找回密码
 加入我们
搜索
      
查看: 3281|回复: 2

[软件] 求助 有没有大佬会看蓝屏文件的。 奥创导致的吗?

[复制链接]
发表于 2024-1-21 23:51 | 显示全部楼层 |阅读模式
看不到只看到一行  PROCESS_NAME: ArmouryCrate.Service.exe

  1. For analysis of this file, run !analyze -v
  2. nt!KeBugCheckEx:
  3. fffff801`29816b00 48894c2408      mov     qword ptr [rsp+8],rcx ss:ffffbf06`da4c73a0=000000000000000a
  4. 21: kd> !analyze -v
  5. *******************************************************************************
  6. *                                                                             *
  7. *                        Bugcheck Analysis                                    *
  8. *                                                                             *
  9. *******************************************************************************

  10. IRQL_NOT_LESS_OR_EQUAL (a)
  11. An attempt was made to access a pageable (or completely invalid) address at an
  12. interrupt request level (IRQL) that is too high.  This is usually
  13. caused by drivers using improper addresses.
  14. If a kernel debugger is available get the stack backtrace.
  15. Arguments:
  16. Arg1: 00000000000000d8, memory referenced
  17. Arg2: 0000000000000002, IRQL
  18. Arg3: 0000000000000000, bitfield :
  19.         bit 0 : value 0 = read operation, 1 = write operation
  20.         bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
  21. Arg4: fffff80129a6a3b3, address which referenced memory

  22. Debugging Details:
  23. ------------------


  24. KEY_VALUES_STRING: 1

  25.     Key  : Analysis.CPU.mSec
  26.     Value: 671

  27.     Key  : Analysis.Elapsed.mSec
  28.     Value: 1960

  29.     Key  : Analysis.IO.Other.Mb
  30.     Value: 0

  31.     Key  : Analysis.IO.Read.Mb
  32.     Value: 0

  33.     Key  : Analysis.IO.Write.Mb
  34.     Value: 0

  35.     Key  : Analysis.Init.CPU.mSec
  36.     Value: 93

  37.     Key  : Analysis.Init.Elapsed.mSec
  38.     Value: 4934

  39.     Key  : Analysis.Memory.CommitPeak.Mb
  40.     Value: 97

  41.     Key  : Bugcheck.Code.LegacyAPI
  42.     Value: 0xa

  43.     Key  : Failure.Bucket
  44.     Value: AV_nt!MiResolvePageFileFault

  45.     Key  : Failure.Hash
  46.     Value: {792a0b16-e499-d3be-c970-fb2f83008d00}

  47.     Key  : WER.OS.Branch
  48.     Value: ni_release

  49.     Key  : WER.OS.Version
  50.     Value: 10.0.22621.1


  51. BUGCHECK_CODE:  a

  52. BUGCHECK_P1: d8

  53. BUGCHECK_P2: 2

  54. BUGCHECK_P3: 0

  55. BUGCHECK_P4: fffff80129a6a3b3

  56. FILE_IN_CAB:  012124-9531-01.dmp

  57. READ_ADDRESS: fffff8012a11d470: Unable to get MiVisibleState
  58. Unable to get NonPagedPoolStart
  59. Unable to get NonPagedPoolEnd
  60. Unable to get PagedPoolStart
  61. Unable to get PagedPoolEnd
  62. unable to get nt!MmSpecialPagesInUse
  63. 00000000000000d8

  64. BLACKBOXBSD: 1 (!blackboxbsd)


  65. BLACKBOXNTFS: 1 (!blackboxntfs)


  66. BLACKBOXPNP: 1 (!blackboxpnp)


  67. BLACKBOXWINLOGON: 1

  68. CUSTOMER_CRASH_COUNT:  1

  69. PROCESS_NAME:  ArmouryCrate.Service.exe

  70. TRAP_FRAME:  ffffbf06da4c74e0 -- (.trap 0xffffbf06da4c74e0)
  71. NOTE: The trap frame does not contain all registers.
  72. Some register values may be zeroed or incorrect.
  73. rax=0000001000043000 rbx=0000000000000000 rcx=0000000000284a00
  74. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  75. rip=fffff80129a6a3b3 rsp=ffffbf06da4c7670 rbp=ffffbf06da4c7770
  76. r8=0000000000000000  r9=000000000011867f r10=00007ffdd7d366a0
  77. r11=ffff8a0000000000 r12=0000000000000000 r13=0000000000000000
  78. r14=0000000000000000 r15=0000000000000000
  79. iopl=0         nv up ei pl nz na po nc
  80. nt!MiResolvePageFileFault+0x13d7:
  81. fffff801`29a6a3b3 4983b8d800000000 cmp     qword ptr [r8+0D8h],0 ds:00000000`000000d8=????????????????
  82. Resetting default scope

  83. STACK_TEXT:  
  84. ffffbf06`da4c7398 fffff801`2982c4e9     : 00000000`0000000a 00000000`000000d8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
  85. ffffbf06`da4c73a0 fffff801`29827a34     : 00000000`00000000 ffff9781`52b13740 00000000`00000001 ffffbf06`da4c76f8 : nt!KiBugCheckDispatch+0x69
  86. ffffbf06`da4c74e0 fffff801`29a6a3b3     : 01000043`3495803e ffffbf06`00000001 fffffd3f`feebe900 01000043`3495803e : nt!KiPageFault+0x474
  87. ffffbf06`da4c7670 fffff801`29886cd2     : ffffbf06`00000001 fffffd3f`feebe9b0 00000000`00000000 ffffbf06`da4c77f8 : nt!MiResolvePageFileFault+0x13d7
  88. ffffbf06`da4c77c0 fffff801`29661fd2     : 00000000`00000000 00000000`00000000 00000000`c0000016 00000000`00000000 : nt!MiDispatchFault+0x222292
  89. ffffbf06`da4c7900 fffff801`29827929     : ffffbf06`da4c7aa0 000002b0`dda1cc30 000002b0`f75d3240 000002b0`dda06c70 : nt!MmAccessFault+0x152
  90. ffffbf06`da4c7a20 00007ffd`d7d366a0     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x369
  91. 000000f9`948ff638 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`d7d366a0


  92. SYMBOL_NAME:  nt!MiResolvePageFileFault+13d7

  93. MODULE_NAME: nt

  94. IMAGE_VERSION:  10.0.22621.3007

  95. STACK_COMMAND:  .cxr; .ecxr ; kb

  96. IMAGE_NAME:  ntkrnlmp.exe

  97. BUCKET_ID_FUNC_OFFSET:  13d7

  98. FAILURE_BUCKET_ID:  AV_nt!MiResolvePageFileFault

  99. OS_VERSION:  10.0.22621.1

  100. BUILDLAB_STR:  ni_release

  101. OSPLATFORM_TYPE:  x64

  102. OSNAME:  Windows 10

  103. FAILURE_ID_HASH:  {792a0b16-e499-d3be-c970-fb2f83008d00}

  104. Followup:     MachineOwner
  105. ---------
复制代码
发表于 2024-1-21 23:56 | 显示全部楼层
蓝屏会有指向文件或者蓝屏代码,除了这个,我还真不会看,如果是蓝屏指向文件,搜搜文件看看目录名啥的,差不多能知道什么程序
 楼主| 发表于 2024-1-21 23:59 | 显示全部楼层
gaoyi124 发表于 2024-1-21 23:56
蓝屏会有指向文件或者蓝屏代码,除了这个,我还真不会看,如果是蓝屏指向文件,搜搜文件看看目录名啥的,差不多 ...

少了一段 点 MODULE_NAME: nt

  1. 21: kd> lmvm nt
  2. Browse full module list
  3. start             end                 module name
  4. fffff801`29400000 fffff801`2a447000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\FCB9AFC6A352F97B17CF5F981382C7821\ntkrnlmp.pdb
  5.     Loaded symbol image file: ntkrnlmp.exe
  6.     Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\16B960371047000\ntkrnlmp.exe
  7.     Image path: ntkrnlmp.exe
  8.     Image name: ntkrnlmp.exe
  9.     Browse all global symbols  functions  data
  10.     Image was built with /Brepro flag.
  11.     Timestamp:        16B96037 (This is a reproducible build file hash, not a timestamp)
  12.     CheckSum:         00B91B6E
  13.     ImageSize:        01047000
  14.     File version:     10.0.22621.3007
  15.     Product version:  10.0.22621.3007
  16.     File flags:       0 (Mask 3F)
  17.     File OS:          40004 NT Win32
  18.     File type:        1.0 App
  19.     File date:        00000000.00000000
  20.     Translations:     0409.04b0
  21.     Information from resource tables:
  22.         CompanyName:      Microsoft Corporation
  23.         ProductName:      Microsoft® Windows® Operating System
  24.         InternalName:     ntkrnlmp.exe
  25.         OriginalFilename: ntkrnlmp.exe
  26.         ProductVersion:   10.0.22621.3007
  27.         FileVersion:      10.0.22621.3007 (WinBuild.160101.0800)
  28.         FileDescription:  NT Kernel & System
  29.         LegalCopyright:   © Microsoft Corporation. All rights reserved.
复制代码
您需要登录后才可以回帖 登录 | 加入我们

本版积分规则

Archiver|手机版|小黑屋|Chiphell ( 沪ICP备12027953号-5 )沪公网备310112100042806 上海市互联网违法与不良信息举报中心

GMT+8, 2025-4-26 17:39 , Processed in 0.008582 second(s), 5 queries , Gzip On, Redis On.

Powered by Discuz! X3.5 Licensed

© 2007-2024 Chiphell.com All rights reserved.

快速回复 返回顶部 返回列表