请大神帮忙分析下什么问题,怎么解决,谢谢 Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Primary dump contents written successfully ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22000 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 22000.1.amd64fre.co_release.210604-1628 Machine Name: Kernel base = 0xfffff801`0ea00000 PsLoadedModuleList = 0xfffff801`0f629790 Debug session time: Wed Oct 12 23:42:44.738 2022 (UTC 8:00) System Uptime: 0 days 0:47:04.404 Loading Kernel Symbols ............................................................... ................................................................ ....................................................... Loading User Symbols Loading unloaded module list ........ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`0ee1ac40 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffbc81`5a7f6d60=000000000000000a 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00007fffffff0000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8010eea6dce, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1656 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 1799 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 1171 Key : Analysis.Init.Elapsed.mSec Value: 11423 Key : Analysis.Memory.CommitPeak.Mb Value: 88 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.KiBugCheckData Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 1000 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 100 Key : WER.OS.Branch Value: co_release Key : WER.OS.Timestamp Value: 2021-06-04T16:28:00Z Key : WER.OS.Version Value: 10.0.22000.1 FILE_IN_CAB: MEMORY.DMP DUMP_FILE_ATTRIBUTES: 0x1000 BUGCHECK_CODE: a BUGCHECK_P1: 7fffffff0000 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8010eea6dce READ_ADDRESS: 00007fffffff0000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 PROCESS_NAME: System TRAP_FRAME: 4800001b11e82024 -- (.trap 0x4800001b11e82024) Unable to read trap frame at 4800001b`11e82024 STACK_TEXT: ffffbc81`5a7f6d58 fffff801`0ee2d8a9 : 00000000`0000000a 00007fff`ffff0000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffbc81`5a7f6d60 fffff801`0ee29a00 : ffffa303`08b2d730 ffffa303`08b2d730 ffffbc81`0000000a ffffcd8f`00000001 : nt!KiBugCheckDispatch 0x69 ffffbc81`5a7f6ea0 fffff801`0eea6dce : ffffa303`0c00ed38 ffffcd8f`54802120 00000000`00000000 00000000`00000000 : nt!KiPageFault 0x440 ffffbc81`5a7f7030 fffff801`0ecf84c9 : ffffa303`0c00ed38 ffffbc81`5a7f71e0 00000000`21601c84 00000000`00000000 : nt!RtlpxVirtualUnwind 0x1ada3e ffffbc81`5a7f70e0 fffff801`0ecf77d6 : ffffbc81`5a7f76e0 00000000`21601c84 ffffa303`0c00ed38 ffffbc81`5a7f71e0 : nt!RtlVirtualUnwind2 0x89 ffffbc81`5a7f7170 fffff801`0ecfb801 : ffffffff`ffffffff ffffa303`0c00eba0 ffffa303`0c00eba0 ffffbc81`5a7f7900 : nt!RtlDispatchException 0x1f6 ffffbc81`5a7f78d0 fffff801`0ee1bb52 : ffffffe0`814118e8 54892824`44894400 4800001b`11e82024 c3ff0006`e1a20d8b : nt!KiDispatchException 0x1b1 ffffbc81`5a7f7fb0 fffff801`0ee1bb20 : fffff801`0ee2d9c7 fffff801`0f653740 fffff801`0ec6d731 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack 0x12 ffffa303`0c00e9b8 fffff801`0ee2d9c7 : fffff801`0f653740 fffff801`0ec6d731 00000000`00000000 fffff801`13a18000 : nt!KiExceptionDispatchOnExceptionStackContinue ffffa303`0c00e9c0 fffff801`0ee2958f : 00000000`00000000 00000000`00000000 fffff801`13a17ec4 00000000`00000000 : nt!KiExceptionDispatch 0x107 ffffa303`0c00eba0 ffffcd8f`54817f37 : ffffcd8f`54802120 00000000`21601c84 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault 0x30f ffffa303`0c00ed30 ffffcd8f`54802120 : 00000000`21601c84 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffcd8f`54817f37 ffffa303`0c00ed38 00000000`21601c84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffcd8f`54802120 ffffa303`0c00ed40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x21601c84 SYMBOL_NAME: nt!RtlpxVirtualUnwind 1ada3e MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 1ada3e FAILURE_BUCKET_ID: AV_nt!RtlpxVirtualUnwind OS_VERSION: 10.0.22000.1 BUILDLAB_STR: co_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {90caf8d4-a034-a257-3599-d8f696fd9681} Followup: MachineOwner --------- 4: kd> lmvm nt Browse full module list start end module name fffff801`0ea00000 fffff801`0fa47000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\666A1F1CDEE669FCCBC9135C820012201\ntkrnlmp.pdb Loaded symbol image file: ntkrnlmp.exe Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\8530C8D31047000\ntkrnlmp.exe Image path: ntkrnlmp.exe Image name: ntkrnlmp.exe Browse all global symbols functions data Image was built with /Brepro flag. Timestamp: 8530C8D3 (This is a reproducible build file hash, not a timestamp) CheckSum: 00B36AA7 ImageSize: 01047000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables:
欢迎访问本站!。没有看到具体错误的驱动等。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。
欢迎访问本站!。没有看到具体错误的驱动等。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。
