好友
阅读权限10
听众
最后登录1970-1-1
|
25吾爱币
本帖最后由 h14164 于 2023-5-30 01:03 编辑
win10电脑蓝屏
电脑开机是在欢迎页面突然断电,来电以后开机,启动360加速球游戏模式,就蓝屏,提示错误IRQL_NOT_LESS_OR_EQUAL,有办法解决吗?现在已经重新安装无线网卡驱动,网卡驱动,显卡驱动,依旧启动360加速球游戏模式就蓝屏,360也卸载重装了.下面是windbg,
错误日志
链接: https://pan.baidu.com/s/1KntXuhFNIqCQr37FoPtJfg?pwd=52pj 提取码: 52pj
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\052923-24953-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path valIDAtion summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 17763 MP (6 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSEdition build lab: 17763.1.amd64fre.rs5_release.180914-1434Machine Name:Kernel base = 0xfffff806`6eaac000 PsLoadedModuleList = 0xfffff806`6eec5510Debug session time: Mon May 29 21:46:04.563 2023 (UTC + 8:00)System Uptime: 0 days 0:10:37.462Loading Kernel Symbols.......................................................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list.......For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff806`6ec65340 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8002`c3e067d0=000000000000000aLoading Dump File [C:\Windows\MEMORY.DMP]Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.Can't set dump file contextsMachineInfo::SetContext failed - Thread: 00000151F6B773D0 Handle: 6 Id: 6 - Error == 0x8000FFFF************* Path validation summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 17763 MP (6 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSEdition build lab: 17763.1.amd64fre.rs5_release.180914-1434Machine Name:Kernel base = 0xfffff801`65812000 PsLoadedModuleList = 0xfffff801`65c2b510Debug session time: Tue May 30 00:33:41.954 2023 (UTC + 8:00)System Uptime: 0 days 0:02:06.860Loading Kernel Symbols...........................................................................Page 116b97 not present in the dump file. Type ".hh dbgerr004" for details.....................................................................................................Page 13c77c not present in the dump file. Type ".hh dbgerr004" for details.Page 13c707 not present in the dump file. Type ".hh dbgerr004" for details.Page 1125 not present in the dump file. Type ".hh dbgerr004" for details..........................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 00000061`321f2018). Type ".hh dbgerr001" for detailsLoading unloaded module list......nt!KeBugCheckEx:fffff801`659cb340 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffba04`099ee6c0=000000000000000a||1:0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: fffff80165d938b0, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000008, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff80165d938b0, address which referenced memoryDebugging Details:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2374 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 17628 Key : Analysis.IO.Other.Mb Value: 1 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 4 Key : Analysis.Init.CPU.mSec Value: 2265 Key : Analysis.Init.Elapsed.mSec Value: 77495 Key : Analysis.Memory.CommitPeak.Mb Value: 155 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.KiBugCheckData Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: rs5_release Key : WER.OS.Timestamp Value: 2018-09-14T14:34:00Z Key : WER.OS.Version Value: 10.0.17763.1FILE_IN_CAB: MEMORY.DMPBUGCHECK_CODE: aBUGCHECK_P1: fffff80165d938b0BUGCHECK_P2: 2BUGCHECK_P3: 8BUGCHECK_P4: fffff80165d938b0READ_ADDRESS: fffff80165d938b0 IP_IN_PAGED_CODE: nt!EtwpApplyLevelKwFilterInner+0fffff801`65d938b0 8bc2 mov eax,edxPROCESS_NAME: SearchIndexer.exeTRAP_FRAME: ffffba04099ee800 -- (.trap 0xffffba04099ee800)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000 rcx=ffffaa0898c1b1a0rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=fffff80165d938b0 rsp=ffffba04099ee998 rbp=ffffba04099eea20 r8=0000000000000004 r9=80000000000000a0 r10=ffffaa0898c1b1a0r11=0000000000000002 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po ncnt!EtwpApplyLevelKwFilterInner:fffff801`65d938b0 8bc2 mov eax,edxResetting default scopeFAILED_INSTRUCTION_ADDRESS: nt!EtwpApplyLevelKwFilterInner+0fffff801`65d938b0 8bc2 mov eax,edxSTACK_TEXT: ffffba04`099ee6b8 fffff801`659ded29 : 00000000`0000000a fffff801`65d938b0 00000000`00000002 00000000`00000008 : nt!KeBugCheckExffffba04`099ee6c0 fffff801`659daa0e : 00000000`00000000 00000000`00000050 00000000`00000050 00000000`00000000 : nt!KiBugCheckDispatch+0x69ffffba04`099ee800 fffff801`65d938b0 : fffff801`660d365c 00000000`00000010 00000000`00010293 ffffba04`099ee9c8 : nt!KiPageFault+0x44effffba04`099ee998 fffff801`660d365c : 00000000`00000010 00000000`00010293 ffffba04`099ee9c8 00000000`00000018 : nt!EtwpApplyLevelKwFilterInnerffffba04`099ee9a0 fffff801`658c8998 : 00000000`00000080 00000000`00015ea0 ffffba04`099eea40 fffff801`65b0d662 : nt!EtwpApplyLevelKwFilter+0x58ffffba04`099ee9d0 fffff801`658cac58 : ffffaa08`a36530b0 fffff801`7a88b311 00000000`00000000 fffff801`00000000 : nt!EtwpEventWriteFull+0x6a8ffffba04`099eed50 fffff801`65b2109f : ffffaa08`a3e1b8b8 ffffaa08`a57b1700 ffffaa08`a3e1b8a0 00000000`00000000 : nt!EtwWriteEx+0x148ffffba04`099eee60 fffff801`65b21d95 : 00000000`00000440 ffffba04`099eef98 00000000`00000003 ffffba04`099ef0e8 : nt!EtwpFileProvTrace+0x17fffffba04`099eeec0 fffff801`7ad92c78 : ffffaa08`a36530f8 ffffba04`099eef99 ffffba04`099ef110 fffff801`65b21d30 : nt!EtwpTraceFileIo+0x65ffffba04`099eef00 fffff801`7ad92523 : ffffaa08`a3653298 00000000`00000000 00000000`00000000 fffff801`65839c98 : fileinfo!FIETWLogFileCreate+0x158ffffba04`099ef000 fffff801`7a85fca2 : 00000000`00000000 00000000`00000000 ffffba04`00000000 00000000`00000000 : fileinfo!FIPreCreateCallback+0x2d13ffffba04`099ef080 fffff801`7a857389 : ffffba04`099ef250 ffffba04`099ef800 ffffaa08`a57b1700 ffffaa08`00000000 : FLTMGR!FltpPerformPreCallbacksWorker+0x4d2ffffba04`099ef190 fffff801`7a856f6c : ffffaa08`a1419a80 ffffba04`099f0000 ffffba04`099e9000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacks+0x79ffffba04`099ef1e0 fffff801`7a88dce5 : ffffaa08`9abb3d60 fffff801`7a858622 00000020`00000000 fffff801`00000040 : FLTMGR!FltpPassThroughInternal+0x8cffffba04`099ef210 fffff801`6583ef39 : ffffaa08`a57b1600 00000000`00000045 00000000`00000000 ffffba04`00000030 : FLTMGR!FltpCreate+0x2e5ffffba04`099ef2c0 fffff801`65837f54 : 00000000`00000000 ffffaa08`a1419a80 ffffba04`099ef820 ffffaa08`a1419a80 : nt!IofCallDriver+0x59ffffba04`099ef300 fffff801`65dddb77 : ffffba04`099ef5c0 00000000`00000045 ffffaa08`9aae1930 ffffaa08`9acf99a0 : nt!IoCallDriverWithTracing+0x34ffffba04`099ef350 fffff801`65de6279 : ffffaa08`9aae1930 ffffaa08`9aae1900 ffffaa08`a14afa80 ffffbb88`6e116301 : nt!IopParseDevice+0x11e7ffffba04`099ef4c0 fffff801`65de4d7f : ffffaa08`a14afa00 ffffba04`099ef728 00000800`00000040 ffffaa08`986f2820 : nt!ObpLookupObjectName+0x719ffffba04`099ef690 fffff801`65dc328d : 00000a00`00000001 00000061`322fbaa0 00000000`00000001 00000061`322fbb40 : nt!ObOpenObjectByNameEx+0x1dfffffba04`099ef7d0 fffff801`659de4f5 : ffffaa08`a50e4080 00000000`00000004 ffffaa08`a50e4080 00000061`322fbb40 : nt!NtQueryAttributesFile+0x1cdffffba04`099efa80 00007ff9`8cb50804 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x2500000061`322fba38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`8cb50804SYMBOL_NAME: fileinfo!FIETWLogFileCreate+158MODULE_NAME: fileinfoIMAGE_NAME: fileinfo.sysSTACK_COMMAND: .cxr; .ecxr ; kbBUCKET_ID_FUNC_OFFSET: 158FAILURE_BUCKET_ID: AV_CODE_AV_PAGED_IP_fileinfo!FIETWLogFileCreateOS_VERSION: 10.0.17763.1BUILDLAB_STR: rs5_releaseOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {2c179f92-b14d-acec-c059-2daef3194260}Followup: MachineOwner--------- |
最佳答案
查看完整内容
searchindexer exe进程CPU高占用或出错怎么禁用。
https://www.sohu.com/a/444655533_120006554
蓝屏的问题如上,当时如果能处理,也许就不用重装了。
已经重装了,但是数据都找不到了。(以后要安装官方完整版,精简版的会有很多bug,还没法修复)
用工具对原来的数据分区进行扫描恢复,有一定的概率找回一些文件,你可以试试。
恢复数据的详细教程
https://diskgenius.cn/exp/use-tutorial.php
|
发帖前要善用【论坛搜索】功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。 |
|
|
|
|