电脑频繁蓝屏,蓝屏代码不一样,但是分析蓝屏文件,最后部分都是这个,麻烦大神帮看一下,谢谢
Loading Dump File [C:\Windows\Minidump\110224-45968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`69c00000 PsLoadedModuleList = 0xfffff801`6a82a7c0
Debug session time: Sat Nov 2 22:20:03.857 2024 (UTC + 8:00)
System Uptime: 0 days 4:23:19.986
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000188, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000e5, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016a01242b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on LAPTOP-IJ9JAD3D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: a
BUGCHECK_P1: 188
BUGCHECK_P2: ff
BUGCHECK_P3: e5
BUGCHECK_P4: fffff8016a01242b
WRITE_ADDRESS: fffff8016a8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016a80f418: Unable to get Flags value from nt!KdVersionBlock
fffff8016a80f418: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000188
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: tbAgent.exe
TRAP_FRAME: ffffce82e1c99970 -- (.trap 0xffffce82e1c99970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff89030c7a7080
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016a01242b rsp=ffffce82e1c99b00 rbp=ffffce82e1c99b80
r8=0000000000000024 r9=0000000000000001 r10=0000000000000000
r11=ffff89030c7a7080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiSystemServiceExit+0x11b:
fffff801`6a01242b 8b0c2588010000 mov ecx,dword ptr [188h] ds:00000000`00000188=????????
Resetting default scope
MISALIGNED_IP:
nt!KiSystemServiceExit+11b
fffff801`6a01242b 8b0c2588010000 mov ecx,dword ptr [188h]
STACK_TEXT:
ffffce82`e1c99828 fffff801`6a012ba9 : 00000000`0000000a 00000000`00000188 00000000`000000ff 00000000`000000e5 : nt!KeBugCheckEx
ffffce82`e1c99830 fffff801`6a00e578 : 00000000`00000001 ffff8903`0c7a7180 00000000`00000002 ffffd080`d63c5180 : nt!KiBugCheckDispatch+0x69
ffffce82`e1c99970 fffff801`6a01242b : 00000000`99ac522a ffff8903`111cb080 ffffffff`fffe7960 ffff8903`00000000 : nt!KiPageFault+0x478
ffffce82`e1c99b00 00000000`775b1cfc : 00000000`775b1bd9 00000023`7763331c 00000000`00000023 00000000`00000202 : nt!KiSystemServiceExit+0x11b
00000000`2054edc8 00000000`775b1bd9 : 00000023`7763331c 00000000`00000023 00000000`00000202 00000000`32f3f9fc : 0x775b1cfc
00000000`2054edd0 00000023`7763331c : 00000000`00000023 00000000`00000202 00000000`32f3f9fc 00000000`0000002b : 0x775b1bd9
00000000`2054edd8 00000000`00000023 : 00000000`00000202 00000000`32f3f9fc 00000000`0000002b 00000000`00000000 : 0x00000023`7763331c
00000000`2054ede0 00000000`00000202 : 00000000`32f3f9fc 00000000`0000002b 00000000`00000000 00000000`00000000 : 0x23
00000000`2054ede8 00000000`32f3f9fc : 00000000`0000002b 00000000`00000000 00000000`00000000 00000000`00000000 : 0x202
00000000`2054edf0 00000000`0000002b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x32f3f9fc
00000000`2054edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00007ffa`052a3d43 : 0x2b
SYMBOL_NAME: nt!KiSystemServiceExit+11b
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.5007
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------
Loading Dump File [C:\Windows\Minidump\110224-45968-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`69c00000 PsLoadedModuleList = 0xfffff801`6a82a7c0
Debug session time: Sat Nov 2 22:20:03.857 2024 (UTC + 8:00)
System Uptime: 0 days 4:23:19.986
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000188, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 00000000000000e5, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8016a01242b, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on LAPTOP-IJ9JAD3D
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: a
BUGCHECK_P1: 188
BUGCHECK_P2: ff
BUGCHECK_P3: e5
BUGCHECK_P4: fffff8016a01242b
WRITE_ADDRESS: fffff8016a8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8016a80f418: Unable to get Flags value from nt!KdVersionBlock
fffff8016a80f418: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000188
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: tbAgent.exe
TRAP_FRAME: ffffce82e1c99970 -- (.trap 0xffffce82e1c99970)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff89030c7a7080
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016a01242b rsp=ffffce82e1c99b00 rbp=ffffce82e1c99b80
r8=0000000000000024 r9=0000000000000001 r10=0000000000000000
r11=ffff89030c7a7080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl zr na po nc
nt!KiSystemServiceExit+0x11b:
fffff801`6a01242b 8b0c2588010000 mov ecx,dword ptr [188h] ds:00000000`00000188=????????
Resetting default scope
MISALIGNED_IP:
nt!KiSystemServiceExit+11b
fffff801`6a01242b 8b0c2588010000 mov ecx,dword ptr [188h]
STACK_TEXT:
ffffce82`e1c99828 fffff801`6a012ba9 : 00000000`0000000a 00000000`00000188 00000000`000000ff 00000000`000000e5 : nt!KeBugCheckEx
ffffce82`e1c99830 fffff801`6a00e578 : 00000000`00000001 ffff8903`0c7a7180 00000000`00000002 ffffd080`d63c5180 : nt!KiBugCheckDispatch+0x69
ffffce82`e1c99970 fffff801`6a01242b : 00000000`99ac522a ffff8903`111cb080 ffffffff`fffe7960 ffff8903`00000000 : nt!KiPageFault+0x478
ffffce82`e1c99b00 00000000`775b1cfc : 00000000`775b1bd9 00000023`7763331c 00000000`00000023 00000000`00000202 : nt!KiSystemServiceExit+0x11b
00000000`2054edc8 00000000`775b1bd9 : 00000023`7763331c 00000000`00000023 00000000`00000202 00000000`32f3f9fc : 0x775b1cfc
00000000`2054edd0 00000023`7763331c : 00000000`00000023 00000000`00000202 00000000`32f3f9fc 00000000`0000002b : 0x775b1bd9
00000000`2054edd8 00000000`00000023 : 00000000`00000202 00000000`32f3f9fc 00000000`0000002b 00000000`00000000 : 0x00000023`7763331c
00000000`2054ede0 00000000`00000202 : 00000000`32f3f9fc 00000000`0000002b 00000000`00000000 00000000`00000000 : 0x23
00000000`2054ede8 00000000`32f3f9fc : 00000000`0000002b 00000000`00000000 00000000`00000000 00000000`00000000 : 0x202
00000000`2054edf0 00000000`0000002b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x32f3f9fc
00000000`2054edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00007ffa`052a3d43 : 0x2b
SYMBOL_NAME: nt!KiSystemServiceExit+11b
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.5007
STACK_COMMAND: .thread ; .cxr ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750}
Followup: MachineOwner
---------