Hey tweakers,
mijn pc is de laatste paar dagen (sinds de aankoop van nieuw ram geheugen (Geil Black Dragon 2x 4GB DDR3 1333 MHz)) een aantal keren "GeBSOD'ed" ...wat een woord... ik heb alleen nog niet erg veel verstand van de crash dump files etc dus zou graag hulp hebben hiermee.
mijn pc is de laatste paar dagen (sinds de aankoop van nieuw ram geheugen (Geil Black Dragon 2x 4GB DDR3 1333 MHz)) een aantal keren "GeBSOD'ed" ...wat een woord... ik heb alleen nog niet erg veel verstand van de crash dump files etc dus zou graag hulp hebben hiermee.
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\New folder\092611-32604-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e03000 PsLoadedModuleList = 0xfffff800`03048670
Debug session time: Mon Sep 26 20:16:39.071 2011 (UTC + 2:00)
System Uptime: 0 days 3:02:08.663
Loading Kernel Symbols
...............................................................
................................................................
........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {18, 2, 0, fffff80002f2b077}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+317 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f2b077, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b2100
0000000000000018
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+317
fffff800`02f2b077 488b4118 mov rax,qword ptr [rcx+18h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880046f64e0 -- (.trap 0xfffff880046f64e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000016b727 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f2b077 rsp=fffff880046f6670 rbp=fffffa800c8b4bb0
r8=000000000008c30c r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x317:
fffff800`02f2b077 488b4118 mov rax,qword ptr [rcx+18h] ds:00000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7f1e9 to fffff80002e7fc40
STACK_TEXT:
fffff880`046f6398 fffff800`02e7f1e9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`046f63a0 fffff800`02e7de60 : 00000000`42506650 00000000`00000000 00000000`00000000 02000000`0017ef27 : nt!KiBugCheckDispatch+0x69
fffff880`046f64e0 fffff800`02f2b077 : 00000000`00000000 02000000`001754ea 00000000`42506600 fffff800`0316b73f : nt!KiPageFault+0x260
fffff880`046f6670 fffff800`02f2bc7b : 00000000`00000000 00000000`00000004 fffffa80`0e2afa30 fffffa80`0e2af000 : nt!MiIdentifyPfn+0x317
fffff880`046f6710 fffff800`032907e5 : fffffa80`0e2af000 fffff880`046f6ca0 fffff880`046f67e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`046f6750 fffff800`031d34c8 : 00000000`00000006 00000000`00000000 fffffa80`0e2af000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
fffff880`046f67a0 fffff800`03189bd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d fffffa80`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
fffff880`046f6830 fffff800`0318a449 : 00000000`01c5b7a8 fffff800`02e8bf58 00000000`01c5b800 00000000`00000000 : nt!ExpQuerySystemInformation+0x1193
fffff880`046f6be0 fffff800`02e7eed3 : 00000000`00000006 fffff880`046f6ca0 00000000`063efc68 00000000`024f4800 : nt!NtQuerySystemInformation+0x4d
fffff880`046f6c20 00000000`7790167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01c5b6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7790167a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+317
fffff800`02f2b077 488b4118 mov rax,qword ptr [rcx+18h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+317
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+317
BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+317
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f2b077, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 0000000000000018
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+317
fffff800`02f2b077 488b4118 mov rax,qword ptr [rcx+18h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880046f64e0 -- (.trap 0xfffff880046f64e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000016b727 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f2b077 rsp=fffff880046f6670 rbp=fffffa800c8b4bb0
r8=000000000008c30c r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x317:
fffff800`02f2b077 488b4118 mov rax,qword ptr [rcx+18h] ds:00000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e7f1e9 to fffff80002e7fc40
STACK_TEXT:
fffff880`046f6398 fffff800`02e7f1e9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`046f63a0 fffff800`02e7de60 : 00000000`42506650 00000000`00000000 00000000`00000000 02000000`0017ef27 : nt!KiBugCheckDispatch+0x69
fffff880`046f64e0 fffff800`02f2b077 : 00000000`00000000 02000000`001754ea 00000000`42506600 fffff800`0316b73f : nt!KiPageFault+0x260
fffff880`046f6670 fffff800`02f2bc7b : 00000000`00000000 00000000`00000004 fffffa80`0e2afa30 fffffa80`0e2af000 : nt!MiIdentifyPfn+0x317
fffff880`046f6710 fffff800`032907e5 : fffffa80`0e2af000 fffff880`046f6ca0 fffff880`046f67e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`046f6750 fffff800`031d34c8 : 00000000`00000006 00000000`00000000 fffffa80`0e2af000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
fffff880`046f67a0 fffff800`03189bd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d fffffa80`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
fffff880`046f6830 fffff800`0318a449 : 00000000`01c5b7a8 fffff800`02e8bf58 00000000`01c5b800 00000000`00000000 : nt!ExpQuerySystemInformation+0x1193
fffff880`046f6be0 fffff800`02e7eed3 : 00000000`00000006 fffff880`046f6ca0 00000000`063efc68 00000000`024f4800 : nt!NtQuerySystemInformation+0x4d
fffff880`046f6c20 00000000`7790167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01c5b6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7790167a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+317
fffff800`02f2b077 488b4118 mov rax,qword ptr [rcx+18h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+317
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+317
BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+317
Followup: MachineOwner
---------