尝试查明蓝屏的根源

尝试查明蓝屏的根源

所以我前几天刚装了一台新电脑,可以正常使用几个小时。包括浏览网页和听音乐。然而,一旦我开始玩视频游戏,一切都变得有点疯狂。玩了 10-20 分钟的游戏后,我几乎立即出现了两次 BSOD。通常我能够将 BSOD 归咎于图形驱动程序或声音驱动程序,但我更新了两者并全新安装了两者,没有任何实际区别。我清理了机器(请注意,它是新的,所以没有太多需要清理的地方)并进行了系统还原,但我仍然得到相同的两个 BSOD。

这是最近两次 BSOD 的链接(从昨天开始,我没有保留之前的 BSOD)

https://www.dropbox.com/s/mmii5s2lqt9x808/Minidump_Raven.zip

有什么建议吗?请注意,我昨天在全新安装之前运行了 Memtest86,直到今晚回家后才能再次运行它。

编辑:只是一条评论,但启动驱动器是 Mushkin SSD,游戏在 WD Green (5400 RPM) 驱动器上。我认为发布此信息会很好,因为下面回答的人提到其中一个转储指向可能存在 HD 问题。谢谢!

答案1

1 转储显示内存损坏:

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa80b2a2af08, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802580b2a31, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80258366168
GetUlongFromAddress: unable to read from fffff802583661f8
 fffffa80b2a2af08 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiImagePageOk+41
fffff802`580b2a31 488b11          mov     rdx,qword ptr [rcx]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  RzSynapse.exe

ANALYSIS_VERSION: 6.3.9431.0 (debuggers(dbg).130615-1214) amd64fre

TRAP_FRAME:  fffff880230bc580 -- (.trap 0xfffff880230bc580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80b2a2af08
rdx=fffffa800325f110 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802580b2a31 rsp=fffff880230bc710 rbp=fffff880230bc7b0
 r8=0000058000000000  r9=fffffa80158d3e28 r10=0000000000000000
r11=00000000f8a003ee r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!MiImagePageOk+0x41:
fffff802`580b2a31 488b11          mov     rdx,qword ptr [rcx] ds:fffffa80`b2a2af08=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80258067769 to fffff80258068440

STACK_TEXT:  
fffff880`230bc438 fffff802`58067769 : 00000000`0000000a fffffa80`b2a2af08 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`230bc440 fffff802`58065fe0 : 00000000`00000000 00000000`70a5a5a0 00000001`00000000 fffff880`230bc580 : nt!KiBugCheckDispatch+0x69
fffff880`230bc580 fffff802`580b2a31 : 00000001`07ce9025 00000000`00000001 00000000`00002596 fffff802`5809d745 : nt!KiPageFault+0x260
fffff880`230bc710 fffff802`580a4185 : 00000000`00000000 fffff802`580e3241 00000000`00000000 fffff880`230bc850 : nt!MiImagePageOk+0x41
fffff880`230bc740 fffff802`5809f34f : 00000000`00000000 00000000`70a5a5a0 fffffa80`0301c290 fffffa80`158d3e28 : nt!MiResolveTransitionFault+0xf5
fffff880`230bc7e0 fffff802`5809b132 : fffff880`230bca88 00000000`70a5a5a0 fffff680`003852d0 fffffa80`158d3e28 : nt!MiResolveProtoPteFault+0x4cf
fffff880`230bc880 fffff802`580a27f9 : fffffa80`1432e080 00000000`00000000 fffff880`230bcb00 fffff880`230bca50 : nt!MiDispatchFault+0x272
fffff880`230bc9c0 fffff802`58065eee : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`230bcb00 : nt!MmAccessFault+0x289
fffff880`230bcb00 00000000`70934daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`082bd33c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x70934daa


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiImagePageOk+41
fffff802`580b2a31 488b11          mov     rdx,qword ptr [rcx]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiImagePageOk+41

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  51a966cd

IMAGE_VERSION:  6.2.9200.16628

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  41

FAILURE_BUCKET_ID:  AV_nt!MiImagePageOk

这可能是 RAM 或 HDD 问题。因此,运行 memtest86+ 来测试 RAM,并运行 HDD 诊断工具来测试 HDD。

第二次转储显示英特尔网络驱动程序 e1d63x64.sys 存在问题:

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_CALLER (c2)
The current thread is making a bad pool request.  Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 00000000000011c1, (reserved)
Arg3: 0000000001500743, Memory contents of the pool block
Arg4: fffffa80127c6640, Address of the block of pool being deallocated

Debugging Details:
------------------


POOL_ADDRESS:  fffffa80127c6640 Nonpaged pool

FREED_POOL_TAG:  Ntfx

BUGCHECK_STR:  0xc2_7_Ntfx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  2

TAG_NOT_DEFINED_c000000f:  FFFFF80331124FB0

LAST_CONTROL_TRANSFER:  from fffff8032f87ea6e to fffff8032f666440

STACK_TEXT:  
nt!KeBugCheckEx
nt!ExFreePool
Ndu!PplGenericFreeFunction
Ndu!NduDeleteNblContext
Ndu!NduHandleNblContextRemoved
Ndu!NduNblNotifyCallback
fwpkclnt!FwppNetBufferListEventNotify
NETIO!WfpNblInfoCleanup
ndis!NdisFreeNetBufferList
tcpip!TcpTcbSendDatagramsComplete
NETIO!NetioDereferenceNetBufferListChain
tcpip!FlSendNetBufferListChainComplete
ndis!ndisMSendCompleteNetBufferListsInternal
ndis!ndisInvokeNextSendCompleteHandler
ndis!NdisMSendNetBufferListsComplete
e1d63x64
0x0




STACK_COMMAND:  kb

FOLLOWUP_IP: 
Ndu!PplGenericFreeFunction+2f
fffff880`1ee0b807 eb0c            jmp     Ndu!PplGenericFreeFunction+0x3d (fffff880`1ee0b815)


FAILURE_BUCKET_ID:  0xc2_7_Ntfx_Ndu!PplGenericFreeFunction



    Loaded symbol image file: e1d63x64.sys
    Image path: \SystemRoot\system32\DRIVERS\e1d63x64.sys
    Image name: e1d63x64.sys
    Timestamp:        Wed Jan 23 17:39:53 2013

相关内容