Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\110122-10484-01 - 副本.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22000 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff804`65000000 PsLoadedModuleList = 0xfffff804`65c29790 Debug session time: Tue Nov 1 21:58:04.775 2022 (UTC 8:00) System Uptime: 0 days 0:18:12.527 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ................................................... Loading User Symbols Loading unloaded module list .................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff804`6541ac40 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffff8004`bf08b7e0=000000000000000a 8: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8046541ced3, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2499 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 12114 Key : Analysis.IO.Other.Mb Value: 18 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 25 Key : Analysis.Init.CPU.mSec Value: 1015 Key : Analysis.Init.Elapsed.mSec Value: 74628 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 110122-10484-01 - ¸±±¾.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 0 BUGCHECK_P2: ff BUGCHECK_P3: 0 BUGCHECK_P4: fffff8046541ced3 READ_ADDRESS: fffff80465d05450: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System TRAP_FRAME: ffff8004bf08b920 -- (.trap 0xffff8004bf08b920) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=ffffd0816d318401 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8046541ced3 rsp=ffff8004bf08bab0 rbp=ffff8004bf08bb30 r8=0000000000000028 r9=0000000000000000 r10=0000000000001895 r11=ffffc07d9ec00000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di pl zr na po nc nt!KiInterruptDispatchNoLockNoEtw 0xf3: fffff804`6541ced3 0000 add byte ptr [rax],al ds:00000000`00000000=?? Resetting default scope MISALIGNED_IP: nt!KiInterruptDispatchNoLockNoEtw f3 fffff804`6541ced3 0000 add byte ptr [rax],al STACK_TEXT: ffff8004`bf08b7d8 fffff804`6542d8a9 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx ffff8004`bf08b7e0 fffff804`65429a00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch 0x69 ffff8004`bf08b920 fffff804`6541ced3 : ffffd081`6d310180 00000000`ffffffff 00000002`8b535b91 00000000`00000000 : nt!KiPageFault 0x440 ffff8004`bf08bab0 fffff804`6541eb7a : 00000000`00000000 ffffd081`6d31c440 ffffab0b`d64f9080 00000000`000005aa : nt!KiInterruptDispatchNoLockNoEtw 0xf3 ffff8004`bf08bc40 00000000`00000000 : ffff8004`bf08c000 ffff8004`bf086000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop 0x5a SYMBOL_NAME: nt!KiInterruptDispatchNoLockNoEtw f3 IMAGE_VERSION: 10.0.22000.1098 STACK_COMMAND: .cxr; .ecxr ; kb MODULE_NAME: AuthenticAMD IMAGE_NAME: AuthenticAMD.sys FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2} Followup: MachineOwner ---------

伟杰夏你好戴夫,我会帮你的。您的minidump打印输出表明导致系统崩溃的是AMD芯片组设备驱动程序。转到制造商网站上您的PC或主板的支持页面,然后从那里下载并安装他们推荐的芯片组驱动程序版本,并在那里检查可能需要安装的任何BIOS更新___________________________________________________________________PowertotheDeveloper!MSIGV72-17.3",i7-8750H(HexCore),32GBDDR4,4GBGeForceGTX1050Ti,256GBNVMeM2,2TBHDD此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(81) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部