所以我前几天刚装了一台新电脑,可以正常使用几个小时。包括浏览网页和听音乐。然而,一旦我开始玩视频游戏,一切都变得有点疯狂。玩了 10-20 分钟的游戏后,我几乎立即出现了两次 BSOD。通常我能够将 BSOD 归咎于图形驱动程序或声音驱动程序,但我更新了两者并全新安装了两者,没有任何实际区别。我清理了机器(请注意,它是新的,所以没有太多需要清理的地方)并进行了系统还原,但我仍然得到相同的两个 BSOD。
这是最近两次 BSOD 的链接(从昨天开始,我没有保留之前的 BSOD)
https://www.dropbox.com/s/mmii5s2lqt9x808/Minidump_Raven.zip
有什么建议吗?请注意,我昨天在全新安装之前运行了 Memtest86,直到今晚回家后才能再次运行它。
编辑:只是一条评论,但启动驱动器是 Mushkin SSD,游戏在 WD Green (5400 RPM) 驱动器上。我认为发布此信息会很好,因为下面回答的人提到其中一个转储指向可能存在 HD 问题。谢谢!
答案1
1 转储显示内存损坏:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa80b2a2af08, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802580b2a31, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80258366168
GetUlongFromAddress: unable to read from fffff802583661f8
fffffa80b2a2af08 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiImagePageOk+41
fffff802`580b2a31 488b11 mov rdx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: RzSynapse.exe
ANALYSIS_VERSION: 6.3.9431.0 (debuggers(dbg).130615-1214) amd64fre
TRAP_FRAME: fffff880230bc580 -- (.trap 0xfffff880230bc580)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80b2a2af08
rdx=fffffa800325f110 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802580b2a31 rsp=fffff880230bc710 rbp=fffff880230bc7b0
r8=0000058000000000 r9=fffffa80158d3e28 r10=0000000000000000
r11=00000000f8a003ee r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiImagePageOk+0x41:
fffff802`580b2a31 488b11 mov rdx,qword ptr [rcx] ds:fffffa80`b2a2af08=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80258067769 to fffff80258068440
STACK_TEXT:
fffff880`230bc438 fffff802`58067769 : 00000000`0000000a fffffa80`b2a2af08 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`230bc440 fffff802`58065fe0 : 00000000`00000000 00000000`70a5a5a0 00000001`00000000 fffff880`230bc580 : nt!KiBugCheckDispatch+0x69
fffff880`230bc580 fffff802`580b2a31 : 00000001`07ce9025 00000000`00000001 00000000`00002596 fffff802`5809d745 : nt!KiPageFault+0x260
fffff880`230bc710 fffff802`580a4185 : 00000000`00000000 fffff802`580e3241 00000000`00000000 fffff880`230bc850 : nt!MiImagePageOk+0x41
fffff880`230bc740 fffff802`5809f34f : 00000000`00000000 00000000`70a5a5a0 fffffa80`0301c290 fffffa80`158d3e28 : nt!MiResolveTransitionFault+0xf5
fffff880`230bc7e0 fffff802`5809b132 : fffff880`230bca88 00000000`70a5a5a0 fffff680`003852d0 fffffa80`158d3e28 : nt!MiResolveProtoPteFault+0x4cf
fffff880`230bc880 fffff802`580a27f9 : fffffa80`1432e080 00000000`00000000 fffff880`230bcb00 fffff880`230bca50 : nt!MiDispatchFault+0x272
fffff880`230bc9c0 fffff802`58065eee : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`230bcb00 : nt!MmAccessFault+0x289
fffff880`230bcb00 00000000`70934daa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`082bd33c 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x70934daa
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiImagePageOk+41
fffff802`580b2a31 488b11 mov rdx,qword ptr [rcx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiImagePageOk+41
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 51a966cd
IMAGE_VERSION: 6.2.9200.16628
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 41
FAILURE_BUCKET_ID: AV_nt!MiImagePageOk
这可能是 RAM 或 HDD 问题。因此,运行 memtest86+ 来测试 RAM,并运行 HDD 诊断工具来测试 HDD。
第二次转储显示英特尔网络驱动程序 e1d63x64.sys 存在问题:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 00000000000011c1, (reserved)
Arg3: 0000000001500743, Memory contents of the pool block
Arg4: fffffa80127c6640, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: fffffa80127c6640 Nonpaged pool
FREED_POOL_TAG: Ntfx
BUGCHECK_STR: 0xc2_7_Ntfx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
TAG_NOT_DEFINED_c000000f: FFFFF80331124FB0
LAST_CONTROL_TRANSFER: from fffff8032f87ea6e to fffff8032f666440
STACK_TEXT:
nt!KeBugCheckEx
nt!ExFreePool
Ndu!PplGenericFreeFunction
Ndu!NduDeleteNblContext
Ndu!NduHandleNblContextRemoved
Ndu!NduNblNotifyCallback
fwpkclnt!FwppNetBufferListEventNotify
NETIO!WfpNblInfoCleanup
ndis!NdisFreeNetBufferList
tcpip!TcpTcbSendDatagramsComplete
NETIO!NetioDereferenceNetBufferListChain
tcpip!FlSendNetBufferListChainComplete
ndis!ndisMSendCompleteNetBufferListsInternal
ndis!ndisInvokeNextSendCompleteHandler
ndis!NdisMSendNetBufferListsComplete
e1d63x64
0x0
STACK_COMMAND: kb
FOLLOWUP_IP:
Ndu!PplGenericFreeFunction+2f
fffff880`1ee0b807 eb0c jmp Ndu!PplGenericFreeFunction+0x3d (fffff880`1ee0b815)
FAILURE_BUCKET_ID: 0xc2_7_Ntfx_Ndu!PplGenericFreeFunction
Loaded symbol image file: e1d63x64.sys
Image path: \SystemRoot\system32\DRIVERS\e1d63x64.sys
Image name: e1d63x64.sys
Timestamp: Wed Jan 23 17:39:53 2013