Bluescreens + Minidumps

mystahr

Cadet 1st Year
Registriert
Okt. 2011
Beiträge
13
Hab eine neue Graka CPU und neuen Speicher eingebaut.
Und irgendwas davon macht Probleme. Nur was? Vllt. kann ja jemand damit was anfangen.


Code:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa89024c0958, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80001e6ff58, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002030080
 fffffa89024c0958 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiRemoveAnyPage+178
fffff800`01e6ff58 4c094828        or      qword ptr [rax+28h],r9

CUSTOMER_CRASH_COUNT:  3

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  BFBC2Updater.ex

TRAP_FRAME:  fffffa60089fa1f0 -- (.trap 0xfffffa60089fa1f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa89024c0930 rbx=0000000000000000 rcx=0000000000000093
rdx=fffffa8003900000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80001e6ff58 rsp=fffffa60089fa380 rbp=0000000000000000
 r8=0000058000000000  r9=000fffffffffffff r10=0000000000000000
r11=0000000000000031 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!MiRemoveAnyPage+0x178:
fffff800`01e6ff58 4c094828        or      qword ptr [rax+28h],r9 ds:fffffa89`024c0958=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80001e6322e to fffff80001e63490

STACK_TEXT:  
fffffa60`089fa0a8 fffff800`01e6322e : 00000000`0000000a fffffa89`024c0958 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffa60`089fa0b0 fffff800`01e6210b : 00000000`00000001 fffffa60`00c06ab2 fffffa80`00000001 fffffa80`024bfd30 : nt!KiBugCheckDispatch+0x6e
fffffa60`089fa1f0 fffff800`01e6ff58 : fffff800`01fce240 fffff800`01e8bbc5 fffffa80`04ccf6c0 fffffa60`00b4630f : nt!KiPageFault+0x20b
fffffa60`089fa380 fffff800`01e923d6 : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 00000000`000003e8 : nt!MiRemoveAnyPage+0x178
fffffa60`089fa3e0 fffff800`01e90e53 : fffff980`1748c000 00000000`03ebfd8c 00000000`00000000 00000000`00000080 : nt!MmCopyToCachedPage+0x396
fffffa60`089fa550 fffff800`01e44f02 : fffffa80`046f8010 00000000`03ebfd8c fffffa60`089fa6e8 00000000`00000000 : nt!CcMapAndCopy+0x3a3
fffffa60`089fa670 fffffa60`010affe7 : 00000000`0000014b 00000000`0014c080 fffffa80`040e8800 00000000`03ebfd8c : nt!CcFastCopyWrite+0x162
fffffa60`089fa750 fffffa60`00a10232 : fffffa80`040e8800 fffffa80`07e92d60 fffffa80`000003e8 00000000`00000000 : Ntfs!NtfsCopyWriteA+0x217
fffffa60`089fa950 fffffa60`00a136e4 : fffffa60`089faa40 00000000`00000000 fffffa80`040e8800 00000000`00000004 : fltmgr!FltpPerformFastIoCall+0xf2
fffffa60`089fa9b0 fffffa60`00a2ea49 : 00000000`00000000 fffff800`01e84bae 00000000`00000000 fffffa60`089faa50 : fltmgr!FltpPassThroughFastIo+0xb4
fffffa60`089faa10 fffff800`020cdbfa : fffffa80`040e8874 fffff800`01e659af fffffa80`03fb8e30 fffffa80`040e8874 : fltmgr!FltpFastIoWrite+0x1a9
fffffa60`089faab0 fffff800`01e62f33 : fffffa80`03fb8e01 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x599
fffffa60`089fabb0 00000000`75483917 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02dbf0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75483917


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiRemoveAnyPage+178
fffff800`01e6ff58 4c094828        or      qword ptr [rax+28h],r9

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!MiRemoveAnyPage+178

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4dfb5a33

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0xA_nt!MiRemoveAnyPage+178

BUCKET_ID:  X64_0xA_nt!MiRemoveAnyPage+178

Followup: MachineOwner
---------


Code:
NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa60082951a8
Arg3: fffffa6008294b80
Arg4: fffff80001e907b0

Debugging Details:
------------------


EXCEPTION_RECORD:  fffffa60082951a8 -- (.exr 0xfffffa60082951a8)
ExceptionAddress: fffff80001e907b0 (nt!MmMapViewInSystemCache+0x0000000000000060)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffa6008294b80 -- (.cxr 0xfffffa6008294b80)
rax=0000000000000040 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=cac5936ccac5936c
rip=fffff80001e907b0 rsp=fffffa60082953e0 rbp=fffffa800398a2c8
 r8=fffffa6008295540  r9=fffffa6008295548 r10=fffffa80039aa650
r11=0000000000000000 r12=fffff8800b98baf0 r13=fffffa8005469c10
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MmMapViewInSystemCache+0x60:
fffff800`01e907b0 48837f6000      cmp     qword ptr [rdi+60h],0 ds:002b:cac5936c`cac593cc=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  WG111v3.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000203c080
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsCachedRead+13d
fffffa60`010119dd 84c0            test    al,al

FAULTING_IP: 
nt!MmMapViewInSystemCache+60
fffff800`01e907b0 48837f6000      cmp     qword ptr [rdi+60h],0

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff80001e92964 to fffff80001e907b0

STACK_TEXT:  
fffffa60`082953e0 fffff800`01e92964 : fffffa80`06e25fb0 00000000`00000000 fffffa60`082955c0 fffffa80`0398a2c8 : nt!MmMapViewInSystemCache+0x60
fffffa60`08295500 fffff800`01e7dea8 : 00000000`00000000 fffff800`01f4989b 00000000`00000000 00000000`00000000 : nt!CcGetVacbMiss+0x1a4
fffffa60`08295590 fffff800`020bfd3d : 00000000`00000000 00000000`00000002 00000000`00000000 fffffa80`058a2550 : nt!CcGetVirtualAddress+0x348
fffffa60`08295610 fffffa60`010119dd : fffffa80`042f0670 fffffa60`082957a0 fffffa80`00003f1f fffffa60`08295901 : nt!CcCopyRead+0x14d
fffffa60`08295730 fffffa60`01022d01 : fffff880`0b948c80 fffffa60`08295930 00000000`00000204 00000000`00003f1f : Ntfs!NtfsCachedRead+0x13d
fffffa60`08295780 fffffa60`01024728 : fffffa80`058a2550 fffffa80`06e25c10 fffffa60`08295901 fffffa80`00000004 : Ntfs!NtfsCommonRead+0x531
fffffa60`08295900 fffffa60`00a0ce91 : fffffa80`06e25fb0 fffffa80`06e25c10 fffffa80`042f06c0 fffffa80`04316010 : Ntfs!NtfsFsdRead+0x1b8
fffffa60`082959b0 fffffa60`00a0b0dd : fffffa80`065f5de0 fffffa80`042f06c0 fffffa80`065f5d00 00000000`00000000 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x211
fffffa60`08295a20 fffff800`0209bd34 : fffffa80`042f0670 fffffa80`042f0670 00000000`0000000b 00000000`03b23f01 : fltmgr!FltpDispatch+0xcd
fffffa60`08295a80 fffff800`01e6ef33 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x702
fffffa60`08295bb0 00000000`75533917 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007ee18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75533917


SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Ntfs!NtfsCachedRead+13d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  49e022ca

STACK_COMMAND:  .cxr 0xfffffa6008294b80 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCachedRead+13d

BUCKET_ID:  X64_0x24_Ntfs!NtfsCachedRead+13d

Followup: MachineOwner
---------


Code:
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

FAULTING_IP: 
watchdog!WdLogEvent5+0
fffff980`0141d130 48895c2410      mov     qword ptr [rsp+10h],rbx

EXCEPTION_RECORD:  fffff9801ad52f38 -- (.exr 0xfffff9801ad52f38)
ExceptionAddress: fffff9800141d130 (watchdog!WdLogEvent5)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000001
   Parameter[1]: 0000000000000029
Attempt to write to address 0000000000000029

CONTEXT:  fffff9801ad52910 -- (.cxr 0xfffff9801ad52910)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=fffff9801ad53550 rdi=fffffa8006221000
rip=fffff9800141d130 rsp=fffff9801ad53178 rbp=fffffa8006693f50
 r8=fffffa8006693f50  r9=0000000000000001 r10=fffff98005bf2000
r11=fffff9801ad530c0 r12=fffff98007250000 r13=fffff9801ad53550
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
watchdog!WdLogEvent5:
fffff980`0141d130 48895c2410      mov     qword ptr [rsp+10h],rbx ss:0018:fffff980`1ad53188=fffffa80045d29b0
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.

EXCEPTION_PARAMETER1:  0000000000000001

EXCEPTION_PARAMETER2:  0000000000000029

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80001dfa0b0
 0000000000000029 

FOLLOWUP_IP: 
dxgkrnl!DXGADAPTER::DdiPresent+79
fffff980`0567a759 81fb080000c0    cmp     ebx,0C0000008h

BUGCHECK_STR:  0x7E

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from fffff9800567a759 to fffff9800141d130

STACK_TEXT:  
fffff980`1ad53178 fffff980`0567a759 : 00000000`00000000 fffffa80`045d29b0 fffff980`00000000 00000000`00000000 : watchdog!WdLogEvent5
fffff980`1ad53180 fffff980`056a405f : fffffa80`00001e10 fffffa80`045d29b0 fffff880`0b0a8990 fffff980`00000003 : dxgkrnl!DXGADAPTER::DdiPresent+0x79
fffff980`1ad531d0 fffff980`056a3b39 : 00000000`00005181 00000000`00000003 fffff880`c000ff00 00000000`c000fe80 : dxgkrnl!DXGCONTEXT::SubmitPresent+0x457
fffff980`1ad534e0 fffff980`0568712b : fffff880`0b0a8990 fffff980`1ad53960 fffff880`00000000 fffff980`05686ea7 : dxgkrnl!DXGCONTEXT::PresentFromCdd+0xc69
fffff980`1ad536e0 fffff960`006034b0 : fffff900`c007e960 ffffffff`ae04188e ffffffff`ae04188e fffffa80`08e64c10 : dxgkrnl!DxgkCddPresent+0x1eb
fffff980`1ad53780 fffff900`c007e960 : ffffffff`ae04188e ffffffff`ae04188e fffffa80`08e64c10 fffff900`c1da51f0 : cdd+0x34b0
fffff980`1ad53788 ffffffff`ae04188e : ffffffff`ae04188e fffffa80`08e64c10 fffff900`c1da51f0 fffff900`c1da51f0 : 0xfffff900`c007e960
fffff980`1ad53790 ffffffff`ae04188e : fffffa80`08e64c10 fffff900`c1da51f0 fffff900`c1da51f0 00000000`00000000 : 0xffffffff`ae04188e
fffff980`1ad53798 fffffa80`08e64c10 : fffff900`c1da51f0 fffff900`c1da51f0 00000000`00000000 fffff800`020e8e5c : 0xffffffff`ae04188e
fffff980`1ad537a0 fffff900`c1da51f0 : fffff900`c1da51f0 00000000`00000000 fffff800`020e8e5c 00000001`c000ffc0 : 0xfffffa80`08e64c10
fffff980`1ad537a8 fffff900`c1da51f0 : 00000000`00000000 fffff800`020e8e5c 00000001`c000ffc0 fffff980`1ad537d4 : 0xfffff900`c1da51f0
fffff980`1ad537b0 00000000`00000000 : fffff800`020e8e5c 00000001`c000ffc0 fffff980`1ad537d4 c000ff00`c000ffc0 : 0xfffff900`c1da51f0


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  dxgkrnl!DXGADAPTER::DdiPresent+79

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4689a549

STACK_COMMAND:  .cxr 0xfffff9801ad52910 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgkrnl!DXGADAPTER::DdiPresent+79

BUCKET_ID:  X64_0x7E_dxgkrnl!DXGADAPTER::DdiPresent+79

Followup: MachineOwner
---------
 
0xA: IMAGE_NAME: memory_corruption
0x24: ERROR_CODE: (NTSTATUS) 0xc0000005 Speicherzugriffsverletzung
0x7E: ERROR_CODE: (NTSTATUS) 0xc0000005 Speicherzugriffsverletzung

Poste hier einmal von CPU-Z die Reiter Mainboard, Memory und SPD (hier von jedem RAM Modul extra)
https://www.computerbase.de/downloads/systemtools/cpu-z/
 
Zurück
Oben