打英雄联盟没啥问题,打瓦会遇到同样的问题
dmp文件如下
************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds************* Waiting for Debugger Extensions Gallery to Initialize **************>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 46Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\AN\Desktop\111325-10765-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path validation summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 26100 MP (16 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSKernel base = 0xfffff804`c4e00000 PsLoadedModuleList = 0xfffff804`c5cf5030Debug session time: Thu Nov 13 12:27:09.137 2025 (UTC + 8:00)System Uptime: 0 days 0:09:24.984Loading Kernel Symbols..Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.Run !sym noisy before .reload to track down problems loading symbols..................................................................................................................................................................................................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 000000fc`8e387018). Type ".hh dbgerr001" for detailsLoading unloaded module list...............For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff804`c52f6880 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd301`3958dcb0=000000000000018b15: kd> !analyze -vLoading Kernel Symbols..Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.Run !sym noisy before .reload to track down problems loading symbols..................................................................................................................................................................................................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 000000fc`8e387018). Type ".hh dbgerr001" for detailsLoading unloaded module list...............******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************SECURE_KERNEL_ERROR (18b)The secure kernel has encountered a fatal error.Arguments:Arg1: 00000000000000c0Arg2: ffffffffc0000001Arg3: 4766634d000002f6Arg4: 00000000f0200000Debugging Details:------------------*** WARNING: Unable to verify timestamp for ACE-SSC-DRV64.sysKEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1546 Key : Analysis.Elapsed.mSec Value: 10015 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 1250 Key : Analysis.Init.Elapsed.mSec Value: 56219 Key : Analysis.Memory.CommitPeak.Mb Value: 121 Key : Analysis.Version.DbgEng Value: 10.0.29457.1000 Key : Analysis.Version.Description Value: 10.2506.23.01 amd64fre Key : Analysis.Version.Ext Value: 1.2506.23.1 Key : Bugcheck.Code.LegacyAPI Value: 0x18b Key : Bugcheck.Code.TargetModel Value: 0x18b Key : Dump.Attributes.AsUlong Value: 0x1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: SECURE_KERNEL_ERROR_c0_securekernel!SkhalpPciAccessDeviceInternal+0xf5_IMAGE_securekernelerror Key : Failure.Hash Value: {14aac6cd-1371-34a0-f300-e4f2eb9d5d93} Key : Hypervisor.Enlightenments.ValueHex Value: 0x7497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 38408431 Key : Hypervisor.Flags.ValueHex Value: 0x24a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 0x3f7 Key : WER.System.BIOSRevision Value: 5.16.0.0BUGCHECK_CODE: 18bBUGCHECK_P1: c0BUGCHECK_P2: ffffffffc0000001BUGCHECK_P3: 4766634d000002f6BUGCHECK_P4: f0200000FILE_IN_CAB: 111325-10765-01.dmpDUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage DumpFAULTING_THREAD: ffffe58adfdc1080BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1 (!blackboxwinlogon)CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: SGuard64.exeSTACK_TEXT: ffffd301`3958dca8 fffff804`c5384dfa : 00000000`0000018b 00000000`000000c0 ffffffff`c0000001 4766634d`000002f6 : nt!KeBugCheckExffffd301`3958dcb0 fffff804`c53b1711 : ffffe58a`bf6a9fb0 fffff804`c53c4136 ffffd301`3957f340 ffffd301`3958dd30 : nt!HvlSkCrashdumpCallbackRoutine+0x8affffd301`3958dcf0 fffff804`c54aabc2 : 00000000`00000100 ffffd301`3958def0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0xb1ffffd301`3958dd30 fffff804`c54aa92e : 00000000`00000000 00000000`00000100 ffffd301`3958def0 00000000`00000000 : nt!KxNmiInterrupt+0x82ffffd301`3958de70 fffff804`5464001c : fffff804`c549a24b 00000000`00000000 ffffe382`a1ad0e20 00000000`00000000 : nt!KiNmiInterrupt+0x26effffe382`a1ad0bb8 fffff804`c549a24b : 00000000`00000000 ffffe382`a1ad0e20 00000000`00000000 00000000`00000000 : 0xfffff804`5464001cffffe382`a1ad0bc0 fffff804`c513e5b7 : fffff804`c5d8da80 ffffe58a`00000000 00000000`00000000 00000000`00000000 : nt!HvlSwitchToVsmVtl1+0xabffffe382`a1ad0d00 fffff804`c513e1be : ffffe382`a1ad11d0 00000000`00000001 ffffe382`a1ad0ec0 fffff804`c50987bf : nt!VslpEnterIumSecureMode+0x137ffffe382`a1ad0dc0 fffff804`c513d21a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpPCIConfig+0x16effffe382`a1ad0f00 fffff804`57475f98 : 00000000`00400200 00000000`00000000 00000000`00000000 ffffe382`a1ad1490 : nt!HaliPciInterfaceWriteConfig+0x2affffe382`a1ad0f50 fffff804`57531619 : fffff804`57576c40 00000000`00000000 ffffe58a`c1be9300 ffffe58a`c1be9000 : ACPI!AcpiWrapperWriteConfig+0x28ffffe382`a1ad0fa0 fffff804`57531377 : 00000000`80000000 ffffe58a`bf78b250 00000000`00000002 00000000`00001e48 : pci!PciExternalWriteDeviceConfig+0x1d9ffffe382`a1ad1030 fffff804`575b1f5d : ffffe58a`dbe2a480 00000000`00000000 ffffe58a`dbe2a3b0 ffffe58a`c1fe51b0 : pci!PciWriteDeviceSpace+0x57ffffe382`a1ad1090 fffff804`5753db36 : ffffe58a`00000000 00000000`00000000 00000075`00000011 fffff804`00000000 : pci!PciDevice_WriteConfig+0x8dffffe382`a1ad10f0 fffff804`c51ab6fd : 00000000`000000b0 ffffe382`a1ad1290 00000000`00000000 ffffe382`a1ad11d0 : pci!PciDispatchPnpPower+0x276ffffe382`a1ad1150 fffff804`9604f24b : 00000000`00000fc0 00000000`00001e48 ffffe58a`dbe2a480 fffff804`575414f0 : nt!IofCallDriver+0xcdffffe382`a1ad1190 00000000`00000fc0 : 00000000`00001e48 ffffe58a`dbe2a480 fffff804`575414f0 00000000`00000000 : ACE_SSC_DRV64+0x3f24bffffe382`a1ad1198 00000000`00001e48 : ffffe58a`dbe2a480 fffff804`575414f0 00000000`00000000 ffffe382`a1ad11d0 : 0xfc0ffffe382`a1ad11a0 ffffe58a`dbe2a480 : fffff804`575414f0 00000000`00000000 ffffe382`a1ad11d0 ffffe382`a1ad1380 : 0x1e48ffffe382`a1ad11a8 fffff804`575414f0 : 00000000`00000000 ffffe382`a1ad11d0 ffffe382`a1ad1380 fffff804`c549a24b : 0xffffe58a`dbe2a480ffffe382`a1ad11b0 ffffe382`a1ad11d8 : ffffe382`a1ad11d8 fffff804`c513be80 ffff2018`bf78f250 00000000`80000000 : pci!PciCfgUpdateAccessLog+0xa0ffffe382`a1ad11e0 ffffe382`a1ad11d8 : fffff804`c513be80 ffff2018`bf78f250 00000000`80000000 00000000`00000000 : 0xffffe382`a1ad11d8ffffe382`a1ad11e8 fffff804`c513be80 : ffff2018`bf78f250 00000000`80000000 00000000`00000000 00000000`00000000 : 0xffffe382`a1ad11d8ffffe382`a1ad11f0 00000000`00000002 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!PopFxIdleComponent+0x18ffffe382`a1ad1250 00000000`00000000 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2MODULE_NAME: securekernelerrorIMAGE_NAME: securekernelerrorSTACK_COMMAND: .process /r /p 0xffffe58ade3ac080; .thread 0xffffe58adfdc1080 ; kbFAILURE_BUCKET_ID: SECURE_KERNEL_ERROR_c0_securekernel!SkhalpPciAccessDeviceInternal+0xf5_IMAGE_securekernelerrorOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {14aac6cd-1371-34a0-f300-e4f2eb9d5d93}Followup: MachineOwner---------
dmp文件如下
************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds************* Waiting for Debugger Extensions Gallery to Initialize **************>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 46Microsoft (R) Windows Debugger Version 10.0.29457.1000 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\AN\Desktop\111325-10765-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path validation summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 26100 MP (16 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSKernel base = 0xfffff804`c4e00000 PsLoadedModuleList = 0xfffff804`c5cf5030Debug session time: Thu Nov 13 12:27:09.137 2025 (UTC + 8:00)System Uptime: 0 days 0:09:24.984Loading Kernel Symbols..Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.Run !sym noisy before .reload to track down problems loading symbols..................................................................................................................................................................................................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 000000fc`8e387018). Type ".hh dbgerr001" for detailsLoading unloaded module list...............For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff804`c52f6880 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd301`3958dcb0=000000000000018b15: kd> !analyze -vLoading Kernel Symbols..Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.Run !sym noisy before .reload to track down problems loading symbols..................................................................................................................................................................................................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 000000fc`8e387018). Type ".hh dbgerr001" for detailsLoading unloaded module list...............******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************SECURE_KERNEL_ERROR (18b)The secure kernel has encountered a fatal error.Arguments:Arg1: 00000000000000c0Arg2: ffffffffc0000001Arg3: 4766634d000002f6Arg4: 00000000f0200000Debugging Details:------------------*** WARNING: Unable to verify timestamp for ACE-SSC-DRV64.sysKEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1546 Key : Analysis.Elapsed.mSec Value: 10015 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 1250 Key : Analysis.Init.Elapsed.mSec Value: 56219 Key : Analysis.Memory.CommitPeak.Mb Value: 121 Key : Analysis.Version.DbgEng Value: 10.0.29457.1000 Key : Analysis.Version.Description Value: 10.2506.23.01 amd64fre Key : Analysis.Version.Ext Value: 1.2506.23.1 Key : Bugcheck.Code.LegacyAPI Value: 0x18b Key : Bugcheck.Code.TargetModel Value: 0x18b Key : Dump.Attributes.AsUlong Value: 0x1808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: SECURE_KERNEL_ERROR_c0_securekernel!SkhalpPciAccessDeviceInternal+0xf5_IMAGE_securekernelerror Key : Failure.Hash Value: {14aac6cd-1371-34a0-f300-e4f2eb9d5d93} Key : Hypervisor.Enlightenments.ValueHex Value: 0x7497cf94 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 1 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 0 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 0 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 38408431 Key : Hypervisor.Flags.ValueHex Value: 0x24a10ef Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 0x3f7 Key : WER.System.BIOSRevision Value: 5.16.0.0BUGCHECK_CODE: 18bBUGCHECK_P1: c0BUGCHECK_P2: ffffffffc0000001BUGCHECK_P3: 4766634d000002f6BUGCHECK_P4: f0200000FILE_IN_CAB: 111325-10765-01.dmpDUMP_FILE_ATTRIBUTES: 0x1808 Kernel Generated Triage DumpFAULTING_THREAD: ffffe58adfdc1080BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1 (!blackboxwinlogon)CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: SGuard64.exeSTACK_TEXT: ffffd301`3958dca8 fffff804`c5384dfa : 00000000`0000018b 00000000`000000c0 ffffffff`c0000001 4766634d`000002f6 : nt!KeBugCheckExffffd301`3958dcb0 fffff804`c53b1711 : ffffe58a`bf6a9fb0 fffff804`c53c4136 ffffd301`3957f340 ffffd301`3958dd30 : nt!HvlSkCrashdumpCallbackRoutine+0x8affffd301`3958dcf0 fffff804`c54aabc2 : 00000000`00000100 ffffd301`3958def0 00000000`00000000 00000000`00000000 : nt!KiProcessNMI+0xb1ffffd301`3958dd30 fffff804`c54aa92e : 00000000`00000000 00000000`00000100 ffffd301`3958def0 00000000`00000000 : nt!KxNmiInterrupt+0x82ffffd301`3958de70 fffff804`5464001c : fffff804`c549a24b 00000000`00000000 ffffe382`a1ad0e20 00000000`00000000 : nt!KiNmiInterrupt+0x26effffe382`a1ad0bb8 fffff804`c549a24b : 00000000`00000000 ffffe382`a1ad0e20 00000000`00000000 00000000`00000000 : 0xfffff804`5464001cffffe382`a1ad0bc0 fffff804`c513e5b7 : fffff804`c5d8da80 ffffe58a`00000000 00000000`00000000 00000000`00000000 : nt!HvlSwitchToVsmVtl1+0xabffffe382`a1ad0d00 fffff804`c513e1be : ffffe382`a1ad11d0 00000000`00000001 ffffe382`a1ad0ec0 fffff804`c50987bf : nt!VslpEnterIumSecureMode+0x137ffffe382`a1ad0dc0 fffff804`c513d21a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpPCIConfig+0x16effffe382`a1ad0f00 fffff804`57475f98 : 00000000`00400200 00000000`00000000 00000000`00000000 ffffe382`a1ad1490 : nt!HaliPciInterfaceWriteConfig+0x2affffe382`a1ad0f50 fffff804`57531619 : fffff804`57576c40 00000000`00000000 ffffe58a`c1be9300 ffffe58a`c1be9000 : ACPI!AcpiWrapperWriteConfig+0x28ffffe382`a1ad0fa0 fffff804`57531377 : 00000000`80000000 ffffe58a`bf78b250 00000000`00000002 00000000`00001e48 : pci!PciExternalWriteDeviceConfig+0x1d9ffffe382`a1ad1030 fffff804`575b1f5d : ffffe58a`dbe2a480 00000000`00000000 ffffe58a`dbe2a3b0 ffffe58a`c1fe51b0 : pci!PciWriteDeviceSpace+0x57ffffe382`a1ad1090 fffff804`5753db36 : ffffe58a`00000000 00000000`00000000 00000075`00000011 fffff804`00000000 : pci!PciDevice_WriteConfig+0x8dffffe382`a1ad10f0 fffff804`c51ab6fd : 00000000`000000b0 ffffe382`a1ad1290 00000000`00000000 ffffe382`a1ad11d0 : pci!PciDispatchPnpPower+0x276ffffe382`a1ad1150 fffff804`9604f24b : 00000000`00000fc0 00000000`00001e48 ffffe58a`dbe2a480 fffff804`575414f0 : nt!IofCallDriver+0xcdffffe382`a1ad1190 00000000`00000fc0 : 00000000`00001e48 ffffe58a`dbe2a480 fffff804`575414f0 00000000`00000000 : ACE_SSC_DRV64+0x3f24bffffe382`a1ad1198 00000000`00001e48 : ffffe58a`dbe2a480 fffff804`575414f0 00000000`00000000 ffffe382`a1ad11d0 : 0xfc0ffffe382`a1ad11a0 ffffe58a`dbe2a480 : fffff804`575414f0 00000000`00000000 ffffe382`a1ad11d0 ffffe382`a1ad1380 : 0x1e48ffffe382`a1ad11a8 fffff804`575414f0 : 00000000`00000000 ffffe382`a1ad11d0 ffffe382`a1ad1380 fffff804`c549a24b : 0xffffe58a`dbe2a480ffffe382`a1ad11b0 ffffe382`a1ad11d8 : ffffe382`a1ad11d8 fffff804`c513be80 ffff2018`bf78f250 00000000`80000000 : pci!PciCfgUpdateAccessLog+0xa0ffffe382`a1ad11e0 ffffe382`a1ad11d8 : fffff804`c513be80 ffff2018`bf78f250 00000000`80000000 00000000`00000000 : 0xffffe382`a1ad11d8ffffe382`a1ad11e8 fffff804`c513be80 : ffff2018`bf78f250 00000000`80000000 00000000`00000000 00000000`00000000 : 0xffffe382`a1ad11d8ffffe382`a1ad11f0 00000000`00000002 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!PopFxIdleComponent+0x18ffffe382`a1ad1250 00000000`00000000 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2MODULE_NAME: securekernelerrorIMAGE_NAME: securekernelerrorSTACK_COMMAND: .process /r /p 0xffffe58ade3ac080; .thread 0xffffe58adfdc1080 ; kbFAILURE_BUCKET_ID: SECURE_KERNEL_ERROR_c0_securekernel!SkhalpPciAccessDeviceInternal+0xf5_IMAGE_securekernelerrorOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {14aac6cd-1371-34a0-f300-e4f2eb9d5d93}Followup: MachineOwner---------
这是事件查看器









