- 将帖子标记为未读
- 将此主题添加到书签
- 订阅此主题
- 禁止
- 订阅此主题的 RSS 提要
- 高亮显示此贴
- 打印此贴
- 标记帖子
暗影精灵6锐龙版大型游戏时蓝屏
发布时间 2022-12-30 16:48:05
产品名称: 暗影精灵6
操作系统: Microsoft Windows 10 (64-bit)
暗影精灵6锐龙版,RTX2060
打大型3D游戏时运行一会就蓝屏,拔掉电源后打游戏没问题,有时候不打游戏也蓝屏
windbg显示蓝屏原因多为AuthenticAMD.sys或者ntkrnlmp.exe
已尝试但均无效:清灰换硅脂,橡皮擦内存条金手指,更新显卡驱动,BIOS;sfc/dism工具、Memtest64内存检查(无异常),惠普自带的硬件检测工具(无异常)
2 条回复2
- 将帖子标记为未读
- 将此主题添加到书签
- 订阅此主题
- 禁止
- 订阅此主题的 RSS 提要
- 高亮显示此贴
- 打印此贴
- 标记帖子
暗影精灵6锐龙版大型游戏时蓝屏
发布时间 2022-12-30 17:04:27
由于聊天栏不支持dmp文件,所以放两个最近的蓝屏解析代码,希望有大佬帮忙看一下,谢谢:
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\123022-11453-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff806`30400000 PsLoadedModuleList = 0xfffff806`3102a290 Debug session time: Fri Dec 30 16:48:30.333 2022 (UTC + 9:00) System Uptime: 0 days 0:12:53.090 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ............................ Loading User Symbols Loading unloaded module list .......... For analysis of this file, run !analyze -vnt!KeBugCheckEx: fffff806`307f92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffc0e`33aa73f0=000000000000000a 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffffffffffff000, memory referenced Arg2: 00000000000000ff, IRQL Arg3: 0000000000000027, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80630964749, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2343 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4081 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 452 Key : Analysis.Init.Elapsed.mSec Value: 5790 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 123022-11453-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: fffffffffffff000 BUGCHECK_P2: ff BUGCHECK_P3: 27 BUGCHECK_P4: fffff80630964749 WRITE_ADDRESS: fffff806310fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse fffffffffffff000 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System TRAP_FRAME: fffffc0e33aa7530 -- (.trap 0xfffffc0e33aa7530)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000200 rdx=00000001cced64ff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80630964749 rsp=fffffc0e33aa76c0 rbp=0000000000000001 r8=0000000000000001 r9=0000000000000010 r10=0000fffff8063072 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up di ng nz na po nc nt!PpmIdleUpdateConcurrency+0x79: fffff806`30964749 488b5c2440 mov rbx,qword ptr [rsp+40h] ss:0018:fffffc0e`33aa7700=ffffac0fe4a8f000 Resetting default scope STACK_TEXT: fffffc0e`33aa73e8 fffff806`3080d329 : 00000000`0000000a ffffffff`fffff000 00000000`000000ff 00000000`00000027 : nt!KeBugCheckEx fffffc0e`33aa73f0 fffff806`30808ee3 : 00000001`cccc5622 00000000`00000000 00000001`cce91b00 fffffc0e`33aa7560 : nt!KiBugCheckDispatch+0x69 fffffc0e`33aa7530 fffff806`30964749 : ffffac0f`e4a8f000 ffff8001`4d79f180 00000001`cced64ff 00000000`00000001 : nt!KiPageFault+0x463 fffffc0e`33aa76c0 00000000`00000000 : ffffac0f`e4a8f000 00000000`00000000 00000000`00000000 fffffc0e`33aa77c0 : nt!PpmIdleUpdateConcurrency+0x79 SYMBOL_NAME: nt!PpmIdleUpdateConcurrency+79 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.2364 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 79 FAILURE_BUCKET_ID: AV_CODE_AV_nt!PpmIdleUpdateConcurrency OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {8f8fa61f-e124-02ce-47cb-ef649431671e} Followup: MachineOwner ---------
Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\123022-11484-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff801`4da00000 PsLoadedModuleList = 0xfffff801`4e62a290 Debug session time: Fri Dec 30 17:00:16.924 2022 (UTC + 9:00) System Uptime: 0 days 0:11:27.680 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ............................ Loading User Symbols Loading unloaded module list .......... For analysis of this file, run !analyze -vnt!KeBugCheckEx: fffff801`4ddf92a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff607`ccf56490=000000000000000a 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000002711, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8014dc13747, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2156 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 2201 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 437 Key : Analysis.Init.Elapsed.mSec Value: 7175 Key : Analysis.Memory.CommitPeak.Mb Value: 85 Key : Bugcheck.Code.DumpHeader Value: 0xa Key : Bugcheck.Code.Register Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 123022-11484-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: a BUGCHECK_P1: 2711 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8014dc13747 READ_ADDRESS: fffff8014e6fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000002711 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: ffxiv.exe TRAP_FRAME: fffff607ccf565d0 -- (.trap 0xfffff607ccf565d0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000000002711 rbx=0000000000000000 rcx=fffff607ccf567c0 rdx=ffff80053b2cb948 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8014dc13747 rsp=fffff607ccf56760 rbp=0101010101010101 r8=0000000000000000 r9=ffff80053b2cb918 r10=0000000000002bd7 r11=0000000000000003 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!KiSwapThread+0xb37: fffff801`4dc13747 8400 test byte ptr [rax],al ds:00000000`00002711=?? Resetting default scope MISALIGNED_IP: nt!KiSwapThread+b37 fffff801`4dc13747 8400 test byte ptr [rax],al STACK_TEXT: fffff607`ccf56488 fffff801`4de0d329 : 00000000`0000000a 00000000`00002711 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff607`ccf56490 fffff801`4de08ee3 : 00000000`00000000 00000000`00000000 ffff8005`3b2cb080 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff607`ccf565d0 fffff801`4dc13747 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x463 fffff607`ccf56760 01010101`01010101 : ffffbf81`2cb9f180 fffff801`4dc12e30 ffffbf81`2c580180 fffffff6`00000000 : nt!KiSwapThread+0xb37 fffff607`ccf56810 ffffbf81`2cb9f180 : fffff801`4dc12e30 ffffbf81`2c580180 fffffff6`00000000 fffff607`00000000 : 0x01010101`01010101 fffff607`ccf56818 fffff801`4dc12e30 : ffffbf81`2c580180 fffffff6`00000000 fffff607`00000000 ffff8005`3b2b2158 : 0xffffbf81`2cb9f180 fffff607`ccf56820 fffff801`4dc1263f : 00000000`00000001 00000000`0000000f fffff607`ccf569e0 0000ffff`00000000 : nt!KiSwapThread+0x220 fffff607`ccf568d0 fffff801`4dc11ee3 : ffff8005`00000000 fffff801`00000000 00000000`00040200 ffff8005`3b2cb1c0 : nt!KiCommitThreadWait+0x14f fffff607`ccf56970 fffff801`4e008371 : ffff8005`3b29cce0 00000000`00000006 00000000`00000001 ffff8005`3a969000 : nt!KeWaitForSingleObject+0x233 fffff607`ccf56a60 fffff801`4e00841a : ffff8005`3b2cb080 00000000`00000000 00000000`00000000 00000000`23fffe40 : nt!ObWaitForSingleObject+0x91 fffff607`ccf56ac0 fffff801`4de0caf8 : ffff8005`3b2cb080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWaitForSingleObject+0x6a fffff607`ccf56b00 00000000`77741cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28 00000000`23efecb8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77741cfc SYMBOL_NAME: nt!KiSwapThread+b37 IMAGE_VERSION: 10.0.19041.2364 STACK_COMMAND: .cxr; .ecxr ; kb MODULE_NAME: AuthenticAMD IMAGE_NAME: AuthenticAMD.sys FAILURE_BUCKET_ID: IP_MISALIGNED_AuthenticAMD.sys OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {716d112a-8330-4bbb-160c-ec98297019d2} Followup: MachineOwner ---------