Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\091422-10171-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff806`59000000 PsLoadedModuleList = 0xfffff806`59c2a250 Debug session time: Wed Sep 14 10:38:08.260 2022 (UTC 8:00) System Uptime: 0 days 0:23:45.993 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ....................... Loading User Symbols Loading unloaded module list ..... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`593f88c0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffa880`37c3e6a0=000000000000000a 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000040082, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff806593f89f6, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1921 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 1954 Key : Analysis.Init.CPU.mSec Value: 796 Key : Analysis.Init.Elapsed.mSec Value: 184205 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 091422-10171-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 40082 BUGCHECK_P2: ff BUGCHECK_P3: 0 BUGCHECK_P4: fffff806593f89f6 READ_ADDRESS: fffff80659cfb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000040082 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: StartMenuExper TRAP_FRAME: ffffa88037c3e7e0 -- (.trap 0xffffa88037c3e7e0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000040082 rbx=0000000000000000 rcx=ffff9780a657e340 rdx=00007ffa6954cfc4 rsi=0000000000000000 rdi=0000000000000000 rip=fffff806593f89f6 rsp=ffffa88037c3e978 rbp=ffffa88037c3eb80 r8=0000000000000002 r9=0000000000000000 r10=ffffa88037c3eb80 r11=ffffdf84c52460c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di ng nz na po nc nt!KeContextToKframes 0x6: fffff806`593f89f6 0000 add byte ptr [rax],al ds:00000000`00040082=?? Resetting default scope MISALIGNED_IP: nt!KeContextToKframes 6 fffff806`593f89f6 0000 add byte ptr [rax],al STACK_TEXT: ffffa880`37c3e698 fffff806`5940a869 : 00000000`0000000a 00000000`00040082 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx ffffa880`37c3e6a0 fffff806`59406b69 : ffff9780`a6ad9100 ffff554a`8429646c 00000000`00000001 ffffdf84`c52461c0 : nt!KiBugCheckDispatch 0x69 ffffa880`37c3e7e0 fffff806`593f89f6 : fffff806`593f88ef 000f8067`bcbbbd01 ffffdf84`c5246200 ffffa880`37c3e9e0 : nt!KiPageFault 0x469 ffffa880`37c3e978 000f8067`bcbbbd01 : ffffdf84`c5246200 ffffa880`37c3e9e0 ffffdf84`00000001 ffffdf84`c41e0000 : nt!KeContextToKframes 0x6 ffffa880`37c3e988 ffffdf84`c5246200 : ffffa880`37c3e9e0 ffffdf84`00000001 ffffdf84`c41e0000 00000003`51f6d161 : 0x000f8067`bcbbbd01 ffffa880`37c3e990 ffffa880`37c3e9e0 : ffffdf84`00000001 ffffdf84`c41e0000 00000003`51f6d161 00000000`00040286 : 0xffffdf84`c5246200 ffffa880`37c3e998 ffffdf84`00000001 : ffffdf84`c41e0000 00000003`51f6d161 00000000`00040286 fffff806`5940a869 : 0xffffa880`37c3e9e0 ffffa880`37c3e9a0 ffffdf84`c41e0000 : 00000003`51f6d161 00000000`00040286 fffff806`5940a869 00000000`0000004a : 0xffffdf84`00000001 ffffa880`37c3e9a8 00000003`51f6d161 : 00000000`00040286 fffff806`5940a869 00000000`0000004a 00007ffa`6954cfc4 : 0xffffdf84`c41e0000 ffffa880`37c3e9b0 00000000`00040286 : fffff806`5940a869 00000000`0000004a 00007ffa`6954cfc4 00000000`00000002 : 0x00000003`51f6d161 ffffa880`37c3e9b8 fffff806`5940a869 : 00000000`0000004a 00007ffa`6954cfc4 00000000`00000002 00000000`00000000 : 0x40286 ffffa880`37c3e9c0 fffff806`5940a733 : 00000000`00000000 00000000`0000000e ffffa880`37c3eb18 ffffffff`fffe7960 : nt!KiBugCheckDispatch 0x69 ffffa880`37c3eb00 00007ffa`6954cfc4 : 00007ffa`66da1ace 0000007e`9d1ff8b9 00007ffa`69550d74 00000000`00000000 : nt!KiSystemServiceExitPico 0x1fe 0000007e`9d1ff738 00007ffa`66da1ace : 0000007e`9d1ff8b9 00007ffa`69550d74 00000000`00000000 00000212`0899c0d0 : 0x00007ffa`6954cfc4 0000007e`9d1ff740 0000007e`9d1ff8b9 : 00007ffa`69550d74 00000000`00000000 00000212`0899c0d0 00000000`00000102 : 0x00007ffa`66da1ace 0000007e`9d1ff748 00007ffa`69550d74 : 00000000`00000000 00000212`0899c0d0 00000000`00000102 ffffffff`fffe7960 : 0x0000007e`9d1ff8b9 0000007e`9d1ff750 00000000`00000000 : 00000212`0899c0d0 00000000`00000102 ffffffff`fffe7960 00000000`00000048 : 0x00007ffa`69550d74 SYMBOL_NAME: nt!KeContextToKframes 6 IMAGE_VERSION: 10.0.19041.1889 STACK_COMMAND: .cxr; .ecxr ; kb MODULE_NAME: AuthenticAMD IMAGE_NAME: AuthenticAMD.sys FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2} Followup: MachineOwner ---------

Hi,I'mDyari.Thanksforreachingout.Iwillbehappytoassistyouinthisregard.KindlycheckC:\Windows\MinidumpandcopyavailableminidumpfilestothedesktopthensharethemviaOneDriveorGoogleDriveinordertobeanalyzedandindicatewhichfileiscausingthecrash.Regards,


已共享https://1drv.ms/u/s!Ahp_nRUjVsvzgQgXB3B1VX5YPWGA?e=FwAJbX此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


嗨于斌,感谢分享minidump文件。minidump文件指示硬件问题。为确定问题是否与硬件相关,请使用免费实用程序MemTest86测试RAM,然后运行完整的8次扫描以测试您的RAM是否存在物理错误:https://www-tenforums-com.translate.goog/tutori.如果您愿意这样做,请取出所有系统内存条,检查它们是否有任何明显的缺陷,然后将它们重新插入插槽。确保它们正确安装在插槽中。如果您安装了多根系统内存并且您怀疑其中一根有故障,则可以尝试的一件事是一次仅使用一根内存模块重现该问题。这将帮助您隔离故障模块。如果上述步骤后问题仍然存在,请启用驱动程序验证程序并让计算机崩溃3次,然后禁用它并共享新创建的minidump文件:https://www-tenforums-com.translate.goog/tutori.请随时询问您是否需要进一步的帮助。


点赞(89) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部