Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\Minidump\092522-17562-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff802`5e400000 PsLoadedModuleList = 0xfffff802`5f02a290 Debug session time: Sun Sep 25 23:16:25.838 2022 (UTC 8:00) System Uptime: 1 days 10:01:39.968 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ........................................ Loading User Symbols Loading unloaded module list ....................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`5e7f8fa0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffff8089`d031f590=000000000000000a 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000085943, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8025e65bd4e, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1640 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 3499 Key : Analysis.Init.CPU.mSec Value: 780 Key : Analysis.Init.Elapsed.mSec Value: 110333 Key : Analysis.Memory.CommitPeak.Mb Value: 96 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 092522-17562-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 85943 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff8025e65bd4e WRITE_ADDRESS: fffff8025f0fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000085943 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: ffff8089d031f6d0 -- (.trap 0xffff8089d031f6d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000000000000043d rbx=0000000000000000 rcx=ffff8089d031f8c8 rdx=0000000000085943 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8025e65bd4e rsp=ffff8089d031f860 rbp=ffff8089d031f949 r8=fffff30000007000 r9=00000000000000d9 r10=00000000000843d0 r11=ffff8089d031f860 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KxWaitForLockOwnerShip 0xe: fffff802`5e65bd4e 48890a mov qword ptr [rdx],rcx ds:00000000`00085943=???????????????? Resetting default scope STACK_TEXT: ffff8089`d031f588 fffff802`5e80af69 : 00000000`0000000a 00000000`00085943 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx ffff8089`d031f590 fffff802`5e807269 : 00000000`00000000 00000000`00000000 ffff8885`a7e34700 00000000`00000000 : nt!KiBugCheckDispatch 0x69 ffff8089`d031f6d0 fffff802`5e65bd4e : 00000000`00000001 00000000`00000002 00000000`000843d9 fffff802`5f050b80 : nt!KiPageFault 0x469 ffff8089`d031f860 fffff802`5e6c0719 : fffff802`5f050b80 00000000`00000000 ffff8089`d031f949 fffff000`018cb8b0 : nt!KxWaitForLockOwnerShip 0xe ffff8089`d031f890 fffff802`5e95f398 : 00000000`000843d9 fffff802`5f050b80 00000000`00000001 fffff802`000000d9 : nt!MiInsertPageInFreeOrZeroedList 0x839 ffff8089`d031f9b0 fffff802`5ecd9758 : ffff8885`00000000 fffff802`5f050b80 ffff8885`c3b6a480 00000000`00000300 : nt!MiScrubNode 0x29c ffff8089`d031fa40 fffff802`5e652b65 : ffff8885`a6393040 ffff8885`8e6ae010 ffff8885`8e6ae010 ffff8885`00000000 : nt!MiScrubMemoryWorker 0x28 ffff8089`d031fa70 fffff802`5e671d25 : ffff8885`a6393040 00000000`00000080 ffff8885`8e6c20c0 00000000`00000000 : nt!ExpWorkerThread 0x105 ffff8089`d031fb10 fffff802`5e800628 : fffff802`5c74c180 ffff8885`a6393040 fffff802`5e671cd0 00000000`00000000 : nt!PspSystemThreadStartup 0x55 ffff8089`d031fb60 00000000`00000000 : ffff8089`d0320000 ffff8089`d0319000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread 0x28 SYMBOL_NAME: nt!KxWaitForLockOwnerShip e MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.2006 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: e FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93} Followup: MachineOwner ---------

Microsoft(R)WindowsDebuggerVersion10.0.25136.1001AMD64Copyright(c)MicrosoftCorporation.Allrightsreserved.LoadingDumpFile


HiIamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.


点赞(18) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部