jiahui4890 jiahui4890
关注数: 7 粉丝数: 219 发帖数: 3,933 关注贴吧数: 19
求大佬看看蓝屏日志 电脑从刚组装好就每天蓝屏,拆掉显卡后用了几天没事,装上显卡一天就蓝屏,驱动也换了好几个版本还是不行,重装了两次系统还是不行,是不是显卡本身的问题啊?这是今天的蓝屏日志求大佬看看。 Microsoft (R) Windows Debugger Version 10.0.17763.1 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\052519-11062-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 17763 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff804`2da98000 PsLoadedModuleList = 0xfffff804`2deb2a50 Debug session time: Sat May 25 13:26:48.883 2019 (UTC + 8:00) System Uptime: 0 days 4:17:49.642 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ . Loading User Symbols Loading unloaded module list .............................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {24edbd9bc0e7, 2, 0, fffff8042dc58dba} Probably caused by : ntkrnlmp.exe ( nt!KiXmmException+2fa ) Followup: MachineOwner --------- 10: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 000024edbd9bc0e7, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8042dc58dba, address which referenced memory Debugging Details: ------------------ KEY_VALUES_STRING: 1 STACKHASH_ANALYSIS: 1 TIMELINE_ANALYSIS: 1 DUMP_CLASS: 1 DUMP_QUALIFIER: 400 DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump DUMP_TYPE: 2 BUGCHECK_P1: 24edbd9bc0e7 BUGCHECK_P2: 2 BUGCHECK_P3: 0 BUGCHECK_P4: fffff8042dc58dba READ_ADDRESS: fffff8042dfd9390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd 000024edbd9bc0e7 CURRENT_IRQL: 2 FAULTING_IP: nt!KiXmmException+2fa fffff804`2dc58dba 4c8b85e8000000 mov r8,qword ptr [rbp+0E8h] CPU_COUNT: c CPU_MHZ: c78 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 9e CPU_STEPPING: a CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: AV PROCESS_NAME: tgp_daemon.exe ANALYSIS_SESSION_HOST: Yct201905111740 ANALYSIS_SESSION_TIME: 05-25-2019 17:23:42.0856 ANALYSIS_VERSION: 10.0.17763.1 x86fre TRAP_FRAME: ffff800a17efa450 -- (.trap 0xffff800a17efa450) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000210000 rbx=0000000000000000 rcx=00000000c0000100 rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8042dc58dba rsp=ffff800a17efa5e0 rbp=000024edbd9bbfff r8=0000000000000441 r9=0000000000000002 r10=000000000000a000 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!KiXmmException+0x2fa: fffff804`2dc58dba 4c8b85e8000000 mov r8,qword ptr [rbp+0E8h] ss:0018:000024ed`bd9bc0e7=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff8042dc5b369 to fffff8042dc49b40 STACK_TEXT: ffff800a`17efa308 fffff804`2dc5b369 : 00000000`0000000a 000024ed`bd9bc0e7 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx ffff800a`17efa310 fffff804`2dc5778e : ffff9100`c27c0180 ffff800a`17efa650 ffff810c`0dcc1080 ffff810c`0648a4c0 : nt!KiBugCheckDispatch+0x69 ffff800a`17efa450 fffff804`2dc58dba : ffff9100`c27c0180 00000000`00000000 ffff810c`0e37a500 fffff804`2c755180 : nt!KiPageFault+0x44e ffff800a`17efa5e0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiXmmException+0x2fa THREAD_SHA1_HASH_MOD_FUNC: dd052559807b8ae143d12d6fa660855b2e2d62a1 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: b558ecbb0e0fed569f2abbf770a6afd45770267d THREAD_SHA1_HASH_MOD: d084f7dfa548ce4e51810e4fd5914176ebc66791 FOLLOWUP_IP: nt!KiXmmException+2fa fffff804`2dc58dba 4c8b85e8000000 mov r8,qword ptr [rbp+0E8h] FAULT_INSTR_CODE: e8858b4c SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!KiXmmException+2fa FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 1130b79a IMAGE_VERSION: 10.0.17763.194 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2fa FAILURE_BUCKET_ID: AV_nt!KiXmmException BUCKET_ID: AV_nt!KiXmmException PRIMARY_PROBLEM_CLASS: AV_nt!KiXmmException TARGET_TIME: 2019-05-25T05:26:48.000Z OSBUILD: 17763 OSSERVICEPACK: 194 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 272 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 1979-02-21 08:36:42 ANALYSIS_SESSION_ELAPSED_TIME: 63a ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:av_nt!kixmmexception FAILURE_ID_HASH: {93b06d73-c950-b447-eb84-f8fb7c94b22a} Followup: MachineOwner ---------
首页 1 2 下一页