韩死狗 2023-09-10 23:52 采纳率: 20%
浏览 136

电脑蓝屏 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe

在我愉快的玩耍的时候,电脑突然蓝屏了,下面是用windbg分析的结果,但是看不太懂,有人帮忙看看吗



************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : false
   AllowNugetExeUpdate : false
   AllowNugetMSCredentialProviderInstall : false
   AllowParallelInitializationOfLocalRepositories : true

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\WINDOWS\Minidump\091023-10328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is: 
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff800`63a00000 PsLoadedModuleList = 0xfffff800`6462a3d0
Debug session time: Sun Sep 10 22:41:33.257 2023 (UTC + 8:00)
System Uptime: 0 days 0:19:32.101
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000006e`f2bd9018).  Type ".hh dbgerr001" for details
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`63dfcc40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff688`2deaee50=000000000000000a
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff800000000e2, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff800000000e2, address which referenced memory

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2218

    Key  : Analysis.Elapsed.mSec
    Value: 17678

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 359

    Key  : Analysis.Init.Elapsed.mSec
    Value: 10049

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 98

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0xd1

    Key  : Failure.Bucket
    Value: AV_CODE_AV_BAD_IP_nt!KiPageFault

    Key  : Failure.Hash
    Value: {73cd60cc-83fa-6b76-df08-1961c31d7403}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  d1

BUGCHECK_P1: fffff800000000e2

BUGCHECK_P2: 2

BUGCHECK_P3: 8

BUGCHECK_P4: fffff800000000e2

FILE_IN_CAB:  091023-10328-01.dmp

READ_ADDRESS: fffff800646fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 fffff800000000e2 

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  NarakaBladepoint.exe

TRAP_FRAME:  fffff6882deaef90 -- (.trap 0xfffff6882deaef90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000015dd1 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffc70246a1b948 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800000000e2 rsp=fffff6882deaf120 rbp=0000000000000000
 r8=0000000000000000  r9=ffffc70246a1b918 r10=000000000002bba2
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
fffff800`000000e2 ??              ???
Resetting default scope

FAILED_INSTRUCTION_ADDRESS: 
+0
fffff800`000000e2 ??              ???

STACK_TEXT:  
fffff688`2deaee48 fffff800`63e10d29     : 00000000`0000000a fffff800`000000e2 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
fffff688`2deaee50 fffff800`63e0c8e3     : ffffd700`d43c1180 fffff800`63e05302 ffffd700`d458b180 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff688`2deaef90 fffff800`000000e2     : ffffd700`d458b180 ffffc702`00000000 ffffc702`458f42a8 fffff800`63cf4275 : nt!KiPageFault+0x463
fffff688`2deaf120 ffffd700`d458b180     : ffffc702`00000000 ffffc702`458f42a8 fffff800`63cf4275 00000000`00000000 : 0xfffff800`000000e2
fffff688`2deaf128 ffffc702`00000000     : ffffc702`458f42a8 fffff800`63cf4275 00000000`00000000 00000000`00000000 : 0xffffd700`d458b180
fffff688`2deaf130 ffffc702`458f42a8     : fffff800`63cf4275 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffc702`00000000
fffff688`2deaf138 fffff800`63cf4275     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000006 : 0xffffc702`458f42a8
fffff688`2deaf140 00000000`00000001     : fffff688`2deaf2e0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiTransitionSchedulingGroupGeneration+0x105
fffff688`2deaf1e0 fffff688`2deaf2e0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1
fffff688`2deaf1e8 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff688`2deaf2e0


SYMBOL_NAME:  nt!KiPageFault+463

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.3324

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  463

FAILURE_BUCKET_ID:  AV_CODE_AV_BAD_IP_nt!KiPageFault

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {73cd60cc-83fa-6b76-df08-1961c31d7403}

Followup:     MachineOwner
---------

1: kd> lmvm nt
Browse full module list
start             end                 module name
fffff800`63a00000 fffff800`64a46000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\06564D3477822C7D97F04852CBD5AFD61\ntkrnlmp.pdb
    Loaded symbol image file: ntkrnlmp.exe
    Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\EAEB45C91046000\ntkrnlmp.exe
    Image path: ntkrnlmp.exe
    Image name: ntkrnlmp.exe
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        EAEB45C9 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         00A637EB
    ImageSize:        01046000
    File version:     10.0.19041.3324
    Product version:  10.0.19041.3324
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        1.0 App
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     ntkrnlmp.exe
        OriginalFilename: ntkrnlmp.exe
        ProductVersion:   10.0.19041.3324
        FileVersion:      10.0.19041.3324 (WinBuild.160101.0800)
        FileDescription:  NT Kernel & System
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
  • 写回答

2条回答 默认 最新

  • threenewbee 2023-09-11 00:21
    关注

    除非硬件开发者,一般用户看蓝屏,只需要关心一件事,就是你这个问题是硬件问题还是软件问题。
    你的问题我看了是硬件问题,直接送修去吧。

    评论

报告相同问题?

问题事件

  • 创建了问题 9月10日

悬赏问题

  • ¥15 两台交换机分别是trunk接口和access接口为何无法通信,通信过程是如何?
  • ¥15 C语言使用vscode编码错误
  • ¥15 用KSV5转成本时,如何不生成那笔中间凭证
  • ¥20 ensp怎么配置让PC1和PC2通讯上
  • ¥50 有没有适合匹配类似图中的运动规律的图像处理算法
  • ¥15 dnat基础问题,本机发出,别人返回的包,不能命中
  • ¥15 请各位帮我看看是哪里出了问题
  • ¥15 vs2019的js智能提示
  • ¥15 关于#开发语言#的问题:FDTD建模问题图中代码没有报错,但是模型却变透明了
  • ¥15 uniapp的h5项目写一个抽奖动画