win 11系统经常蓝屏,蓝屏次数比较多,每天一次

win 11系统经常蓝屏,蓝屏次数比较多,每天一次

操作系统:Windows 11 家庭中文版

电脑型号:Dell Inspiron 16 plus 7620

电脑为2022年9月份买的新机器,2023年2月6日第一次蓝屏没有太关注,3月月7日后系统蓝屏频率为每天一次,有点崩溃,望专业大佬解救下。

蓝屏代码主要为如下:

1、终止代码:DRIVER_IRQL_NOT_LESS_OR_EQUAL,失败的操作:fwpkclnt.sys

2、终止代码:DPC_WATCHDOG_VIOLATION

通过WinDbg分析,最近一次的蓝屏日志如下:

Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64

Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [D:\032323-11062-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary **************

Response Time (ms) Location

Deferred srv*

Symbol search path is: srv*

Executable search path is:

Windows 10 Kernel Version 22621 MP (20 procs) Free x64

Product: WinNt, suite: TerminalServer SingleUserTS Personal

Edition build lab: 22621.1.amd64fre.ni_release.220506-1250

Machine Name:

Kernel base = 0xfffff805`10000000 PsLoadedModuleList = 0xfffff805`10c13430

Debug session time: Thu Mar 23 09:23:34.171 2023 (UTC + 8:00)

System Uptime: 0 days 20:32:55.855

Loading Kernel Symbols

...............................................................

................................................................

................................................................

.....................................................

Loading User Symbols

Loading unloaded module list

..................................................

For analysis of this file, run !analyze -v

nt!KeBugCheckEx:

fffff805`10429400 48894c2408 mov qword ptr [rsp+8],rcx ss:fffffa88`f7684d40=000000000000000a

4: kd> !analyze -v

*******************************************************************************

* *

* Bugcheck Analysis *

* *

*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If kernel debugger is available get stack backtrace.

Arguments:

Arg1: ffffe0803b43f000, memory referenced

Arg2: 0000000000000002, IRQL

Arg3: 0000000000000001, value 0 = read operation, 1 = write operation

Arg4: fffff80514eb4aaf, address which referenced memory

Debugging Details:

------------------

DBGHELP: Timeout to store: https://msdl.microsoft.com/download/symbols

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec

Value: 1046

Key : Analysis.DebugAnalysisManager

Value: Create

Key : Analysis.Elapsed.mSec

Value: 57014

Key : Analysis.IO.Other.Mb

Value: 0

Key : Analysis.IO.Read.Mb

Value: 4

Key : Analysis.IO.Write.Mb

Value: 0

Key : Analysis.Init.CPU.mSec

Value: 233

Key : Analysis.Init.Elapsed.mSec

Value: 11887

Key : Analysis.Memory.CommitPeak.Mb

Value: 107

Key : Bugcheck.Code.DumpHeader

Value: 0xd1

Key : Bugcheck.Code.Register

Value: 0xa

Key : WER.OS.Branch

Value: ni_release

Key : WER.OS.Timestamp

Value: 2022-05-06T12:50:00Z

Key : WER.OS.Version

Value: 10.0.22621.1

FILE_IN_CAB: 032323-11062-01.dmp

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffe0803b43f000

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff80514eb4aaf

WRITE_ADDRESS: fffff80510d1c468: Unable to get MiVisibleState

Unable to get NonPagedPoolStart

Unable to get NonPagedPoolEnd

Unable to get PagedPoolStart

Unable to get PagedPoolEnd

unable to get nt!MmSpecialPagesInUse

ffffe0803b43f000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: WeChat.exe

DPC_STACK_BASE: FFFFFA88F7687FB0

TRAP_FRAME: fffffa88f7684e80 -- (.trap 0xfffffa88f7684e80)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=ffff838eef5a8010 rbx=0000000000000000 rcx=ffff838eef5b7c60

rdx=ffff838eef5a8010 rsi=0000000000000000 rdi=0000000000000000

rip=fffff80514eb4aaf rsp=fffffa88f7685010 rbp=0000000000000001

r8=ffffe0803c0798c0 r9=000000006e706657 r10=fffff80514a9ef20

r11=0000000000000000 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei ng nz na po nc

fwpkclnt!FwppSetPacketInfo+0x89:

fffff805`14eb4aaf c7074677706e mov dword ptr [rdi],6E707746h ds:00000000`00000000=????????

Resetting default scope

STACK_TEXT:

fffffa88`f7684d38 fffff805`1043eaa9 : 00000000`0000000a ffffe080`3b43f000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx

fffffa88`f7684d40 fffff805`1043a134 : 00000000`00000000 ffffe080`3c134180 ffff838e`ef5b7c60 fffffa88`f7685950 : nt!KiBugCheckDispatch+0x69

fffffa88`f7684e80 fffff805`14eb4aaf : ffff838e`ef5b7c60 00000000`00000000 00000000`00000001 ffffe080`3b43f000 : nt!KiPageFault+0x474

fffffa88`f7685010 fffff805`14eb4900 : ffffe080`3b43f000 00000000`00000000 00000000`646e7044 fffff805`102d614f : fwpkclnt!FwppSetPacketInfo+0x89

fffffa88`f7685040 fffff805`14eb49a6 : 00000000`00000000 00000000`00000000 ffff8389`d6537b01 00000000`00000000 : fwpkclnt!FwppReferenceNetBufferListCommon+0xc6

fffffa88`f7685070 fffff805`14eb551b : ffff838e`ef5b7c60 ffff8389`d6537ba0 ffff8389`d6537ba0 fffffa88`f7685490 : fwpkclnt!FwppReferenceNetioNetBufferList+0x4a

fffffa88`f76850c0 fffff805`3a3361db : fffffa88`f7685490 00000000`00000002 00000000`00000004 fffff805`00000007 : fwpkclnt!FwpsReferenceNetBufferList0+0x2b

fffffa88`f76850f0 fffffa88`f7685490 : 00000000`00000002 00000000`00000004 fffff805`00000007 ffff838e`ef5a5010 : Dcntgrd+0x61db

fffffa88`f76850f8 00000000`00000002 : 00000000`00000004 fffff805`00000007 ffff838e`ef5a5010 00000000`00000006 : 0xfffffa88`f7685490

fffffa88`f7685100 00000000`00000004 : fffff805`00000007 ffff838e`ef5a5010 00000000`00000006 ffffffff`00ffffff : 0x2

fffffa88`f7685108 fffff805`00000007 : ffff838e`ef5a5010 00000000`00000006 ffffffff`00ffffff 7421d358`00000000 : 0x4

fffffa88`f7685110 ffff838e`ef5a5010 : 00000000`00000006 ffffffff`00ffffff 7421d358`00000000 ffff8389`ce01a450 : 0xfffff805`00000007

fffffa88`f7685118 00000000`00000006 : ffffffff`00ffffff 7421d358`00000000 ffff8389`ce01a450 fffff805`14eb40d2 : 0xffff838e`ef5a5010

fffffa88`f7685120 ffffffff`00ffffff : 7421d358`00000000 ffff8389`ce01a450 fffff805`14eb40d2 ffff8389`00000050 : 0x6

fffffa88`f7685128 7421d358`00000000 : ffff8389`ce01a450 fffff805`14eb40d2 ffff8389`00000050 00000000`00000000 : 0xffffffff`00ffffff

fffffa88`f7685130 ffff8389`ce01a450 : fffff805`14eb40d2 ffff8389`00000050 00000000`00000000 00000000`00000002 : 0x7421d358`00000000

fffffa88`f7685138 fffff805`14eb40d2 : ffff8389`00000050 00000000`00000000 00000000`00000002 00000000`00000000 : 0xffff8389`ce01a450

fffffa88`f7685140 fffff805`14eb5485 : ffff8389`ce0103b9 00000000`00000000 00000000`00000cbe ffff838c`9d0a9030 : fwpkclnt!FwppGetPacketInfo+0x10

fffffa88`f7685170 fffff805`3a336aea : 00000000`00000000 fffffa88`f7685230 fffffa88`f7685950 00000000`00000017 : fwpkclnt!FwpsQueryPacketInjectionState0+0x85

fffffa88`f76851a0 00000000`00000000 : fffffa88`f7685230 fffffa88`f7685950 00000000`00000017 ffff8389`fafb1ed0 : Dcntgrd+0x6aea

SYMBOL_NAME: fwpkclnt!FwppSetPacketInfo+89

MODULE_NAME: fwpkclnt

IMAGE_NAME: fwpkclnt.sys

IMAGE_VERSION: 10.0.22621.1194

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 89

FAILURE_BUCKET_ID: AV_fwpkclnt!FwppSetPacketInfo

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {373ff51e-e794-ab37-6fe1-5c7719ddaac3}

Followup: MachineOwner

---------

相关推荐

课桌的长和宽是多少?课桌的长和宽是多少厘米?
365etb为什么关闭账号

课桌的长和宽是多少?课桌的长和宽是多少厘米?

07-03 👁️ 7316
冒险岛平民玩家神秘球满级堆500万面板需要多久?
365etb为什么关闭账号

冒险岛平民玩家神秘球满级堆500万面板需要多久?

08-11 👁️ 6780
投稿指南【NO.12_12】【极易投中】期刊投稿(​电脑知识与技术)
Excel函数大全
365bet有手机版吗

Excel函数大全

07-15 👁️ 9361
虎扑怎么保存视频 虎扑保存视频的操作方法
可以押镖的手游大全
365etb为什么关闭账号

可以押镖的手游大全

07-28 👁️ 2465