请大神帮忙分析下什么问题,怎么解决,谢谢
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Primary dump contents written successfully
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Machine Name:
Kernel base = 0xfffff801`0ea00000 PsLoadedModuleList = 0xfffff801`0f629790
Debug session time: Wed Oct 12 23:42:44.738 2022 (UTC + 8:00)
System Uptime: 0 days 0:47:04.404
Loading Kernel Symbols
...............................................................
................................................................
.......................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`0ee1ac40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffbc81`5a7f6d60=000000000000000a
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00007fffffff0000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8010eea6dce, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1656
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1799
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1171
Key : Analysis.Init.Elapsed.mSec
Value: 11423
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.KiBugCheckData
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1000
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 100
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: MEMORY.DMP
DUMP_FILE_ATTRIBUTES: 0x1000
BUGCHECK_CODE: a
BUGCHECK_P1: 7fffffff0000
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8010eea6dce
READ_ADDRESS: 00007fffffff0000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: 4800001b11e82024 -- (.trap 0x4800001b11e82024)
Unable to read trap frame at 4800001b`11e82024
STACK_TEXT:
ffffbc81`5a7f6d58 fffff801`0ee2d8a9 : 00000000`0000000a 00007fff`ffff0000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffbc81`5a7f6d60 fffff801`0ee29a00 : ffffa303`08b2d730 ffffa303`08b2d730 ffffbc81`0000000a ffffcd8f`00000001 : nt!KiBugCheckDispatch+0x69
ffffbc81`5a7f6ea0 fffff801`0eea6dce : ffffa303`0c00ed38 ffffcd8f`54802120 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x440
ffffbc81`5a7f7030 fffff801`0ecf84c9 : ffffa303`0c00ed38 ffffbc81`5a7f71e0 00000000`21601c84 00000000`00000000 : nt!RtlpxVirtualUnwind+0x1ada3e
ffffbc81`5a7f70e0 fffff801`0ecf77d6 : ffffbc81`5a7f76e0 00000000`21601c84 ffffa303`0c00ed38 ffffbc81`5a7f71e0 : nt!RtlVirtualUnwind2+0x89
ffffbc81`5a7f7170 fffff801`0ecfb801 : ffffffff`ffffffff ffffa303`0c00eba0 ffffa303`0c00eba0 ffffbc81`5a7f7900 : nt!RtlDispatchException+0x1f6
ffffbc81`5a7f78d0 fffff801`0ee1bb52 : ffffffe0`814118e8 54892824`44894400 4800001b`11e82024 c3ff0006`e1a20d8b : nt!KiDispatchException+0x1b1
ffffbc81`5a7f7fb0 fffff801`0ee1bb20 : fffff801`0ee2d9c7 fffff801`0f653740 fffff801`0ec6d731 00000000`00000000 : nt!KxExceptionDispatchOnExceptionStack+0x12
ffffa303`0c00e9b8 fffff801`0ee2d9c7 : fffff801`0f653740 fffff801`0ec6d731 00000000`00000000 fffff801`13a18000 : nt!KiExceptionDispatchOnExceptionStackContinue
ffffa303`0c00e9c0 fffff801`0ee2958f : 00000000`00000000 00000000`00000000 fffff801`13a17ec4 00000000`00000000 : nt!KiExceptionDispatch+0x107
ffffa303`0c00eba0 ffffcd8f`54817f37 : ffffcd8f`54802120 00000000`21601c84 00000000`00000000 00000000`00000000 : nt!KiGeneralProtectionFault+0x30f
ffffa303`0c00ed30 ffffcd8f`54802120 : 00000000`21601c84 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffcd8f`54817f37
ffffa303`0c00ed38 00000000`21601c84 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffcd8f`54802120
ffffa303`0c00ed40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x21601c84
SYMBOL_NAME: nt!RtlpxVirtualUnwind+1ada3e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1ada3e
FAILURE_BUCKET_ID: AV_nt!RtlpxVirtualUnwind
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {90caf8d4-a034-a257-3599-d8f696fd9681}
Followup: MachineOwner
---------
4: kd> lmvm nt
Browse full module list
start end module name
fffff801`0ea00000 fffff801`0fa47000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\666A1F1CDEE669FCCBC9135C820012201\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\8530C8D31047000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: 8530C8D3 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00B36AA7
ImageSize: 01047000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:欢迎访问本站!。没有看到具体错误的驱动等。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。若是48小时内没有新的,我将无法再收到提醒。
欢迎访问本站!。没有看到具体错误的驱动等。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下所有的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。若是48小时内没有新的,我将无法再收到提醒。