DoctorUltra
Ensign
- Registriert
- Okt. 2009
- Beiträge
- 149
Hallo,
ich bekomme seit neuestens andauernd Bluescreens, so ca. 10 bis 15 Stück pro Tag. Könnt Ihr anhand des Dump file Auszug was deuten?
ich bekomme seit neuestens andauernd Bluescreens, so ca. 10 bis 15 Stück pro Tag. Könnt Ihr anhand des Dump file Auszug was deuten?
Code:
Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\_trash\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff804`24200000 PsLoadedModuleList = 0xfffff804`24648190
Debug session time: Mon Jun 15 17:31:00.828 2020 (UTC + 2:00)
System Uptime: 0 days 0:04:27.657
Loading Kernel Symbols
...............................................................
.....Page 102b43 not present in the dump file. Type ".hh dbgerr004" for details
...........................................................
.............................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`243c23a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8f09`344ae450=000000000000000a
2: kd> !analyze -v
*******************************************************************************
*
Bugcheck Analysis *
*
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000004f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff804242a40b6, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on PC-GROESER
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 6
Key : Analysis.Memory.CommitPeak.Mb
Value: 60
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 4f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff804242a40b6
READ_ADDRESS: 000000000000004f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8f09344ae590 -- (.trap 0xffff8f09344ae590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000007 rbx=0000000000000000 rcx=fffff8042478f240
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804242a40b6 rsp=ffff8f09344ae720 rbp=000000000000000f
r8=0000000000000001 r9=0000000000000003 r10=0000000000000000
r11=fffff80424200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiSwapThread+0x626:
fffff804`242a40b6 a802 test al,2
Resetting default scope
STACK_TEXT:
ffff8f09`344ae448 fffff804`243d41e9 : 00000000`0000000a 00000000`0000004f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8f09`344ae450 fffff804`243d0529 : 00000000`ffffffff fffff804`242b4500 00000000`000031a0 00000000`00000003 : nt!KiBugCheckDispatch+0x69
ffff8f09`344ae590 fffff804`242a40b6 : ffffad00`00000000 00000000`fffffffe ffffad00`ffffffff 00000000`00000001 : nt!KiPageFault+0x469
ffff8f09`344ae720 fffff804`242a3514 : ffffbe08`149cf0c0 ffffbe08`00000000 ffffbe08`00000000 00000000`00000000 : nt!KiSwapThread+0x626
ffff8f09`344ae7c0 fffff804`2426dd37 : ffffbe08`00000008 ffffbe08`00000000 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x144
ffff8f09`344ae860 fffff80e`a8d90116 : ffffbe08`150e4000 ffffbe08`150e4000 00000000`00000001 00000670`00000005 : nt!KeWaitForMultipleObjects+0x287
ffff8f09`344ae970 fffff80e`a8d55c32 : 00000000`00000000 00000000`00000000 ffff8f09`344aec00 ffffbe08`15e669a0 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1d6
ffff8f09`344aeb00 fffff80e`a8da471a : ffffbe08`150e4000 ffffbe08`15e669a0 ffffbe08`150e4000 ffffbe08`00000000 : dxgmms1!VidSchiScheduleCommandToRun+0x992
ffff8f09`344aecc0 fffff80e`a8da46e3 : ffffbe08`150e4000 00000000`00000080 fffff80e`a8da4630 ffffbe08`150e4000 : dxgmms1!VidSchiRun_PriorityTable+0x2a
ffff8f09`344aed10 fffff804`2431e135 : ffffbe08`149cf0c0 fffff80e`a8da4630 ffffbe08`150e4000 00000000`a91b3ffe : dxgmms1!VidSchiWorkerThread+0xb3
ffff8f09`344aed50 fffff804`243c99a8 : ffffad00`8231b180 ffffbe08`149cf0c0 fffff804`2431e0e0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff8f09`344aeda0 00000000`00000000 : ffff8f09`344af000 ffff8f09`344a9000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: dxgmms1!VidSchiWaitForSchedulerEvents+1d6
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 10.0.18362.900
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1d6
FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiWaitForSchedulerEvents
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {190e4907-9961-d9b9-9296-b3b5f98d8804}
Followup: MachineOwner
Zuletzt bearbeitet: