网页资讯视频图片知道文库贴吧地图采购
进入贴吧全吧搜索

 
 
 
日一二三四五六
       
       
       
       
       
       

签到排名:今日本吧第个签到,

本吧因你更精彩,明天继续来努力!

本吧签到人数:0

一键签到
成为超级会员,使用一键签到
一键签到
本月漏签0次!
0
成为超级会员,赠送8张补签卡
如何使用?
点击日历上漏签日期,即可进行补签。
连续签到:天  累计签到:天
0
超级会员单次开通12个月以上,赠送连续签到卡3张
使用连续签到卡
01月31日漏签0天
windows吧 关注:201,640贴子:882,162
  • 看贴

  • 图片

  • 吧主推荐

  • 视频

  • 游戏

  • 0回复贴,共1页
<<返回windows吧
>0< 加载中...

大神们帮我看一下我的崩溃日志吧,是什么导致蓝屏??

  • 只看楼主
  • 收藏

  • 回复
  • CCFind
  • 欢迎关注
    1
该楼层疑似违规已被系统折叠 隐藏此楼查看此楼
Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [F:\081021-13718-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Path validation summary **************Response Time (ms) LocationDeferred srv*Symbol search path is: srv*Executable search path is: Windows 10 Kernel Version 19041 MP (20 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSEdition build lab: 19041.1.amd64fre.vb_release.191206-1406Machine Name:Kernel base = 0xfffff803`2b600000 PsLoadedModuleList = 0xfffff803`2c22a1d0Debug session time: Tue Aug 10 18:02:21.103 2021 (UTC + 8:00)System Uptime: 0 days 4:08:58.879Loading Kernel Symbols.......................................................................................................................................................................................................Loading User SymbolsLoading unloaded module list.....For analysis of this file, run !analyze -vnt!KeBugCheckEx:fffff803`2b9f6f20 48894c2408 mov qword ptr [rsp+8],rcx ss:ffff8e08`cbcff390=000000000000000a11: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: ffff88fa349bf000, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff8032b8a900a, address which referenced memoryDebugging Details:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1921 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 15499 Key : Analysis.Init.CPU.mSec Value: 280 Key : Analysis.Init.Elapsed.mSec Value: 9394 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1BUGCHECK_CODE: aBUGCHECK_P1: ffff88fa349bf000BUGCHECK_P2: 2BUGCHECK_P3: 1BUGCHECK_P4: fffff8032b8a900aWRITE_ADDRESS: fffff8032c2fa390: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse ffff88fa349bf000 BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: Thunder.exeTRAP_FRAME: ffff8e08cbcff4d0 -- (.trap 0xffff8e08cbcff4d0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=fffff178bc5e2000 rbx=0000000000000000 rcx=fffff10000076f38rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000rip=fffff8032b8a900a rsp=ffff8e08cbcff660 rbp=ffff8e08cbcff820 r8=00000000000001ff r9=ffff8e08cbcff760 r10=ffff8e08cbcffa00r11=ffff8e08cbcff780 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl zr na po ncnt!MiResolveTransitionFault+0x34a:fffff803`2b8a900a 65ff0425982e0000 inc dword ptr gs:[2E98h] gs:00000000`00002e98=????????Resetting default scopeSTACK_TEXT: ffff8e08`cbcff388 fffff803`2ba08e69 : 00000000`0000000a ffff88fa`349bf000 00000000`00000002 00000000`00000001 : nt!KeBugCheckExffff8e08`cbcff390 fffff803`2ba05169 : ffffe00d`e73c4700 fffff100`003b3180 ffffba00`17f03400 0a000007`fabc0025 : nt!KiBugCheckDispatch+0x69ffff8e08`cbcff4d0 fffff803`2b8a900a : 80000007`c9064963 00000000`00000000 0a000007`fabc0121 ffffcf05`182935b0 : nt!KiPageFault+0x469ffff8e08`cbcff660 fffff803`2b8a136e : ffff8e08`cbcff780 ffffe00d`e73c4700 00000000`00000000 00000000`00000000 : nt!MiResolveTransitionFault+0x34affff8e08`cbcff720 fffff803`2b89f289 : 00000000`00000110 00000000`00000004 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x3feffff8e08`cbcff860 fffff803`2ba0505e : ffffe00d`e5e0f000 ffffe00d`defda080 ffff8e08`cbcffa80 ffffe00d`00000000 : nt!MmAccessFault+0x189ffff8e08`cbcffa00 00000000`10036c28 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e00000000`0e73fcf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x10036c28
SYMBOL_NAME: nt!MiResolveTransitionFault+34a
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1110
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 34a
FAILURE_BUCKET_ID: AV_nt!MiResolveTransitionFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10FAILURE_ID_HASH: {f82a1cc4-0031-028b-996f-2865233234fa}
Followup: MachineOwner


登录百度账号

扫二维码下载贴吧客户端

下载贴吧APP
看高清直播、视频!
  • 贴吧页面意见反馈
  • 违规贴吧举报反馈通道
  • 贴吧违规信息处理公示
  • 0回复贴,共1页
<<返回windows吧
分享到:
©2026 Baidu贴吧协议|隐私政策|吧主制度|意见反馈|网络谣言警示