金币数
魅力值
疲劳值
黑历史
额外经验
论坛代币
|
[召唤客服]
W11,2024年3月初开始玩DNF莫名其妙蓝屏重启
|
登录可查看完整内容
您需要 登录 才可以下载或查看,没有帐号?立即注册
x
W11,2024年3月初开始玩DNF莫名其妙蓝屏重启。
没用WG登录,直接客户端登陆的。从今年3月份开始玩着玩着就莫名其妙电脑蓝屏重启,我的电脑买回来用了一年,首次和第二三四次蓝屏全都出现在3月开始玩DNF的时候。原本我以为只有我出现这种情况,还去排查了硬件,重装游戏都没用。直到3月28号更新后连助手上都开始有不少帖子说遇上了同样的问题,都是玩DNF时出现,玩其他游戏一点事都没有。
查了蓝屏日志,发现和DNF.EXE脱不了关系
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, ****** referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8034581d01b, address which referenced ******
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : **ysis.CPU.mSec
Value: 1421
Key : **ysis.Elapsed.mSec
Value: 9785
Key : **ysis.IO.Other.Mb
Value: 25
Key : **ysis.IO.Read.Mb
Value: 0
Key : **ysis.IO.Write.Mb
Value: 33
Key : **ysis.Init.CPU.mSec
Value: 203
Key : **ysis.Init.Elapsed.mSec
Value: 48746
Key : **ysis.******.CommitPeak.Mb
Value: 98
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Bugcheck.Code.TargetModel
Value: 0xa
Key : Dump.Attributes.AsUlong
Value: 1008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : Failure.Bucket
Value: AV_ACE_BASE!unknown_function
Key : Failure.Hash
Value: {2a7f67f1-b324-eb93-e618-e903b45ded5c}
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8034581d01b
FILE_IN_CAB: 040124-9953-01.dmp
DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump
READ_ADDRESS: fffff8034631c470: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: DNF.exe
IRP_ADDRESS: ffffdb8366d1fa10
TRAP_FRAME: ffff8501a94b71b0 -- (.trap 0xffff8501a94b71b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff8501a94b6388
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8034581d01b rsp=ffff8501a94b7340 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000001 r10=0000000000000000
r11=ffffdb83657d8d80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KeSetEvent+0x1db:
fffff803`4581d01b 488b00 mov rax,qword ptr [rax] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff8501`a94b7068 fffff803`45a2d329 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8501`a94b7070 fffff803`45a28834 : ffff5140`7cc53b88 0000000a`81a1c73e ffff8501`a94b7218 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8501`a94b71b0 fffff803`4581d01b : 00000000`00000000 ffff8501`a94b6388 ffff8501`a94b7aa0 ffffdb83`66d1fa20 : nt!KiPageFault+0x474
ffff8501`a94b7340 fffff803`45855680 : ffffdb83`00000001 ffff8501`a94b74f9 ffffdb83`66d1fa10 00000000`00000000 : nt!KeSetEvent+0x1db
ffff8501`a94b73d0 fffff803`458c3cb6 : ffffdb83`66d1fa88 00000000`00000230 ffffdb83`66d1fa10 ffff8501`a94b7400 : nt!IopCompleteRequest+0x**0
ffff8501`a94b74a0 fffff803`45a1d7ec : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : nt!KiDeliverApc+0x186
ffff8501`a94b7560 fffff803`45902dc8 : 00000000`00000000 fffff803`4630c380 00000000`00002eb4 ffffdb83`5c6bc000 : nt!KiApcInterrupt+0x35c
ffff8501`a94b76f0 fffff803`7381495e : fffff803`739c6720 fffff803`739c6720 ffffdb83`00000002 00000000`00000100 : nt!KeReleaseGuardedMutex+0x38
ffff8501`a94b7720 fffff803`739c6720 : fffff803`739c6720 ffffdb83`00000002 00000000`00000100 ffffdb83`4f178ec0 : ACE_BASE+0x4495e
ffff8501`a94b7728 fffff803`739c6720 : ffffdb83`00000002 00000000`00000100 ffffdb83`4f178ec0 fffff803`739a8ae8 : ACE_BASE+0x1f6720
ffff8501`a94b7730 ffffdb83`00000002 : 00000000`00000100 ffffdb83`4f178ec0 fffff803`739a8ae8 fffff803`739a8ae8 : ACE_BASE+0x1f6720
ffff8501`a94b7738 00000000`00000100 : ffffdb83`4f178ec0 fffff803`739a8ae8 fffff803`739a8ae8 fffff803`739a8ae8 : 0xffffdb83`00000002
ffff8501`a94b7740 ffffdb83`4f178ec0 : fffff803`739a8ae8 fffff803`739a8ae8 fffff803`739a8ae8 fffff803`739a8ae8 : 0x100
ffff8501`a94b7748 fffff803`739a8ae8 : fffff803`739a8ae8 fffff803`739a8ae8 fffff803`739a8ae8 ffffdb83`4f1c5010 : 0xffffdb83`4f178ec0
ffff8501`a94b7750 fffff803`739a8ae8 : fffff803`739a8ae8 fffff803`739a8ae8 ffffdb83`4f1c5010 ffffdb83`5c6bc000 : ACE_BASE+0x1d8ae8
ffff8501`a94b7758 fffff803`739a8ae8 : fffff803`739a8ae8 ffffdb83`4f1c5010 ffffdb83`5c6bc000 fffff803`7381455a : ACE_BASE+0x1d8ae8
ffff8501`a94b7760 fffff803`739a8ae8 : ffffdb83`4f1c5010 ffffdb83`5c6bc000 fffff803`7381455a 00000000`00002eb4 : ACE_BASE+0x1d8ae8
ffff8501`a94b7768 ffffdb83`4f1c5010 : ffffdb83`5c6bc000 fffff803`7381455a 00000000`00002eb4 00000000`00000000 : ACE_BASE+0x1d8ae8
ffff8501`a94b7770 ffffdb83`5c6bc000 : fffff803`7381455a 00000000`00002eb4 00000000`00000000 ffffdb83`5c6bc080 : 0xffffdb83`4f1c5010
ffff8501`a94b7778 fffff803`7381455a : 00000000`00002eb4 00000000`00000000 ffffdb83`5c6bc080 00000000`00000000 : 0xffffdb83`5c6bc000
ffff8501`a94b7780 00000000`00002eb4 : 00000000`00000000 ffffdb83`5c6bc080 00000000`00000000 ffffdb83`5c6bc080 : ACE_BASE+0x4455a
ffff8501`a94b7788 00000000`00000000 : ffffdb83`5c6bc080 00000000`00000000 ffffdb83`5c6bc080 fffff803`73b68197 : 0x2eb4
SYMBOL_NAME: ACE_BASE+4495e
MODULE_NAME: ACE_BASE
IMAGE_NAME: ACE-BASE.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 4495e
FAILURE_BUCKET_ID: AV_ACE_BASE!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2a7f67f1-b324-eb93-e618-e903b45ded5c}
Followup: MachineOwner
|
|