找回密码
 立即注册
  • QQ空间
  • 回复
  • 收藏

昨天更新后CS2就频繁崩溃掉驱动,吧友碰到了吗

刚刚还给我干重启了
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)An attempt was made to write to readonly memory.  The guilty driver is on thestack trace (and is typically the current instruction pointer).When possible, the guilty driver's name (Unicode string) is printed onthe BugCheck screen and saved in KiBugCheckDriver.Arguments:Arg1: ffffad00266c55a8, Virtual address for the attempted write.Arg2: 8a00000000200121, PTE contents.Arg3: ffffa681857f6c60, (reserved)Arg4: 000000000000000a, (reserved)Debugging DetAIls:------------------KEY_VALUES_STRING: 1    Key  : Analysis.CPU.mSec    Value: 1093    Key  : Analysis.ElaPSed.mSec    Value: 10470    Key  : Analysis.IO.Other.Mb    Value: 23    Key  : Analysis.IO.Read.Mb    Value: 0    Key  : Analysis.IO.Write.Mb    Value: 31    Key  : Analysis.Init.CPU.mSec    Value: 171    Key  : Analysis.Init.Elapsed.mSec    Value: 73874    Key  : Analysis.Memory.CommitPeak.Mb    Value: 150    Key  : Bugcheck.Code.LegacyAPI    Value: 0xbe    Key  : Bugcheck.Code.TargetModel    Value: 0xbe    Key  : Dump.Attributes.AsUlong    Value: 1008    Key  : Dump.Attributes.DiagDataWrittenToHeader    Value: 1    Key  : Dump.Attributes.ErrorCode    Value: 0    Key  : Dump.Attributes.KernelGeneratedTriageDump    Value: 1    Key  : Dump.Attributes.LastLine    Value: Dump completed successfully.    Key  : Dump.Attributes.ProgressPercentage    Value: 0    Key  : Failure.Bucket    Value: AV_nt!MiRaisedIrqlFault    Key  : Failure.Hash    Value: {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}BUGCHECK_CODE:  beBUGCHECK_P1: ffffad00266c55a8BUGCHECK_P2: 8a00000000200121BUGCHECK_P3: ffffa681857f6c60BUGCHECK_P4: aFILE_IN_CAB:  081024-5921-01.dmpDUMP_FILE_ATTRIBUTES: 0x1008  Kernel Generated Triage DumpFAULTING_THREAD:  ffff800f4b9db080BLACKBOXBSD: 1 (!blackboxbsd)BLACKBOXntfs: 1 (!blackboxntfs)BLACKBOXPNP: 1 (!blackboxpnp)BLACKBOXWINLOGON: 1CUSTOMER_CRASH_COUNT:  1PROCESS_NAME:  cs2.exeTRAP_FRAME:  ffffa681857f6c60 -- (.trap 0xffffa681857f6c60)NOTE: The trap frame does not contain all registers.Some register values may be zeroed or incorrect.rax=ffffa681857f7030 rbx=0000000000000000 rcx=ffffad00266c5590rdx=0000000000302107 rsi=0000000000000000 rdi=0000000000000000rip=fffff8055a94509d rsp=ffffa681857f6df0 rbp=0000000000040000 r8=ffffad0009063150  r9=0000000000000004 r10=0000000000ccec73r11=ffffad0000000000 r12=0000000000000000 r13=0000000000000000r14=0000000000000000 r15=0000000000000000iopl=0         nv up ei pl zr na po ncnt!MiAcquirePageListLock+0x30d:fffff805`5a94509d f0480fba69183f  lock bts qword ptr [rcx+18h],3Fh ds:ffffad00`266c55a8=0000000000000000Resetting default scopeSTACK_TEXT:  ffffa681`857f6ae8 fffff805`5aa88ff4     : 00000000`000000be ffffad00`266c55a8 8a000000`00200121 ffffa681`857f6c60 : nt!KeBugCheckExffffa681`857f6af0 fffff805`5a947fc3     : 8a000000`00200121 00000000`00000003 ffffa681`857f6bf9 00000000`00000000 : nt!MiRaisedIrqlFault+0x221f54ffffa681`857f6b40 fffff805`5aa2707e     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x363ffffa681`857f6c60 fffff805`5a94509d     : ffffa681`857f6fc0 1a000001`03350863 00000000`00000001 fffff805`5a808613 : nt!KiPageFault+0x37effffa681`857f6df0 fffff805`5a944243     : fffff805`5b26bcf8 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiAcquirePageListLock+0x30dffffa681`857f6e90 fffff805`5a91f9e0     : 00000000`00000000 ffffff5e`050177d8 ffffad00`1705c530 00000000`00000000 : nt!MiUnlinkPageFromListEx+0x223ffffa681`857f7070 fffff805`5a921015     : fffff805`00000000 00000000`02f40000 ffffa681`00000000 00000000`00000000 : nt!MmCheckCachedPageStates+0x890ffffa681`857f7200 fffff805`5ade13f3     : 00000000`02f40000 00000000`00000000 ffff800f`4b354cb0 00000000`000c0000 : nt!CcFetchDataForRead+0x95ffffa681`857f7260 fffff805`5a91d288     : ffff800f`4b354cb0 00000000`02f40000 ffffa681`00000000 ffffce8c`3e282001 : nt!CcMapAndCopyFromCache+0xf3ffffa681`857f7320 fffff805`601dd6cf     : ffffa681`00000000 ffff800f`4ad8ad30 00000000`00100000 ffff800f`00100001 : nt!CcCopyReadEx+0x1c8ffffa681`857f7400 fffff805`5f3fac56     : ffff800f`4b354cb0 00000000`00000000 ffffa681`857f77b8 0000029d`6c5a0300 : Ntfs!NtfsCopyReadA+0x28fffffa681`857f7710 fffff805`5f3f7a3e     : ffffa681`857f7820 ffffa681`857f77b8 ffff800f`426d2a20 ffff800f`426d2b20 : FLTMGR!FltpPerformFastIoCall+0x196ffffa681`857f7770 fffff805`5f43274c     : ffffa681`857f8000 ffffa681`857f1000 ffffa681`857f7930 00000000`00000000 : FLTMGR!FltpPassThroughFastIo+0x10effffa681`857f77f0 fffff805`5acac9f6     : 00000000`00000000 ffff800f`4b354cb0 ffff800f`4b354cb0 00000000`00000000 : FLTMGR!FltpFastIoRead+0x15cffffa681`857f78a0 fffff805`5acac3bb     : ffff800f`4b354cb0 00000000`00000000 00000000`00000000 000000e3`34bbfa00 : nt!IopReadFile+0x606ffffa681`857f79a0 fffff805`5aa2b408     : ffff800f`4b9db080 ffffa681`857f7b20 000000e3`34bbf978 ffffa681`857f7a48 : nt!NtReadFile+0xdbffffa681`857f7a30 00007ffa`70730064     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28000000e3`34bbf958 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`70730064SYMBOL_NAME:  nt!MiRaisedIrqlFault+221f54MODULE_NAME: ntIMAGE_VERSION:  10.0.22621.3880STACK_COMMAND:  .process /r /p 0xffff800f43b4d080; .thread 0xffff800f4b9db080 ; kbIMAGE_NAME:  ntkrnlmp.exeBUCKET_ID_FUNC_OFFSET:  221f54FAILURE_BUCKET_ID:  AV_nt!MiRaisedIrqlFaultOSPLATFORM_TYPE:  x64OSNAME:  Windows 10FAILURE_ID_HASH:  {3b24175f-7f5b-9c9f-8aaf-822c248bf0f5}Followup:     MachineOwner
回复

使用道具 举报

大神点评(4)

Raymonddoxy 楼主 5 天前 显示全部楼层
昨天更新后CS2就频繁崩溃掉驱动,吧友碰到了吗-1.jpg 应该不会就我碰到了吧,平台是3A的5700X加B550M加7900XT,除了主板都是新的
windows文件显示有程序修改只读虚拟内存导致的崩溃
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory.  The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffad00266c55a8, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: ffffa681857f6c60, (reserved)
Arg4: 000000000000000a, (reserved)
指向的程序是PROCESS_NAME:  cs2.exe
TRAP_FRAME:  ffffa681857f6c60 -- (.trap 0xffffa681857f6c60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
回复 支持 反对

使用道具 举报

是不是打着打着直接回游戏主界面,然后进游戏很卡,要死一次才正常?
回复 支持 反对

使用道具 举报

一样 玩着玩着就PPT
回复 支持 反对

使用道具 举报

最近碰到过一次,热身结束直接卡死的,还碰到一次完美匹配成功但是显示steam离线的(我没关steam,他自己消失的)
回复 支持 反对

使用道具 举报

说点什么

您需要登录后才可以回帖 登录 | 立即注册
HOT • 推荐