以下是的dmp文件 求解答Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\120822-10187-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22621 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff802`6de00000 PsLoadedModuleList = 0xfffff802`6ea12fe0 Debug session time: Thu Dec 8 15:52:41.301 2022 (UTC 8:00) System Uptime: 0 days 0:00:01.990 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ...................................... Loading User Symbols Loading unloaded module list .. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff802`6e2288f0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffab81`a327bdd0=000000000000000a 6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00007fffffff0000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8026e24ab6f, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1453 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 1574 Key : Analysis.IO.Other.Mb Value: 7 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 23 Key : Analysis.Init.CPU.mSec Value: 109 Key : Analysis.Init.Elapsed.mSec Value: 46128 Key : Analysis.Memory.CommitPeak.Mb Value: 86 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 120822-10187-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 7fffffff0000 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8026e24ab6f READ_ADDRESS: fffff8026eb1c468: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 00007fffffff0000 BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: afafafafafafafaf -- (.trap 0xafafafafafafafaf) Unable to read trap frame at afafafaf`afafafaf STACK_TEXT: ffffab81`a327bdc8 fffff802`6e23dfa9 : 00000000`0000000a 00007fff`ffff0000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffab81`a327bdd0 fffff802`6e239634 : 0001be18`0002a350 0002a238`0001bfaa 0001c08a`0001bfb0 0001c090`0002550c : nt!KiBugCheckDispatch 0x69 ffffab81`a327bf10 fffff802`6e24ab6f : ffff8687`cfdae548 ffff968b`2f572720 ffff8687`cfdae518 fffff802`6ded3c64 : nt!KiPageFault 0x474 ffffab81`a327c0a0 fffff802`6e00c135 : ffff8687`cfdae548 ffff8687`cfdae2d8 00000000`00000001 00000000`00000000 : nt!RtlpxVirtualUnwind 0x23cb0f ffffab81`a327c160 fffff802`6e010087 : ffffffff`ffffffff ffff8687`cfdae380 ffff8687`cfdae380 ffffab81`a327c900 : nt!RtlDispatchException 0x215 ffffab81`a327c8d0 fffff802`6e229ab2 : afafafaf`afafafaf afafafaf`afafafaf afafafaf`afafafaf afafafaf`afafafaf : nt!KiDispatchException 0x317 ffffab81`a327cfb0 fffff802`6e229a80 : fffff802`6e23e0f5 ffff968b`00000000 00000000`00000000 ffff968b`2f60e970 : nt!KxExceptionDispatchOnExceptionStack 0x12 ffff8687`cfdae198 fffff802`6e23e0f5 : ffff968b`00000000 00000000`00000000 ffff968b`2f60e970 ffff968b`2f2f9c40 : nt!KiExceptionDispatchOnExceptionStackContinue ffff8687`cfdae1a0 fffff802`6e239183 : ffff968b`2f60ea20 00000000`00000000 00000000`00000000 ffff968b`295de980 : nt!KiExceptionDispatch 0x135 ffff8687`cfdae380 fffff802`6e0a234d : fffff802`6e0d28ff 00000000`00000000 00000001`00060001 ffff8687`cfdae530 : nt!KiGeneralProtectionFault 0x343 ffff8687`cfdae518 ffff968b`2f572720 : 00000000`00000001 ffff968b`2953d040 ffff968b`295de980 ffff968b`295de900 : nt!MiUnlockVadCore 0x29 ffff8687`cfdae548 00000000`00000001 : ffff968b`2953d040 ffff968b`295de980 ffff968b`295de900 fffff802`00000002 : 0xffff968b`2f572720 ffff8687`cfdae550 ffff968b`2953d040 : ffff968b`295de980 ffff968b`295de900 fffff802`00000002 ffff968b`28e030d0 : 0x1 ffff8687`cfdae558 ffff968b`295de980 : ffff968b`295de900 fffff802`00000002 ffff968b`28e030d0 ffff968b`28e030d0 : 0xffff968b`2953d040 ffff8687`cfdae560 ffff968b`295de900 : fffff802`00000002 ffff968b`28e030d0 ffff968b`28e030d0 ffff968b`2f555000 : 0xffff968b`295de980 ffff8687`cfdae568 fffff802`00000002 : ffff968b`28e030d0 ffff968b`28e030d0 ffff968b`2f555000 00000000`00000000 : 0xffff968b`295de900 ffff8687`cfdae570 ffff968b`28e030d0 : ffff968b`28e030d0 ffff968b`2f555000 00000000`00000000 ffff8687`cfdaea40 : 0xfffff802`00000002 ffff8687`cfdae578 ffff968b`28e030d0 : ffff968b`2f555000 00000000`00000000 ffff8687`cfdaea40 00000000`00000000 : 0xffff968b`28e030d0 ffff8687`cfdae580 ffff968b`2f555000 : 00000000`00000000 ffff8687`cfdaea40 00000000`00000000 ffff968b`28e023b9 : 0xffff968b`28e030d0 ffff8687`cfdae588 00000000`00000000 : ffff8687`cfdaea40 00000000`00000000 ffff968b`28e023b9 ffff968b`2953d040 : 0xffff968b`2f555000 SYMBOL_NAME: nt!RtlpxVirtualUnwind 23cb0f MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.22621.900 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 23cb0f FAILURE_BUCKET_ID: AV_nt!RtlpxVirtualUnwind OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {90caf8d4-a034-a257-3599-d8f696fd9681} Followup: MachineOwner ---------

欢迎访问本站!。没有看到具体错误的驱动等,若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。


目前尝试了禁用Microsoft服务以外的所有启动项,但问题并没有得到解决,还是会蓝屏,并且这种情况只会出现在关机然后开机这种情况下,只是重启的话就不会蓝屏。以下是最新的dmp文件链接:https://pan.baidu.com/s/1uNwxNWax9V4nTZyWUcXSYw提取码:um3y求助此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


感谢,确保没有超频,降压等,xmp也关闭的。同时更新一下bios,覆盖安装一下芯片组驱动,显卡驱动,硬盘相关的驱动(例如英特尔快速存储技术驱动),请勿使用第三方的驱动安装程序。若是刚刚已经更新了这些驱动,可以忽略。然后如下图关闭一下快速启动,看下是否恢复正常。


在提问之前这个方法我在网上也找到了,关闭后还是会蓝屏此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


感谢,其中有显示快速存储有关的错误。建议暂时先关闭。然后更新和覆盖安装一下上述的驱动。若是仍然会蓝屏,可以再次分享一下之后的dmp文件,我将查看下之后的情况。


新的dmp文件如下链接:https://pan.baidu.com/s/1NWLRkcUGtq4UB7Bz2N9oVA提取码:5zjw此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


感谢,显示amd相关的异常。确保没有超频等,xmp也是关闭的。确保更新了bios,覆盖安装了芯片组驱动,显卡驱动,硬盘相关的驱动。同时安装一下amd的其他驱动,请勿使用第三方的驱动安装程序。然后更换一个电源计划(模式)。保持快速启动是关闭的。若是仍然有该异常,若是有独显和核显,建议打开设备管理器,禁用amd显卡,看下是否恢复正常,以便判断是否和该显卡有关。


点赞(95) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部