M
matti87
Gast
Hat sich erledigt! Nachdem ich ebend beide Riegel vertauscht hatte, startete der PC garnicht mehr. Also ist wohl der RAM defekt.
Hallo allerseits.
Ich habe leider seit einigen Wochen folgendes Problem. Immer wenn ich meinen PC das erste Mal am Tag starte, treten seltsame Probleme auf. Mal ein BSOD, mal Freezes oder manchmal ist einfach das Bild weg. Nach dem ersten oder zweiten Neustart läuft das System seltsamerweise über Stunden stabil. Ich hab auch schon den RAM auf Speicherfehler prüfen lassen, aber ohne Ergebnis. Nun ist mir im Ressourcenmonitor aufgefallen, dass die Hälfte meines RAMs für Hardware reserviert ist. Also mir stehen nur noch 8GB anstatt 16GB zur Verfügung. Also vielleicht doch der RAM? Oder kann es auch an der CPU liegen?
Hier der Inhalt des letzten BSOD. Am Prozess liegt es wahrscheinlich nicht. Es waren auch schon Steam oder Chrome als betroffener Prozess angegeben.
Ich habe leider seit einigen Wochen folgendes Problem. Immer wenn ich meinen PC das erste Mal am Tag starte, treten seltsame Probleme auf. Mal ein BSOD, mal Freezes oder manchmal ist einfach das Bild weg. Nach dem ersten oder zweiten Neustart läuft das System seltsamerweise über Stunden stabil. Ich hab auch schon den RAM auf Speicherfehler prüfen lassen, aber ohne Ergebnis. Nun ist mir im Ressourcenmonitor aufgefallen, dass die Hälfte meines RAMs für Hardware reserviert ist. Also mir stehen nur noch 8GB anstatt 16GB zur Verfügung. Also vielleicht doch der RAM? Oder kann es auch an der CPU liegen?
Hier der Inhalt des letzten BSOD. Am Prozess liegt es wahrscheinlich nicht. Es waren auch schon Steam oder Chrome als betroffener Prozess angegeben.
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000008000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80209eae104, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P2.00
BIOS_DATE: 01/12/2016
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: FM2A68M-HD+
BASEBOARD_VERSION:
DUMP_TYPE: 1
BUGCHECK_P1: 8000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80209eae104
WRITE_ADDRESS: 0000000000008000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff802`09eae104 48890a mov qword ptr [rdx],rcx
CPU_COUNT: 4
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: firefox.exe
ANALYSIS_SESSION_HOST: DESKTOP-8R036KS
ANALYSIS_SESSION_TIME: 10-03-2018 15:59:26.0601
ANALYSIS_VERSION: 10.0.16299.91 amd64fre
TRAP_FRAME: fffff6023afdab00 -- (.trap 0xfffff6023afdab00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000043d rbx=0000000000000000 rcx=fffff6023afdacf8
rdx=0000000000008000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80209eae104 rsp=fffff6023afdac90 rbp=0000000000000001
r8=ffffaa0000007000 r9=8000000000000000 r10=ffffaa0000004a08
r11=ffffa7000004d728 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KxWaitForLockOwnerShip+0x14:
fffff802`09eae104 48890a mov qword ptr [rdx],rcx ds:00000000`00008000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8020a04b069 to fffff8020a03a490
STACK_TEXT:
fffff602`3afda9b8 fffff802`0a04b069 : 00000000`0000000a 00000000`00008000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff602`3afda9c0 fffff802`0a047ce5 : 00000001`00000003 00000000`00000000 00000000`0000000f 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff602`3afdab00 fffff802`09eae104 : 00000000`00000001 ffffa700`0004d8b0 00000000`00000002 00000000`000000d9 : nt!KiPageFault+0x425
fffff602`3afdac90 fffff802`09f9a0be : ffffaa00`000049e8 fffff802`00000001 00000000`00000000 fffff602`3afdb060 : nt!KxWaitForLockOwnerShip+0x14
fffff602`3afdacc0 fffff802`09f99931 : 00000000`000019d9 00000000`0004d8b0 00000000`00000001 fffffcfe`000000d9 : nt!MiInsertPageInFreeOrZeroedList+0x6de
fffff602`3afdadc0 fffff802`09f96d25 : 00000000`00000001 fffff602`3afdb060 00000000`00000080 00000000`00000200 : nt!MiPfnShareCountIsZero+0x4b1
fffff602`3afdae20 fffff802`09f7af50 : fffffc80`00000000 ffffd980`54b9e380 0000015c`81ccd000 fffff602`3afdb940 : nt!MiDeletePteList+0x3d5
fffff602`3afdaed0 fffff802`0a41deab : 00000000`00000000 ffffd980`00000000 ffffd980`52cd4080 0000015c`81f24000 : nt!MiDecommitPages+0x1220
fffff602`3afdb900 fffff802`0a41d4e9 : 00000000`00000000 ffffd980`52322580 00000000`00001000 fffff802`09f8910f : nt!MiDecommitRegion+0x6b
fffff602`3afdb970 fffff802`0a41d1fb : ffffd980`52403080 00000000`00000000 fffff602`3afdbb00 fffff602`3afdbb80 : nt!MmFreeVirtualMemory+0x2b9
fffff602`3afdbaa0 fffff802`0a04ab43 : ffffd980`52cd4080 ffffd980`52403080 00000000`00000000 00000000`0000002f : nt!NtFreeVirtualMemory+0x8b
fffff602`3afdbb00 00007ffb`a1e4a2b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000050`0adfefa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a1e4a2b4
THREAD_SHA1_HASH_MOD_FUNC: e031295d8f3a5794db68b843d78ddc16eb3a62dc
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8ff310558160a46d0d4470712107fd6a6d4bc89a
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+14
fffff802`09eae104 48890a mov qword ptr [rdx],rcx
FAULT_INSTR_CODE: 660a8948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5ba4682b
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
PRIMARY_PROBLEM_CLASS: AV_nt!KxWaitForLockOwnerShip
TARGET_TIME: 2018-10-03T12:05:36.000Z
OSBUILD: 17134
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-09-21 05:40:27
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 14c0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kxwaitforlockownership
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000008000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80209eae104, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 17134.1.amd64fre.rs4_release.180410-1804
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P2.00
BIOS_DATE: 01/12/2016
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: FM2A68M-HD+
BASEBOARD_VERSION:
DUMP_TYPE: 1
BUGCHECK_P1: 8000
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff80209eae104
WRITE_ADDRESS: 0000000000008000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+14
fffff802`09eae104 48890a mov qword ptr [rdx],rcx
CPU_COUNT: 4
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 15
CPU_MODEL: 30
CPU_STEPPING: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: firefox.exe
ANALYSIS_SESSION_HOST: DESKTOP-8R036KS
ANALYSIS_SESSION_TIME: 10-03-2018 15:59:26.0601
ANALYSIS_VERSION: 10.0.16299.91 amd64fre
TRAP_FRAME: fffff6023afdab00 -- (.trap 0xfffff6023afdab00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000043d rbx=0000000000000000 rcx=fffff6023afdacf8
rdx=0000000000008000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80209eae104 rsp=fffff6023afdac90 rbp=0000000000000001
r8=ffffaa0000007000 r9=8000000000000000 r10=ffffaa0000004a08
r11=ffffa7000004d728 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KxWaitForLockOwnerShip+0x14:
fffff802`09eae104 48890a mov qword ptr [rdx],rcx ds:00000000`00008000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8020a04b069 to fffff8020a03a490
STACK_TEXT:
fffff602`3afda9b8 fffff802`0a04b069 : 00000000`0000000a 00000000`00008000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff602`3afda9c0 fffff802`0a047ce5 : 00000001`00000003 00000000`00000000 00000000`0000000f 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff602`3afdab00 fffff802`09eae104 : 00000000`00000001 ffffa700`0004d8b0 00000000`00000002 00000000`000000d9 : nt!KiPageFault+0x425
fffff602`3afdac90 fffff802`09f9a0be : ffffaa00`000049e8 fffff802`00000001 00000000`00000000 fffff602`3afdb060 : nt!KxWaitForLockOwnerShip+0x14
fffff602`3afdacc0 fffff802`09f99931 : 00000000`000019d9 00000000`0004d8b0 00000000`00000001 fffffcfe`000000d9 : nt!MiInsertPageInFreeOrZeroedList+0x6de
fffff602`3afdadc0 fffff802`09f96d25 : 00000000`00000001 fffff602`3afdb060 00000000`00000080 00000000`00000200 : nt!MiPfnShareCountIsZero+0x4b1
fffff602`3afdae20 fffff802`09f7af50 : fffffc80`00000000 ffffd980`54b9e380 0000015c`81ccd000 fffff602`3afdb940 : nt!MiDeletePteList+0x3d5
fffff602`3afdaed0 fffff802`0a41deab : 00000000`00000000 ffffd980`00000000 ffffd980`52cd4080 0000015c`81f24000 : nt!MiDecommitPages+0x1220
fffff602`3afdb900 fffff802`0a41d4e9 : 00000000`00000000 ffffd980`52322580 00000000`00001000 fffff802`09f8910f : nt!MiDecommitRegion+0x6b
fffff602`3afdb970 fffff802`0a41d1fb : ffffd980`52403080 00000000`00000000 fffff602`3afdbb00 fffff602`3afdbb80 : nt!MmFreeVirtualMemory+0x2b9
fffff602`3afdbaa0 fffff802`0a04ab43 : ffffd980`52cd4080 ffffd980`52403080 00000000`00000000 00000000`0000002f : nt!NtFreeVirtualMemory+0x8b
fffff602`3afdbb00 00007ffb`a1e4a2b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000050`0adfefa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`a1e4a2b4
THREAD_SHA1_HASH_MOD_FUNC: e031295d8f3a5794db68b843d78ddc16eb3a62dc
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 8ff310558160a46d0d4470712107fd6a6d4bc89a
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+14
fffff802`09eae104 48890a mov qword ptr [rdx],rcx
FAULT_INSTR_CODE: 660a8948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5ba4682b
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
PRIMARY_PROBLEM_CLASS: AV_nt!KxWaitForLockOwnerShip
TARGET_TIME: 2018-10-03T12:05:36.000Z
OSBUILD: 17134
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2018-09-21 05:40:27
BUILDDATESTAMP_STR: 180410-1804
BUILDLAB_STR: rs4_release
BUILDOSVER_STR: 10.0.17134.1.amd64fre.rs4_release.180410-1804
ANALYSIS_SESSION_ELAPSED_TIME: 14c0
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kxwaitforlockownership
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------
Zuletzt bearbeitet von einem Moderator: