Ich habe jetzt seit März dieses Jahres so gut wie jeden Tag einen BSOD. Natürlich hab ich versucht das zu beheben, indem ich folgendes gemacht habe:
+Alle Treiber aktualisert
+Registry gesäubert
+Bios auf den neusten Stand gebracht(MoBo&GraKa)
+Systemwiederherstellung
+Win7 neu aufgesetzt
+Memtest86+ drüberlaufen lassen(12h=kein Fehler)
+HD Tune Festplatten auf Fehler untersuchen lassen
Ich bin also zu 100% ratlos und hoffe auf eure Hilfe ...
Mein System:
Intel I5-760
Asus P7P55D
4GB DDR3 OZC CL9 1333MHz
Gigabyte GeForce GTX 460 1024MB
500w be quiet
Spinpoint F4 HD322GJ (320GB)
Spinpoint F3 HD103UJ (1TB)
Windows7 Proffesional 64-bit
Asus P7P55D
4GB DDR3 OZC CL9 1333MHz
Gigabyte GeForce GTX 460 1024MB
500w be quiet
Spinpoint F4 HD322GJ (320GB)
Spinpoint F3 HD103UJ (1TB)
Windows7 Proffesional 64-bit
1.03.2011
20.03.2011
10.04.2011
25.04.2011
09.05.2011
24.06.2011
04.07.2011
Wenn ihr mehr Fehlerberichte braucht kann ich auch meinen Minidumpordner hochladen.
Code:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff880048a3448 Arg3: fffff880048a2ca0 Arg4: fffff80003189b87 Debugging Details: ------------------ EXCEPTION_RECORD: fffff880048a3448 -- (.exr 0xfffff880048a3448) ExceptionAddress: fffff80003189b87 (nt!CcMapData+0x0000000000000117) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: 0000000000002400 Attempt to read from address 0000000000002400 CONTEXT: fffff880048a2ca0 -- (.cxr 0xfffff880048a2ca0) rax=fffffa8003ec58d0 rbx=000000000000000e rcx=0000000000000000 rdx=0000000000002400 rsi=fffff880048a3848 rdi=fffffa8007730060 rip=fffff80003189b87 rsp=fffff880048a3680 rbp=0000000000000080 r8=000000000000000f r9=0000000001942400 r10=0000000000000400 r11=0000000000000001 r12=0000000000000001 r13=fffffa800482bf20 r14=fffff880048a3788 r15=0000000000000001 iopl=0 nv up ei ng nz ac po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297 nt!CcMapData+0x117: fffff800`03189b87 0fb602 movzx eax,byte ptr [rdx] ds:002b:00000000`00002400=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: League of Lege CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: 0000000000002400 READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030be0e8 0000000000002400 FOLLOWUP_IP: Ntfs!NtfsReadMftRecord+b2 fffff880`012c21e2 84c0 test al,al FAULTING_IP: nt!CcMapData+117 fffff800`03189b87 0fb602 movzx eax,byte ptr [rdx] BUGCHECK_STR: 0x24 LAST_CONTROL_TRANSFER: from fffff880012c21e2 to fffff80003189b87 STACK_TEXT: fffff880`048a3680 fffff880`012c21e2 : 00700028`0003dc00 fffffa80`03ec58d0 00080000`01180000 00000000`0000000e : nt!CcMapData+0x117 fffff880`048a3740 fffff880`012bdd5c : fffffa80`07715380 fffffa80`0483d180 fffff8a0`0015c018 fffff8a0`1098b001 : Ntfs!NtfsReadMftRecord+0xb2 fffff880`048a37f0 fffff880`012cbc58 : fffff980`1ac50118 fffff8a0`0015c140 fffffa80`0836a3a0 fffff8a0`04de7f80 : Ntfs!NtfsLookupInFileRecord+0x6c fffff880`048a3880 fffff880`012cfd99 : fffffa80`07715380 fffff880`012d0a00 fffff8a0`0015c140 00000000`88603ec0 : Ntfs!NtfsWriteFileSizes+0xa8 fffff880`048a39e0 fffff880`012cf930 : fffffa80`07715380 fffffa80`046b9b00 fffffa80`07715380 fffff880`012cb034 : Ntfs!NtOfsSetLength+0x149 fffff880`048a3ae0 fffff880`012d6868 : fffffa80`07715380 fffff880`048a3c01 00000000`88603e68 00000000`00000702 : Ntfs!NtOfsPutData+0x54 fffff880`048a3c10 fffff880`012d7163 : fffffa80`07715380 00000000`00000000 fffffa80`07715380 00000000`00000000 : Ntfs!NtfsWriteFcbUsnRecordToJournal+0xa8 fffff880`048a3cd0 fffff880`012d260e : fffffa80`07715301 fffff8a0`04cfb6c0 fffff8a0`0015c140 fffff8a0`04de7b40 : Ntfs!NtfsWriteUsnJournalChanges+0x187 fffff880`048a3d50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCreateNewFile+0xc6e SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: Ntfs!NtfsReadMftRecord+b2 FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce792f9 STACK_COMMAND: .cxr 0xfffff880048a2ca0 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsReadMftRecord+b2 BUCKET_ID: X64_0x24_Ntfs!NtfsReadMftRecord+b2 Followup: MachineOwner
Code:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff88000c78309, Address of the instruction which caused the bugcheck Arg3: fffff8800469fb40, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. FAULTING_IP: usbaudio!USBType1BuildIsochUrbRequest+181 fffff880`00c78309 41a07f5000740f418b87 mov al,byte ptr [878B410F7400507Fh] CONTEXT: fffff8800469fb40 -- (.cxr 0xfffff8800469fb40) rax=fffffa8005d18258 rbx=fffffa80037a2700 rcx=fffffa8005d1929c rdx=0000000000000000 rsi=fffffa8005d191f8 rdi=fffffa80037a28f0 rip=fffff88000c78309 rsp=fffff880046a0520 rbp=fffffa800776b6e0 r8=0000000000000000 r9=0000000000000000 r10=fffff8000301c6c8 r11=000000000000000a r12=fffffa80037a2700 r13=00000000000000b4 r14=00000000000000b4 r15=fffffa80037a27a0 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 usbaudio!USBType1BuildIsochUrbRequest+0x181: fffff880`00c78309 41a07f5000740f418b87 mov al,byte ptr [878B410F7400507Fh] ds:002b:878b410f`7400507f=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x3B PROCESS_NAME: audiodg.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88000c78309 STACK_TEXT: fffff880`046a0520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : usbaudio!USBType1BuildIsochUrbRequest+0x181 CHKIMG_EXTENSION: !chkimg -lo 50 -db !usbaudio 5 errors : !usbaudio (fffff88000c7830a-fffff88000c7833a) fffff88000c78300 18 48 8b 45 20 48 89 46 28 41 *a0 7f 50 00 74 0f .H.E H.F(A..P.t. ... fffff88000c78320 46 20 *84 00 00 00 33 c9 33 db *09 4c 24 48 39 4c F ....3.3..L$H9L fffff88000c78330 24 4c *8f 86 d4 00 00 00 40 8a *fc 24 30 8b e9 45 $L......@..$0..E MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE STACK_COMMAND: .cxr 0xfffff8800469fb40 ; kb FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE Followup: memory_corruption ---------
Code:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8800f8d8319, Address of the instruction which caused the bugcheck Arg3: fffff880072f7630, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. FAULTING_IP: nvlddmkm+7dd319 fffff880`0f8d8319 49ab stos qword ptr [rdi] CONTEXT: fffff880072f7630 -- (.cxr 0xfffff880072f7630) rax=0000000000000000 rbx=fffffa8006dd4740 rcx=fffff8800fd289d0 rdx=0000000080000102 rsi=fffff880072f8600 rdi=0000000000000000 rip=fffff8800f8d8319 rsp=fffff880072f8010 rbp=fffffa8004fa4000 r8=0000000000000000 r9=0000000000000000 r10=0000000000800001 r11=fffff10017020a60 r12=fffffa8004d78010 r13=000000000000000f r14=fffff8800fd289d0 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286 nvlddmkm+0x7dd319: fffff880`0f8d8319 49ab stos qword ptr [rdi] ds:002b:00000000`00000000=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800f8d8319 STACK_TEXT: fffff880`072f8010 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x7dd319 FOLLOWUP_IP: nvlddmkm+7dd319 fffff880`0f8d8319 49ab stos qword ptr [rdi] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nvlddmkm+7dd319 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d8d8d72 STACK_COMMAND: .cxr 0xfffff880072f7630 ; kb FAILURE_BUCKET_ID: X64_0x3B_nvlddmkm+7dd319 BUCKET_ID: X64_0x3B_nvlddmkm+7dd319 Followup: MachineOwner ---------
Code:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An attempt was made to write to readonly memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff8800f877350, Virtual address for the attempted write. Arg2: 80000001176bf121, PTE contents. Arg3: fffff88002f8b4d0, (reserved) Arg4: 000000000000000a, (reserved) Debugging Details: ------------------ CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xBE PROCESS_NAME: System CURRENT_IRQL: 6 TRAP_FRAME: fffff88002f8b4d0 -- (.trap 0xfffff88002f8b4d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8800f877350 rbx=0000000000000000 rcx=fffffa800580c000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8800f320898 rsp=fffff88002f8b668 rbp=fffffa800580c000 r8=fffff8800f1c94b0 r9=0000000000000000 r10=0000000000000000 r11=fffff88002f8b780 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nvlddmkm+0x29d898: fffff880`0f320898 ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002e38807 to fffff80002e8e640 STACK_TEXT: fffff880`02f8b368 fffff800`02e38807 : 00000000`000000be fffff880`0f877350 80000001`176bf121 fffff880`02f8b4d0 : nt!KeBugCheckEx fffff880`02f8b370 fffff800`02e8c76e : fffffa80`055f4000 fffff880`0f2768fa fffffa80`055f0770 fffffa80`04fec000 : nt! ?? ::FNODOBFM::`string'+0x443cb fffff880`02f8b4d0 fffff880`0f320898 : fffff880`0f1c9578 00000000`00610024 fffff880`0f2d7626 fffffa80`055f4000 : nt!KiPageFault+0x16e fffff880`02f8b668 fffff880`0f1c9578 : 00000000`00610024 fffff880`0f2d7626 fffffa80`055f4000 fffff880`0f2768fa : nvlddmkm+0x29d898 fffff880`02f8b670 00000000`00610024 : fffff880`0f2d7626 fffffa80`055f4000 fffff880`0f2768fa fffffa80`055f4000 : nvlddmkm+0x146578 fffff880`02f8b678 fffff880`0f2d7626 : fffffa80`055f4000 fffff880`0f2768fa fffffa80`055f4000 fffff880`0f2d3034 : 0x610024 fffff880`02f8b680 fffffa80`055f4000 : fffff880`0f2768fa fffffa80`055f4000 fffff880`0f2d3034 fffffa80`055f4000 : nvlddmkm+0x254626 fffff880`02f8b688 fffff880`0f2768fa : fffffa80`055f4000 fffff880`0f2d3034 fffffa80`055f4000 fffff880`0f2d7626 : 0xfffffa80`055f4000 fffff880`02f8b690 fffffa80`055f4000 : fffff880`0f2d3034 fffffa80`055f4000 fffff880`0f2d7626 00000000`00610024 : nvlddmkm+0x1f38fa fffff880`02f8b698 fffff880`0f2d3034 : fffffa80`055f4000 fffff880`0f2d7626 00000000`00610024 fffff880`0f5ec4c6 : 0xfffffa80`055f4000 fffff880`02f8b6a0 fffffa80`055f4000 : fffff880`0f2d7626 00000000`00610024 fffff880`0f5ec4c6 fffffa80`04fec968 : nvlddmkm+0x250034 fffff880`02f8b6a8 fffff880`0f2d7626 : 00000000`00610024 fffff880`0f5ec4c6 fffffa80`04fec968 fffffa80`04b95320 : 0xfffffa80`055f4000 fffff880`02f8b6b0 00000000`00610024 : fffff880`0f5ec4c6 fffffa80`04fec968 fffffa80`04b95320 00000000`00000000 : nvlddmkm+0x254626 fffff880`02f8b6b8 fffff880`0f5ec4c6 : fffffa80`04fec968 fffffa80`04b95320 00000000`00000000 00000000`00000000 : 0x610024 fffff880`02f8b6c0 fffffa80`04fec968 : fffffa80`04b95320 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x5694c6 fffff880`02f8b6c8 fffffa80`04b95320 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0f2d4d82 : 0xfffffa80`04fec968 fffff880`02f8b6d0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff880`0f2d4d82 fffffa80`036cf540 : 0xfffffa80`04b95320 STACK_COMMAND: kb FOLLOWUP_IP: nvlddmkm+29d898 fffff880`0f320898 ?? ??? SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nvlddmkm+29d898 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d8d8d72 FAILURE_BUCKET_ID: X64_0xBE_nvlddmkm+29d898 BUCKET_ID: X64_0xBE_nvlddmkm+29d898 Followup: MachineOwner ---------
Code:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 00000000400c0020, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff880048e991b, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c00e8 00000000400c0020 CURRENT_IRQL: 2 FAULTING_IP: kl1+3191b fffff880`048e991b 837f4402 cmp dword ptr [rdi+44h],2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff88002f1a920 -- (.trap 0xfffff88002f1a920) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000048 rbx=0000000000000000 rcx=00000000400c0024 rdx=fffffa8004cc52c0 rsi=0000000000000000 rdi=0000000000000000 rip=fffff880048e991b rsp=fffff88002f1aab0 rbp=0000000000000000 r8=0000000000000a00 r9=0000000000000000 r10=0000000000000030 r11=fffffa8004cc52a0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe nc kl1+0x3191b: fffff880`048e991b 837f4402 cmp dword ptr [rdi+44h],2 ds:e7fc:00000000`00000044=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002e8ebe9 to fffff80002e8f640 STACK_TEXT: fffff880`02f1a7d8 fffff800`02e8ebe9 : 00000000`0000000a 00000000`400c0020 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`02f1a7e0 fffff800`02e8d860 : fffffa80`0663e500 fffff880`01463387 00000066`9455d104 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`02f1a920 fffff880`048e991b : fffffa80`0545f850 00000000`00000000 fffffa80`054be7b0 fffffa80`04ca9700 : nt!KiPageFault+0x260 fffff880`02f1aab0 fffffa80`0545f850 : 00000000`00000000 fffffa80`054be7b0 fffffa80`04ca9700 00000000`00000000 : kl1+0x3191b fffff880`02f1aab8 00000000`00000000 : fffffa80`054be7b0 fffffa80`04ca9700 00000000`00000000 fffff880`0101aee1 : 0xfffffa80`0545f850 STACK_COMMAND: kb FOLLOWUP_IP: kl1+3191b fffff880`048e991b 837f4402 cmp dword ptr [rdi+44h],2 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: kl1+3191b FOLLOWUP_NAME: MachineOwner MODULE_NAME: kl1 IMAGE_NAME: kl1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a9d0591 FAILURE_BUCKET_ID: X64_0xD1_kl1+3191b BUCKET_ID: X64_0xD1_kl1+3191b Followup: MachineOwner ---------
Code:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8800101bda9, Address of the instruction which caused the bugcheck Arg3: fffff8800a47b810, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. FAULTING_IP: klif+1bda9 fffff880`0101bda9 48394810 cmp qword ptr [rax+10h],rcx CONTEXT: fffff8800a47b810 -- (.cxr 0xfffff8800a47b810) rax=6c894808245c8948 rbx=fffffa8003858f18 rcx=00000000000008bc rdx=0000000000000000 rsi=0000000000000000 rdi=fffffa800708eeb0 rip=fffff8800101bda9 rsp=fffff8800a47c1f0 rbp=00000000ffffffff r8=0000000000000000 r9=0000000000000000 r10=00610048005c0065 r11=0000000000000011 r12=fffffa8003858f10 r13=fffff8800a47c2b8 r14=fffffa8006344188 r15=fffff8a00bfb1010 iopl=0 nv up ei pl nz na po cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010207 klif+0x1bda9: fffff880`0101bda9 48394810 cmp qword ptr [rax+10h],rcx ds:002b:6c894808`245c8958=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: Skype.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800101bda9 STACK_TEXT: fffff880`0a47c1f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : klif+0x1bda9 FOLLOWUP_IP: klif+1bda9 fffff880`0101bda9 48394810 cmp qword ptr [rax+10h],rcx SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: klif+1bda9 FOLLOWUP_NAME: MachineOwner MODULE_NAME: klif IMAGE_NAME: klif.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4afabce0 STACK_COMMAND: .cxr 0xfffff8800a47b810 ; kb FAILURE_BUCKET_ID: X64_0x3B_klif+1bda9 BUCKET_ID: X64_0x3B_klif+1bda9 Followup: MachineOwner ---------
Code:
******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff88004f9a360, The address that the exception occurred at Arg3: 0000000000000001, Parameter 0 of the exception Arg4: 0000000000001000, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. FAULTING_IP: dxgmms1!memset+50 fffff880`04f9a360 488911 mov qword ptr [rcx],rdx EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 0000000000001000 WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030be100 0000000000001000 ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden. BUGCHECK_STR: 0x1E_c0000005 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff8800a5788b0 -- (.trap 0xfffff8800a5788b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000001000 rbx=0000000000000000 rcx=0000000000001000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88004f9a360 rsp=fffff8800a578a48 rbp=0000000040000180 r8=0000000000000004 r9=0000000000000003 r10=0000000000000015 r11=fffffa8006eb78c0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po cy dxgmms1!memset+0x50: fffff880`04f9a360 488911 mov qword ptr [rcx],rdx ds:92a0:00000000`00001000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002eda5d8 to fffff80002e8ed00 STACK_TEXT: fffff880`0a578028 fffff800`02eda5d8 : 00000000`0000001e ffffffff`c0000005 fffff880`04f9a360 00000000`00000001 : nt!KeBugCheckEx fffff880`0a578030 fffff800`02e8e382 : fffff880`0a578808 fffffa80`04e3e150 fffff880`0a5788b0 00000000`80000011 : nt! ?? ::FNODOBFM::`string'+0x4987d fffff880`0a5786d0 fffff800`02e8cefa : 00000000`00000001 00000000`00001000 00000000`00000000 fffffa80`04e3e150 : nt!KiExceptionDispatch+0xc2 fffff880`0a5788b0 fffff880`04f9a360 : 00000015`000001ec 00000000`00000015 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a fffff880`0a578a48 00000015`000001ec : 00000000`00000015 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!memset+0x50 fffff880`0a578a50 00000000`00000015 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x15`000001ec fffff880`0a578a58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x15 STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -db !dxgmms1 6 errors : !dxgmms1 (fffff88004f9a302-fffff88004f9a33a) fffff88004f9a300 cc cc *ec cc cc cc 66 66 0f 1f *a4 00 00 00 00 00 ......ff........ fffff88004f9a310 48 8b *e1 49 83 f8 08 72 53 0f b6 d2 49 b9 01 01 H..I...rS...I... fffff88004f9a320 01 01 *81 01 01 01 49 0f af d1 *c9 83 f8 40 72 1e ......I......@r. fffff88004f9a330 48 f7 d9 83 e1 07 74 06 4c 2b *41 48 89 10 48 03 H.....t.L+AH..H. MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE Followup: memory_corruption ---------
Gruß
bobo126