Jap der aktuellste ist drauf!
Also ich habe das gefühl das mit der CPU etwas nicht stimmt. Hab den Rechner eben Hochgefahren und 5 min gewartet. Es hängt sich jeweils für bis zu 10 sekunden auf, danach kann ich für 2-3 s (mit ruckler was machen) dann hängt es sich wieder auf. Während es gefrohren ist merkt es sich nur 10 zeichen was ich hier eingebe, bei mehr zeichen sadfsafsafdaddasfaetartgrasatreatertratrewttewrtwrezrturuzturtziruzirzuizuriruiretwerterterterwtewtert
geschieht das:
Sorry wollte da einen link setzten aber hatte einen bluescreen bekommen.
BugCheck A, {8, 2, 0, fffff80002f3450b}
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** ERROR: Module load completed but symbols could not be loaded for dxgkrnl.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL:
estroyOneAllocation+153 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f3450b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030af0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiStoreSetEvictPageFile+b
fffff800`02f3450b 488b5008 mov rdx,qword ptr [rax+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff8800824be30 -- (.trap 0xfffff8800824be30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800396bc20
rdx=0000000000a10000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f3450b rsp=fffff8800824bfc8 rbp=0000000000a10000
r8=0000000000a10000 r9=fffff8a0000a9020 r10=fffff80003005600
r11=fffff8800824c020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiStoreSetEvictPageFile+0xb:
fffff800`02f3450b 488b5008 mov rdx,qword ptr [rax+8] ds:bff0:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e78469 to fffff80002e78f00
STACK_TEXT:
fffff880`0824bce8 fffff800`02e78469 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0824bcf0 fffff800`02e770e0 : fffff800`03003b40 fffffa80`01eed930 00000000`00000000 fffff880`0824bf00 : nt!KiBugCheckDispatch+0x69
fffff880`0824be30 fffff800`02f3450b : fffff800`02f35a4e 00000000`00000006 fffffa80`01eed930 fffffa80`0396bc20 : nt!KiPageFault+0x260
fffff880`0824bfc8 fffff800`02f35a4e : 00000000`00000006 fffffa80`01eed930 fffffa80`0396bc20 fffffa80`0396bc20 : nt!MiStoreSetEvictPageFile+0xb
fffff880`0824bfd0 fffff800`02e6320a : 00a10000`00520000 00520000`00a10000 fffffa80`01d739e0 00a10000`00520000 : nt!MiReleaseConfirmedPageFileSpace+0x7e
fffff880`0824c050 fffff800`03166f13 : fffffa80`01d73960 fffffa80`03f1a000 fffffa80`01d73960 00000000`00002001 : nt!MiDeleteSegmentPages+0x316
fffff880`0824c100 fffff800`02e7e0b4 : 00000000`00000000 fffffa80`03f1a000 fffffa80`018cc080 fffffa80`018cc080 : nt!MiSegmentDelete+0x7b
fffff880`0824c140 fffff880`03b67b2b : fffffa80`03f1a000 fffff8a0`06f642b0 fffff8a0`02faf000 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`0824c1a0 fffff880`03b4e98f : fffffa80`01c36530 fffff8a0`06d48080 fffffa80`03f1a000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL:
estroyOneAllocation+0x153
fffff880`0824c280 fffff880`03a90fb3 : fffff8a0`07032ee0 00000000`00000000 fffff8a0`02faf000 00000000`00000174 : dxgmms1!VidMmDestroyAllocation+0x4f
fffff880`0824c2b0 fffff8a0`07032ee0 : 00000000`00000000 fffff8a0`02faf000 00000000`00000174 fffff8a0`00000001 : dxgkrnl+0x37fb3
fffff880`0824c2b8 00000000`00000000 : fffff8a0`02faf000 00000000`00000174 fffff8a0`00000001 fffff8a0`025ee9e0 : 0xfffff8a0`07032ee0
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL:
estroyOneAllocation+153
fffff880`03b67b2b 488b058665ffff mov rax,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`03b5e0b8)]
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL:
estroyOneAllocation+153
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0xA_dxgmms1!VIDMM_GLOBAL:
estroyOneAllocation+153
BUCKET_ID: X64_0xA_dxgmms1!VIDMM_GLOBAL:
estroyOneAllocation+153
Followup: MachineOwner
---------
Ergänzung ()
Also ich habe das gefühl das mit der CPU etwas nicht stimmt. Hab den Rechner eben Hochgefahren und 5 min gewartet. Es hängt sich jeweils für bis zu 10 sekunden auf, danach kann ich für 2-3 s (mit ruckler was machen) dann hängt es sich wieder auf. Während es gefrohren ist merkt es sich nur 10 zeichen was ich hier eingebe, bei mehr zeichen sadfsafsafdaddasfaetartgrasatreatertratrewttewrtwrezrturuzturtziruzirzuizuriruiretwerterterterwtewtert
geschieht das:
Ergänzung ()
Sorry wollte da einen link setzten aber hatte einen bluescreen bekommen.
Ergänzung ()
BugCheck A, {8, 2, 0, fffff80002f3450b}
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** ERROR: Module load completed but symbols could not be loaded for dxgkrnl.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL:
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f3450b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030af0e0
0000000000000008
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiStoreSetEvictPageFile+b
fffff800`02f3450b 488b5008 mov rdx,qword ptr [rax+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff8800824be30 -- (.trap 0xfffff8800824be30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa800396bc20
rdx=0000000000a10000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f3450b rsp=fffff8800824bfc8 rbp=0000000000a10000
r8=0000000000a10000 r9=fffff8a0000a9020 r10=fffff80003005600
r11=fffff8800824c020 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiStoreSetEvictPageFile+0xb:
fffff800`02f3450b 488b5008 mov rdx,qword ptr [rax+8] ds:bff0:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e78469 to fffff80002e78f00
STACK_TEXT:
fffff880`0824bce8 fffff800`02e78469 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0824bcf0 fffff800`02e770e0 : fffff800`03003b40 fffffa80`01eed930 00000000`00000000 fffff880`0824bf00 : nt!KiBugCheckDispatch+0x69
fffff880`0824be30 fffff800`02f3450b : fffff800`02f35a4e 00000000`00000006 fffffa80`01eed930 fffffa80`0396bc20 : nt!KiPageFault+0x260
fffff880`0824bfc8 fffff800`02f35a4e : 00000000`00000006 fffffa80`01eed930 fffffa80`0396bc20 fffffa80`0396bc20 : nt!MiStoreSetEvictPageFile+0xb
fffff880`0824bfd0 fffff800`02e6320a : 00a10000`00520000 00520000`00a10000 fffffa80`01d739e0 00a10000`00520000 : nt!MiReleaseConfirmedPageFileSpace+0x7e
fffff880`0824c050 fffff800`03166f13 : fffffa80`01d73960 fffffa80`03f1a000 fffffa80`01d73960 00000000`00002001 : nt!MiDeleteSegmentPages+0x316
fffff880`0824c100 fffff800`02e7e0b4 : 00000000`00000000 fffffa80`03f1a000 fffffa80`018cc080 fffffa80`018cc080 : nt!MiSegmentDelete+0x7b
fffff880`0824c140 fffff880`03b67b2b : fffffa80`03f1a000 fffff8a0`06f642b0 fffff8a0`02faf000 00000000`00000000 : nt!ObfDereferenceObject+0xd4
fffff880`0824c1a0 fffff880`03b4e98f : fffffa80`01c36530 fffff8a0`06d48080 fffffa80`03f1a000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL:
fffff880`0824c280 fffff880`03a90fb3 : fffff8a0`07032ee0 00000000`00000000 fffff8a0`02faf000 00000000`00000174 : dxgmms1!VidMmDestroyAllocation+0x4f
fffff880`0824c2b0 fffff8a0`07032ee0 : 00000000`00000000 fffff8a0`02faf000 00000000`00000174 fffff8a0`00000001 : dxgkrnl+0x37fb3
fffff880`0824c2b8 00000000`00000000 : fffff8a0`02faf000 00000000`00000174 fffff8a0`00000001 fffff8a0`025ee9e0 : 0xfffff8a0`07032ee0
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL:
fffff880`03b67b2b 488b058665ffff mov rax,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`03b5e0b8)]
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL:
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0xA_dxgmms1!VIDMM_GLOBAL:
BUCKET_ID: X64_0xA_dxgmms1!VIDMM_GLOBAL:
Followup: MachineOwner
---------