Hab eine neue Graka CPU und neuen Speicher eingebaut.
Und irgendwas davon macht Probleme. Nur was? Vllt. kann ja jemand damit was anfangen.
Und irgendwas davon macht Probleme. Nur was? Vllt. kann ja jemand damit was anfangen.
Code:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa89024c0958, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001e6ff58, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002030080
fffffa89024c0958
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemoveAnyPage+178
fffff800`01e6ff58 4c094828 or qword ptr [rax+28h],r9
CUSTOMER_CRASH_COUNT: 3
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: BFBC2Updater.ex
TRAP_FRAME: fffffa60089fa1f0 -- (.trap 0xfffffa60089fa1f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa89024c0930 rbx=0000000000000000 rcx=0000000000000093
rdx=fffffa8003900000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001e6ff58 rsp=fffffa60089fa380 rbp=0000000000000000
r8=0000058000000000 r9=000fffffffffffff r10=0000000000000000
r11=0000000000000031 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MiRemoveAnyPage+0x178:
fffff800`01e6ff58 4c094828 or qword ptr [rax+28h],r9 ds:fffffa89`024c0958=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80001e6322e to fffff80001e63490
STACK_TEXT:
fffffa60`089fa0a8 fffff800`01e6322e : 00000000`0000000a fffffa89`024c0958 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffa60`089fa0b0 fffff800`01e6210b : 00000000`00000001 fffffa60`00c06ab2 fffffa80`00000001 fffffa80`024bfd30 : nt!KiBugCheckDispatch+0x6e
fffffa60`089fa1f0 fffff800`01e6ff58 : fffff800`01fce240 fffff800`01e8bbc5 fffffa80`04ccf6c0 fffffa60`00b4630f : nt!KiPageFault+0x20b
fffffa60`089fa380 fffff800`01e923d6 : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 00000000`000003e8 : nt!MiRemoveAnyPage+0x178
fffffa60`089fa3e0 fffff800`01e90e53 : fffff980`1748c000 00000000`03ebfd8c 00000000`00000000 00000000`00000080 : nt!MmCopyToCachedPage+0x396
fffffa60`089fa550 fffff800`01e44f02 : fffffa80`046f8010 00000000`03ebfd8c fffffa60`089fa6e8 00000000`00000000 : nt!CcMapAndCopy+0x3a3
fffffa60`089fa670 fffffa60`010affe7 : 00000000`0000014b 00000000`0014c080 fffffa80`040e8800 00000000`03ebfd8c : nt!CcFastCopyWrite+0x162
fffffa60`089fa750 fffffa60`00a10232 : fffffa80`040e8800 fffffa80`07e92d60 fffffa80`000003e8 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x217
fffffa60`089fa950 fffffa60`00a136e4 : fffffa60`089faa40 00000000`00000000 fffffa80`040e8800 00000000`00000004 : fltmgr!FltpPerformFastIoCall+0xf2
fffffa60`089fa9b0 fffffa60`00a2ea49 : 00000000`00000000 fffff800`01e84bae 00000000`00000000 fffffa60`089faa50 : fltmgr!FltpPassThroughFastIo+0xb4
fffffa60`089faa10 fffff800`020cdbfa : fffffa80`040e8874 fffff800`01e659af fffffa80`03fb8e30 fffffa80`040e8874 : fltmgr!FltpFastIoWrite+0x1a9
fffffa60`089faab0 fffff800`01e62f33 : fffffa80`03fb8e01 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x599
fffffa60`089fabb0 00000000`75483917 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02dbf0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75483917
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRemoveAnyPage+178
fffff800`01e6ff58 4c094828 or qword ptr [rax+28h],r9
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRemoveAnyPage+178
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4dfb5a33
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiRemoveAnyPage+178
BUCKET_ID: X64_0xA_nt!MiRemoveAnyPage+178
Followup: MachineOwner
---------
Code:
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa60082951a8
Arg3: fffffa6008294b80
Arg4: fffff80001e907b0
Debugging Details:
------------------
EXCEPTION_RECORD: fffffa60082951a8 -- (.exr 0xfffffa60082951a8)
ExceptionAddress: fffff80001e907b0 (nt!MmMapViewInSystemCache+0x0000000000000060)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffffa6008294b80 -- (.cxr 0xfffffa6008294b80)
rax=0000000000000040 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=cac5936ccac5936c
rip=fffff80001e907b0 rsp=fffffa60082953e0 rbp=fffffa800398a2c8
r8=fffffa6008295540 r9=fffffa6008295548 r10=fffffa80039aa650
r11=0000000000000000 r12=fffff8800b98baf0 r13=fffffa8005469c10
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MmMapViewInSystemCache+0x60:
fffff800`01e907b0 48837f6000 cmp qword ptr [rdi+60h],0 ds:002b:cac5936c`cac593cc=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: WG111v3.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000203c080
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsCachedRead+13d
fffffa60`010119dd 84c0 test al,al
FAULTING_IP:
nt!MmMapViewInSystemCache+60
fffff800`01e907b0 48837f6000 cmp qword ptr [rdi+60h],0
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff80001e92964 to fffff80001e907b0
STACK_TEXT:
fffffa60`082953e0 fffff800`01e92964 : fffffa80`06e25fb0 00000000`00000000 fffffa60`082955c0 fffffa80`0398a2c8 : nt!MmMapViewInSystemCache+0x60
fffffa60`08295500 fffff800`01e7dea8 : 00000000`00000000 fffff800`01f4989b 00000000`00000000 00000000`00000000 : nt!CcGetVacbMiss+0x1a4
fffffa60`08295590 fffff800`020bfd3d : 00000000`00000000 00000000`00000002 00000000`00000000 fffffa80`058a2550 : nt!CcGetVirtualAddress+0x348
fffffa60`08295610 fffffa60`010119dd : fffffa80`042f0670 fffffa60`082957a0 fffffa80`00003f1f fffffa60`08295901 : nt!CcCopyRead+0x14d
fffffa60`08295730 fffffa60`01022d01 : fffff880`0b948c80 fffffa60`08295930 00000000`00000204 00000000`00003f1f : Ntfs!NtfsCachedRead+0x13d
fffffa60`08295780 fffffa60`01024728 : fffffa80`058a2550 fffffa80`06e25c10 fffffa60`08295901 fffffa80`00000004 : Ntfs!NtfsCommonRead+0x531
fffffa60`08295900 fffffa60`00a0ce91 : fffffa80`06e25fb0 fffffa80`06e25c10 fffffa80`042f06c0 fffffa80`04316010 : Ntfs!NtfsFsdRead+0x1b8
fffffa60`082959b0 fffffa60`00a0b0dd : fffffa80`065f5de0 fffffa80`042f06c0 fffffa80`065f5d00 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x211
fffffa60`08295a20 fffff800`0209bd34 : fffffa80`042f0670 fffffa80`042f0670 00000000`0000000b 00000000`03b23f01 : fltmgr!FltpDispatch+0xcd
fffffa60`08295a80 fffff800`01e6ef33 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x702
fffffa60`08295bb0 00000000`75533917 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75533917
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Ntfs!NtfsCachedRead+13d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 49e022ca
STACK_COMMAND: .cxr 0xfffffa6008294b80 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsCachedRead+13d
BUCKET_ID: X64_0x24_Ntfs!NtfsCachedRead+13d
Followup: MachineOwner
---------
Code:
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
watchdog!WdLogEvent5+0
fffff980`0141d130 48895c2410 mov qword ptr [rsp+10h],rbx
EXCEPTION_RECORD: fffff9801ad52f38 -- (.exr 0xfffff9801ad52f38)
ExceptionAddress: fffff9800141d130 (watchdog!WdLogEvent5)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000029
Attempt to write to address 0000000000000029
CONTEXT: fffff9801ad52910 -- (.cxr 0xfffff9801ad52910)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=fffff9801ad53550 rdi=fffffa8006221000
rip=fffff9800141d130 rsp=fffff9801ad53178 rbp=fffffa8006693f50
r8=fffffa8006693f50 r9=0000000000000001 r10=fffff98005bf2000
r11=fffff9801ad530c0 r12=fffff98007250000 r13=fffff9801ad53550
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
watchdog!WdLogEvent5:
fffff980`0141d130 48895c2410 mov qword ptr [rsp+10h],rbx ss:0018:fffff980`1ad53188=fffffa80045d29b0
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000000029
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80001dfa0b0
0000000000000029
FOLLOWUP_IP:
dxgkrnl!DXGADAPTER::DdiPresent+79
fffff980`0567a759 81fb080000c0 cmp ebx,0C0000008h
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from fffff9800567a759 to fffff9800141d130
STACK_TEXT:
fffff980`1ad53178 fffff980`0567a759 : 00000000`00000000 fffffa80`045d29b0 fffff980`00000000 00000000`00000000 : watchdog!WdLogEvent5
fffff980`1ad53180 fffff980`056a405f : fffffa80`00001e10 fffffa80`045d29b0 fffff880`0b0a8990 fffff980`00000003 : dxgkrnl!DXGADAPTER::DdiPresent+0x79
fffff980`1ad531d0 fffff980`056a3b39 : 00000000`00005181 00000000`00000003 fffff880`c000ff00 00000000`c000fe80 : dxgkrnl!DXGCONTEXT::SubmitPresent+0x457
fffff980`1ad534e0 fffff980`0568712b : fffff880`0b0a8990 fffff980`1ad53960 fffff880`00000000 fffff980`05686ea7 : dxgkrnl!DXGCONTEXT::PresentFromCdd+0xc69
fffff980`1ad536e0 fffff960`006034b0 : fffff900`c007e960 ffffffff`ae04188e ffffffff`ae04188e fffffa80`08e64c10 : dxgkrnl!DxgkCddPresent+0x1eb
fffff980`1ad53780 fffff900`c007e960 : ffffffff`ae04188e ffffffff`ae04188e fffffa80`08e64c10 fffff900`c1da51f0 : cdd+0x34b0
fffff980`1ad53788 ffffffff`ae04188e : ffffffff`ae04188e fffffa80`08e64c10 fffff900`c1da51f0 fffff900`c1da51f0 : 0xfffff900`c007e960
fffff980`1ad53790 ffffffff`ae04188e : fffffa80`08e64c10 fffff900`c1da51f0 fffff900`c1da51f0 00000000`00000000 : 0xffffffff`ae04188e
fffff980`1ad53798 fffffa80`08e64c10 : fffff900`c1da51f0 fffff900`c1da51f0 00000000`00000000 fffff800`020e8e5c : 0xffffffff`ae04188e
fffff980`1ad537a0 fffff900`c1da51f0 : fffff900`c1da51f0 00000000`00000000 fffff800`020e8e5c 00000001`c000ffc0 : 0xfffffa80`08e64c10
fffff980`1ad537a8 fffff900`c1da51f0 : 00000000`00000000 fffff800`020e8e5c 00000001`c000ffc0 fffff980`1ad537d4 : 0xfffff900`c1da51f0
fffff980`1ad537b0 00000000`00000000 : fffff800`020e8e5c 00000001`c000ffc0 fffff980`1ad537d4 c000ff00`c000ffc0 : 0xfffff900`c1da51f0
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dxgkrnl!DXGADAPTER::DdiPresent+79
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4689a549
STACK_COMMAND: .cxr 0xfffff9801ad52910 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgkrnl!DXGADAPTER::DdiPresent+79
BUCKET_ID: X64_0x7E_dxgkrnl!DXGADAPTER::DdiPresent+79
Followup: MachineOwner
---------