RT,本人在联想门店加装固态后,电脑时不时出现蓝屏。用windbg分析结果如下: 大伙有明白下一步该怎么处理的么?求教 Microsoft (R) Windows Debugger Version 10.0.19041.685 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\030221-18687-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 18362 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 18362.1.amd64fre.19h1_release.190318-1202 Machine Name: Kernel base = 0xfffff805`46a00000 PsLoadedModuleList = 0xfffff805`46e45e90 Debug session time: Tue Mar 2 14:47:12.297 2021 (UTC + 8:00) System Uptime: 1 days 19:23:32.061 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ..................... Loading User Symbols Loading unloaded module list ....................... For analysis of this file, run !analyze -v 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000000000f9, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff805470753ea, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.Sec Value: 4 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on LAPTOP-05RP5RDN Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.Sec Value: 65 Key : Analysis.Memory.CommitPeak.Mb Value: 77 Key : Analysis.System Value: CreateObject BUGCHECK_CODE: a BUGCHECK_P1: f9 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff805470753ea READ_ADDRESS: fffff80546f713b8: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd fffff80546e283c8: Unable to get Flags value from nt!KdVersionBlock fffff80546e283c8: Unable to get Flags value from nt!KdVersionBlock unable to get nt!MmSpecialPagesInUse 00000000000000f9 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: ctfmon.exe TRAP_FRAME: ffff9f06b8fb7bc0 -- (.trap 0xffff9f06b8fb7bc0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000000f9 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff805470753ea rsp=ffff9f06b8fb7d50 rbp=ffffe18f2dcbb0c0 r8=0000000000000000 r9=0000000000000000 r10=0000000000000001 r11=ffffa18ca0b2304c r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr ac po nc nt!CmpCheckLeaf+0x7a: fffff805`470753ea 8400 test byte ptr [rax],al ds:00000000`000000f9=?? Resetting default scope MISALIGNED_IP: nt!CmpCheckLeaf+7a fffff805`470753ea 8400 test byte ptr [rax],al STACK_TEXT: ffff9f06`b8fb7a78 fffff805`46bd5929 : 00000000`0000000a 00000000`000000f9 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff9f06`b8fb7a80 fffff805`46bd1c69 : ffffe18f`0ea02100 fffff805`46a74ba1 ffffe18f`00000000 ffffe18f`0ea02000 : nt!KiBugCheckDispatch+0x69 ffff9f06`b8fb7bc0 fffff805`470753ea : ffffe18f`2dcbb3e0 fffff805`46e63930 ffffe18f`2dcbb3e0 fffff805`46a4e6bd : nt!KiPageFault+0x469 ffff9f06`b8fb7d50 ffff9f06`b8fb8108 : 00000000`00000000 ffffe18f`2dcbb0c0 fffff805`46f8b380 fffff805`46a4b35a : nt!CmpCheckLeaf+0x7a ffff9f06`b8fb7de0 00000000`00000000 : ffffe18f`2dcbb0c0 fffff805`46f8b380 fffff805`46a4b35a 00000000`01580c04 : 0xffff9f06`b8fb8108 SYMBOL_NAME: nt!CmpCheckLeaf+7a IMAGE_NAME: hardware IMAGE_VERSION: 10.0.18362.1379 STACK_COMMAND: .thread ; .cxr ; kb MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED OS_VERSION: 10.0.18362.1 BUILDLAB_STR: 19h1_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {201b0e5d-db2a-63d2-77be-8ce8ff234750} Followup: MachineOwner |