Bluescreen unter Windows 8.1

Nicht ganz! :)

Dann nochmal zusammenfassend:

- Nach Umstellung auf PCI-E GEN2 keine Probleme für 3/4/5 Std. zumindest bei dem von mir zum Testen verwendeten Spiel
-->stabilerer Betrieb, ohne zu Streamen war es fast undenkbar solange ohne Bluescreens zu spielen

- keine Probleme wenn zusätzlich gestreamt wird

- Keine Probleme, wenn du neben her deinen eigenen Stream anschaust (der dann lokal gestreamt wird?)
--> Genau Open Broadcaster Software hat eine Art "Stream Vorschau", welche dann nur für mich sichtbar ist und nicht live auf meinem Twitch.tv Kanal geht.

FAZIT: Computer läuft stabiler, allerdings scheint das Problem " Bluescreens" nicht endgültig beseitigt zu sein!
 
So der ist Taufrisch , 20 min her!

Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\032614-14000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff801`cc87b000 PsLoadedModuleList = 0xfffff801`ccb3f990
Debug session time: Wed Mar 26 01:44:06.457 2014 (UTC + 1:00)
System Uptime: 2 days 0:19:37.168
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
Loading unloaded module list
........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 139, {3, ffffd00027c79690, ffffd00027c795e8, 0}

Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiInterlockedRemoveHeadListIfExist+6d )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd00027c79690, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd00027c795e8, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


TRAP_FRAME: ffffd00027c79690 -- (.trap 0xffffd00027c79690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe0000cd5d018 rbx=0000000000000000 rcx=0000000000000003
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002437a8d rsp=ffffd00027c79820 rbp=ffffe0000886c870
r8=ffffd00027c79840 r9=0000000000000005 r10=ffffc000087f4e20
r11=ffffd00027c79840 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms1!VidSchiInterlockedRemoveHeadListIfExist+0x6d:
fffff800`02437a8d cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffd00027c795e8 -- (.exr 0xffffd00027c795e8)
ExceptionAddress: fffff80002437a8d (dxgmms1!VidSchiInterlockedRemoveHeadListIfExist+0x000000000000006d)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT

BUGCHECK_STR: 0x139

PROCESS_NAME: eu4.exe

CURRENT_IRQL: 2

ERROR_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.

EXCEPTION_PARAMETER1: 0000000000000003

LAST_CONTROL_TRANSFER: from fffff801cc9d47e9 to fffff801cc9c8ca0

STACK_TEXT:
ffffd000`27c79368 fffff801`cc9d47e9 : 00000000`00000139 00000000`00000003 ffffd000`27c79690 ffffd000`27c795e8 : nt!KeBugCheckEx
ffffd000`27c79370 fffff801`cc9d4b10 : 00000000`00000001 00000000`44d90000 00001e00`00000000 00000780`00000004 : nt!KiBugCheckDispatch+0x69
ffffd000`27c794b0 fffff801`cc9d3d34 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiFastFailDispatch+0xd0
ffffd000`27c79690 fffff800`02437a8d : ffffc000`00000001 ffffe000`01973c00 ffffc000`020915c0 00000000`00000001 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`27c79820 fffff800`024661de : 00000000`0006f249 00000000`00000000 ffffc000`02091500 fffff800`0319e401 : dxgmms1!VidSchiInterlockedRemoveHeadListIfExist+0x6d
ffffd000`27c79870 fffff800`02304ed6 : ffffc000`087f4e20 ffffc000`020915c0 ffffe000`05b02000 00000000`00000000 : dxgmms1!VidSchSubmitCommand+0xae
ffffd000`27c79990 fffff800`0230c1a2 : ffffc000`0b8aa560 00000000`00000000 ffffc000`020915c0 ffffd000`27c7a9c0 : dxgkrnl!DXGCONTEXT::SubmitPresent+0x4a6
ffffd000`27c79f50 fffff800`023068d0 : ffffe000`05b84540 ffffc000`087f4dd0 ffffc000`087f4dd0 ffffc000`02091010 : dxgkrnl!DXGCONTEXT::present+0x1df2
ffffd000`27c7a930 fffff801`cc9d44b3 : ffffe000`0435d440 00000000`0ad0dc90 ffffc000`087f4dd0 00000000`00000000 : dxgkrnl!DxgkPresent+0x3e0
ffffd000`27c7ab00 00000000`7709773a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0ad0dc48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7709773a


STACK_COMMAND: kb

FOLLOWUP_IP:
dxgmms1!VidSchiInterlockedRemoveHeadListIfExist+6d
fffff800`02437a8d cd29 int 29h

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: dxgmms1!VidSchiInterlockedRemoveHeadListIfExist+6d

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME: dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 52cc90dc

BUCKET_ID_FUNC_OFFSET: 6d

FAILURE_BUCKET_ID: 0x139_3_dxgmms1!VidSchiInterlockedRemoveHeadListIfExist

BUCKET_ID: 0x139_3_dxgmms1!VidSchiInterlockedRemoveHeadListIfExist

Followup: MachineOwner
---------

Und das ist der von vor 3 Tagen!:

Microsoft (R) Windows Debugger Version 6.2.9200.20512 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\032314-13453-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff801`9ae8d000 PsLoadedModuleList = 0xfffff801`9b151990
Debug session time: Sun Mar 23 01:01:44.910 2014 (UTC + 1:00)
System Uptime: 0 days 1:39:56.622
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 139, {3, ffffd00024da6410, ffffd00024da6368, 0}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer+18f10 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd00024da6410, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd00024da6368, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


TRAP_FRAME: ffffd00024da6410 -- (.trap 0xffffd00024da6410)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe00006216330 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffe000017451d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002463ca0 rsp=ffffd00024da65a0 rbp=ffffd00024da66a0
r8=ffffc0000b56f428 r9=0000000000000008 r10=0000000000000077
r11=0000000000000086 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer+0x18f10:
fffff800`02463ca0 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffd00024da6368 -- (.exr 0xffffd00024da6368)
ExceptionAddress: fffff80002463ca0 (dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer+0x0000000000018f10)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT

BUGCHECK_STR: 0x139

PROCESS_NAME: System

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.

EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - Das System hat in dieser Anwendung den berlauf eines stapelbasierten Puffers ermittelt. Dieser berlauf k nnte einem b sartigen Benutzer erm glichen, die Steuerung der Anwendung zu bernehmen.

EXCEPTION_PARAMETER1: 0000000000000003

LAST_CONTROL_TRANSFER: from fffff8019afe67e9 to fffff8019afdaca0

STACK_TEXT:
ffffd000`24da60e8 fffff801`9afe67e9 : 00000000`00000139 00000000`00000003 ffffd000`24da6410 ffffd000`24da6368 : nt!KeBugCheckEx
ffffd000`24da60f0 fffff801`9afe6b10 : ffffd000`24da6410 00000000`00000000 00000000`00000000 ffffe000`0607f010 : nt!KiBugCheckDispatch+0x69
ffffd000`24da6230 fffff801`9afe5d34 : 00000000`00000008 ffffe000`062162f0 00000000`00000000 ffffd000`24da6410 : nt!KiFastFailDispatch+0xd0
ffffd000`24da6410 fffff800`02463ca0 : 00000000`00000000 ffffe000`08325f00 ffffc000`0b271fb8 ffffd000`24da66a0 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd000`24da65a0 fffff800`02449d22 : ffffe000`058d7000 ffffd000`24da6900 fffff800`02420d00 fffff801`00000002 : dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer+0x18f10
ffffd000`24da6820 fffff800`02456975 : ffffe000`0743d460 ffffe000`00000000 ffffe000`00000000 ffffe000`00000004 : dxgmms1!VidSchiSubmitRenderCommand+0x1f2
ffffd000`24da6b70 fffff800`024568ed : ffffe000`058d7000 00000000`00000080 ffffe000`05b40080 ffffe000`05b40000 : dxgmms1!VidSchiRun_PriorityTable+0x85
ffffd000`24da6bc0 fffff801`9af1a2e4 : ffffd000`206cc240 ffffe000`05b40080 ffffd000`24da6c90 fffff801`9afde07d : dxgmms1!VidSchiWorkerThread+0x8d
ffffd000`24da6c00 fffff801`9afe12c6 : ffffd000`206c0180 ffffe000`05b40080 ffffd000`206cc240 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd000`24da6c60 00000000`00000000 : ffffd000`24da7000 ffffd000`24da1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND: kb

FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer+18f10
fffff800`02463ca0 cd29 int 29h

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer+18f10

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME: dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 52cc90dc

BUCKET_ID_FUNC_OFFSET: 18f10

FAILURE_BUCKET_ID: 0x139_3_dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer

BUCKET_ID: 0x139_3_dxgmms1!VIDMM_GLOBAL::prepareDmaBuffer

Followup: MachineOwner
---------
 
Zuletzt bearbeitet:
Hmm... der webinstaller hat eine Datei mit der Größe von 6 MB installiert! Aber obs daran liegt?Ich teste mal weiter!
 
Also ehrlich gesagt denke ich langsam, das es wirklich an der Hardware liegt, aber welches Teil wäre das wahrscheinlichste?
 
Hatte bisher wenig Zeit zum testen, werde mich aber sofort melden falls wieder ein bluescreen auftritt.

grüße Mo
Ergänzung ()

so da wars es wieder! "Unexpected Kernel Mode Trap"

Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\040214-13562-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.16452.amd64fre.winblue_gdr.131030-1505
Machine Name:
Kernel base = 0xfffff801`fc615000 PsLoadedModuleList = 0xfffff801`fc8d9990
Debug session time: Wed Apr 2 16:36:48.005 2014 (UTC + 2:00)
System Uptime: 3 days 14:28:46.580
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
...........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, ffffd000206480b0, ffffd0002754df70, fffff801fc650e8e}

Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b4 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd000206480b0
Arg3: ffffd0002754df70
Arg4: fffff801fc650e8e

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: Steam.exe

CURRENT_IRQL: 0

TRAP_FRAME: ffffd000275514d0 -- (.trap 0xffffd000275514d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000050 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000000d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801fc6f04b1 rsp=ffffd00027551660 rbp=ffffd00027551760
r8=00000000001594b3 r9=ffffd00027553b00 r10=0000000000000006
r11=fffff801fc925b03 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po nc
nt!RtlDispatchException+0x371:
fffff801`fc6f04b1 488b02 mov rax,qword ptr [rdx] ds:00000000`000000d0=????????????????
Resetting default scope

EXCEPTION_RECORD: ffffe00000000001 -- (.exr 0xffffe00000000001)
Cannot read Exception record @ ffffe00000000001

LAST_CONTROL_TRANSFER: from fffff801fc76e7e9 to fffff801fc762ca0

STACK_TEXT:
ffffd000`20647f68 fffff801`fc76e7e9 : 00000000`0000007f 00000000`00000008 ffffd000`206480b0 ffffd000`2754df70 : nt!KeBugCheckEx
ffffd000`20647f70 fffff801`fc76c8f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`206480b0 fffff801`fc650e8e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb4
ffffd000`2754df70 fffff801`fc76cf2f : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`2754e0b0 : nt!MmAccessFault+0xce
ffffd000`2754e0b0 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`2754e340 ffffd000`2754f168 00000000`000002fe : nt!KiPageFault+0x12f
ffffd000`2754e240 fffff801`fc6f145b : ffffd000`2754f168 ffffd000`2754ee70 ffffd000`2754f168 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`2754e940 fffff801`fc76e8c2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x61f
ffffd000`2754f030 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`2754f210 : nt!KiExceptionDispatch+0xc2
ffffd000`2754f210 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`2754f4a0 ffffd000`275502c8 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`2754f3a0 fffff801`fc6f145b : ffffd000`275502c8 ffffd000`2754ffd0 ffffd000`275502c8 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`2754faa0 fffff801`fc76e8c2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x61f
ffffd000`27550190 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`27550370 : nt!KiExceptionDispatch+0xc2
ffffd000`27550370 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`27550600 ffffd000`27551428 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`27550500 fffff801`fc6f145b : ffffd000`27551428 ffffd000`27551130 ffffd000`27551428 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`27550c00 fffff801`fc76e8c2 : 00000000`00000000 00000000`0000001b 00000000`00000000 ffffedaf`f991f298 : nt!KiDispatchException+0x61f
ffffd000`275512f0 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffd000`275514d0 : nt!KiExceptionDispatch+0xc2
ffffd000`275514d0 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`27551760 ffffd000`27552588 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`27551660 fffff801`fc6f145b : ffffd000`27552588 ffffd000`27552290 ffffd000`27552588 fffff801`fc894808 : nt!RtlDispatchException+0x371
ffffd000`27551d60 fffff801`fc76e8c2 : ffffe000`00000001 fffff800`019fc906 ffffe000`00000003 00000000`7f000001 : nt!KiDispatchException+0x61f
ffffd000`27552450 fffff801`fc76d014 : 00000000`00000000 00000000`00000003 00000014`00000000 ffffd000`27552630 : nt!KiExceptionDispatch+0xc2
ffffd000`27552630 fffff801`fc6f04b1 : 00000000`00000000 ffffd000`275528c0 ffffd000`275536e8 00000000`000002fe : nt!KiPageFault+0x214
ffffd000`275527c0 fffff801`fc6f145b : ffffd000`275536e8 ffffd000`275533f0 ffffd000`275536e8 00000000`00000001 : nt!RtlDispatchException+0x371
ffffd000`27552ec0 fffff801`fc76e8c2 : ffffd000`20640180 ffffe000`09117080 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x61f
ffffd000`275535b0 fffff801`fc76cdfe : ffffe000`091171c0 00000000`00000000 00000000`00000000 ffffe000`095ff570 : nt!KiExceptionDispatch+0xc2
ffffd000`27553790 fffff960`001288fe : fffbf960`00124961 00000000`00000000 fffff901`407a0000 00000000`00003dff : nt!KiGeneralProtectionFault+0xfe
ffffd000`27553928 fffbf960`00124961 : 00000000`00000000 fffff901`407a0000 00000000`00003dff fffff960`00000000 : win32k!xxxRealSleepThread+0x2fe
ffffd000`27553930 00000000`00000000 : fffff901`407a0000 00000000`00003dff fffff960`00000000 00000000`00000000 : 0xfffbf960`00124961


STACK_COMMAND: kb

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

FOLLOWUP_NAME: MachineOwner

DEBUG_FLR_IMAGE_TIMESTAMP: 52718d9c

FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b4
fffff801`fc76c8f4 90 nop

SYMBOL_STACK_INDEX: 2

SYMBOL_NAME: nt!KiDoubleFaultAbort+b4

FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION

BUCKET_ID: TRAP_FRAME_RECURSION

Followup: MachineOwner
---------
 
Lade mal bitte die Minidump vom geposteten Absturz hier hoch.

Ich denke aber, dass wir ein Treiberproblem ausschließen können. Die Preisfrage ist allerdings wo das hardwareseitige Problem liegt.
Bitte als nächstes einen CMOS Reset durchführen (genau nach Anleitung Handbuch Motherboard vorgehen).
Anschließend aktuelle Screenshots von CPU-Z (Reiter CPU und Memory) posten.

Hast du schon das andere RAM Paar separat getestet?
Wenn ja, und die Probleme nach dem CMOS Reset bleiben, baue die Grafikkarte aus und teste die Stabilität des System, über die CPU-Grafik.
Sofern du eine andere Grafikkarte zur Hand hast, könntest du auch diese einbauen.

Sollte das System ohne Grafikkarte stabil laufen, baue die Grafikkarte nochmals ein und takte den 3D Takt der Karte (Core-, Shader- und Memtakt) um mind. 200mhz herunter. Das Untertakten kannst du z.B. relativ einfach mit dem Tool Afterburner bewerkstelligen.
 
Alles klar, danke erstmal das du versuchst mir zu helfen!
Das ganze wird ein wenig dauern! Ich melde mich wieder! :)

mfg mo
 
So ich melde mich auch mal wieder. Problem besteht weiterhin. Hatte allerdings noch keine Zeit mich genauer mit dem Problem zu befassen und deine letzten Lösungsvorschläge aus zu probieren. Sobald ich in 2 Wochen wieder da bin, werde ich mich daran setzen! Mfg
 
setz mal die DRAM Vcore auf 1,55 Volt...

auto is 1,5 und je nach Board kann da schonmal bissl zu wenig anliegen.

IRQL not less or equal is (meistens) Ram Fehler.

Gerade bei 2 Kits isses mim Ram immer schwierig gerade wegen den Timings. Da muss nur einer bissl "Toleranz" haben und schon zickt alles rum. Selbst schon erlebt.

Am besten du lässt nur 2 Rams laufen und zwar da wo im Handbuch steht das es die Dual Channel Slots sind.
Ist performanter als 4x. ( aber erst mal alles stabil bekommen :) )

11-11-11-28 -2T sind aber recht miese Timings für DDR3 1600 aber stell die am besten mal manuell ein und zwar 9-9-9-24 - 2T (lt. Info sollten die RipJawz das locker können)

sollten alle stricke reissen die Rams einzeln durchtesten ned 2.

Wenn die Kits von einer Firma sind ist ein defekt aller Ram Riegel auch nicht auszuschließen.

Desweiteren mal die Auslagerungsdatei deaktivieren testweise und danach wieder aktivieren.
Durch die ganzen Bsods können sich da auch Speicherfehler einschleichen.

mfg.
 
Zuletzt bearbeitet:
Ok danke für die Tipps!. Ich werde das morgen gleich mal alles ausprobieren! Also sollte ich lieber 2x8 Ramriegel einbauen?
Die timings etc kann ich im Bios einstellen geh ich mal von aus!^^

Wie gesagt das irrwitzige ist einfach, das der Rechner stabil läuft, wenn mein Stream/Streamprogramm läuft. Also wenn mehr Leistung bezogen wird! Ich versteh das nicht!
Ergänzung ()

Leider habe ich Probleme die jeweiligen Settings im Bios einzustellen, weil ich sie schlichtweg nicht finde! :/
Ergänzung ()

Hier übrigens die Minidump von den letzten Bluescreens, alle von heute!

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801b9805447, Address of the instruction which caused the bugcheck
Arg3: ffffd000217338c0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
nt!ObpCaptureHandleInformation+6b
fffff801`b9805447 8a4128 mov al,byte ptr [rcx+28h]

CONTEXT: ffffd000217338c0 -- (.cxr 0xffffd000217338c0)
rax=0000000000000000 rbx=0000000000000098 rcx=0000000000000000
rdx=ffffd000240831e8 rsi=ffffc001ddc97260 rdi=000000000017fffc
rip=fffff801b9805447 rsp=ffffd000217342f8 rbp=ffffc001ddc40700
r8=ffffe001ab3a8880 r9=0000000000000098 r10=ffffd00021734388
r11=ffffc001ddc97260 r12=0000000000000000 r13=ffffd000217343c8
r14=fffff801b98053dc r15=ffffd00024000050
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!ObpCaptureHandleInformation+0x6b:
fffff801`b9805447 8a4128 mov al,byte ptr [rcx+28h] ds:002b:00000000`00000028=??
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: Steam.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff801b9838afc to fffff801b9805447

STACK_TEXT:
ffffd000`217342f8 fffff801`b9838afc : fffff801`b98b42a0 ffffe001`abc3d340 00000000`0017fffc ffffd000`21734434 : nt!ObpCaptureHandleInformation+0x6b
ffffd000`21734300 fffff801`b9805378 : fffff801`b98053dc ffffd000`240831e8 00000000`0017fffc ffffd000`21734434 : nt!ExpSnapShotHandleTables+0x138
ffffd000`21734380 fffff801`b9839163 : ffffd000`21734434 00000000`000831b0 00000000`0017fffc 00000000`00000020 : nt!ObGetHandleInformation+0x3c
ffffd000`217343c0 fffff801`b9753c86 : 00000000`0c9ee050 00000000`0c9ee050 ffffd000`24000050 ffffe001`acd6d3c0 : nt!ExpGetHandleInformation+0x53
ffffd000`21734400 fffff801`b95f3f71 : 00000000`0c9ee050 00000000`00000004 00000000`000ffffc 00000000`00018002 : nt! ?? ::NNGAKEGL::`string'+0x24616
ffffd000`21734ac0 fffff801`b93647b3 : 00000000`00000001 00000000`00290000 ffffd000`21734a01 ffffd000`21734b00 : nt!NtQuerySystemInformation+0x49
ffffd000`21734b00 00007ffc`7ea3b06a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`089ddcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`7ea3b06a


FOLLOWUP_IP:
nt!ObpCaptureHandleInformation+6b
fffff801`b9805447 8a4128 mov al,byte ptr [rcx+28h]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!ObpCaptureHandleInformation+6b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 53388e13

STACK_COMMAND: .cxr 0xffffd000217338c0 ; kb

BUCKET_ID_FUNC_OFFSET: 6b

FAILURE_BUCKET_ID: 0x3B_nt!ObpCaptureHandleInformation

BUCKET_ID: 0x3B_nt!ObpCaptureHandleInformation

Followup: MachineOwner
---------

Und der nächste:

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff960000fe3dd, Address of the instruction which caused the bugcheck
Arg3: ffffd00024145d60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP:
win32k+e3dd
fffff960`000fe3dd 488b4808 mov rcx,qword ptr [rax+8]

CONTEXT: ffffd00024145d60 -- (.cxr 0xffffd00024145d60)
rax=fffee0009ac10850 rbx=fffff9014084e040 rcx=fffff9014084e040
rdx=0000000000000004 rsi=fffff9014012b6b0 rdi=0000000000000000
rip=fffff960000fe3dd rsp=ffffd00024146790 rbp=0000000000000004
r8=0000000000000000 r9=000000000000007f r10=0000000086000000
r11=0000000000000080 r12=0000000000000000 r13=0000000000000001
r14=0000000000000000 r15=fffff90140800830
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
win32k+0xe3dd:
fffff960`000fe3dd 488b4808 mov rcx,qword ptr [rax+8] ds:002b:fffee000`9ac10858=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: explorer.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff9014084e210 to fffff960000fe3dd

STACK_TEXT:
ffffd000`24146790 fffff901`4084e210 : 00000000`00000004 00000000`00200098 00000000`00000001 ffffd000`24146810 : win32k+0xe3dd
ffffd000`24146798 00000000`00000004 : 00000000`00200098 00000000`00000001 ffffd000`24146810 00000000`00000004 : 0xfffff901`4084e210
ffffd000`241467a0 00000000`00200098 : 00000000`00000001 ffffd000`24146810 00000000`00000004 00000000`00000003 : 0x4
ffffd000`241467a8 00000000`00000001 : ffffd000`24146810 00000000`00000004 00000000`00000003 fffff960`000fe51b : 0x200098
ffffd000`241467b0 ffffd000`24146810 : 00000000`00000004 00000000`00000003 fffff960`000fe51b fffff901`40404a70 : 0x1
ffffd000`241467b8 00000000`00000004 : 00000000`00000003 fffff960`000fe51b fffff901`40404a70 fffff901`4012b6b0 : 0xffffd000`24146810
ffffd000`241467c0 00000000`00000003 : fffff960`000fe51b fffff901`40404a70 fffff901`4012b6b0 00000000`00000004 : 0x4
ffffd000`241467c8 fffff960`000fe51b : fffff901`40404a70 fffff901`4012b6b0 00000000`00000004 fffff960`000fe525 : 0x3
ffffd000`241467d0 fffff901`40404a70 : fffff901`4012b6b0 00000000`00000004 fffff960`000fe525 fffff901`41dd7b60 : win32k+0xe51b
ffffd000`241467d8 fffff901`4012b6b0 : 00000000`00000004 fffff960`000fe525 fffff901`41dd7b60 00000000`00200098 : 0xfffff901`40404a70
ffffd000`241467e0 00000000`00000004 : fffff960`000fe525 fffff901`41dd7b60 00000000`00200098 fffff901`40758700 : 0xfffff901`4012b6b0
ffffd000`241467e8 fffff960`000fe525 : fffff901`41dd7b60 00000000`00200098 fffff901`40758700 00000000`00000001 : 0x4
ffffd000`241467f0 fffff901`41dd7b60 : 00000000`00200098 fffff901`40758700 00000000`00000001 ffffd000`241468d0 : win32k+0xe525
ffffd000`241467f8 00000000`00200098 : fffff901`40758700 00000000`00000001 ffffd000`241468d0 fffff901`4084e040 : 0xfffff901`41dd7b60
ffffd000`24146800 fffff901`40758700 : 00000000`00000001 ffffd000`241468d0 fffff901`4084e040 00000000`00000000 : 0x200098
ffffd000`24146808 00000000`00000001 : ffffd000`241468d0 fffff901`4084e040 00000000`00000000 00000000`00000000 : 0xfffff901`40758700
ffffd000`24146810 ffffd000`241468d0 : fffff901`4084e040 00000000`00000000 00000000`00000000 00000000`00000004 : 0x1
ffffd000`24146818 fffff901`4084e040 : 00000000`00000000 00000000`00000000 00000000`00000004 00000000`00000000 : 0xffffd000`241468d0
ffffd000`24146820 00000000`00000000 : 00000000`00000000 00000000`00000004 00000000`00000000 ffffd000`24146900 : 0xfffff901`4084e040


FOLLOWUP_IP:
win32k+e3dd
fffff960`000fe3dd 488b4808 mov rcx,qword ptr [rax+8]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: win32k+e3dd

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 0

STACK_COMMAND: .cxr 0xffffd00024145d60 ; kb

FAILURE_BUCKET_ID: 0x3B_win32k+e3dd

BUCKET_ID: 0x3B_win32k+e3dd

Followup: MachineOwner
---------


Und noch einer:

NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 000000b500190637
Arg2: ffffd00022269f98
Arg3: ffffd000222697a0
Arg4: fffff80160651ff9

Debugging Details:
------------------


EXCEPTION_RECORD: ffffd00022269f98 -- (.exr 0xffffd00022269f98)
ExceptionAddress: fffff80160651ff9 (nt!MiRemoveUnusedSegment+0x0000000000000061)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT: ffffd000222697a0 -- (.cxr 0xffffd000222697a0)
rax=ffffe000fe915628 rbx=0000000000000000 rcx=ffffe000fec55828
rdx=ffdfe00100b20888 rsi=0000000008000000 rdi=ffffe000fe915620
rip=fffff80160651ff9 rsp=ffffd0002226a1d0 rbp=ffffd0002226a330
r8=ffffd0002226a238 r9=0000000000000000 r10=ffffe000fe915670
r11=0000000000000000 r12=0000000000000004 r13=ffffe0010036a710
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MiRemoveUnusedSegment+0x61:
fffff801`60651ff9 48394208 cmp qword ptr [rdx+8],rax ds:002b:ffdfe001`00b20890=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

PROCESS_NAME: Dropbox.exe

CURRENT_IRQL: 2

ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: ffffffffffffffff

READ_ADDRESS: fffff801608b9ce0: Unable to get special pool info
fffff801608b9ce0: Unable to get special pool info
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff

FOLLOWUP_IP:
nt!MiRemoveUnusedSegment+61
fffff801`60651ff9 48394208 cmp qword ptr [rdx+8],rax

FAULTING_IP:
nt!MiRemoveUnusedSegment+61
fffff801`60651ff9 48394208 cmp qword ptr [rdx+8],rax

BUGCHECK_STR: 0x24

LAST_CONTROL_TRANSFER: from fffff8016065095c to fffff80160651ff9

STACK_TEXT:
ffffd000`2226a1d0 fffff801`6065095c : ffffe000`fe915620 ffffd000`2226a330 00000000`08000000 fffff800`55403f2c : nt!MiRemoveUnusedSegment+0x61
ffffd000`2226a200 fffff801`609cba4d : 00000000`00000001 ffffc000`00000000 00000000`00000001 00000000`00000000 : nt!MiReferenceControlAreaForCacheManager+0x60
ffffd000`2226a230 fffff801`609ca42b : ffffe000`ff1e3778 00000000`00000000 ffffe000`00000001 ffffd000`2226a4f8 : nt!MiCreateSection+0x759
ffffd000`2226a420 fffff801`60692a59 : 00000000`00000001 00000000`00000000 00000000`00000208 00000000`000007ff : nt!MmCreateSection+0x87
ffffd000`2226a480 fffff800`5591ab33 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc000`ee694140 : nt!CcInitializeCacheMap+0x645
ffffd000`2226a560 fffff800`55913d0b : 00000000`00000000 ffffd000`2226a790 00000000`00001800 ffffc000`ee694140 : Ntfs!NtfsCachedRead+0x137
ffffd000`2226a5c0 fffff800`5591576c : ffffe001`00345228 ffffe000`fed51bd0 ffffd000`2226a701 00000000`00000201 : Ntfs!NtfsCommonRead+0x6ab
ffffd000`2226a760 fffff800`55402cf8 : ffffe000`ff14b8a0 ffffe000`fed51bd0 ffffe000`fed51bd0 ffffe000`fed51fb8 : Ntfs!NtfsFsdRead+0x1dc
ffffd000`2226a810 fffff800`554010b6 : ffffe000`fb5d7d70 00000000`00000000 ffffe000`fed51bd0 00000000`00000001 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x258
ffffd000`2226a8b0 fffff801`609f9d1a : ffffe000`fed51fb8 ffffd000`2226ab80 00000000`00000000 00000000`0000000c : fltmgr!FltpDispatch+0xb6
ffffd000`2226a910 fffff801`607617b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x7ca
ffffd000`2226aa90 00000000`00020002 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0b45f128 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x20002


SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!MiRemoveUnusedSegment+61

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 53388e13

STACK_COMMAND: .cxr 0xffffd000222697a0 ; kb

IMAGE_NAME: memory_corruption

BUCKET_ID_FUNC_OFFSET: 61

FAILURE_BUCKET_ID: 0x24_nt!MiRemoveUnusedSegment

BUCKET_ID: 0x24_nt!MiRemoveUnusedSegment

Followup: MachineOwner
---------

Hilfe!:/
 
Zuletzt bearbeitet:
Zurück
Oben