- 惠普社区
- >
- 八月饼 的帖子
最新主题
2022-12-30
17:10:08
蓝屏文件:链接:https://pan.baidu.com/s/1KXZp3BtAyobDInUntaWaEA?pwd=psvn 提取码:psvn
2022-12-30
17:04:27
由于聊天栏不支持dmp文件,所以放两个最近的蓝屏解析代码,希望有大佬帮忙看一下,谢谢: Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\M...
查看更多...
由于聊天栏不支持dmp文件,所以放两个最近的蓝屏解析代码,希望有大佬帮忙看一下,谢谢: Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\123022-11453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff806`30400000 PsLoadedModuleList = 0xfffff806`3102a290
Debug session time: Fri Dec 30 16:48:30.333 2022 (UTC + 9:00)
System Uptime: 0 days 0:12:53.090
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -vnt!KeBugCheckEx:
fffff806`307f92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc0e`33aa73f0=000000000000000a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffffffffff000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000027, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80630964749, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 4081
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 452
Key : Analysis.Init.Elapsed.mSec
Value: 5790
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 123022-11453-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: fffffffffffff000
BUGCHECK_P2: ff
BUGCHECK_P3: 27
BUGCHECK_P4: fffff80630964749
WRITE_ADDRESS: fffff806310fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffffffffffff000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffc0e33aa7530 -- (.trap 0xfffffc0e33aa7530)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000200
rdx=00000001cced64ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80630964749 rsp=fffffc0e33aa76c0 rbp=0000000000000001
r8=0000000000000001 r9=0000000000000010 r10=0000fffff8063072
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po nc
nt!PpmIdleUpdateConcurrency+0x79:
fffff806`30964749 488b5c2440 mov rbx,qword ptr [rsp+40h] ss:0018:fffffc0e`33aa7700=ffffac0fe4a8f000
Resetting default scope
STACK_TEXT:
fffffc0e`33aa73e8 fffff806`3080d329 : 00000000`0000000a ffffffff`fffff000 00000000`000000ff 00000000`00000027 : nt!KeBugCheckEx
fffffc0e`33aa73f0 fffff806`30808ee3 : 00000001`cccc5622 00000000`00000000 00000001`cce91b00 fffffc0e`33aa7560 : nt!KiBugCheckDispatch+0x69
fffffc0e`33aa7530 fffff806`30964749 : ffffac0f`e4a8f000 ffff8001`4d79f180 00000001`cced64ff 00000000`00000001 : nt!KiPageFault+0x463
fffffc0e`33aa76c0 00000000`00000000 : ffffac0f`e4a8f000 00000000`00000000 00000000`00000000 fffffc0e`33aa77c0 : nt!PpmIdleUpdateConcurrency+0x79
SYMBOL_NAME: nt!PpmIdleUpdateConcurrency+79
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2364
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 79
FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdleUpdateConcurrency
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8f8fa61f-e124-02ce-47cb-ef649431671e}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\123022-11484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Machine Name:
Kernel base = 0xfffff801`4da00000 PsLoadedModuleList = 0xfffff801`4e62a290
Debug session time: Fri Dec 30 17:00:16.924 2022 (UTC + 9:00)
System Uptime: 0 days 0:11:27.680
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -vnt!KeBugCheckEx:
fffff801`4ddf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff607`ccf56490=000000000000000a
10: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000002711, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8014dc13747, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2156
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2201
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 437
Key : Analysis.Init.Elapsed.mSec
Value: 7175
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Bugcheck.Code.DumpHeader
Value: 0xa
Key : Bugcheck.Code.Register
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
FILE_IN_CAB: 123022-11484-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: a
BUGCHECK_P1: 2711
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8014dc13747
READ_ADDRESS: fffff8014e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000002711
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: ffxiv.exe
TRAP_FRAME: fffff607ccf565d0 -- (.trap 0xfffff607ccf565d0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000002711 rbx=0000000000000000 rcx=fffff607ccf567c0
rdx=ffff80053b2cb948 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8014dc13747 rsp=fffff607ccf56760 rbp=0101010101010101
r8=0000000000000000 r9=ffff80053b2cb918 r10=0000000000002bd7
r11=0000000000000003 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!KiSwapThread+0xb37:
fffff801`4dc13747 8400 test byte ptr [rax],al ds:00000000`00002711=??
Resetting default scope
MISALIGNED_IP:
nt!KiSwapThread+b37
fffff801`4dc13747 8400 test byte ptr [rax],al
STACK_TEXT:
fffff607`ccf56488 fffff801`4de0d329 : 00000000`0000000a 00000000`00002711 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff607`ccf56490 fffff801`4de08ee3 : 00000000`00000000 00000000`00000000 ffff8005`3b2cb080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff607`ccf565d0 fffff801`4dc13747 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x463
fffff607`ccf56760 01010101`01010101 : ffffbf81`2cb9f180 fffff801`4dc12e30 ffffbf81`2c580180 fffffff6`00000000 : nt!KiSwapThread+0xb37
fffff607`ccf56810 ffffbf81`2cb9f180 : fffff801`4dc12e30 ffffbf81`2c580180 fffffff6`00000000 fffff607`00000000 : 0x01010101`01010101
fffff607`ccf56818 fffff801`4dc12e30 : ffffbf81`2c580180 fffffff6`00000000 fffff607`00000000 ffff8005`3b2b2158 : 0xffffbf81`2cb9f180
fffff607`ccf56820 fffff801`4dc1263f : 00000000`00000001 00000000`0000000f fffff607`ccf569e0 0000ffff`00000000 : nt!KiSwapThread+0x220
fffff607`ccf568d0 fffff801`4dc11ee3 : ffff8005`00000000 fffff801`00000000 00000000`00040200 ffff8005`3b2cb1c0 : nt!KiCommitThreadWait+0x14f
fffff607`ccf56970 fffff801`4e008371 : ffff8005`3b29cce0 00000000`00000006 00000000`00000001 ffff8005`3a969000 : nt!KeWaitForSingleObject+0x233
fffff607`ccf56a60 fffff801`4e00841a : ffff8005`3b2cb080 00000000`00000000 00000000`00000000 00000000`23fffe40 : nt!ObWaitForSingleObject+0x91
fffff607`ccf56ac0 fffff801`4de0caf8 : ffff8005`3b2cb080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6a
fffff607`ccf56b00 00000000`77741cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`23efecb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77741cfc
SYMBOL_NAME: nt!KiSwapThread+b37
IMAGE_VERSION: 10.0.19041.2364
STACK_COMMAND: .cxr; .ecxr ; kb
MODULE_NAME: AuthenticAMD
IMAGE_NAME: AuthenticAMD.sys
FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2}
Followup: MachineOwner
---------
2022-12-30
16:48:05
暗影精灵6锐龙版,RTX2060 打大型3D游戏时运行一会就蓝屏,拔掉电源后打游戏没问题,有时候不打游戏也蓝屏 windbg显示蓝屏原因多为AuthenticAMD.sys或者ntkrnlmp.exe 已尝试但均无效:清灰换硅脂,橡皮擦内存条金手指,更新显卡驱动,BIOS;sfc/dism工具、Memtest64内存检查(无异常),惠普自带的硬件检测工具(无异常)