Hallo,
ich habe seit Wochen immer wieder Bluescreens und komme langsam ins Verzweifeln.
Ich vermute immer, dass es der Ram ist, aber 6 Passes mit Memtest86 sind schon fehlerfrei durchgelaufen.
Hier die letzten Minidumps: https://www.sendspace.com/file/r3t92u
Hier der aktuelle Dump, analysiert mit
Liegt es am Ram oder doch an etwas anderem?
Grüße und ein fröhliches Fest,
Dominik
ich habe seit Wochen immer wieder Bluescreens und komme langsam ins Verzweifeln.
Ich vermute immer, dass es der Ram ist, aber 6 Passes mit Memtest86 sind schon fehlerfrei durchgelaufen.
Hier die letzten Minidumps: https://www.sendspace.com/file/r3t92u
Hier der aktuelle Dump, analysiert mit
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17328.amd64fre.winblue_r3.140827-1500
Machine Name:
Kernel base = 0xfffff803`a5a15000 PsLoadedModuleList = 0xfffff803`a5ceb370
Debug session time: Wed Dec 24 15:53:50.599 2014 (UTC + 1:00)
System Uptime: 0 days 12:18:11.333
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00007ff6`7a1e6018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff68000000000, 0, 0, 6}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+18b9e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff68000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
READ_ADDRESS: unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
fffff68000000000
MM_INTERNAL_CODE: 6
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: Photoshop.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
TRAP_FRAME: ffffd000255337b0 -- (.trap 0xffffd000255337b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff68000000000 rbx=0000000000000000 rcx=0800000000000000
rdx=ffffd00025533a48 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803a5a5d3a1 rsp=ffffd00025533940 rbp=00000000000c0010
r8=0000000000000000 r9=0000058000000000 r10=fffff803a5cd8b80
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiLockProtoPoolPage+0x5d:
fffff803`a5a5d3a1 4d8b0400 mov r8,qword ptr [r8+rax] ds:fffff680`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803a5b8d24e to fffff803a5b641a0
STACK_TEXT:
ffffd000`25533508 fffff803`a5b8d24e : 00000000`00000050 fffff680`00000000 00000000`00000000 fffff6fb`40000000 : nt!KeBugCheckEx
ffffd000`25533510 fffff803`a5a79a3d : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`255336a8 : nt! ?? ::FNODOBFM::`string'+0x18b9e
ffffd000`25533600 fffff803`a5b6e42f : e0019d94`51800411 fffff803`a5b670ef 00000000`80000000 ffffd000`255337b0 : nt!MmAccessFault+0x31d
ffffd000`255337b0 fffff803`a5a5d3a1 : 00000000`00000010 00000000`00000246 00000000`00088081 00000000`000c0010 : nt!KiPageFault+0x12f
ffffd000`25533940 fffff803`a5ad4e98 : e0019d94`51800400 e0019d94`51800411 00000000`000c0010 00000000`00088081 : nt!MiLockProtoPoolPage+0x5d
ffffd000`25533990 fffff803`a5e482af : ffffe001`96e8a1a0 00000000`00000011 ffffe001`00088081 fffffa80`0bce1100 : nt!MiDeleteSegmentPages+0x43c
ffffd000`25533a40 fffff803`a5a6a435 : 00000000`00000002 ffffd000`25533ab0 ffffe001`96e8a1a0 ffffe001`96fb6de8 : nt!MiSegmentDelete+0x57
ffffd000`25533a80 fffff803`a5a68ede : 00000000`00000001 00000000`00000001 ffffe001`96e8a1a0 ffffe001`20646156 : nt!MiCheckControlArea+0x1bd
ffffd000`25533ae0 fffff803`a5dfa6de : ffffe001`984862a0 ffffe001`984862a0 ffffe001`00000001 ffffe001`00000001 : nt!MiDeleteVad+0xb3e
ffffd000`25533bd0 fffff803`a5e47c28 : 00000000`00040000 ffffd000`25533d00 00000000`00000000 00000000`00000000 : nt!MmCleanProcessAddressSpace+0xe6
ffffd000`25533c30 fffff803`a5df767b : ffffe001`96fb6900 ffffc001`1a3ee950 ffffd000`25533d00 00000000`00000000 : nt!PspRundownSingleProcess+0xac
ffffd000`25533cc0 fffff803`a5dba9fd : 00000000`c000004b 00000000`00000000 ffffe001`96fb6900 ffffe001`9c4fd080 : nt!PspExitThread+0x573
ffffd000`25533dd0 fffff803`a5b6f9b3 : ffffe001`96fb6900 ffffe001`9c4fd080 ffffd000`25533ec0 00000000`00000000 : nt!NtTerminateProcess+0xfd
ffffd000`25533e40 00007ffc`2b9d193a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000008a`de99ef78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`2b9d193a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+18b9e
fffff803`a5b8d24e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+18b9e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 53fe6f2e
BUCKET_ID_FUNC_OFFSET: 18b9e
FAILURE_BUCKET_ID: AV_nt!_??_::FNODOBFM::_string_
BUCKET_ID: AV_nt!_??_::FNODOBFM::_string_
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {9e2f043e-2671-7df2-fe70-649f4b2357db}
Followup: MachineOwner
---------
Liegt es am Ram oder doch an etwas anderem?
Grüße und ein fröhliches Fest,
Dominik