- #1
B
Binary
Gast
Hallo liebe Forenmitglieder,
ich nutze Windows 8 von Dreamspark und habe seit der Installation des öfteren Bluescreens (mindestens 1x am Tag). Ich habe zuerst an den Arbeitsspeicher gedacht, jedoch hat memtest nach einem achtstündigen Test kein Problem gefunden. Also habe ich mir das Windows SDK heruntergeladen und versucht, den letzten Crashdump zu analysieren, verstehe jedoch nicht richtig den Inhalt der Ausgabe... Kann mir eventuell jemand weiterhelfen, damit ich diese BSODs endlich abstellen kann?
Vielen Dank im Voraus für das Drüberschauen
Hier die Ausgabe von windbg:
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffab002694788, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8033dd3ac85, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8033dfc8168
GetUlongFromAddress: unable to read from fffff8033dfc81f8
fffffab002694788 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiUnlinkPageFromLockedList+305
fffff803`3dd3ac85 48334108 xor rax,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800cb2c4a0 -- (.trap 0xfffff8800cb2c4a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000001f940000000 rbx=0000000000000000 rcx=fffffab002694780
rdx=00fffff000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033dd3ac85 rsp=fffff8800cb2c630 rbp=fffff8800cb2c698
r8=00000001000cdc28 r9=00000000001f9400 r10=fffffa800691f078
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiUnlinkPageFromLockedList+0x305:
fffff803`3dd3ac85 48334108 xor rax,qword ptr [rcx+8] ds:fffffab0`02694788=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8033dcec069 to fffff8033dcecd40
STACK_TEXT:
fffff880`0cb2c358 fffff803`3dcec069 : 00000000`0000000a fffffab0`02694788 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0cb2c360 fffff803`3dcea8e0 : 00000000`00000000 fffffa80`025e6750 00000000`00000000 fffff880`0cb2c4a0 : nt!KiBugCheckDispatch+0x69
fffff880`0cb2c4a0 fffff803`3dd3ac85 : fffff880`0cb2c6f0 fffffa80`069dd180 00000000`00000007 fffffa80`0691e000 : nt!KiPageFault+0x260
fffff880`0cb2c630 fffff803`3dcc2682 : 00000000`000cdd05 fffffa80`025e6750 fffffa80`00000000 fa800996`00000005 : nt!MiUnlinkPageFromLockedList+0x305
fffff880`0cb2c6c0 fffff803`3dcc4913 : fffff8a0`00000000 00000000`000ca227 00000000`00000011 fffffa80`00000001 : nt!MiDeleteLockedTransitionPte+0x162
fffff880`0cb2c750 fffff803`3dcc120f : 00000000`00100000 fffffa80`09f03000 fffffa80`0a262378 00000000`00000001 : nt!MmPurgeSection+0x293
fffff880`0cb2c800 fffff880`017b38ce : fffff8a0`0a02f3c8 fffff8a0`0a02f140 fffff880`0c9a39a0 fffff880`0c9a3740 : nt!CcPurgeCacheSection+0x13b
fffff880`0cb2c870 fffff880`017cee45 : fffff8a0`0a02f010 00000000`00000705 00000000`00000705 fffff8a0`0a02f140 : Ntfs!NtfsDeleteFile+0x68e
fffff880`0cb2cb30 fffff880`017d3419 : fffffa80`08c5e4f0 fffffa80`0bdf8310 fffff880`0c9a36b0 fffffa80`0937e080 : Ntfs!NtfsCommonCleanup+0x1715
fffff880`0cb2cf50 fffff803`3dce7467 : fffff880`0c9a36b0 00000000`00d9de78 00000000`ff6fd000 00000000`00e9ca74 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`0cb2cf80 fffff803`3dce742d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0c9a3510 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkPageFromLockedList+305
fffff803`3dd3ac85 48334108 xor rax,qword ptr [rcx+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiUnlinkPageFromLockedList+305
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5063f8c8
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 305
FAILURE_BUCKET_ID: AV_nt!MiUnlinkPageFromLockedList
BUCKET_ID: AV_nt!MiUnlinkPageFromLockedList
Followup: MachineOwner
---------
ich nutze Windows 8 von Dreamspark und habe seit der Installation des öfteren Bluescreens (mindestens 1x am Tag). Ich habe zuerst an den Arbeitsspeicher gedacht, jedoch hat memtest nach einem achtstündigen Test kein Problem gefunden. Also habe ich mir das Windows SDK heruntergeladen und versucht, den letzten Crashdump zu analysieren, verstehe jedoch nicht richtig den Inhalt der Ausgabe... Kann mir eventuell jemand weiterhelfen, damit ich diese BSODs endlich abstellen kann?
Vielen Dank im Voraus für das Drüberschauen
Hier die Ausgabe von windbg:
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffab002694788, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8033dd3ac85, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8033dfc8168
GetUlongFromAddress: unable to read from fffff8033dfc81f8
fffffab002694788 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiUnlinkPageFromLockedList+305
fffff803`3dd3ac85 48334108 xor rax,qword ptr [rcx+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff8800cb2c4a0 -- (.trap 0xfffff8800cb2c4a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000001f940000000 rbx=0000000000000000 rcx=fffffab002694780
rdx=00fffff000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8033dd3ac85 rsp=fffff8800cb2c630 rbp=fffff8800cb2c698
r8=00000001000cdc28 r9=00000000001f9400 r10=fffffa800691f078
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe cy
nt!MiUnlinkPageFromLockedList+0x305:
fffff803`3dd3ac85 48334108 xor rax,qword ptr [rcx+8] ds:fffffab0`02694788=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8033dcec069 to fffff8033dcecd40
STACK_TEXT:
fffff880`0cb2c358 fffff803`3dcec069 : 00000000`0000000a fffffab0`02694788 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0cb2c360 fffff803`3dcea8e0 : 00000000`00000000 fffffa80`025e6750 00000000`00000000 fffff880`0cb2c4a0 : nt!KiBugCheckDispatch+0x69
fffff880`0cb2c4a0 fffff803`3dd3ac85 : fffff880`0cb2c6f0 fffffa80`069dd180 00000000`00000007 fffffa80`0691e000 : nt!KiPageFault+0x260
fffff880`0cb2c630 fffff803`3dcc2682 : 00000000`000cdd05 fffffa80`025e6750 fffffa80`00000000 fa800996`00000005 : nt!MiUnlinkPageFromLockedList+0x305
fffff880`0cb2c6c0 fffff803`3dcc4913 : fffff8a0`00000000 00000000`000ca227 00000000`00000011 fffffa80`00000001 : nt!MiDeleteLockedTransitionPte+0x162
fffff880`0cb2c750 fffff803`3dcc120f : 00000000`00100000 fffffa80`09f03000 fffffa80`0a262378 00000000`00000001 : nt!MmPurgeSection+0x293
fffff880`0cb2c800 fffff880`017b38ce : fffff8a0`0a02f3c8 fffff8a0`0a02f140 fffff880`0c9a39a0 fffff880`0c9a3740 : nt!CcPurgeCacheSection+0x13b
fffff880`0cb2c870 fffff880`017cee45 : fffff8a0`0a02f010 00000000`00000705 00000000`00000705 fffff8a0`0a02f140 : Ntfs!NtfsDeleteFile+0x68e
fffff880`0cb2cb30 fffff880`017d3419 : fffffa80`08c5e4f0 fffffa80`0bdf8310 fffff880`0c9a36b0 fffffa80`0937e080 : Ntfs!NtfsCommonCleanup+0x1715
fffff880`0cb2cf50 fffff803`3dce7467 : fffff880`0c9a36b0 00000000`00d9de78 00000000`ff6fd000 00000000`00e9ca74 : Ntfs!NtfsCommonCleanupCallout+0x19
fffff880`0cb2cf80 fffff803`3dce742d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0c9a3510 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkPageFromLockedList+305
fffff803`3dd3ac85 48334108 xor rax,qword ptr [rcx+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiUnlinkPageFromLockedList+305
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 5063f8c8
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 305
FAILURE_BUCKET_ID: AV_nt!MiUnlinkPageFromLockedList
BUCKET_ID: AV_nt!MiUnlinkPageFromLockedList
Followup: MachineOwner
---------