我超爱耄耋 LEO4090m
关注数: 5 粉丝数: 12 发帖数: 370 关注贴吧数: 24
求助!!!各位大佬帮帮我 最近我的枪7plus超竞不停的蓝屏,已经严重到1天蓝屏一次的地步了。 一下是最近一次蓝屏的dmp文件,有没有大佬能帮帮我 ************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : true AllowNugetExeUpdate : true NonInteractiveNuget : true AllowNugetMSCredentialProviderInstall : true AllowParallelInitializationOfLocalRepositories : true EnableRedirectToChakraJsProvider : false -- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true >>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds ************* Waiting for Debugger Extensions Gallery to Initialize ************** >>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 43 Microsoft (R) Windows Debugger Version 10.0.27793.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\032525-18578-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Invalid directory table base value 0x0 ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 26100 MP (32 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Kernel base = 0xfffff807`cfc00000 PsLoadedModuleList = 0xfffff807`d0af47a0 Debug session time: Tue Mar 25 19:22:03.956 2025 (UTC + 8:00) System Uptime: 1 days 21:05:57.368 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................................................................ ................................ Loading User Symbols Loading unloaded module list ........................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`d00b7ce0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb989`f075ef90=000000000000000a 8: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000000000000000a, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff807cfe824a9, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1390 Key : Analysis.Elapsed.mSec Value: 7770 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 1 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 343 Key : Analysis.Init.Elapsed.mSec Value: 4330 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Analysis.Version.DbgEng Value: 10.0.27793.1000 Key : Analysis.Version.Description Value: 10.2410.02.02 amd64fre Key : Analysis.Version.Ext Value: 1.2410.2.2 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 0x21808 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0x0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 Key : Failure.Bucket Value: AV_nt!KiDeliverApc Key : Failure.Exception.IP.Address Value: 0xfffff807cfe824a9 Key : Failure.Exception.IP.Module Value: nt Key : Failure.Exception.IP.Offset Value: 0x2824a9 Key : Failure.Hash Value: {f94393b9-4308-5aa6-9044-71825dde3286} Key : Hypervisor.Enlightenments.ValueHex Value: 0x7417df84 Key : Hypervisor.Flags.AnyHypervisorPresent Value: 1 Key : Hypervisor.Flags.ApicEnlightened Value: 0 Key : Hypervisor.Flags.ApicVirtualizationAvailable Value: 1 Key : Hypervisor.Flags.AsyncMemoryHint Value: 0 Key : Hypervisor.Flags.CoreSchedulerRequested Value: 0 Key : Hypervisor.Flags.CpuManager Value: 1 Key : Hypervisor.Flags.DeprecateAutoEoi Value: 1 Key : Hypervisor.Flags.DynamicCpuDisabled Value: 1 Key : Hypervisor.Flags.Epf Value: 0 Key : Hypervisor.Flags.ExtendedProcessorMasks Value: 1 Key : Hypervisor.Flags.HardwareMbecAvailable Value: 1 Key : Hypervisor.Flags.MaxBankNumber Value: 0 Key : Hypervisor.Flags.MemoryZeroingControl Value: 0 Key : Hypervisor.Flags.NoExtendedRangeFlush Value: 0 Key : Hypervisor.Flags.NoNonArchCoreSharing Value: 1 Key : Hypervisor.Flags.Phase0InitDone Value: 1 Key : Hypervisor.Flags.PowerSchedulerQos Value: 0 Key : Hypervisor.Flags.RootScheduler Value: 0 Key : Hypervisor.Flags.SynicAvailable Value: 1 Key : Hypervisor.Flags.UseQpcBias Value: 0 Key : Hypervisor.Flags.Value Value: 55185662 Key : Hypervisor.Flags.ValueHex Value: 0x34a10fe Key : Hypervisor.Flags.VpAssistPage Value: 1 Key : Hypervisor.Flags.VsmAvailable Value: 1 Key : Hypervisor.RootFlags.AccessStats Value: 1 Key : Hypervisor.RootFlags.CrashdumpEnlightened Value: 1 Key : Hypervisor.RootFlags.CreateVirtualProcessor Value: 1 Key : Hypervisor.RootFlags.DisableHyperthreading Value: 0 Key : Hypervisor.RootFlags.HostTimelineSync Value: 1 Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled Value: 0 Key : Hypervisor.RootFlags.IsHyperV Value: 1 Key : Hypervisor.RootFlags.LivedumpEnlightened Value: 1 Key : Hypervisor.RootFlags.MapDeviceInterrupt Value: 1 Key : Hypervisor.RootFlags.MceEnlightened Value: 1 Key : Hypervisor.RootFlags.Nested Value: 0 Key : Hypervisor.RootFlags.StartLogicalProcessor Value: 1 Key : Hypervisor.RootFlags.Value Value: 1015 Key : Hypervisor.RootFlags.ValueHex Value: 0x3f7 BUGCHECK_CODE: a BUGCHECK_P1: a BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff807cfe824a9 FILE_IN_CAB: 032525-18578-01.dmp TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b DUMP_FILE_ATTRIBUTES: 0x21808 Kernel Generated Triage Dump FAULTING_THREAD: ffffe684aa8e6080 READ_ADDRESS: fffff807d0bc34b0: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 000000000000000a BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 TRAP_FRAME: ffffb989f075f0d0 -- (.trap 0xffffb989f075f0d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000002 rdx=ffffb989f075f068 rsi=0000000000000000 rdi=0000000000000000 rip=fffff807cfe824a9 rsp=ffffb989f075f260 rbp=ffffb989f075f2c8 r8=ffffb989f075f040 r9=0000000000000002 r10=0000000000000003 r11=ffff96090a2a9ac0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KiDeliverApc+0x2c9: fffff807`cfe824a9 48395108 cmp qword ptr [rcx+8],rdx ds:00000000`0000000a=???????????????? Resetting default scope STACK_TEXT: ffffb989`f075ef88 fffff807`d028cee9 : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffb989`f075ef90 fffff807`d02881a8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 ffffb989`f075f0d0 fffff807`cfe824a9 : 00000000`00000000 00000000`00000000 ffffb989`f075f080 ffffb989`f075f090 : nt!KiPageFault+0x468 ffffb989`f075f260 fffff807`cfe94864 : ffff9609`0a2a9a90 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x2c9 ffffb989`f075f300 fffff807`cfe94819 : 00000000`0000014c ffffffff`ffffffff ffff9609`01d1fb10 00000000`000001c4 : nt!KiCheckForKernelApcDelivery+0x34 ffffb989`f075f350 fffff807`d04f55f2 : 00000000`00000000 00000000`00000000 ffff9609`0a2a9a90 00000000`00000246 : nt!KeLeaveGuardedRegion+0x29 ffffb989`f075f380 fffff807`d04f6005 : 00000000`00000001 ffffb989`f075faa0 ffff9609`26cea150 00000000`00000001 : nt!WbCreateHeapExecutedBlock+0xe52 ffffb989`f075f590 fffff807`d05b5cee : ffff9609`01d1fb10 ffffc680`00000000 ffff9609`26cea150 00000008`e610d820 : nt!WbValidateHeapExecuteCallArguments+0x86d ffffb989`f075f600 fffff807`d05b288e : 0000012f`ec485d67 fffff807`cffdeb2a 00000003`aeefe1b0 00000000`7cd8f2f0 : nt!ExpQuerySystemInformation+0x32fe ffffb989`f075f9e0 fffff807`d028c555 : 0000017a`057a0000 ffffe684`aa8e6080 ffffe684`aa8e6080 d87d10b1`e2a47460 : nt!NtQuerySystemInformation+0x3e ffffb989`f075fa20 000001b2`87724310 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 00000003`aeefe008 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000001b2`87724310 SYMBOL_NAME: nt!KiDeliverApc+2c9 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.26100.3476 STACK_COMMAND: .process /r /p 0xffffe68485a75080; .thread 0xffffe684aa8e6080 ; kb BUCKET_ID_FUNC_OFFSET: 2c9 FAILURE_BUCKET_ID: AV_nt!KiDeliverApc OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f94393b9-4308-5aa6-9044-71825dde3286} PROCESS_NAME: Unknown Followup: MachineOwner ---------
1 下一页