在我愉快的玩耍的时候,电脑突然蓝屏了,下面是用windbg分析的结果,但是看不太懂,有人帮忙看看吗
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\091023-10328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff800`63a00000 PsLoadedModuleList = 0xfffff800`6462a3d0
Debug session time: Sun Sep 10 22:41:33.257 2023 (UTC + 8:00)
System Uptime: 0 days 0:19:32.101
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000006e`f2bd9018). Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`63dfcc40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff688`2deaee50=000000000000000a
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff800000000e2, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff800000000e2, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2218
Key : Analysis.Elapsed.mSec
Value: 17678
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 359
Key : Analysis.Init.Elapsed.mSec
Value: 10049
Key : Analysis.Memory.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: AV_CODE_AV_BAD_IP_nt!KiPageFault
Key : Failure.Hash
Value: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff800000000e2
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff800000000e2
FILE_IN_CAB: 091023-10328-01.dmp
READ_ADDRESS: fffff800646fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff800000000e2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NarakaBladepoint.exe
TRAP_FRAME: fffff6882deaef90 -- (.trap 0xfffff6882deaef90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000015dd1 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffc70246a1b948 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800000000e2 rsp=fffff6882deaf120 rbp=0000000000000000
r8=0000000000000000 r9=ffffc70246a1b918 r10=000000000002bba2
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
fffff800`000000e2 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`000000e2 ?? ???
STACK_TEXT:
fffff688`2deaee48 fffff800`63e10d29 : 00000000`0000000a fffff800`000000e2 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff688`2deaee50 fffff800`63e0c8e3 : ffffd700`d43c1180 fffff800`63e05302 ffffd700`d458b180 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff688`2deaef90 fffff800`000000e2 : ffffd700`d458b180 ffffc702`00000000 ffffc702`458f42a8 fffff800`63cf4275 : nt!KiPageFault+0x463
fffff688`2deaf120 ffffd700`d458b180 : ffffc702`00000000 ffffc702`458f42a8 fffff800`63cf4275 00000000`00000000 : 0xfffff800`000000e2
fffff688`2deaf128 ffffc702`00000000 : ffffc702`458f42a8 fffff800`63cf4275 00000000`00000000 00000000`00000000 : 0xffffd700`d458b180
fffff688`2deaf130 ffffc702`458f42a8 : fffff800`63cf4275 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc702`00000000
fffff688`2deaf138 fffff800`63cf4275 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000006 : 0xffffc702`458f42a8
fffff688`2deaf140 00000000`00000001 : fffff688`2deaf2e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTransitionSchedulingGroupGeneration+0x105
fffff688`2deaf1e0 fffff688`2deaf2e0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1
fffff688`2deaf1e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff688`2deaf2e0
SYMBOL_NAME: nt!KiPageFault+463
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3324
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 463
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
1: kd> lmvm nt
Browse full module list
start end module name
fffff800`63a00000 fffff800`64a46000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\06564D3477822C7D97F04852CBD5AFD61\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\EAEB45C91046000\ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Image was built with /Brepro flag.
Timestamp: EAEB45C9 (This is a reproducible build file hash, not a timestamp)
CheckSum: 00A637EB
ImageSize: 01046000
File version: 10.0.19041.3324
Product version: 10.0.19041.3324
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 10.0.19041.3324
FileVersion: 10.0.19041.3324 (WinBuild.160101.0800)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.