電腦當機只有在玩"爐石戰紀"著個遊戲會這樣而以 其他遊戲都不會 每次只能玩一下就當機 當機碼是C5
之後我就用Windows Debugging Tool 這個軟體去解讀 當機的資訊
出來的結果如下 Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\041514-19546-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*c:\sytemp*
Symbol search path is: SRV*c:\sytemp*
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032a86d0
Debug session time: Tue Apr 15 0027.043 2014 (UTC + 8:00)
System Uptime: 0 days 6:48:11.087
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C5, {8, 2, 0, fffff8000320fb05}
*** WARNING: Unable to verify timestamp for epfwwfp.sys
*** ERROR: Module load completed but symbols could not be loaded for epfwwfp.sys
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+249 )
Followup: Pool_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_CORRUPTED_EXPOOL (c5)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is
caused by drivers that have corrupted the system pool. Run the driver
verifier against any new (or suspect) drivers, and if that doesn't turn up
the culprit, then use gflags to enable special pool.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8000320fb05, address which referenced memory
Debugging Details:
------------------
BUGCHECK_STR: 0xC5_2
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExDeferredFreePool+249
fffff800`0320fb05 4c395808 cmp qword ptr [rax+8],r11
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: ekrn.exe
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
DPC_STACK_BASE: FFFFF80000BA2FB0
TRAP_FRAME: fffff80000ba2860 -- (.trap 0xfffff80000ba2860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff8000326a800
rdx=fffff8800a0d7310 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000320fb05 rsp=fffff80000ba29f0 rbp=0000000000000000
r8=0000000000000000 r9=fffff8800a0d7310 r10=0000000000000001
r11=fffff8800a0d7320 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
nt!ExDeferredFreePool+0x249:
fffff800`0320fb05 4c395808 cmp qword ptr [rax+8],r11 ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030da169 to fffff800030dabc0
STACK_TEXT:
fffff800`00ba2718 fffff800`030da169 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba2720 fffff800`030d8de0 : fffffa80`0413edc4 fffffa80`06ff3860 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba2860 fffff800`0320fb05 : fffffa80`05fcc7f8 fffffa80`05fcc808 00000000`00000000 fffffa80`05c68ba8 : nt!KiPageFault+0x260
fffff800`00ba29f0 fffff800`0320e4f1 : 00000000`00000000 fffffa80`0613ea20 00000000`00000000 00000000`00010000 : nt!ExDeferredFreePool+0x249
fffff800`00ba2a80 fffff880`017e515c : 00000000`00010000 fffffa80`042f0010 fffffa80`44465745 fffffa80`000002a7 : nt!ExFreePoolWithTag+0x411
fffff800`00ba2b30 00000000`00010000 : fffffa80`042f0010 fffffa80`44465745 fffffa80`000002a7 fffff800`00ba2b78 : epfwwfp+0x315c
fffff800`00ba2b38 fffffa80`042f0010 : fffffa80`44465745 fffffa80`000002a7 fffff800`00ba2b78 00000000`00000000 : 0x10000
fffff800`00ba2b40 fffffa80`44465745 : fffffa80`000002a7 fffff800`00ba2b78 00000000`00000000 00000000`00000000 : 0xfffffa80`042f0010
fffff800`00ba2b48 fffffa80`000002a7 : fffff800`00ba2b78 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`44465745
fffff800`00ba2b50 fffff800`00ba2b78 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xfffffa80`000002a7
fffff800`00ba2b58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : 0xfffff800`00ba2b78
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+249
fffff800`0320fb05 4c395808 cmp qword ptr [rax+8],r11
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!ExDeferredFreePool+249
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 6.1.7601.18247
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+249
BUCKET_ID: X64_0xC5_2_nt!ExDeferredFreePool+249
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:x64_0xc5_2_nt!exdeferredfreepool+249
FAILURE_ID_HASH: {d7d883d2-bf7a-4d64-421b-e996f9e683cf}
Followup: Pool_corruption
---------
... |