Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\HaoKe G\Desktop\052622-7609-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff801`58000000 PsLoadedModuleList = 0xfffff801`58c2a250 Debug session time: Thu May 26 22:01:23.487 2022 (UTC 8:00) System Uptime: 0 days 0:20:19.238 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ............................................................. Loading User Symbols Loading unloaded module list ...... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`583dda20 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:fffff005`0487ea40=000000000000000a 6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000069fcf9271850, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff801582a889e, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nfwfp.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1733 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4272 Key : Analysis.Init.CPU.mSec Value: 468 Key : Analysis.Init.Elapsed.mSec Value: 23214 Key : Analysis.Memory.CommitPeak.Mb Value: 91 FILE_IN_CAB: 052622-7609-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 69fcf9271850 BUGCHECK_P2: 2 BUGCHECK_P3: 1 BUGCHECK_P4: fffff801582a889e WRITE_ADDRESS: fffff80158cfa388: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 000069fcf9271850 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffff0050487eb80 -- (.trap 0xfffff0050487eb80) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=fffff0050487ed90 rdx=000069fcf9271850 rsi=0000000000000000 rdi=0000000000000000 rip=fffff801582a889e rsp=fffff0050487ed10 rbp=ffffcd08ae2fd140 r8=0000000000000000 r9=ffffcd08b6a027c0 r10=0000000000000002 r11=fffff0050487ed40 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!KxWaitForLockOwnerShip 0xe: fffff801`582a889e 48890a mov qword ptr [rdx],rcx ds:000069fc`f9271850=???????????????? Resetting default scope STACK_TEXT: fffff005`0487ea38 fffff801`583ef929 : 00000000`0000000a 000069fc`f9271850 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff005`0487ea40 fffff801`583ebc29 : 00000000`00000480 00000000`00000014 fffff005`04880000 fffff005`04879000 : nt!KiBugCheckDispatch 0x69 fffff005`0487eb80 fffff801`582a889e : ffffcd08`aaec53c0 00000000`00000000 ffffcd08`b6a027c0 00000000`00000000 : nt!KiPageFault 0x469 fffff005`0487ed10 fffff801`582a887f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip 0xe fffff005`0487ed40 fffff801`6ff59d68 : ffffcd08`b6a02c10 ffffcd08`b54446d0 00000000`00000000 ffffcd08`b2297240 : nt!KeAcquireInStackQueuedSpinLock 0x7f fffff005`0487ed70 ffffcd08`b6a02c10 : ffffcd08`b54446d0 00000000`00000000 ffffcd08`b2297240 00000000`00000000 : nfwfp 0x9d68 fffff005`0487ed78 ffffcd08`b54446d0 : 00000000`00000000 ffffcd08`b2297240 00000000`00000000 ffffcd08`b6a02fc1 : 0xffffcd08`b6a02c10 fffff005`0487ed80 00000000`00000000 : ffffcd08`b2297240 00000000`00000000 ffffcd08`b6a02fc1 00000000`c0000002 : 0xffffcd08`b54446d0 SYMBOL_NAME: nfwfp 9d68 MODULE_NAME: nfwfp IMAGE_NAME: nfwfp.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 9d68 FAILURE_BUCKET_ID: AV_nfwfp!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {df2cffb3-9f55-64bc-fdcb-0a56b34b70ce} Followup: MachineOwner ---------

HiIamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.


点赞(17) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部