电脑5分钟就出现蓝屏,蓝屏错误就是IRQL NOT LESS OR EQUAL
这是蓝屏文件错误内容:Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\ASUS\Desktop\062424-23328-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path validation summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 18362 MP (20 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSEdition build lab: 18362.1.amd64fre.19h1_release.190318-1202Machine Name:Kernel base = 0xfffff806`2dc00000 PsLoadedModuleList = 0xfffff806`2e045f30Debug session time: Mon Jun 24 22:24:18.015 2024 (UTC + 8:00)System Uptime: 0 days 0:05:12.744Loading Kernel Symbols..............................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list........For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff806`2ddc3e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc00`068595f0=000000000000000a6: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: fffff70001164420, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8062dc35e55, address which referenced memoryDebugging Details:------------------*** WARNING: Unable to verify checksum for win32k.sysKEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2046 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 2105 Key : Analysis.Init.CPU.mSec Value: 827 Key : Analysis.Init.Elapsed.mSec Value: 2630 Key : Analysis.Memory.CommitPeak.Mb Value: 79 Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1BUGCHECK_CODE: aBUGCHECK_P1: fffff70001164420BUGCHECK_P2: 2BUGCHECK_P3: 1BUGCHECK_P4: fffff8062dc35e55WRITE_ADDRESS: fffff8062e1713b8: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse fffff70001164420 BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: SystemTRAP_FRAME: fffffc0006859730 -- (.trap 0xfffffc0006859730)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000 rcx=fffff70001164420rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=fffff8062dc35e55 rsp=fffffc00068598c8 rbp=0000000000000000 r8=0000000080000000 r9=fffff70001164420 r10=0000000fffffffffr11=ffff8c823d551000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po ncnt!MiUnmapPageInHyperSpaceWorker+0x85:fffff806`2dc35e55 498911 mov qword ptr [r9],rdx ds:fffff700`01164420=????????????????Resetting default scopeBAD_STACK_POINTER: fffffc00068595e8SYMBOL_NAME: nt!MiUnmapPageInHyperSpaceWorker+85MODULE_NAME: ntIMAGE_VERSION: 10.0.18362.1556STACK_COMMAND: .thread ; .cxr ; kbIMAGE_NAME: ntkrnlmp.exeBUCKET_ID_FUNC_OFFSET: 85FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MiUnmapPageInHyperSpaceWorkerOS_VERSION: 10.0.18362.1BUILDLAB_STR: 19h1_releaseOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {63df5f76-e891-303f-fc12-d12cb00c9e46}Followup: MachineOwner---------
这是蓝屏文件错误内容:Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Users\ASUS\Desktop\062424-23328-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path validation summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 18362 MP (20 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSEdition build lab: 18362.1.amd64fre.19h1_release.190318-1202Machine Name:Kernel base = 0xfffff806`2dc00000 PsLoadedModuleList = 0xfffff806`2e045f30Debug session time: Mon Jun 24 22:24:18.015 2024 (UTC + 8:00)System Uptime: 0 days 0:05:12.744Loading Kernel Symbols..............................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list........For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff806`2ddc3e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc00`068595f0=000000000000000a6: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: fffff70001164420, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8062dc35e55, address which referenced memoryDebugging Details:------------------*** WARNING: Unable to verify checksum for win32k.sysKEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2046 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 2105 Key : Analysis.Init.CPU.mSec Value: 827 Key : Analysis.Init.Elapsed.mSec Value: 2630 Key : Analysis.Memory.CommitPeak.Mb Value: 79 Key : WER.OS.Branch Value: 19h1_release Key : WER.OS.Timestamp Value: 2019-03-18T12:02:00Z Key : WER.OS.Version Value: 10.0.18362.1BUGCHECK_CODE: aBUGCHECK_P1: fffff70001164420BUGCHECK_P2: 2BUGCHECK_P3: 1BUGCHECK_P4: fffff8062dc35e55WRITE_ADDRESS: fffff8062e1713b8: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse fffff70001164420 BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: SystemTRAP_FRAME: fffffc0006859730 -- (.trap 0xfffffc0006859730)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000000 rbx=0000000000000000 rcx=fffff70001164420rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=fffff8062dc35e55 rsp=fffffc00068598c8 rbp=0000000000000000 r8=0000000080000000 r9=fffff70001164420 r10=0000000fffffffffr11=ffff8c823d551000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po ncnt!MiUnmapPageInHyperSpaceWorker+0x85:fffff806`2dc35e55 498911 mov qword ptr [r9],rdx ds:fffff700`01164420=????????????????Resetting default scopeBAD_STACK_POINTER: fffffc00068595e8SYMBOL_NAME: nt!MiUnmapPageInHyperSpaceWorker+85MODULE_NAME: ntIMAGE_VERSION: 10.0.18362.1556STACK_COMMAND: .thread ; .cxr ; kbIMAGE_NAME: ntkrnlmp.exeBUCKET_ID_FUNC_OFFSET: 85FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!MiUnmapPageInHyperSpaceWorkerOS_VERSION: 10.0.18362.1BUILDLAB_STR: 19h1_releaseOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {63df5f76-e891-303f-fc12-d12cb00c9e46}Followup: MachineOwner---------