;Value: 10.0.22000.1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;FILE_IN_CAB: MEMORY.DMP&lt;/P&gt;&lt;P&gt;DUMP_FILE_ATTRIBUTES: 0x1000&lt;/P&gt;&lt;P&gt;BUGCHECK_CODE: d1&lt;/P&gt;&lt;P&gt;BUGCHECK_P1: 0&lt;/P&gt;&lt;P&gt;BUGCHECK_P2: 2&lt;/P&gt;&lt;P&gt;BUGCHECK_P3: 8&lt;/P&gt;&lt;P&gt;BUGCHECK_P4: 0&lt;/P&gt;&lt;P&gt;READ_ADDRESS: 0000000000000000&lt;/P&gt;&lt;P&gt;PROCESS_NAME: SangforServiceClient.exe&lt;/P&gt;&lt;P&gt;BLACKBOXBSD: 1 (!blackboxbsd)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BLACKBOXNTFS: 1 (!blackboxntfs)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BLACKBOXPNP: 1 (!blackboxpnp)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BLACKBOXWINLOGON: 1&lt;/P&gt;&lt;P&gt;TRAP_FRAME: ffff9c09067d5a20 -- (.trap 0xffff9c09067d5a20)&lt;BR /&gt;NOTE: The trap frame does not contain all registers.&lt;BR /&gt;Some register values may be zeroed or incorrect.&lt;BR /&gt;rax=ffff810646e5d0a0 rbx=0000000000000000 rcx=0000000000000000&lt;BR /&gt;rdx=0000000000000016 rsi=0000000000000000 rdi=0000000000000000&lt;BR /&gt;rip=0000000000000000 rsp=ffff9c09067d5bb8 rbp=0000000000000016&lt;BR /&gt;r8=ffff9c09067d5d80 r9=0000000000000018 r10=0000000000000016&lt;BR /&gt;r11=0000000000000001 r12=0000000000000000 r13=0000000000000000&lt;BR /&gt;r14=0000000000000000 r15=0000000000000000&lt;BR /&gt;iopl=0 nv up ei ng nz ac po cy&lt;BR /&gt;00000000`00000000 ?? ???&lt;BR /&gt;Resetting default scope&lt;/P&gt;&lt;P&gt;IP_IN_FREE_BLOCK: 0&lt;/P&gt;&lt;P&gt;FAILED_INSTRUCTION_ADDRESS:&lt;BR /&gt;+0&lt;BR /&gt;STACK_TEXT:&lt;BR /&gt;ffff9c09`067d5bb8 fffff805`4da93707 : 00000000`00000000 ffff8106`46e5d0a0 ffff8106`420ac390 ffff8106`46e5d0a0 : 0x0&lt;BR /&gt;ffff9c09`067d5bc0 fffff805`2944175e : ffff8106`46e5d010 ffff8106`3c7c3a50 ffff9c09`067d5d60 ffff8106`1fd18470 : SURE_Engine+0x3707&lt;BR /&gt;ffff9c09`067d5c60 fffff805`16b222cb : 00000000`00000000 00000000`00000000 ffff8106`1feb5000 00000000`00000000 : tdx!TdxEventReceiveMessagesTransportAddress+0x34e&lt;BR /&gt;ffff9c09`067d5e60 fffff805`16b2099d : ffff8106`4a0a9210 ffff9c09`067d6180 ffff8106`4a0a9211 ffff8106`1fd18470 : tcpip!UdpDeliverDatagrams+0x2fb&lt;BR /&gt;ffff9c09`067d6080 fffff805`16b1fd70 : ffff8106`418ef7c0 00000000`00000000 ffff8106`1fdb9c20 00000000`00000001 : tcpip!UdpReceiveDatagrams+0xc1d&lt;BR /&gt;ffff9c09`067d62e0 fffff805`16af4063 : 00000000`00000001 ffff6211`112bc056 00000000`00009411 fffff805`16ced250 : tcpip!UdpNlClientReceiveDatagrams+0x10&lt;BR /&gt;ffff9c09`067d6310 fffff805`16af3e59 : ffff8106`1feb5000 ffff9c09`00000011 ffff8106`418ef940 ffff9c09`067d6460 : tcpip!IppProcessDeliverList+0xb3&lt;BR /&gt;ffff9c09`067d6400 fffff805`16af50aa : fffff805`16ced250 ffff8106`1fe748a0 ffff8106`1feb5000 ffff8106`1feb5000 : tcpip!IppReceiveHeaderBatch+0x3a9&lt;BR /&gt;ffff9c09`067d64f0 fffff805`16b4700e : ffff8106`37fbff00 00000000`00000000 ffff9c09`067d6600 00000000`00000000 : tcpip!IppReceivePackets+0x36a&lt;BR /&gt;ffff9c09`067d6600 fffff805`16b44f78 : ffff8106`37fbff00 ffff8106`37792700 fffff805`16b535f0 ffff9c09`067d69d0 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x29e&lt;BR /&gt;ffff9c09`067d6700 fffff805`132a3f48 : 00000000`00000001 fffff805`16b44de0 ffff8106`47c0d080 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x198&lt;BR /&gt;ffff9c09`067d6840 fffff805`132a3ebd : fffff805`16b44de0 ffff9c09`067d69f0 ffff8106`1fcc9130 00000000`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x78&lt;BR /&gt;ffff9c09`067d68b0 fffff805`16b52e9d : 00000029`87980009 ffff8106`426ff560 ffff8106`426ff3d0 ffff8106`426ff3d0 : nt!KeExpandKernelStackAndCalloutEx+0x1d&lt;BR /&gt;ffff9c09`067d68f0 fffff805`16b5261c : 00000000`00000001 ffff9c09`067d6a50 ffff8106`37792770 ffff8106`426ff6f0 : tcpip!NetioExpandKernelStackAndCallout+0x8d&lt;BR /&gt;ffff9c09`067d6950 fffff805`16872d6c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0x5ec&lt;BR /&gt;ffff9c09`067d6c40 fffff805`168727f0 : ffff8106`37d93460 ffff8106`418ef700 ffff8106`00000000 00000000`00000001 : ndis!ndisMIndicateNetBufferListsToOpen+0x15c&lt;BR /&gt;ffff9c09`067d6d20 fffff805`168a48dc : ffff8106`378e51a0 ffff8106`00000000 ffff8106`378e51a0 fffff805`13424216 : ndis!ndisMTopReceiveNetBufferLists+0x240&lt;BR /&gt;ffff9c09`067d6e00 fffff805`168a6da9 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0x54&lt;BR /&gt;ffff9c09`067d6e60 fffff805`295c14c7 : 00000000`00000000 00000000`00000000 ffff8106`00000000 00000000`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0x305b9&lt;BR /&gt;ffff9c09`067d6f10 fffff805`168a4869 : 00000000`00000000 ffff8106`23e320d0 00000000`00000000 ffff9c09`067d7188 : rtf64x64+0x14c7&lt;BR /&gt;ffff9c09`067d6fb0 fffff805`168a42eb : 00000000`000060e8 ffff9c09`067d70d0 00000000`00000000 fffff805`13268ea5 : ndis!ndisCallReceiveHandler+0xb9&lt;BR /&gt;ffff9c09`067d7000 fffff805`168a8be0 : ffff9c09`067d70e8 00000000`00000000 ffff9c09`067d7140 ffff9c09`067d7190 : ndis!ndisCallNextDatapathHandler&amp;lt;2,void * __ptr64 &amp;amp; __ptr64,void (__cdecl*&amp;amp; __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 &amp;amp; __ptr64,_NET_BUFFER_LIST * __ptr64 &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64&amp;gt;+0x3f&lt;BR /&gt;ffff9c09`067d7050 fffff805`168a4963 : ffff8106`418ef7c0 fffff805`00000000 00000000`00000001 00000000`00000000 : ndis!ndisExpandDataPathStack&amp;lt;2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)&amp;gt;+0xae&lt;BR /&gt;ffff9c09`067d70f0 fffff805`168a6da9 : 00000000`00000000 ffff9c09`067d7261 00000000`00000001 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb&lt;BR /&gt;ffff9c09`067d7150 fffff805`16e912dc : ffff8106`418ef700 ffff8106`1ff5a080 ffff9c09`00000000 ffff8106`00000001 : ndis!NdisFIndicateReceiveNetBufferLists+0x305b9&lt;BR /&gt;ffff9c09`067d7200 fffff805`168a4869 : ffffc6d1`00000001 ffff8106`418ef7c0 ffff8106`378e5100 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0x14c&lt;BR /&gt;ffff9c09`067d72c0 fffff805`168a42eb : 00000000`000063f8 ffff9c09`067d73e0 00000000`00000000 fffff805`13268ea5 : ndis!ndisCallReceiveHandler+0xb9&lt;BR /&gt;ffff9c09`067d7310 fffff805`168a8be0 : ffff9c09`067d73f8 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisCallNextDatapathHandler&amp;lt;2,void * __ptr64 &amp;amp; __ptr64,void (__cdecl*&amp;amp; __ptr64)(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long),void * __ptr64 &amp;amp; __ptr64,_NET_BUFFER_LIST * __ptr64 &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64,unsigned long &amp;amp; __ptr64&amp;gt;+0x3f&lt;BR /&gt;ffff9c09`067d7360 fffff805`168a4963 : ffff8106`418ef7c0 00000000`00000000 00000000`00000001 00000000`00000000 : ndis!ndisExpandDataPathStack&amp;lt;2,void __cdecl(void * __ptr64,_NET_BUFFER_LIST * __ptr64,unsigned long,unsigned long,unsigned long)&amp;gt;+0xae&lt;BR /&gt;ffff9c09`067d7400 fffff805`16934341 : 00000000`00000000 ffff9c09`067d74d8 ffff8106`418ef7c0 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler+0xdb&lt;BR /&gt;ffff9c09`067d7460 fffff805`16935f9f : ffff9c09`067d7500 ffff9c09`067d7568 00000000`00000000 00000000`00000001 : ndis!ndisMIndicatePacketsToNetBufferLists+0x171&lt;BR /&gt;ffff9c09`067d7520 fffff805`16935c11 : ffffc6e3`00000000 ffff8106`3792f650 ffffa201`f3688a2d ffff9c09`0000000e : ndis!ndisLWM5IndicateReceive+0x37f&lt;BR /&gt;ffff9c09`067d75d0 fffff805`29b73938 : ffff8106`3792f650 ffff8106`00000000 fffff805`1695b050 00000000`00000000 : ndis!EthIndicateReceive+0x31&lt;BR /&gt;ffff9c09`067d7620 fffff805`16878030 : ffff8106`37d93a50 fffff805`1695b050 ffff8106`37d93a50 ffff8106`37d93900 : SangforVnic+0x3938&lt;BR /&gt;ffff9c09`067d7730 fffff805`13242665 : ffff8106`48c13c40 ffff9c09`067d7821 00000000`00000001 00000000`00000001 : ndis!ndisDummyIrpHandler+0x100&lt;BR /&gt;ffff9c09`067d7780 fffff805`136941b2 : ffff8106`48c13c40 00000000`00000001 ffff9c09`067d7821 ffff8106`40dd2080 : nt!IofCallDriver+0x55&lt;BR /&gt;ffff9c09`067d77c0 fffff805`136cbf28 : ffff8106`37d93900 ffff8106`48c13d58 00000000`06f2f100 ffff8106`48c13c40 : nt!IopSynchronousServiceTail+0x1d2&lt;BR /&gt;ffff9c09`067d7870 fffff805`1342f985 : ffff8106`45b7bee0 00000000`000003ec 00000000`00000001 00000000`06f2f264 : nt!NtWriteFile+0x8d8&lt;BR /&gt;ffff9c09`067d7970 00000000`772a1cf3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25&lt;BR /&gt;00000000`06e3f0c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772a1cf3&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;STACK_COMMAND: .trap 0xffff9c09067d5a20 ; kb&lt;/P&gt;&lt;P&gt;SYMBOL_NAME: SURE_Engine+3707&lt;/P&gt;&lt;P&gt;MODULE_NAME: SURE_Engine&lt;/P&gt;&lt;P&gt;IMAGE_NAME: SURE_Engine.sys&lt;/P&gt;&lt;P&gt;BUCKET_ID_FUNC_OFFSET: 3707&lt;/P&gt;&lt;P&gt;FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_SURE_Engine!unknown_function&lt;/P&gt;&lt;P&gt;OS_VERSION: 10.0.22000.1&lt;/P&gt;&lt;P&gt;BUILDLAB_STR: co_release&lt;/P&gt;&lt;P&gt;OSPLATFORM_TYPE: x64&lt;/P&gt;&lt;P&gt;OSNAME: Windows 10&lt;/P&gt;&lt;P&gt;FAILURE_ID_HASH: {97bef196-986b-49da-ec97-da0f34c38224}&lt;/P&gt;&lt;P&gt;Followup: MachineOwner&lt;BR /&gt;---------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 08:20:37 GMT</pubDate>
      <guid>https://h30471.www3.hp.com/t5/you-xi-ben/xi-tong-zui-jin-pin-fan-lan-ping/m-p/1200079#M75149</guid>
      <dc:creator>刚子qwadsad</dc:creator>
      <dc:date>2022-11-17T08:20:37Z</dc:date>
    </item>
    <item>
      <title>回复： 系统最近频繁蓝屏</title>
      <link>https://h30471.www3.hp.com/t5/you-xi-ben/xi-tong-zui-jin-pin-fan-lan-ping/m-p/1200123#M75150</link>
      <description>&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI lang="zh-CN" style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN&gt;系统桌面按Win+R打开运行，输入&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 'HP Simplified Hans Light'; font-size: 11.0pt;" lang="zh-CN"&gt;powershell&lt;/P&gt;
&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN&gt;按键盘&lt;/SPAN&gt;&lt;SPAN&gt;ctrl+shift+&lt;/SPAN&gt;&lt;SPAN&gt;回车&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 'HP Simplified Hans Light'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;或者按键盘&lt;/SPAN&gt;&lt;SPAN&gt;ctrl+shift&lt;/SPAN&gt;&lt;SPAN&gt;，鼠标点确定&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 'HP Simplified Hans Light'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;命令行打开显示PS C:\Windows\system32&amp;gt;则是成功以管理员运行打开了&lt;/SPAN&gt;&lt;SPAN&gt;powershell&lt;/SPAN&gt;&lt;SPAN&gt;，否则以上重试&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI lang="zh-CN" style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN&gt;在命令行窗口中复制粘贴下面命令回车&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 'HP Simplified Hans Light'; font-size: 11.0pt;"&gt;&lt;SPAN&gt;(Get-Item (gwmi win32_systemdriver | ? caption -match 'realtek').pathname).versioninfo;&lt;/SPAN&gt;(Get-Item &lt;SPAN&gt;C:\WINDOWS\system32\Drivers\SURE_Engine.sys&lt;/SPAN&gt;).versioninfo&lt;/P&gt;
&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN&gt;命令行窗口的内容文字可以鼠标全选之后回车完成复制。&lt;/SPAN&gt;&lt;SPAN&gt;或者点窗口左上角，从菜单选择全选，然后回车完成复制&lt;/SPAN&gt;&lt;SPAN&gt;。复制成功后粘贴回复出来。&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 17 Nov 2022 12:19:26 GMT</pubDate>
      <guid>https://h30471.www3.hp.com/t5/you-xi-ben/xi-tong-zui-jin-pin-fan-lan-ping/m-p/1200123#M75150</guid>
      <dc:creator>y2kim</dc:creator>
      <dc:date>2022-11-17T12:19:26Z</dc:date>
    </item>
  </channel>
</rss>

