最近电脑频繁出现蓝屏,错误代码IRQL_NOT_LESS_OR_EQUAL,用WINDBUG分析了DMP日志,自己不太看得懂,有没有大佬能帮忙指点下,谢谢!以下为分析日志:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\minidump\040923-26812-01.dmp] Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: srv* Executable search path is: Windows 10 Kernel Version 18362 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Kernel base = 0xfffff804`38e00000 PsLoadedModuleList = 0xfffff804`392461b0 Debug session time: Sun Apr 9 09:02:29.083 2023 (UTC + 8:00) System Uptime: 0 days 1:04:55.960 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ............................... Loading User Symbols Loading unloaded module list ................ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff804`38fc3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffce08`1b45ed00=000000000000000a 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: ffffcf038a42dfe0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff804396fee6e, address which referenced memoryDebugging Details: ------------------*** WARNING: Unable to verify checksum for win32k.sysKEY_VALUES_STRING: 1Key : Analysis.CPU.mSecValue: 2905Key : Analysis.DebugAnalysisManagerValue: CreateKey : Analysis.Elapsed.mSecValue: 41284Key : Analysis.IO.Other.MbValue: 18Key : Analysis.IO.Read.MbValue: 0Key : Analysis.IO.Write.MbValue: 22Key : Analysis.Init.CPU.mSecValue: 1296Key : Analysis.Init.Elapsed.mSecValue: 386655Key : Analysis.Memory.CommitPeak.MbValue: 94Key : Bugcheck.Code.DumpHeaderValue: 0xaKey : Bugcheck.Code.RegisterValue: 0xaKey : WER.OS.BranchValue: 19h1_releaseKey : WER.OS.TimestampValue: 2019-03-18T12:02:00ZKey : WER.OS.VersionValue: 10.0.18362.1FILE_IN_CAB: 040923-26812-01.dmpBUGCHECK_CODE: aBUGCHECK_P1: ffffcf038a42dfe0BUGCHECK_P2: 2BUGCHECK_P3: 0BUGCHECK_P4: fffff804396fee6eREAD_ADDRESS: fffff804393713b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUseffffcf038a42dfe0 BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: SystemTRAP_FRAME: ffffce081b45ee40 -- (.trap 0xffffce081b45ee40) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffff9286df00ab20 rbx=0000000000000000 rcx=ffff9286d0c169e0 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff804396fee6e rsp=ffffce081b45efd8 rbp=ffffce081b45f030r8=0000000000000004 r9=8000000000002000 r10=ffffcf038a42dfd0 r11=ffff9286d0c169e0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!EtwpApplyLevelKwFilter+0x1a: fffff804`396fee6e 418a4210 mov al,byte ptr [r10+10h] ds:ffffcf03`8a42dfe0=04 Resetting default scopeSTACK_TEXT: ffffce08`1b45ecf8 fffff804`38fd5929 : 00000000`0000000a ffffcf03`8a42dfe0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffffce08`1b45ed00 fffff804`38fd1c69 : 00000000`00000000 ffffbc80`7f5c5101 ffff88ee`8fefc7d5 ffff9286`ddcb7080 : nt!KiBugCheckDispatch+0x69 ffffce08`1b45ee40 fffff804`396fee6e : fffff804`38ec084e ffff9286`e87edc02 00000000`00000001 00000000`00000001 : nt!KiPageFault+0x469 ffffce08`1b45efd8 fffff804`38ec084e : ffff9286`e87edc02 00000000`00000001 00000000`00000001 ffff9286`e87ed9a0 : nt!EtwpApplyLevelKwFilter+0x1a ffffce08`1b45efe0 fffff804`38e3644e : ffff9286`cfc02000 ffffce08`1b45f480 ffffffff`ffffffff fffff804`00000000 : nt!EtwpEventWriteFull+0x6ae ffffce08`1b45f360 fffff804`39131162 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffce08`1b45f500 : nt!EtwWriteEx+0x14e ffffce08`1b45f470 fffff804`39131205 : 00000000`0000001b ffffce08`1b45f590 ffff9286`ea12d8a0 fffff804`3938c9c0 : nt!EtwpTiFillVadEventWrite+0x116 ffffce08`1b45f4c0 fffff804`39130d77 : 01d96a7e`f4df3263 ffffce08`1b45f590 fffff804`39195c90 fffff804`00000000 : nt!EtwpTiVadQueryEventWrite+0x81 ffffce08`1b45f510 fffff804`39022afa : ffffbc80`7f5c5101 ffff9286`e2bd48c8 ffffbc80`7f5c5101 00000000`00000000 : nt!EtwTiLogInsertQueueUserApc+0x2a7 ffffce08`1b45f5d0 fffff804`38efec95 : ffff9286`e2bd4901 ffff9286`e2bd4880 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x173e4a ffffce08`1b45f670 fffff804`38ec3559 : ffff9286`e2bd4920 ffff9286`e2bd4880 00000000`00000002 00000000`00000001 : nt!ExpTimerDpcRoutine+0xa5 ffffce08`1b45f840 fffff804`38ec22b9 : 00000000`0000001a 00000000`00989680 00000000`0002448b 00000000`000000a3 : nt!KiProcessExpiredTimerList+0x169 ffffce08`1b45f930 fffff804`38fc764e : ffffffff`00000000 ffffbc80`7f5c5180 ffffbc80`7f5d6440 ffff9286`e7ab7080 : nt!KiRetireDpcList+0x4e9 ffffce08`1b45fb60 00000000`00000000 : ffffce08`1b460000 ffffce08`1b459000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x7eCHKIMG_EXTENSION: !chkimg -lo 50 -d !halfffff80438d5dc5a-fffff80438d5dc5f 6 bytes - hal!HalSendSoftwareInterrupt+10a[ cc cc cc cc cc cc:4c 87 00 98 c3 90 ] 6 errors : !hal (fffff80438d5dc5a-fffff80438d5dc5f)MODULE_NAME: memory_corruptionIMAGE_NAME: memory_corruptionMEMORY_CORRUPTOR: LARGESTACK_COMMAND: .cxr; .ecxr ; kbFAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGEOS_VERSION: 10.0.18362.1BUILDLAB_STR: 19h1_releaseOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}Followup: memory_corruption ---------