请大神帮忙分析下什么问题,怎么解决,谢谢
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.

Primary dump contents written successfully


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff801`0ea00000 PsLoadedModuleList = 0xfffff801`0f629790
Debug session time: Wed Oct 12 23:42:44.738 2022 (UTC + 8:00)
System Uptime: 0 days 0:47:04.404
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols

Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`0ee1ac40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffbc81`5a7f6d60=000000000000000a
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00007fffffff0000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8010eea6dce, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1656

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 1799

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 1171

    Key  : Analysis.Init.Elapsed.mSec
    Value: 11423

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.KiBugCheckData
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : Dump.Attributes.AsUlong
    Value: 1000

    Key  : Dump.Attributes.DiagDataWrittenToHeader
    Value: 1

    Key  : Dump.Attributes.ErrorCode
    Value: 0

    Key  : Dump.Attributes.LastLine
    Value: Dump completed successfully.

    Key  : Dump.Attributes.ProgressPercentage
    Value: 100

    Key  : WER.OS.Branch
    Value: co_release

    Key  : WER.OS.Timestamp
    Value: 2021-06-04T16:28:00Z

    Key  : WER.OS.Version
    Value: 10.0.22000.1


FILE_IN_CAB:  MEMORY.DMP

DUMP_FILE_ATTRIBUTES: 0x1000

BUGCHECK_CODE:  a

BUGCHECK_P1: 7fffffff0000

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8010eea6dce

READ_ADDRESS:  00007fffffff0000

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

PROCESS_NAME:  System

TRAP_FRAME:  4800001b11e82024 -- (.trap 0x4800001b11e82024)
Unable to read trap frame at 4800001b`11e82024

STACK_TEXT: 
ffffbc81`5a7f6d58 fffff801`0ee2d8a9     : 00000000`0000000a 00007fff`ffff0000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbc81`5a7f6d60 fffff801`0ee29a00     : ffffa303`08b2d730 ffffa303`08b2d730 ffffbc81`0000000a ffffcd8f`00000001 : nt!KiBugCheckDispatch+0x69
ffffbc81`5a7f6ea0 fffff801`0eea6dce     : ffffa303`0c00ed38 ffffcd8f`54802120 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x440
ffffbc81`5a7f7030 fffff801`0ecf84c9     : ffffa303`0c00ed38 ffffbc81`5a7f71e0 00000000`21601c84 00000000`00000000 : nt!RtlpxVirtualUnwind+0x1ada3e
ffffbc81`5a7f70e0 fffff801`0ecf77d6     : ffffbc81`5a7f76e0 00000000`21601c84 ffffa303`0c00ed38 ffffbc81`5a7f71e0 : nt!RtlVirtualUnwind2+0x89
ffffbc81`5a7f7170 fffff801`0ecfb801     : ffffffff`ffffffff ffffa303`0c00eba0 ffffa303`0c00eba0 ffffbc81`5a7f7900 : nt!RtlDispatchException+0x1f6
ffffbc81`5a7f78d0 fffff801`0ee1bb52     : ffffffe0`814118e8 54892824`44894400 4800001b`11e82024 c3ff0006`e1a20d8b : nt!KiDispatchException+0x1b1
ffffbc81`5a7f7fb0 fffff801`0ee1bb20     : fffff801`0ee2d9c7 fffff801`0f653740 fffff801`0ec6d731 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa303`0c00e9b8 fffff801`0ee2d9c7     : fffff801`0f653740 fffff801`0ec6d731 00000000`00000000 fffff801`13a18000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa303`0c00e9c0 fffff801`0ee2958f     : 00000000`00000000 00000000`00000000 fffff801`13a17ec4 00000000`00000000 : nt!KiExceptionDispatch+0x107
ffffa303`0c00eba0 ffffcd8f`54817f37     : ffffcd8f`54802120 00000000`21601c84 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x30f
ffffa303`0c00ed30 ffffcd8f`54802120     : 00000000`21601c84 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffcd8f`54817f37
ffffa303`0c00ed38 00000000`21601c84     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffcd8f`54802120
ffffa303`0c00ed40 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x21601c84


SYMBOL_NAME:  nt!RtlpxVirtualUnwind+1ada3e

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  1ada3e

FAILURE_BUCKET_ID:  AV_nt!RtlpxVirtualUnwind

OS_VERSION:  10.0.22000.1

BUILDLAB_STR:  co_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {90caf8d4-a034-a257-3599-d8f696fd9681}

Followup:     MachineOwner
---------

4: kd> lmvm nt
Browse full module list
start             end                 module name
fffff801`0ea00000 fffff801`0fa47000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\666A1F1CDEE669FCCBC9135C820012201\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\8530C8D31047000\ntkrnlmp.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        8530C8D3 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00B36AA7
    ImageSize:        01047000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    Information from resource tables:欢迎访问本站!。没有看到具体错误的驱动等。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。若是48小时内没有新的,我将无法再收到提醒。
欢迎访问本站!。没有看到具体错误的驱动等。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。若是48小时内没有新的,我将无法再收到提醒。

点赞(29) 打赏

评论列表 共有 0 条评论

暂无评论

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部