Hallo,
Ich habe jetzt seit März dieses Jahres so gut wie jeden Tag einen BSOD. Natürlich hab ich versucht das zu beheben, indem ich folgendes gemacht habe:
+Alle Treiber aktualisert
+Registry gesäubert
+Bios auf den neusten Stand gebracht(MoBo&GraKa)
+Systemwiederherstellung
+Win7 neu aufgesetzt
+Memtest86+ drüberlaufen lassen(12h=kein Fehler)
Ich bin also zu 100% ratlos und hoffe auf eure Hilfe ...
Mein System:
7 Fehlerberichte aus meiner Sammlung:
Gruß
FireEagle
PS: Ich hoffe mal dass ich hier im richtigen Forum bin O.o
Ich habe jetzt seit März dieses Jahres so gut wie jeden Tag einen BSOD. Natürlich hab ich versucht das zu beheben, indem ich folgendes gemacht habe:
+Alle Treiber aktualisert
+Registry gesäubert
+Bios auf den neusten Stand gebracht(MoBo&GraKa)
+Systemwiederherstellung
+Win7 neu aufgesetzt
+Memtest86+ drüberlaufen lassen(12h=kein Fehler)
Ich bin also zu 100% ratlos und hoffe auf eure Hilfe ...
Mein System:
Intel I5-760
Asus P7P55D
4GB DDR3 OZC CL9 1333MHz
Gigabyte GeForce GTX 460 1024MB
500w be quiet
Spinpoint F4 HD322GJ (320GB)
Spinpoint F3 HD103UJ (1TB)
Asus P7P55D
4GB DDR3 OZC CL9 1333MHz
Gigabyte GeForce GTX 460 1024MB
500w be quiet
Spinpoint F4 HD322GJ (320GB)
Spinpoint F3 HD103UJ (1TB)
1.03.2011
20.03.2011
10.04.2011
25.04.2011
09.05.2011
24.06.2011
04.07.2011
Wenn ihr mehr Fehlerberichte braucht kann ich auch meinen Minidumpordner hochladen.
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880048a3448
Arg3: fffff880048a2ca0
Arg4: fffff80003189b87
Debugging Details:
------------------
EXCEPTION_RECORD: fffff880048a3448 -- (.exr 0xfffff880048a3448)
ExceptionAddress: fffff80003189b87 (nt!CcMapData+0x0000000000000117)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000002400
Attempt to read from address 0000000000002400
CONTEXT: fffff880048a2ca0 -- (.cxr 0xfffff880048a2ca0)
rax=fffffa8003ec58d0 rbx=000000000000000e rcx=0000000000000000
rdx=0000000000002400 rsi=fffff880048a3848 rdi=fffffa8007730060
rip=fffff80003189b87 rsp=fffff880048a3680 rbp=0000000000000080
r8=000000000000000f r9=0000000001942400 r10=0000000000000400
r11=0000000000000001 r12=0000000000000001 r13=fffffa800482bf20
r14=fffff880048a3788 r15=0000000000000001
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!CcMapData+0x117:
fffff800`03189b87 0fb602 movzx eax,byte ptr [rdx] ds:002b:00000000`00002400=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: League of Lege
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000002400
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030be0e8
0000000000002400
FOLLOWUP_IP:
Ntfs!NtfsReadMftRecord+b2
fffff880`012c21e2 84c0 test al,al
FAULTING_IP:
nt!CcMapData+117
fffff800`03189b87 0fb602 movzx eax,byte ptr [rdx]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff880012c21e2 to fffff80003189b87
STACK_TEXT:
fffff880`048a3680 fffff880`012c21e2 : 00700028`0003dc00 fffffa80`03ec58d0 00080000`01180000 00000000`0000000e : nt!CcMapData+0x117
fffff880`048a3740 fffff880`012bdd5c : fffffa80`07715380 fffffa80`0483d180 fffff8a0`0015c018 fffff8a0`1098b001 : Ntfs!NtfsReadMftRecord+0xb2
fffff880`048a37f0 fffff880`012cbc58 : fffff980`1ac50118 fffff8a0`0015c140 fffffa80`0836a3a0 fffff8a0`04de7f80 : Ntfs!NtfsLookupInFileRecord+0x6c
fffff880`048a3880 fffff880`012cfd99 : fffffa80`07715380 fffff880`012d0a00 fffff8a0`0015c140 00000000`88603ec0 : Ntfs!NtfsWriteFileSizes+0xa8
fffff880`048a39e0 fffff880`012cf930 : fffffa80`07715380 fffffa80`046b9b00 fffffa80`07715380 fffff880`012cb034 : Ntfs!NtOfsSetLength+0x149
fffff880`048a3ae0 fffff880`012d6868 : fffffa80`07715380 fffff880`048a3c01 00000000`88603e68 00000000`00000702 : Ntfs!NtOfsPutData+0x54
fffff880`048a3c10 fffff880`012d7163 : fffffa80`07715380 00000000`00000000 fffffa80`07715380 00000000`00000000 : Ntfs!NtfsWriteFcbUsnRecordToJournal+0xa8
fffff880`048a3cd0 fffff880`012d260e : fffffa80`07715301 fffff8a0`04cfb6c0 fffff8a0`0015c140 fffff8a0`04de7b40 : Ntfs!NtfsWriteUsnJournalChanges+0x187
fffff880`048a3d50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCreateNewFile+0xc6e
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: Ntfs!NtfsReadMftRecord+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce792f9
STACK_COMMAND: .cxr 0xfffff880048a2ca0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsReadMftRecord+b2
BUCKET_ID: X64_0x24_Ntfs!NtfsReadMftRecord+b2
Followup: MachineOwner
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88000c78309, Address of the instruction which caused the bugcheck
Arg3: fffff8800469fb40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
usbaudio!USBType1BuildIsochUrbRequest+181
fffff880`00c78309 41a07f5000740f418b87 mov al,byte ptr [878B410F7400507Fh]
CONTEXT: fffff8800469fb40 -- (.cxr 0xfffff8800469fb40)
rax=fffffa8005d18258 rbx=fffffa80037a2700 rcx=fffffa8005d1929c
rdx=0000000000000000 rsi=fffffa8005d191f8 rdi=fffffa80037a28f0
rip=fffff88000c78309 rsp=fffff880046a0520 rbp=fffffa800776b6e0
r8=0000000000000000 r9=0000000000000000 r10=fffff8000301c6c8
r11=000000000000000a r12=fffffa80037a2700 r13=00000000000000b4
r14=00000000000000b4 r15=fffffa80037a27a0
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
usbaudio!USBType1BuildIsochUrbRequest+0x181:
fffff880`00c78309 41a07f5000740f418b87 mov al,byte ptr [878B410F7400507Fh] ds:002b:878b410f`7400507f=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x3B
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88000c78309
STACK_TEXT:
fffff880`046a0520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : usbaudio!USBType1BuildIsochUrbRequest+0x181
CHKIMG_EXTENSION: !chkimg -lo 50 -db !usbaudio
5 errors : !usbaudio (fffff88000c7830a-fffff88000c7833a)
fffff88000c78300 18 48 8b 45 20 48 89 46 28 41 *a0 7f 50 00 74 0f .H.E H.F(A..P.t.
...
fffff88000c78320 46 20 *84 00 00 00 33 c9 33 db *09 4c 24 48 39 4c F ....3.3..L$H9L
fffff88000c78330 24 4c *8f 86 d4 00 00 00 40 8a *fc 24 30 8b e9 45 $L......@..$0..E
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
STACK_COMMAND: .cxr 0xfffff8800469fb40 ; kb
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800f8d8319, Address of the instruction which caused the bugcheck
Arg3: fffff880072f7630, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nvlddmkm+7dd319
fffff880`0f8d8319 49ab stos qword ptr [rdi]
CONTEXT: fffff880072f7630 -- (.cxr 0xfffff880072f7630)
rax=0000000000000000 rbx=fffffa8006dd4740 rcx=fffff8800fd289d0
rdx=0000000080000102 rsi=fffff880072f8600 rdi=0000000000000000
rip=fffff8800f8d8319 rsp=fffff880072f8010 rbp=fffffa8004fa4000
r8=0000000000000000 r9=0000000000000000 r10=0000000000800001
r11=fffff10017020a60 r12=fffffa8004d78010 r13=000000000000000f
r14=fffff8800fd289d0 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nvlddmkm+0x7dd319:
fffff880`0f8d8319 49ab stos qword ptr [rdi] ds:002b:00000000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800f8d8319
STACK_TEXT:
fffff880`072f8010 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x7dd319
FOLLOWUP_IP:
nvlddmkm+7dd319
fffff880`0f8d8319 49ab stos qword ptr [rdi]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nvlddmkm+7dd319
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8d8d72
STACK_COMMAND: .cxr 0xfffff880072f7630 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nvlddmkm+7dd319
BUCKET_ID: X64_0x3B_nvlddmkm+7dd319
Followup: MachineOwner
---------
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8800f877350, Virtual address for the attempted write.
Arg2: 80000001176bf121, PTE contents.
Arg3: fffff88002f8b4d0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 6
TRAP_FRAME: fffff88002f8b4d0 -- (.trap 0xfffff88002f8b4d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800f877350 rbx=0000000000000000 rcx=fffffa800580c000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800f320898 rsp=fffff88002f8b668 rbp=fffffa800580c000
r8=fffff8800f1c94b0 r9=0000000000000000 r10=0000000000000000
r11=fffff88002f8b780 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x29d898:
fffff880`0f320898 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e38807 to fffff80002e8e640
STACK_TEXT:
fffff880`02f8b368 fffff800`02e38807 : 00000000`000000be fffff880`0f877350 80000001`176bf121 fffff880`02f8b4d0 : nt!KeBugCheckEx
fffff880`02f8b370 fffff800`02e8c76e : fffffa80`055f4000 fffff880`0f2768fa fffffa80`055f0770 fffffa80`04fec000 : nt! ?? ::FNODOBFM::`string'+0x443cb
fffff880`02f8b4d0 fffff880`0f320898 : fffff880`0f1c9578 00000000`00610024 fffff880`0f2d7626 fffffa80`055f4000 : nt!KiPageFault+0x16e
fffff880`02f8b668 fffff880`0f1c9578 : 00000000`00610024 fffff880`0f2d7626 fffffa80`055f4000 fffff880`0f2768fa : nvlddmkm+0x29d898
fffff880`02f8b670 00000000`00610024 : fffff880`0f2d7626 fffffa80`055f4000 fffff880`0f2768fa fffffa80`055f4000 : nvlddmkm+0x146578
fffff880`02f8b678 fffff880`0f2d7626 : fffffa80`055f4000 fffff880`0f2768fa fffffa80`055f4000 fffff880`0f2d3034 : 0x610024
fffff880`02f8b680 fffffa80`055f4000 : fffff880`0f2768fa fffffa80`055f4000 fffff880`0f2d3034 fffffa80`055f4000 : nvlddmkm+0x254626
fffff880`02f8b688 fffff880`0f2768fa : fffffa80`055f4000 fffff880`0f2d3034 fffffa80`055f4000 fffff880`0f2d7626 : 0xfffffa80`055f4000
fffff880`02f8b690 fffffa80`055f4000 : fffff880`0f2d3034 fffffa80`055f4000 fffff880`0f2d7626 00000000`00610024 : nvlddmkm+0x1f38fa
fffff880`02f8b698 fffff880`0f2d3034 : fffffa80`055f4000 fffff880`0f2d7626 00000000`00610024 fffff880`0f5ec4c6 : 0xfffffa80`055f4000
fffff880`02f8b6a0 fffffa80`055f4000 : fffff880`0f2d7626 00000000`00610024 fffff880`0f5ec4c6 fffffa80`04fec968 : nvlddmkm+0x250034
fffff880`02f8b6a8 fffff880`0f2d7626 : 00000000`00610024 fffff880`0f5ec4c6 fffffa80`04fec968 fffffa80`04b95320 : 0xfffffa80`055f4000
fffff880`02f8b6b0 00000000`00610024 : fffff880`0f5ec4c6 fffffa80`04fec968 fffffa80`04b95320 00000000`00000000 : nvlddmkm+0x254626
fffff880`02f8b6b8 fffff880`0f5ec4c6 : fffffa80`04fec968 fffffa80`04b95320 00000000`00000000 00000000`00000000 : 0x610024
fffff880`02f8b6c0 fffffa80`04fec968 : fffffa80`04b95320 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x5694c6
fffff880`02f8b6c8 fffffa80`04b95320 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0f2d4d82 : 0xfffffa80`04fec968
fffff880`02f8b6d0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff880`0f2d4d82 fffffa80`036cf540 : 0xfffffa80`04b95320
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+29d898
fffff880`0f320898 ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+29d898
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8d8d72
FAILURE_BUCKET_ID: X64_0xBE_nvlddmkm+29d898
BUCKET_ID: X64_0xBE_nvlddmkm+29d898
Followup: MachineOwner
---------
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000000400c0020, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880048e991b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c00e8
00000000400c0020
CURRENT_IRQL: 2
FAULTING_IP:
kl1+3191b
fffff880`048e991b 837f4402 cmp dword ptr [rdi+44h],2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f1a920 -- (.trap 0xfffff88002f1a920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000048 rbx=0000000000000000 rcx=00000000400c0024
rdx=fffffa8004cc52c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880048e991b rsp=fffff88002f1aab0 rbp=0000000000000000
r8=0000000000000a00 r9=0000000000000000 r10=0000000000000030
r11=fffffa8004cc52a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
kl1+0x3191b:
fffff880`048e991b 837f4402 cmp dword ptr [rdi+44h],2 ds:e7fc:00000000`00000044=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e8ebe9 to fffff80002e8f640
STACK_TEXT:
fffff880`02f1a7d8 fffff800`02e8ebe9 : 00000000`0000000a 00000000`400c0020 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1a7e0 fffff800`02e8d860 : fffffa80`0663e500 fffff880`01463387 00000066`9455d104 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f1a920 fffff880`048e991b : fffffa80`0545f850 00000000`00000000 fffffa80`054be7b0 fffffa80`04ca9700 : nt!KiPageFault+0x260
fffff880`02f1aab0 fffffa80`0545f850 : 00000000`00000000 fffffa80`054be7b0 fffffa80`04ca9700 00000000`00000000 : kl1+0x3191b
fffff880`02f1aab8 00000000`00000000 : fffffa80`054be7b0 fffffa80`04ca9700 00000000`00000000 fffff880`0101aee1 : 0xfffffa80`0545f850
STACK_COMMAND: kb
FOLLOWUP_IP:
kl1+3191b
fffff880`048e991b 837f4402 cmp dword ptr [rdi+44h],2
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: kl1+3191b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: kl1
IMAGE_NAME: kl1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a9d0591
FAILURE_BUCKET_ID: X64_0xD1_kl1+3191b
BUCKET_ID: X64_0xD1_kl1+3191b
Followup: MachineOwner
---------
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800101bda9, Address of the instruction which caused the bugcheck
Arg3: fffff8800a47b810, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
klif+1bda9
fffff880`0101bda9 48394810 cmp qword ptr [rax+10h],rcx
CONTEXT: fffff8800a47b810 -- (.cxr 0xfffff8800a47b810)
rax=6c894808245c8948 rbx=fffffa8003858f18 rcx=00000000000008bc
rdx=0000000000000000 rsi=0000000000000000 rdi=fffffa800708eeb0
rip=fffff8800101bda9 rsp=fffff8800a47c1f0 rbp=00000000ffffffff
r8=0000000000000000 r9=0000000000000000 r10=00610048005c0065
r11=0000000000000011 r12=fffffa8003858f10 r13=fffff8800a47c2b8
r14=fffffa8006344188 r15=fffff8a00bfb1010
iopl=0 nv up ei pl nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010207
klif+0x1bda9:
fffff880`0101bda9 48394810 cmp qword ptr [rax+10h],rcx ds:002b:6c894808`245c8958=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800101bda9
STACK_TEXT:
fffff880`0a47c1f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : klif+0x1bda9
FOLLOWUP_IP:
klif+1bda9
fffff880`0101bda9 48394810 cmp qword ptr [rax+10h],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: klif+1bda9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: klif
IMAGE_NAME: klif.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4afabce0
STACK_COMMAND: .cxr 0xfffff8800a47b810 ; kb
FAILURE_BUCKET_ID: X64_0x3B_klif+1bda9
BUCKET_ID: X64_0x3B_klif+1bda9
Followup: MachineOwner
---------
Code:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004f9a360, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000001000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
dxgmms1!memset+50
fffff880`04f9a360 488911 mov qword ptr [rcx],rdx
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000001000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030be100
0000000000001000
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800a5788b0 -- (.trap 0xfffff8800a5788b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000001000 rbx=0000000000000000 rcx=0000000000001000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004f9a360 rsp=fffff8800a578a48 rbp=0000000040000180
r8=0000000000000004 r9=0000000000000003 r10=0000000000000015
r11=fffffa8006eb78c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
dxgmms1!memset+0x50:
fffff880`04f9a360 488911 mov qword ptr [rcx],rdx ds:92a0:00000000`00001000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002eda5d8 to fffff80002e8ed00
STACK_TEXT:
fffff880`0a578028 fffff800`02eda5d8 : 00000000`0000001e ffffffff`c0000005 fffff880`04f9a360 00000000`00000001 : nt!KeBugCheckEx
fffff880`0a578030 fffff800`02e8e382 : fffff880`0a578808 fffffa80`04e3e150 fffff880`0a5788b0 00000000`80000011 : nt! ?? ::FNODOBFM::`string'+0x4987d
fffff880`0a5786d0 fffff800`02e8cefa : 00000000`00000001 00000000`00001000 00000000`00000000 fffffa80`04e3e150 : nt!KiExceptionDispatch+0xc2
fffff880`0a5788b0 fffff880`04f9a360 : 00000015`000001ec 00000000`00000015 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`0a578a48 00000015`000001ec : 00000000`00000015 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!memset+0x50
fffff880`0a578a50 00000000`00000015 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x15`000001ec
fffff880`0a578a58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x15
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgmms1
6 errors : !dxgmms1 (fffff88004f9a302-fffff88004f9a33a)
fffff88004f9a300 cc cc *ec cc cc cc 66 66 0f 1f *a4 00 00 00 00 00 ......ff........
fffff88004f9a310 48 8b *e1 49 83 f8 08 72 53 0f b6 d2 49 b9 01 01 H..I...rS...I...
fffff88004f9a320 01 01 *81 01 01 01 49 0f af d1 *c9 83 f8 40 72 1e ......I......@r.
fffff88004f9a330 48 f7 d9 83 e1 07 74 06 4c 2b *41 48 89 10 48 03 H.....t.L+AH..H.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
Wenn ihr mehr Fehlerberichte braucht kann ich auch meinen Minidumpordner hochladen.
Gruß
FireEagle
PS: Ich hoffe mal dass ich hier im richtigen Forum bin O.o