Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff801`31000000 PsLoadedModuleList = 0xfffff801`31c2a390 Debug session time: Tue Aug 30 13:36:35.508 2022 (UTC 8:00) System Uptime: 0 days 1:46:30.289 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ... Loading User Symbols Loading unloaded module list ........... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`313f5a80 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffcb08`94afca70=000000000000000a 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffffbefc01640b8, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80131203939, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4030 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 25089 Key : Analysis.Init.CPU.mSec Value: 1030 Key : Analysis.Init.Elapsed.mSec Value: 579121 Key : Analysis.Memory.CommitPeak.Mb Value: 134 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.KiBugCheckData Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: MEMORY.DMP BUGCHECK_CODE: a BUGCHECK_P1: fffffbefc01640b8 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff80131203939 READ_ADDRESS: fffffbefc01640b8 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System TRAP_FRAME: ffffcb0894afcbb0 -- (.trap 0xffffcb0894afcbb0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000001 rdx=fffffbfdfeff7000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80131203939 rsp=ffffcb0894afcd40 rbp=000000000000001c r8=ffffef7e2fb0d900 r9=fffffbefc0000000 r10=fffffbfdfeff77f8 r11=fffffb8000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiReplenishBitMap 0xf9: fffff801`31203939 4b8b0cf1 mov rcx,qword ptr [r9 r14*8] ds:fffffbef`c0000000=???????????????? Resetting default scope STACK_TEXT: ffffcb08`94afca68 fffff801`31407a69 : 00000000`0000000a fffffbef`c01640b8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffcb08`94afca70 fffff801`31403d69 : 00000000`0006b17d ffffffff`ffffffff 00000000`00000000 fffff801`31c4edc0 : nt!KiBugCheckDispatch 0x69 ffffcb08`94afcbb0 fffff801`31203939 : 00000000`00000006 00000000`0004adea 00000000`00000000 ffffdf80`6b17d000 : nt!KiPageFault 0x469 ffffcb08`94afcd40 fffff801`3120378d : ffffdf80`6a608730 00000000`00000000 00000000`00000002 00000000`00000000 : nt!MiReplenishBitMap 0xf9 ffffcb08`94afceb0 fffff801`31274840 : 0006b093`0004adea ffffb982`00000001 00000000`00000000 ffffb982`ae2c8920 : nt!MiEmptyPteBins 0x11d ffffcb08`94afcf10 fffff801`31274b84 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffb982`a05ec920 : nt!MiReservePtes 0x4a0 ffffcb08`94afcfe0 fffff801`33637ce2 : 00000000`00000584 000001ff`00000000 00000000`00000584 ffffcb08`94afd188 : nt!MmMapLockedPagesSpecifyCache 0xd4 ffffcb08`94afd040 fffff801`33711a90 : ffffcb08`94afd180 ffffcb08`94afd13c ffffcb08`94afd188 ffffcb08`94afd140 : NETIO!RtlCopyMdlToMdlIndirect 0x242 ffffcb08`94afd0c0 fffff801`337121f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpSatisfyReceiveRequests 0x100 ffffcb08`94afd2c0 fffff801`33711f25 : ffffb982`abd28940 ffffb982`abd28940 ffffcb08`94afd571 ffffcb08`94afd570 : tcpip!TcpDeliverDataToClient 0xe4 ffffcb08`94afd440 fffff801`3374ebf0 : ffffb982`ae2c8920 ffffcb08`94afd580 ffffb982`ae2c8920 ffffb982`ae2c8ad8 : tcpip!TcpDeliverReceive 0xb5 ffffcb08`94afd530 fffff801`3371e7f8 : 00000000`00001000 00000000`00001000 ffffb982`abd28940 ffffb982`abd28940 : tcpip!TcpInspectReceive 0xd4 ffffcb08`94afd5b0 fffff801`337154ee : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTcbCarefulDatagram 0x40a8 ffffcb08`94afda10 fffff801`3371470f : 00000000`00000028 ffffb982`9afad3c0 00000000`00000007 ffffb982`9afad3c0 : tcpip!TcpTcbReceive 0x30e ffffcb08`94afdc60 fffff801`33713798 : 00000000`1508b07d 00000000`00000010 00000000`c6f53cb7 fffff801`338f9598 : tcpip!TcpMatchReceive 0x51f ffffcb08`94afdf10 fffff801`33779142 : ffffb982`9a6c76b0 00000000`0000bb01 00000000`00000007 ffffb982`9afad301 : tcpip!TcpReceive 0x358 ffffcb08`94afe000 fffff801`3373a241 : ffffb982`a98808a0 00000000`00000000 00000000`00000000 ffffb982`9a5dce80 : tcpip!TcpNlClientReceiveDatagrams 0x22 ffffcb08`94afe040 fffff801`33736b8b : 00000000`00000002 ffffcb08`94afe100 00000000`00000000 ffffb982`9afad000 : tcpip!IppProcessDeliverList 0xc1 ffffcb08`94afe120 fffff801`3373610f : fffff801`338f9230 ffffb982`9af9b8e0 ffffb982`9afad000 00000000`00000000 : tcpip!IppReceiveHeaderBatch 0x21b ffffcb08`94afe220 fffff801`337334ac : ffffb982`b0f27c50 ffffb982`a987db50 00000000`00000001 00000000`00000000 : tcpip!IppFlcReceivePacketsCore 0x32f ffffcb08`94afe340 fffff801`3377f770 : ffffb982`a98808a0 00000000`00000000 ffffcb08`94afe411 00000000`00000000 : tcpip!IpFlcReceivePackets 0xc ffffcb08`94afe370 fffff801`3377ed6c : 00000000`00000001 ffffb982`af243800 fffff801`33772140 ffffcb08`94afe74c : tcpip!FlpReceiveNonPreValidatedNetBufferListChain 0x270 ffffcb08`94afe470 fffff801`31354488 : ffffb982`9aff4ea0 00000000`00000002 ffffb982`a00c4040 ffffcb08`94afe768 : tcpip!FlReceiveNetBufferListChainCalloutRoutine 0x17c ffffcb08`94afe5c0 fffff801`313543fd : fffff801`3377ebf0 ffffcb08`94afe768 ffffb982`9a779e40 ffffcb08`94afe770 : nt!KeExpandKernelStackAndCalloutInternal 0x78 ffffcb08`94afe630 fffff801`33771cdd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx 0x1d ffffcb08`94afe670 fffff801`337713bd : 00000000`00000000 ffffcb08`94afe7d0 ffffb982`af2438e0 00000000`00000000 : tcpip!NetioExpandKernelStackAndCallout 0x8d ffffcb08`94afe6d0 fffff801`334b1eb1 : 00000000`00000001 ffffb982`b3a95a81 00000000`00000020 00000000`00000000 : tcpip!FlReceiveNetBufferListChain 0x46d ffffcb08`94afe980 fffff801`334b1ccb : ffffb982`a0b0ac00 ffff0008`350a0001 ffffcb08`00000000 ffffb982`00000004 : ndis!ndisMIndicateNetBufferListsToOpen 0x141 ffffcb08`94afea60 fffff801`334edd4f : ffffb982`b07a71a0 ffffb982`a04af401 ffffb982`a987db50 ffffcb08`94afec58 : ndis!ndisMTopReceiveNetBufferLists 0x22b ffffcb08`94afeae0 fffff801`334f3681 : 00000000`00000000 ffffb982`aa0f1a20 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler 0x4b ffffcb08`94afebb0 fffff801`334b804e : ffffb982`aa0f1a20 00000000`00000001 ffffb982`00000000 00000000`00000004 : ndis!ndisFilterIndicateReceiveNetBufferLists 0x3c211 ffffcb08`94afec60 fffff801`494cd86c : ffffb982`ac071010 00000000`00000001 ffffb982`a987db50 ffffb982`ac0720e8 : ndis!NdisFIndicateReceiveNetBufferLists 0x6e ffffcb08`94afeca0 fffff801`334b7ef1 : ffffb982`aa0f1a20 fffff801`494cd5a0 ffffb982`97fbd020 00000000`00000280 : nwifi!Pt6Receive 0x2cc ffffcb08`94afed00 fffff801`334c83be : ffffb982`a00c4040 ffffcb08`94afeed1 ffffcb08`94afeeb0 00000000`00000000 : ndis!ndisCallReceiveHandler 0x61 ffffcb08`94afed50 fffff801`31354488 : ffffcb08`94afeed1 ffffb982`aa0f1a20 ffffcb08`00000000 ffffb982`abb69310 : ndis!ndisDataPathExpandStackCallback 0x3e ffffcb08`94afeda0 fffff801`313543fd : fffff801`334c8380 ffffcb08`94afeeb0 ffffb982`ae005bb0 fffff801`312ec5ca : nt!KeExpandKernelStackAndCalloutInternal 0x78 ffffcb08`94afee10 fffff801`334edf40 : fffff801`460b1168 ffffb982`a78a1da0 00000000`00000004 fffff801`313f7ae5 : nt!KeExpandKernelStackAndCalloutEx 0x1d ffffcb08`94afee50 fffff801`334f3681 : 00000000`00000000 ffffb982`aa8efc70 00000000`00000000 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler 0x23c ffffcb08`94afef20 fffff801`334b804e : ffffb982`aa8efc70 ffffb982`ae005bb0 fffff801`00000000 ffffb982`00000004 : ndis!ndisFilterIndicateReceiveNetBufferLists 0x3c211 ffffcb08`94afefd0 fffff801`46a85a8d : ffffb982`b0842d00 ffffb982`b088e260 00000000`00000000 00000000`00000004 : ndis!NdisFIndicateReceiveNetBufferLists 0x6e ffffcb08`94aff010 fffff801`334b7ef1 : ffffb982`aa8efc70 fffff801`46a859b0 ffffb982`b088e260 fffff801`339f12bb : vwififlt!FilterReceiveNetBufferLists 0xdd ffffcb08`94aff070 fffff801`334c83be : ffffb982`a00c4040 ffffcb08`94aff241 ffffcb08`94aff220 00000000`00000000 : ndis!ndisCallReceiveHandler 0x61 ffffcb08`94aff0c0 fffff801`31354488 : ffffcb08`94aff241 ffffb982`aa8efc70 fffff801`00000000 ffffb982`9e21cb50 : ndis!ndisDataPathExpandStackCallback 0x3e ffffcb08`94aff110 fffff801`313543fd : fffff801`334c8380 ffffcb08`94aff220 ffffb982`ae005bb0 fffff801`33638d88 : nt!KeExpandKernelStackAndCalloutInternal 0x78 ffffcb08`94aff180 fffff801`334edf40 : ffffb982`ab41ac20 ffffffff`fffffffe ffffb982`9a6e3130 fffff801`313f7ae5 : nt!KeExpandKernelStackAndCalloutEx 0x1d ffffcb08`94aff1c0 fffff801`334f3681 : 00000000`00000000 ffffb982`abf38c70 00000000`00000000 ffffb982`ae005bb0 : ndis!ndisInvokeNextReceiveHandler 0x23c ffffcb08`94aff290 fffff801`334b804e : ffffb982`abf38c70 ffffb982`abf38c70 fffff801`00000000 00000000`00000004 : ndis!ndisFilterIndicateReceiveNetBufferLists 0x3c211 ffffcb08`94aff340 fffff801`33a7131c : ffffb982`ab41abf0 00000000`00000004 00000000`00000000 00000000`00000001 : ndis!NdisFIndicateReceiveNetBufferLists 0x6e ffffcb08`94aff380 fffff801`334b7ef1 : ffffb982`00000004 ffffb982`ae005bb0 00000000`00000000 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists 0x17c ffffcb08`94aff440 fffff801`334c83be : ffffb982`a00c4040 ffffcb08`94aff611 ffffcb08`94aff5f0 00000000`00000000 : ndis!ndisCallReceiveHandler 0x61 ffffcb08`94aff490 fffff801`31354488 : ffffcb08`94aff611 ffffb982`abf38c70 00000000`00000000 00000000`00000002 : ndis!ndisDataPathExpandStackCallback 0x3e ffffcb08`94aff4e0 fffff801`313543fd : fffff801`334c8380 ffffcb08`94aff5f0 ffffb982`ae005bb0 565eb480`7134bb01 : nt!KeExpandKernelStackAndCalloutInternal 0x78 ffffcb08`94aff550 fffff801`334edf40 : ffffb982`b0be3ab0 ffffcb08`94aff6a1 00000000`00000000 ffffcb08`94aff740 : nt!KeExpandKernelStackAndCalloutEx 0x1d ffffcb08`94aff590 fffff801`334b4a94 : 00000000`00063d92 00000000`00000000 ffffb982`b07a71a0 00000000`00000000 : ndis!ndisInvokeNextReceiveHandler 0x23c ffffcb08`94aff660 fffff801`476b2d98 : 00000000`00000000 ffffb982`b0be3a20 ffffcb08`94aff750 ffffb982`ae005bb0 : ndis!NdisMIndicateReceiveNetBufferLists 0x104 ffffcb08`94aff6f0 fffff801`47677167 : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : wdiwifi!CPort::IndicateFrames 0x2d8 ffffcb08`94aff790 fffff801`4765bb67 : ffffb982`ae005bb0 ffffcb08`94aff8b9 ffffb982`ab6b8bb0 ffffb982`ba505824 : wdiwifi!CAdapter::IndicateFrames 0x137 ffffcb08`94aff800 fffff801`4765c2a6 : ffffb982`ab6b8bb0 00000000`00000003 ffffb982`ab6b8bb0 ffffcb08`94aff9c0 : wdiwifi!CRxMgr::RxProcessAndIndicateNblChain 0x7f7 ffffcb08`94aff920 fffff801`47658142 : ffffb982`ae005bb0 ffffcb08`94affae0 ffffb982`abe13000 fffff801`47bc9000 : wdiwifi!CRxMgr::RxInOrderDataInd 0x35a ffffcb08`94aff9c0 fffff801`4781d00d : fffff801`476580b0 fffff801`47c80000 00000000`00000005 fffff801`47bc885b : wdiwifi!AdapterRxInorderDataInd 0x92 ffffcb08`94affa10 fffff801`4781b3d9 : ffffb982`abe13000 00000000`0000001f ffffb982`b4670005 fffff801`47bc4938 : rtwlanu!wdi_NotifyPeerData 0x3a5 ffffcb08`94affa80 fffff801`478be1fd : ffffb982`00000000 ffffb982`b3e00000 ffffb982`b467af50 ffffb982`b467bf24 : rtwlanu!WDI_NotifyDataInQueue 0x9d ffffcb08`94affae0 fffff801`47bc433e : ffffb982`abe146d8 fffff801`478be130 ffffb982`b3a99dd8 ffffb982`b3a99da0 : rtwlanu!RxNotifyThreadCallback 0xcd ffffcb08`94affb20 fffff801`31317e25 : ffffb982`a00c4040 00000000`00000080 fffff801`47bc42b0 ffffb982`b467aea0 : rtwlanu!Ndis6ThreadCallback 0x8e ffffcb08`94affb50 fffff801`313fd0d8 : fffff801`2bde7180 ffffb982`a00c4040 fffff801`31317dd0 ffffdf80`6a600180 : nt!PspSystemThreadStartup 0x55 ffffcb08`94affba0 00000000`00000000 : ffffcb08`94b00000 ffffcb08`94af9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread 0x28 SYMBOL_NAME: NETIO!RtlCopyMdlToMdlIndirect 242 MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 242 FAILURE_BUCKET_ID: AV_NETIO!RtlCopyMdlToMdlIndirect OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {d357dedb-61ef-0759-396f-911f270bccf3} Followup: MachineOwner ---------
您好,A&K,前来提供帮助。您的dump文件显示了与网络相关的驱动程序造成了问题。这可能是由于网络适配器损坏或者驱动程序故障,建议先尝试卸载网卡驱动程序,前往设备制造商网站下载并安装最新版本驱动程序。
