windows7 64位 旗舰版
处理器i7 920 OC 4G
主板ASUS Rampage II Extreme
显卡蓝宝石HD6990
内存海盗船2G*3套装
鼠标罗技G9x,安过setpoint驱动
还有块华硕的独立声卡
最近打CS1.6,总是画面卡死,最后一秒的声音不断重复,只能重启,如果没在打游戏,有时会自动蓝屏
用windbg分析dmp文件,结果如下
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\061811-11122-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*DownstreamStore*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
Machine Name:
Kernel base = 0xfffff800`04801000 PsLoadedModuleList = 0xfffff800`04a46650
Debug session time: Sat Jun 18 12:49:03.196 2011 (GMT+8)
System Uptime: 0 days 5:43:06.960
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffffffffffff83, 2, 1, fffff8000496c714}
Probably caused by : ntkrnlmp.exe ( nt!PpmEventTracePerfCheck+34 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffff83, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000496c714, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004ab0100
ffffffffffffff83
CURRENT_IRQL: 2
FAULTING_IP:
nt!PpmEventTracePerfCheck+34
fffff800`0496c714 7447 je nt!PpmEventTracePerfCheck+0x7d (fffff800`0496c75d)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c360 -- (.trap 0xfffff80000b9c360)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000012c43afe29 rbx=0000000000000000 rcx=0000000000000065
rdx=fffff800049b9200 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000496c714 rsp=fffff80000b9c4f0 rbp=0000000000000002
r8=fffff78000000008 r9=00000000003bbdb1 r10=0000000000000001
r11=0000000000000065 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!PpmEventTracePerfCheck+0x34:
fffff800`0496c714 7447 je nt!PpmEventTracePerfCheck+0x7d (fffff800`0496c75d) [br=0]
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800048802a9 to fffff80004880d00
STACK_TEXT:
fffff800`00b9c218 fffff800`048802a9 : 00000000`0000000a ffffffff`ffffff83 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`00b9c220 fffff800`0487ef20 : fffffa80`0ab93a50 00000000`00000000 fffff800`049f3e80 fffff800`00b9c600 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c360 fffff800`0496c714 : fffff800`00b9c600 fffff800`04938f3c 00000000`00000000 fffff800`00000000 : nt!KiPageFault+0x260
fffff800`00b9c4f0 fffff800`0496ee9a : 00000000`003bbdb1 fffff800`00b9c600 00000000`00000001 fffff800`0488965a : nt!PpmEventTracePerfCheck+0x34
fffff800`00b9c540 fffff800`0488c652 : fffff800`049f3e80 00000000`00000000 fffff800`40f61288 00000000`00000001 : nt!PpmCheckStart+0x2a
fffff800`00b9c570 fffff800`0488c4f6 : fffff880`047da640 00000000`001422f4 00000000`00000000 00000000`00000040 : nt!KiProcessTimerDpcTable+0x66
fffff800`00b9c5e0 fffff800`0488c3de : 0000002f`eec8de10 fffff800`00b9cc58 00000000`001422f4 fffff800`049f8108 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00b9cc30 fffff800`0488c1c7 : 00000012`c43aebc2 00000012`001422f4 00000012`c43aeb09 00000000`000000f4 : nt!KiTimerExpiration+0x1be
fffff800`00b9ccd0 fffff800`04878a2a : fffff800`049f3e80 fffff800`04a01cc0 00000000`00000000 fffff880`08d54db0 : nt!KiRetireDpcList+0x277
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PpmEventTracePerfCheck+34
fffff800`0496c714 7447 je nt!PpmEventTracePerfCheck+0x7d (fffff800`0496c75d)
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!PpmEventTracePerfCheck+34
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fdd5b
FAILURE_BUCKET_ID: X64_0xA_nt!PpmEventTracePerfCheck+34
BUCKET_ID: X64_0xA_nt!PpmEventTracePerfCheck+34
Followup: MachineOwner
---------
请问是什么问题?
整套配置跟以前的一样,一直很稳定
最近有变动的地方是换了显卡HD6990
用过驱动精灵全部升级过驱动
安装了360杀毒软件和360安全卫士