问题概述:近几个月碰到多次相关方面的问题(IQRL_NOT_LESS_OR_EQUAL,kernel_data_inpage_error等<这两者比较突出所以特别说他们>),各个时间点都有碰到过(例如开机时,待机时,高负载时等),由于前者发生的次数比后者多得多,所以推测可能是由于IQRL的这个问题导致的其他问题, IQRL_NOT_LESS_OR_EQUAL应该才是主因执行过的措施概述也有尝试过独自解决,有执行过以下措施: 有通过powershell的“DISM /online /cleanup-image /restorehealth”指令修复过系统方面文件, 还下了个火绒执行了全盘、进程等方面的扫毒,(虽然的确有扫出几个,问题也有一些改善,不过几十天后又死灰复燃了<这次再扫描就没用了>)以及其他措施若干此处不表 不过以上方式没有什么明显结果。 研究结果通过各方研究发现“IQRL NOT LESS OR EQUAL”问题应该是由于驱动(进程)引用非法地址导致的, 可惜碍于技艺不精,并没找到是由哪个驱动引发的(从dump文件实在是看不怎么出来阿),有几次蓝屏的信息指向cbfs6.sys(原话是“失败的操作:cbfs6.sys”)也有几次甚至给出”提示失败的操作“,经过搜索发现cbfs6.sys的确是一个可能引发问题的驱动,也有检查过这个文件和它关联的驱动是否经过篡改,不过没有什么有价值的信息(这个文件似乎也是挺正常的,并且甚至我都不知道它是什么驱动——实在是没找到阿) 因为火绒不搞驱动级对抗,所以驱动级病毒的可能性还不能排除(打算去下个360杀毒试试看——安全卫士不太敢下,请容易送难阿)【后期更新】下了360杀毒依然没找出什么有效结果,兴许这个病毒比较厉害?(可能在驱动隐藏的比较深) 附dump文件节选: 几个比较具有代表性的IQRL_NOT_LESS_OR_EQUAL的dump文件的Probably caused by和BUGCHECK_STR的相关内容节选如下(因kernel_data_inpage_error我手动关机的速度比较快,没来得及生成dump,而又没找到,所以没传——我们聚焦分析IQRL_NOT_LESS_OR_EQUAL吧,这个应该才是主因): IQRL_NOT_LESS_OR_EQUAL的第一个dump文件:
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\101722-11906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff805`46800000 PsLoadedModuleList = 0xfffff805`4742a270
Debug session time: Mon Oct 17 08:04:51.742 2022 (UTC + 8:00)
System Uptime: 0 days 0:00:11.805
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffb30b06bb5010, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000011, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80546c0c0d3, address which referenced memory
Debugging Details:
------------------

KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4281
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 11715
    Key  : Analysis.Init.CPU.mSec
    Value: 1921
    Key  : Analysis.Init.Elapsed.mSec
    Value: 28215
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump
BUGCHECK_CODE:  a
BUGCHECK_P1: ffffb30b06bb5010
BUGCHECK_P2: ff
BUGCHECK_P3: 11
BUGCHECK_P4: fffff80546c0c0d3
WRITE_ADDRESS: fffff805474fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffb30b06bb5010
BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  fffff18e76111b90 -- (.trap 0xfffff18e76111b90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb30b06bb5010 rbx=0000000000000000 rcx=ffffb30b06bb5020
rdx=fffffffffff1ae60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80546c0c0d3 rsp=fffff18e76111d28 rbp=fffff18e761121b9
 r8=000000000000001c  r9=0000000000000001 r10=ffffb30b06acfe70
r11=ffffb30b06acfedc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!memcpy+0x113:
fffff805`46c0c0d3 0f2941f0        movaps  xmmword ptr [rcx-10h],xmm0 ds:ffffb30b`06bb5010=????????????????????????????????
Resetting default scope
LOCK_ADDRESS:  fffff805474449c0 -- (!locks fffff805474449c0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff805474449c0)    Available
1 total locks
PNP_TRIAGE_DATA:
    Lock address  : 0xfffff805474449c0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0
STACK_TEXT: 
fffff18e`76111a48 fffff805`46c0b069     : 00000000`0000000a ffffb30b`06bb5010 00000000`000000ff 00000000`00000011 : nt!KeBugCheckEx
fffff18e`76111a50 fffff805`46c07369     : 00000000`0000007c fffff805`471b2094 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff18e`76111b90 fffff805`46c0c0d3     : fffff805`46a099fb ffffb30b`06b364f0 ffffb30b`06acfe60 00000000`00000000 : nt!KiPageFault+0x469
fffff18e`76111d28 fffff805`46a099fb     : ffffb30b`06b364f0 ffffb30b`06acfe60 00000000`00000000 00000000`00001000 : nt!memcpy+0x113
fffff18e`76111d30 fffff805`46df31e3     : 00000000`00000001 ffffb30b`06b016a0 fffff18e`76111f20 00000000`00000000 : nt!CmpDoQueryKeyName+0x23b
fffff18e`76111e70 fffff805`46dde793     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : nt!CmpQueryKeyName+0x13
fffff18e`76111ec0 fffff805`46dde38a     : ffffb30b`06b364f0 ffffb30b`06bb5000 00000000`00001000 fffff18e`76112034 : nt!ObQueryNameStringMode+0xd3
fffff18e`76111fe0 fffff805`46f2f54a     : ffffffff`80001f18 ffffffff`80001f18 00000000`00001000 fffff805`00001000 : nt!NtQueryObject+0x18a
fffff18e`76112130 fffff805`46f2e859     : fffff805`62a10000 ffffdc83`d8759040 ffffffff`00000000 00000000`00000000 : nt!IopQueryRegistryKeySystemPath+0xda
fffff18e`76112220 fffff805`46f2c608     : fffff805`62a10000 fffff805`62a10000 00000000`00000000 00000000`00000000 : nt!IopBuildFullDriverPath+0xc1
fffff18e`761122e0 fffff805`46f2c570     : fffff805`62a10000 00000000`00000000 ffffffff`80001f18 ffffb30b`05db6990 : nt!PpCheckInDriverDatabase+0x40
fffff18e`76112340 fffff805`46f2ef75     : fffff18e`761124c0 fffff805`62a100d8 fffff805`47445880 00000000`00000000 : nt!PnpPrepareDriverLoading+0x6c
fffff18e`761123c0 fffff805`46f30b66     : 00000000`00000000 00000000`00000000 00000000`00000004 fffff18e`00000004 : nt!IopLoadDriver+0x27d
fffff18e`76112590 fffff805`46f30876     : fffff805`4680af01 00000000`00000000 ffffdc83`d9b9aba0 ffffffff`80001ee4 : nt!PipCallDriverAddDeviceQueryRoutine+0x1be
fffff18e`76112620 fffff805`46f30234     : 00000000`00000000 fffff18e`76112730 00000000`6e657050 fffff805`0000000e : nt!PnpCallDriverQueryServiceHelper+0xda
fffff18e`761126d0 fffff805`46f2f9c7     : ffffdc83`d9c76380 fffff18e`76112911 ffffdc83`d9c76380 00000000`00000000 : nt!PipCallDriverAddDevice+0x41c
fffff18e`76112890 fffff805`46f27886     : ffffdc83`d9c76300 ffffdc83`d9e8f801 fffff18e`761129b0 fffff805`00000000 : nt!PipProcessDevNodeTree+0x333
fffff18e`76112960 fffff805`46b6c72a     : 00000001`00000003 ffffdc83`d9c76380 00000000`00000000 ffffdc83`d9e8f830 : nt!PiRestartDevice+0xba
fffff18e`761129b0 fffff805`46a52b65     : ffffdc83`d8759040 ffffdc83`d14aa720 fffff805`47443380 ffffdc83`00000000 : nt!PnpDeviceActionWorker+0x46a
fffff18e`76112a70 fffff805`46a71d25     : ffffdc83`d8759040 00000000`00000080 ffffdc83`d14c9040 000fa46f`b19bbfff : nt!ExpWorkerThread+0x105
fffff18e`76112b10 fffff805`46c00778     : ffffc980`9edc0180 ffffdc83`d8759040 fffff805`46a71cd0 1fa23a90`fe78eb93 : nt!PspSystemThreadStartup+0x55
fffff18e`76112b60 00000000`00000000     : fffff18e`76113000 fffff18e`7610c000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME:  nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.2130
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  469
FAILURE_BUCKET_ID:  AV_nt!KiPageFault
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup:     MachineOwner
---------

IQRL_NOT_LESS_OR_EQUAL的第二个dump文件:
Microsoft (R) Windows Debugger Version 10.0.22000.194 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\101522-11437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff804`6a800000 PsLoadedModuleList = 0xfffff804`6b42a270
Debug session time: Sat Oct 15 16:33:36.928 2022 (UTC + 8:00)
System Uptime: 0 days 3:58:47.921
Loading Kernel Symbols
..
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
.............................................................
................................................................
................................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....................................
For analysis of this file, run !analyze -v
5: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffa70d15bff010, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000021, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046ac0c0d3, address which referenced memory
Debugging Details:
------------------

KEY_VALUES_STRING: 1
    Key  : Analysis.CPU.mSec
    Value: 4671
    Key  : Analysis.DebugAnalysisManager
    Value: Create
    Key  : Analysis.Elapsed.mSec
    Value: 9445
    Key  : Analysis.Init.CPU.mSec
    Value: 2156
    Key  : Analysis.Init.Elapsed.mSec
    Value: 348874
    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

DUMP_FILE_ATTRIBUTES: 0x8
  Kernel Generated Triage Dump
BUGCHECK_CODE:  a
BUGCHECK_P1: ffffa70d15bff010
BUGCHECK_P2: ff
BUGCHECK_P3: 21
BUGCHECK_P4: fffff8046ac0c0d3
WRITE_ADDRESS: fffff8046b4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffa70d15bff010
CUSTOMER_CRASH_COUNT:  1
PROCESS_NAME:  System
TRAP_FRAME:  fffff90f4b21eb90 -- (.trap 0xfffff90f4b21eb90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa70d15bff010 rbx=0000000000000000 rcx=ffffa70d15bff020
rdx=fffffffffadbb960 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046ac0c0d3 rsp=fffff90f4b21ed28 rbp=fffff90f4b21f1b9
 r8=0000000000000020  r9=0000000000000001 r10=ffffa70d109ba970
r11=ffffa70d109ba9e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl nz na pe nc
nt!memcpy+0x113:
fffff804`6ac0c0d3 0f2941f0        movaps  xmmword ptr [rcx-10h],xmm0 ds:ffffa70d`15bff010=????????????????????????????????
Resetting default scope
LOCK_ADDRESS:  fffff8046b4449c0 -- (!locks fffff8046b4449c0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff8046b4449c0)    Available
1 total locks
PNP_TRIAGE_DATA:
    Lock address  : 0xfffff8046b4449c0
    Thread Count  : 0
    Thread address: 0x0000000000000000
    Thread wait   : 0x0
STACK_TEXT: 
fffff90f`4b21ea48 fffff804`6ac0b069     : 00000000`0000000a ffffa70d`15bff010 00000000`000000ff 00000000`00000021 : nt!KeBugCheckEx
fffff90f`4b21ea50 fffff804`6ac07369     : 00000000`00000080 fffff804`6b1b2094 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff90f`4b21eb90 fffff804`6ac0c0d3     : fffff804`6aa099fb ffffa70d`15ec40b0 ffffa70d`109ba960 00000000`00000000 : nt!KiPageFault+0x469
fffff90f`4b21ed28 fffff804`6aa099fb     : ffffa70d`15ec40b0 ffffa70d`109ba960 00000000`00000000 00000000`00001000 : nt!memcpy+0x113
fffff90f`4b21ed30 fffff804`6adf31e3     : 00000000`00000001 ffffa70d`15b01fe0 fffff90f`4b21ef20 00000000`00000000 : nt!CmpDoQueryKeyName+0x23b
fffff90f`4b21ee70 fffff804`6adde793     : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000001 : nt!CmpQueryKeyName+0x13
fffff90f`4b21eec0 fffff804`6adde38a     : ffffa70d`15ec40b0 ffffa70d`15bff000 00000000`00001000 fffff90f`4b21f034 : nt!ObQueryNameStringMode+0xd3
fffff90f`4b21efe0 fffff804`6af2f54a     : ffffffff`800023e0 ffffffff`800023e0 ffff968e`6db76040 fffff804`00001000 : nt!NtQueryObject+0x18a
fffff90f`4b21f130 fffff804`6af2e859     : fffff804`ed6c0000 ffff968e`6db76040 ffffa70c`00000000 00000000`00000000 : nt!IopQueryRegistryKeySystemPath+0xda
fffff90f`4b21f220 fffff804`6af2c608     : fffff804`ed6c0000 fffff804`ed6c0000 ffffa70d`16926050 00000000`00000000 : nt!IopBuildFullDriverPath+0xc1
fffff90f`4b21f2e0 fffff804`6af2c570     : fffff804`ed6c0000 00000000`00000000 ffffffff`800023e0 ffffa70c`d22bc6b0 : nt!PpCheckInDriverDatabase+0x40
fffff90f`4b21f340 fffff804`6af2ef75     : fffff90f`4b21f4c0 fffff804`ed6c0100 fffff804`6b445880 00000000`00000000 : nt!PnpPrepareDriverLoading+0x6c
fffff90f`4b21f3c0 fffff804`6af30b66     : 00000000`00000000 00000000`00000000 00000000`00000004 fffff90f`00000004 : nt!IopLoadDriver+0x27d
fffff90f`4b21f590 fffff804`6af30876     : fffff804`6a80af01 00000000`00000000 ffff968e`4efa8260 ffffffff`800079a4 : nt!PipCallDriverAddDeviceQueryRoutine+0x1be
fffff90f`4b21f620 fffff804`6af30234     : 00000000`00000000 fffff90f`4b21f730 00000000`6e657050 fffff804`00000012 : nt!PnpCallDriverQueryServiceHelper+0xda
fffff90f`4b21f6d0 fffff804`6af2f9c7     : ffff968e`51084bf0 fffff90f`4b21f911 ffff968e`51084bf0 00000000`00000000 : nt!PipCallDriverAddDevice+0x41c
fffff90f`4b21f890 fffff804`6af27886     : ffff968e`51084b00 ffff968e`6b697201 fffff90f`4b21f9b0 fffff804`00000000 : nt!PipProcessDevNodeTree+0x333
fffff90f`4b21f960 fffff804`6ab6c72a     : 00000001`00000003 ffff968e`51084bf0 00000000`00000000 ffff968e`6b697250 : nt!PiRestartDevice+0xba
fffff90f`4b21f9b0 fffff804`6aa52b65     : ffff968e`6db76040 ffff968e`4e329a60 fffff804`6b443380 ffff968e`00000000 : nt!PnpDeviceActionWorker+0x46a
fffff90f`4b21fa70 fffff804`6aa71d25     : ffff968e`6db76040 00000000`00000080 ffff968e`4e2ac040 00000000`00000000 : nt!ExpWorkerThread+0x105
fffff90f`4b21fb10 fffff804`6ac00778     : ffffcd01`f1180180 ffff968e`6db76040 fffff804`6aa71cd0 00000000`00000246 : nt!PspSystemThreadStartup+0x55
fffff90f`4b21fb60 00000000`00000000     : fffff90f`4b220000 fffff90f`4b219000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28

SYMBOL_NAME:  nt!KiPageFault+469
MODULE_NAME: nt
IMAGE_NAME:  ntkrnlmp.exe
IMAGE_VERSION:  10.0.19041.2130
STACK_COMMAND:  .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET:  469
FAILURE_BUCKET_ID:  AV_nt!KiPageFault
OSPLATFORM_TYPE:  x64
OSNAME:  Windows 10
FAILURE_ID_HASH:  {ec3e2762-48ae-ffe9-5b16-fbcb853e8320}
Followup:     MachineOwner
---------
说来也奇怪,dump文件居然没有反映出这个“cbfs6.sys”,不过在蓝屏界面的确是有的(虽然不全是)(附几张拍屏图<为了隐私问题而做了一些裁剪>)(的确是有的没有提示阿,真是奇怪——图片与dump文件可能对不上,这个图片只是为了进一步说明这个问题)感谢排错除障的时候也有参考了”Alex_Shen的回答“和”张杰的文章“等网页中的诸位大佬的的高见,虽然问题目前还没解决完,不过还是表示一下感谢之意,感谢!写在后面因为敝人所做的几个措施都没有什么明显效果,(重装和重置系统目前还不太想做<还原点的办法感觉不太靠谱所以没做>)搞得有点束手无策,所以上论坛请教一下各位大佬, 若有什么额外需求请尽管提出,敝人一定在可行范围内尽力满足!辛苦各位,感激不尽!      您好!根据您提供的dump文件分析,可能是以下文件出现问题导致的蓝屏,您可以在您的电脑搜索找到该文件,查看该文件所属应用程序或组件,尝试更新或重新安装它,看看是否可以解决您蓝屏的问题。Yu
        您好!感谢您联系本站支持平台!了解到您目前遇到Windows操作系统出现蓝屏,您不用担心,此问题一般是由于系统中某些应用所属进程或驱动出现问题导致系统宕机引起的,需要您提供您的Minidump文件本身来分析您系统故障的原因,您可以通过以下方案收集您的Dump日志文件:打开控制面板>>系统>>高级系统设置>>高级>>启动和故障恢复>>设置,写入调试信息>>选择“小内存转储(256KB)”,路径选择默认,确定并重启您的计算机。再次异常关机后,前往C:\Windows\Minidump提取即可。再将您收集到的Minidump文件通过私信提供给。当收到私人消息时,可以通过收到的邮件直接进入私人消息界面,或在本站点头像,点击“我的个人资料”右侧的“.”,选择“查看私人消息”进入私人消息界面。另外,也
        您好!感谢您联系本站支持平台!了解到您目前遇到Windows操作系统出现蓝屏,您不用担心,此问题一般是由于系统中某些应用所属进程或驱动出现问题导致系统宕机引起的,需要您提供您的Minidump文件本身来分析您系统故障的原因,您可以通过以下方案收集您的Dump日志文件:打开控制面板>>系统>>高级系统设置>>高级>>启动和故障恢复>>设置,写入调试信息>>选择“小内存转储(256KB)”,路径选择默认,确定并重启您的计算机。再次异常关机后,前往C:\Windows\Minidump提取即可。再将您收集到的Minidump文件通过私信提供给。当收到私人消息时,可以通过收到的邮件直接进入私人消息界面,或在本站点头像,点击“我的个人资料”右侧的“.”,选择“查看私人消息”进入私人消息界面。另外,也
        您好!根据您提供的dump文件分析,可能是以下文件出现问题导致的蓝屏,该文件是您计算机的内置网络驱动程序,建议您联系您计算机厂商官方下载原配网络驱动程序作备用,卸载您设备管理器中网络驱动器下的网络驱动程序,重启您的计算机,看看是否可以恢复正常;如果出现无法连接网络的问题,您可以直接安装之前准备好的网络驱动程序,看看是否可以解决这个问题,
        您好!十分感谢!这一点我的是确漏看了,大意了阿,回去翻了一下windbg的确是有这么一句话(指出了出问题的驱动),当时可能是没
        您好!很高兴可以帮助到您。也
        您好!很高兴可以帮助到您。也
        您好!请问您符号表地址是否进行了输入?左上角:File>>SymbolFilePath,SRV*c:\localsymbols*http://msdl.microsoft.com/download/symbols在WinDbg中打开该dump文件,运行“!thread”执行,反馈得到“Limit”与“Base”的地址,再根据“Limit”与“Base”的地址输入:dpsLimitBases,也就是:dpsfffff90f4b219000fffff90f4b220000,就可以看到提示的错误进程文件名称。
        你好恰好今天开机又碰到了一次这个蓝屏的问题,所以使用了您提供的方式,不过也没有发现这个导致问题的文件,我猜测这个可能只适用于“错误内容指出了sys文件“的情况吧?(这次的错误内容提示就没有指出sys文件了)(因为图片过大而把图片进行了压缩)我也是先load了一下symbolfile,之后打开dumpfile,然后执行了!thread获得limit和base,再执行了dpsLimitBases(填入真实数值)——如图所示然而代码返回给我的只有一些问号,零以及意义不明的字符串(如如所示):在dps命令后输出的内容全都是这样,直到末尾,我也有进行全文搜索,也有人工翻看,不过也没找到什么有价值的线索我有用管理员权限打开windbg,也有完全按照您的说法来做,甚至还多次尝试了,其他方面的问题我也都有
        您好!很抱歉无法通过您已上传的dump文件中找到导致您蓝屏的原因,建议您尝试以下方案进行操作,重新收集最新的dump文件,“Win+R”打开运行,键入:verifier.exe,打开驱动程序验证程序管理器,选择“创建自定义设置”,点击“下一步”,勾选“杂项检查”,点击“下一步”,选择“自动选择这台计算机上安装的所有驱动程序”,点击“完成”,重启您的计算机,待下一次出现蓝屏现象,收集该dump文件即可。
        好的,感谢你!我这就去执行这个verifier,等下次有蓝屏我再来回报一下真是感激不尽,多谢了,这位大佬此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。

点赞(62) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部