Een maatje van mij heeft al een tijdje last van BSOD's. Ik vermoed een geheugen fout, zeker nu de laatste DMP refereert naar een hardware probleem. Echter om het zeker te weten zou het fijn zijn als een van jullie even naar onze dump wilde kijken
Ligt de oorzaak echt bij een hardware probleem of kan het ook ergens anders aan liggen?
Alvast bedankt!
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Dumps\Bjorn2\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: srv*
Executable search path is: srv*
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18229.amd64fre.win7sp1_gdr.130801-1533
Machine Name:
Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`0304f6d0
Debug session time: Tue Oct 8 06:58:38.568 2013 (UTC + 2:00)
System Uptime: 0 days 0:07:58.801
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7E, {ffffffffc0000005, fffff80002e18a03, fffff88003308aa8, fffff88003308300}
Probably caused by : hardware ( nt!MiModifiedPageWriter+63 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002e18a03, The address that the exception occurred at
Arg3: fffff88003308aa8, Exception Record Address
Arg4: fffff88003308300, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.
FAULTING_IP:
nt!MiModifiedPageWriter+63
fffff800`02e18a03 0100 add dword ptr [rax],eax
EXCEPTION_RECORD: fffff88003308aa8 -- (.exr 0xfffff88003308aa8)
ExceptionAddress: fffff80002e18a03 (nt!MiModifiedPageWriter+0x0000000000000063)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 00000000039739e0
Attempt to write to address 00000000039739e0
CONTEXT: fffff88003308300 -- (.cxr 0xfffff88003308300)
rax=00000000039739e0 rbx=fffffa8003a9db50 rcx=0000000000000000
rdx=0000000000000002 rsi=fffffa80039739e0 rdi=fffffa8005dfb760
rip=fffff80002e18a03 rsp=fffff88003308ce0 rbp=0000000000000001
r8=00000000984b6983 r9=0000000000da7a64 r10=000000000007a345
r11=fffff880009e9180 r12=fffff80003038c00 r13=fffff80002e189a0
r14=0000000000000000 r15=fffff88002f67f40
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiModifiedPageWriter+0x63:
fffff800`02e18a03 0100 add dword ptr [rax],eax ds:002b:00000000`039739e0=????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000000039739e0
WRITE_ADDRESS: 00000000039739e0
FOLLOWUP_IP:
nt!MiModifiedPageWriter+63
fffff800`02e18a03 0100 add dword ptr [rax],eax
BUGCHECK_STR: 0x7E
MISALIGNED_IP:
nt!MiModifiedPageWriter+63
fffff800`02e18a03 0100 add dword ptr [rax],eax
LAST_CONTROL_TRANSFER: from fffff8000311fbae to fffff80002e18a03
STACK_TEXT:
fffff880`03308ce0 fffff800`0311fbae : fffffa80`03a9db50 9d8cccdc`efca84c7 00000000`00000080 00000000`00000001 : nt!MiModifiedPageWriter+0x63
fffff880`03308d40 fffff800`02e728c6 : fffff880`02f63180 fffffa80`03a9db50 fffff880`02f6dfc0 efedb9b9`dfbeffc6 : nt!PspSystemThreadStartup+0x5a
fffff880`03308d80 00000000`00000000 : fffff880`03309000 fffff880`03303000 fffff880`03308a80 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiModifiedPageWriter+63
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff88003308300 ; kb
IMAGE_NAME: hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
Alvast bedankt!
Microsoft (R) Windows Debugger Version 6.2.9200.20512 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Dumps\Bjorn2\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: srv*
Executable search path is: srv*
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18229.amd64fre.win7sp1_gdr.130801-1533
Machine Name:
Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`0304f6d0
Debug session time: Tue Oct 8 06:58:38.568 2013 (UTC + 2:00)
System Uptime: 0 days 0:07:58.801
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7E, {ffffffffc0000005, fffff80002e18a03, fffff88003308aa8, fffff88003308300}
Probably caused by : hardware ( nt!MiModifiedPageWriter+63 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002e18a03, The address that the exception occurred at
Arg3: fffff88003308aa8, Exception Record Address
Arg4: fffff88003308300, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.
FAULTING_IP:
nt!MiModifiedPageWriter+63
fffff800`02e18a03 0100 add dword ptr [rax],eax
EXCEPTION_RECORD: fffff88003308aa8 -- (.exr 0xfffff88003308aa8)
ExceptionAddress: fffff80002e18a03 (nt!MiModifiedPageWriter+0x0000000000000063)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 00000000039739e0
Attempt to write to address 00000000039739e0
CONTEXT: fffff88003308300 -- (.cxr 0xfffff88003308300)
rax=00000000039739e0 rbx=fffffa8003a9db50 rcx=0000000000000000
rdx=0000000000000002 rsi=fffffa80039739e0 rdi=fffffa8005dfb760
rip=fffff80002e18a03 rsp=fffff88003308ce0 rbp=0000000000000001
r8=00000000984b6983 r9=0000000000da7a64 r10=000000000007a345
r11=fffff880009e9180 r12=fffff80003038c00 r13=fffff80002e189a0
r14=0000000000000000 r15=fffff88002f67f40
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiModifiedPageWriter+0x63:
fffff800`02e18a03 0100 add dword ptr [rax],eax ds:002b:00000000`039739e0=????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - De instructie op 0x%08lx verwijst naar geheugen op 0x%08lx. Een lees- of schrijfbewerking op het geheugen is mislukt: %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 00000000039739e0
WRITE_ADDRESS: 00000000039739e0
FOLLOWUP_IP:
nt!MiModifiedPageWriter+63
fffff800`02e18a03 0100 add dword ptr [rax],eax
BUGCHECK_STR: 0x7E
MISALIGNED_IP:
nt!MiModifiedPageWriter+63
fffff800`02e18a03 0100 add dword ptr [rax],eax
LAST_CONTROL_TRANSFER: from fffff8000311fbae to fffff80002e18a03
STACK_TEXT:
fffff880`03308ce0 fffff800`0311fbae : fffffa80`03a9db50 9d8cccdc`efca84c7 00000000`00000080 00000000`00000001 : nt!MiModifiedPageWriter+0x63
fffff880`03308d40 fffff800`02e728c6 : fffff880`02f63180 fffffa80`03a9db50 fffff880`02f6dfc0 efedb9b9`dfbeffc6 : nt!PspSystemThreadStartup+0x5a
fffff880`03308d80 00000000`00000000 : fffff880`03309000 fffff880`03303000 fffff880`03308a80 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiModifiedPageWriter+63
FOLLOWUP_NAME: MachineOwner
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff88003308300 ; kb
IMAGE_NAME: hardware
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------