电脑吧 关注:3,870,109贴子:49,225,958
  • 0回复贴,共1

电脑蓝屏代码分析,有没有大佬看得懂啊

只看楼主收藏回复

******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 0000000019f899a4, memory referencedArg2: 0000000000000002, IRQLArg3: 0000000000000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: fffff80243613a67, address which referenced memoryDebugging Details:------------------KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2030 Key : Analysis.Elapsed.mSec Value: 5684 Key : Analysis.IO.Other.Mb Value: 4 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 24 Key : Analysis.Init.CPU.mSec Value: 562 Key : Analysis.Init.Elapsed.mSec Value: 42521 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.LegacyAPI Value: 0xa Key : Bugcheck.Code.TargetModel Value: 0xa Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Failure.Bucket Value: AV_MessageTransfer!unknown_function Key : Failure.Hash Value: {f3e31ad6-d82b-fe8d-0291-2085eb28e5e9}BUGCHECK_CODE: aBUGCHECK_P1: 19f899a4BUGCHECK_P2: 2BUGCHECK_P3: 1BUGCHECK_P4: fffff80243613a67FILE_IN_CAB: 051824-7750-01.dmpDUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage DumpWRITE_ADDRESS: fffff80243efb390: Unable to get MiVisibleStateUnable to get NonPagedPoolStartUnable to get NonPagedPoolEndUnable to get PagedPoolStartUnable to get PagedPoolEndunable to get nt!MmSpecialPagesInUse 0000000019f899a4 BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXNTFS: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT: 1PROCESS_NAME: LÞsð.exeTRAP_FRAME: ffffed05ba799fb0 -- (.trap 0xffffed05ba799fb0)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=0000000019f899a4 rbx=0000000000000000 rcx=0000000019f899b0rdx=ffffcb01c24d665c rsi=0000000000000000 rdi=0000000000000000rip=fffff80243613a67 rsp=ffffed05ba79a148 rbp=0000000000000000 r8=0000000000001000 r9=0000000000001000 r10=ffffffff00000000r11=ffffcb01dc461000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0 nv up ei pl nz na pe ncnt!memcpy+0xa7:fffff802`43613a67 0f1100 movups xmmword ptr [rax],xmm0 ds:00000000`19f899a4=00000000000000000000000000000000Resetting default scopeSTACK_TEXT: ffffed05`ba799e68 fffff802`43612269 : 00000000`0000000a 00000000`19f899a4 00000000`00000002 00000000`00000001 : nt!KeBugCheckExffffed05`ba799e70 fffff802`4360dc34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69ffffed05`ba799fb0 fffff802`43613a67 : fffff802`4349f665 00000000`01883304 00000000`00000001 ffff9980`0c419820 : nt!KiPageFault+0x474ffffed05`ba79a148 fffff802`4349f665 : 00000000`01883304 00000000`00000001 ffff9980`0c419820 00000000`00000001 : nt!memcpy+0xa7ffffed05`ba79a150 fffff802`4349f41c : 00000000`19f899a4 00000004`15dd6000 00000000`00000000 00000000`19f89764 : nt!MiCopySinglePage+0x141ffffed05`ba79a1b0 fffff802`a0048fd7 : 00000000`00001248 00000000`00000000 00000004`15dd6000 fffff802`50e8d000 : nt!MmCopyMemory+0x1dcffffed05`ba79a320 00000000`00001248 : 00000000`00000000 00000004`15dd6000 fffff802`50e8d000 ffffed05`ba79a368 : MessageTransfer+0x5e8fd7ffffed05`ba79a328 00000000`00000000 : 00000004`15dd6000 fffff802`50e8d000 ffffed05`ba79a368 00000000`00000000 : 0x1248SYMBOL_NAME: MessageTransfer+5e8fd7MODULE_NAME: MessageTransferIMAGE_NAME: MessageTransfer.sysSTACK_COMMAND: .cxr; .ecxr ; kbBUCKET_ID_FUNC_OFFSET: 5e8fd7FAILURE_BUCKET_ID: AV_MessageTransfer!unknown_functionOSPLATFORM_TYPE: x64OSNAME: Windows 10FAILURE_ID_HASH: {f3e31ad6-d82b-fe8d-0291-2085eb28e5e9}Followup: MachineOwner---------


IP属地:山东1楼2024-05-19 00:20回复