Shaokin
2021-03-23T10:04:42+00:00
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80215a76f33, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2546
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 108546
Key : Analysis.Init.CPU.mSec
Value: 1359
Key : Analysis.Init.Elapsed.mSec
Value: 130172
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80215a76f33
READ_ADDRESS: 0000000000000000
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff88a5cc373a0 -- (.trap 0xfffff88a5cc373a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff928a8e4abde0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80215a76f33 rsp=fffff88a5cc37530 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff928a7d359af0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KeSetEvent+0x173:
fffff802`15a76f33 4d8b36 mov r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff88a`5cc37258 fffff802`15bd5929 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff88a`5cc37260 fffff802`15bd1c69 : fffff88a`5cc373b8 00000000`00000000 fffff88a`5cc374f0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff88a`5cc373a0 fffff802`15a76f33 : ffff928a`8e4abde0 00000000`00000004 fffff88a`5cc375a8 00000000`00000004 : nt!KiPageFault+0x469
fffff88a`5cc37530 ffffff56`648d8c08 : ffffff0a`47326e70 00000000`01a8a76d ffffff56`64db3b60 ffff928a`93822bc8 : nt!KeSetEvent+0x173
fffff88a`5cc375c0 ffffff56`648d86db : 00000000`00000001 fffff88a`5cc37740 ffffff56`64b1f308 00000000`00000004 : win32kfull!RawInputThread+0x12c8
fffff88a`5cc37640 ffffff56`64c441ee : ffff928a`8d1fa080 ffff928a`8d1fa080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0xd9b
fffff88a`5cc378c0 ffffff56`64815ea0 : ffff928a`8d1fa080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x9e
fffff88a`5cc379d0 fffff802`15bd5355 : ffff928a`8d1fa080 00000000`00000005 00000249`926040e0 00000000`00000488 : win32kfull!NtUserCallNoParam+0x70
fffff88a`5cc37a00 00007ff9`213c1144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000c3`6057f898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`213c1144
SYMBOL_NAME: win32kfull!RawInputThread+12c8
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12c8
FAILURE_BUCKET_ID: AV_win32kfull!RawInputThread
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1a1b452c-33c1-4f7e-9945-1bd059279c39}
Followup: MachineOwner
---------
就是好端端打游戏了一半就这样,大约2天1次
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80215a76f33, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2546
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 108546
Key : Analysis.Init.CPU.mSec
Value: 1359
Key : Analysis.Init.Elapsed.mSec
Value: 130172
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80215a76f33
READ_ADDRESS: 0000000000000000
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff88a5cc373a0 -- (.trap 0xfffff88a5cc373a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff928a8e4abde0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80215a76f33 rsp=fffff88a5cc37530 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff928a7d359af0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
nt!KeSetEvent+0x173:
fffff802`15a76f33 4d8b36 mov r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff88a`5cc37258 fffff802`15bd5929 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff88a`5cc37260 fffff802`15bd1c69 : fffff88a`5cc373b8 00000000`00000000 fffff88a`5cc374f0 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff88a`5cc373a0 fffff802`15a76f33 : ffff928a`8e4abde0 00000000`00000004 fffff88a`5cc375a8 00000000`00000004 : nt!KiPageFault+0x469
fffff88a`5cc37530 ffffff56`648d8c08 : ffffff0a`47326e70 00000000`01a8a76d ffffff56`64db3b60 ffff928a`93822bc8 : nt!KeSetEvent+0x173
fffff88a`5cc375c0 ffffff56`648d86db : 00000000`00000001 fffff88a`5cc37740 ffffff56`64b1f308 00000000`00000004 : win32kfull!RawInputThread+0x12c8
fffff88a`5cc37640 ffffff56`64c441ee : ffff928a`8d1fa080 ffff928a`8d1fa080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0xd9b
fffff88a`5cc378c0 ffffff56`64815ea0 : ffff928a`8d1fa080 00000000`00000000 00000000`00000005 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x9e
fffff88a`5cc379d0 fffff802`15bd5355 : ffff928a`8d1fa080 00000000`00000005 00000249`926040e0 00000000`00000488 : win32kfull!NtUserCallNoParam+0x70
fffff88a`5cc37a00 00007ff9`213c1144 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000c3`6057f898 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`213c1144
SYMBOL_NAME: win32kfull!RawInputThread+12c8
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12c8
FAILURE_BUCKET_ID: AV_win32kfull!RawInputThread
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1a1b452c-33c1-4f7e-9945-1bd059279c39}
Followup: MachineOwner
---------
就是好端端打游戏了一半就这样,大约2天1次