Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\jhj_i\Desktop\新建文件夹\110822-16843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`2081e000 PsLoadedModuleList = 0xfffff806`21448270
Debug session time: Tue Nov  8 08:13:47.727 2022 (UTC + 8:00)
System Uptime: 0 days 0:06:59.479
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`20c170f0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffffd0b`70cdf830=000000000000000a
15: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000853, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80620c28c6e, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3155

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 15040

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 608

    Key  : Analysis.Init.Elapsed.mSec
    Value: 17764

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xa

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  110822-16843-01.dmp

BUGCHECK_CODE:  a

BUGCHECK_P1: 853

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80620c28c6e

READ_ADDRESS: fffff80621519390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000853

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffffd0b70cdf970 -- (.trap 0xfffffd0b70cdf970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd08320f19080
rdx=0000000079517350 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80620c28c6e rsp=fffffd0b70cdfb00 rbp=fffffd0b70cdfb80
 r8=0000000000000065  r9=ffffd08320f19080 r10=0000000000000009
r11=ffffd08320f19080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!KiSystemServiceExit+0x1ae:
fffff806`20c28c6e c604255308000000 mov     byte ptr [853h],0 ds:00000000`00000853=??
Resetting default scope

MISALIGNED_IP:
nt!KiSystemServiceExit+1ae
fffff806`20c28c6e c604255308000000 mov     byte ptr [853h],0

STACK_TEXT: 
fffffd0b`70cdf828 fffff806`20c29069     : 00000000`0000000a 00000000`00000853 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
fffffd0b`70cdf830 fffff806`20c25369     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffffd0b`70cdf970 fffff806`20c28c6e     : ffffd083`20f19000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x469
fffffd0b`70cdfb00 00007ff8`c750d264     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x1ae
0000005d`e7a7f568 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c750d264


SYMBOL_NAME:  nt!KiSystemServiceExit+1ae

IMAGE_VERSION:  10.0.19041.2130

STACK_COMMAND:  .cxr; .ecxr ; kb

MODULE_NAME: AuthenticAMD

IMAGE_NAME:  AuthenticAMD.sys

FAILURE_BUCKET_ID:  IP_MISALIGNED_AuthenticAMD.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {716d112a-8330-4bbb-160c-ec98297019d2}

Followup:     MachineOwner
---------      您好,A&K,前来提供帮助。您提供的信息显示了AMD驱动程序的问题。如果您的CPU或GPU来自AMD,这代表它们可能损坏或者出现了驱动程序故障。我建议先排除驱动程序问题,请先尝试卸载所有主要设备驱动程序(GPU、芯片组等),然后前往设备制造商官网下载最新版本并重新安装。

点赞(23) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部