Liebe Community
Gerade heute habe ich meinen Defekten RAM getauscht und den neuen auf Fehler überprüft, wobei kein Fehler zu finden war. Jedoch hatte ich heute einen BSOD: Hier die Info:
Nun heisst es Memory_Corruption. Kann mir jemand helfen?
LG
Adrian
Gerade heute habe ich meinen Defekten RAM getauscht und den neuen auf Fehler überprüft, wobei kein Fehler zu finden war. Jedoch hatte ich heute einen BSOD: Hier die Info:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See OSR Online - The Home Page for Windows Driver Developers for more information
Windows 8 Kernel Version 14393 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 14393.447.amd64fre.rs1_release_inmarket.161102-0100
Machine Name:
Kernel base = 0xfffff800`a280e000 PsLoadedModuleList = 0xfffff800`a2b13060
Debug session time: Sat Dec 10 08:42:31.270 2016 (UTC - 5:00)
System Uptime: 0 days 1:41:51.944
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffff8400006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800a282a832, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffff8400006f56d8
FAULTING_IP:
nt!MmBuildMdlForNonPagedPool+312
fffff800`a282a832 498b00 mov rax,qword ptr [r8]
MM_INTERNAL_CODE: 2
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: ffffe580b7f625d0 -- (.trap 0xffffe580b7f625d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd20000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffff844200000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a282a832 rsp=ffffe580b7f62760 rbp=ffffe580b7f62780
r8=ffff8400006f56d8 r9=ffffd20ac9800000 r10=00000000deadb000
r11=0000100000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!MmBuildMdlForNonPagedPool+0x312:
fffff800`a282a832 498b00 mov rax,qword ptr [r8] ds:ffff8400`006f56d8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800a29a9c56 to fffff800a2958510
STACK_TEXT:
ffffe580`b7f622d8 fffff800`a29a9c56 : 00000000`00000050 ffff8400`006f56d8 00000000`00000000 ffffe580`b7f625d0 : nt!KeBugCheckEx
ffffe580`b7f622e0 fffff800`a28b65da : 00000000`00000000 00000000`00000000 ffffe580`b7f625d0 fffff800`a2822cca : nt! ?? ::FNODOBFM::`string'+0x422b6
ffffe580`b7f623d0 fffff800`a2961afc : 00000000`00000000 ffffd20a`b75cc000 00000000`00000000 ffffd20a`c9800000 : nt!MmAccessFault+0x9ca
ffffe580`b7f625d0 fffff800`a282a832 : ffffd20a`af9343d0 fffff804`9af567fc ffffd20a`b73de170 fffff800`a28702b2 : nt!KiPageFault+0x13c
ffffe580`b7f62760 fffff804`95edf891 : ffffd20a`b4336000 ffffd20a`c9800000 ffffd20a`b4336000 00000000`d678489c : nt!MmBuildMdlForNonPagedPool+0x312
ffffe580`b7f627f0 fffff804`9af21d1f : fffff800`a2b50180 ffffd20a`bd0761f0 ffffd20a`b52aa000 ffffd20a`b4336000 : ndis!NdisAllocateMdl+0x31
ffffe580`b7f62830 fffff800`a2b50180 : ffffd20a`bd0761f0 ffffd20a`b52aa000 ffffd20a`b4336000 00000000`0000018e : bcmwl63a+0xe1d1f
ffffe580`b7f62838 ffffd20a`bd0761f0 : ffffd20a`b52aa000 ffffd20a`b4336000 00000000`0000018e fffff804`9af0413c : nt!KiInitialPCR+0x180
ffffe580`b7f62840 ffffd20a`b52aa000 : ffffd20a`b4336000 00000000`0000018e fffff804`9af0413c ffffd20a`b4457a50 : 0xffffd20a`bd0761f0
ffffe580`b7f62848 ffffd20a`b4336000 : 00000000`0000018e fffff804`9af0413c ffffd20a`b4457a50 ffffd20a`b5264780 : 0xffffd20a`b52aa000
ffffe580`b7f62850 00000000`0000018e : fffff804`9af0413c ffffd20a`b4457a50 ffffd20a`b5264780 00000000`000000c7 : 0xffffd20a`b4336000
ffffe580`b7f62858 fffff804`9af0413c : ffffd20a`b4457a50 ffffd20a`b5264780 00000000`000000c7 ffffd20a`b4457a50 : 0x18e
ffffe580`b7f62860 ffffd20a`b4457a50 : ffffd20a`b5264780 00000000`000000c7 ffffd20a`b4457a50 00000000`00000206 : bcmwl63a+0xc413c
ffffe580`b7f62868 ffffd20a`b5264780 : 00000000`000000c7 ffffd20a`b4457a50 00000000`00000206 fffff800`a286f980 : 0xffffd20a`b4457a50
ffffe580`b7f62870 00000000`000000c7 : ffffd20a`b4457a50 00000000`00000206 fffff800`a286f980 ffffd20a`2000bc80 : 0xffffd20a`b5264780
ffffe580`b7f62878 ffffd20a`b4457a50 : 00000000`00000206 fffff800`a286f980 ffffd20a`2000bc80 ffffd20a`c388e040 : 0xc7
ffffe580`b7f62880 00000000`00000206 : fffff800`a286f980 ffffd20a`2000bc80 ffffd20a`c388e040 ffffb700`a8d25bef : 0xffffd20a`b4457a50
ffffe580`b7f62888 fffff800`a286f980 : ffffd20a`2000bc80 ffffd20a`c388e040 ffffb700`a8d25bef fffff804`9af55e32 : 0x206
ffffe580`b7f62890 ffffd20a`b5291f80 : ffffd20a`b4457a50 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeferredReadyThread+0x280
ffffe580`b7f62930 ffffd20a`b4457a50 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe580`b795f180 : 0xffffd20a`b5291f80
ffffe580`b7f62938 00000000`00000000 : 00000000`00000000 00000000`00000000 ffffe580`b795f180 fffff800`a28743a2 : 0xffffd20a`b4457a50
STACK_COMMAND: kb
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
Online Crash Dump Analysis Service
See OSR Online - The Home Page for Windows Driver Developers for more information
Windows 8 Kernel Version 14393 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 14393.447.amd64fre.rs1_release_inmarket.161102-0100
Machine Name:
Kernel base = 0xfffff800`a280e000 PsLoadedModuleList = 0xfffff800`a2b13060
Debug session time: Sat Dec 10 08:42:31.270 2016 (UTC - 5:00)
System Uptime: 0 days 1:41:51.944
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffff8400006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800a282a832, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffff8400006f56d8
FAULTING_IP:
nt!MmBuildMdlForNonPagedPool+312
fffff800`a282a832 498b00 mov rax,qword ptr [r8]
MM_INTERNAL_CODE: 2
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: ffffe580b7f625d0 -- (.trap 0xffffe580b7f625d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd20000000000 rbx=0000000000000000 rcx=0000000000000001
rdx=ffff844200000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a282a832 rsp=ffffe580b7f62760 rbp=ffffe580b7f62780
r8=ffff8400006f56d8 r9=ffffd20ac9800000 r10=00000000deadb000
r11=0000100000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!MmBuildMdlForNonPagedPool+0x312:
fffff800`a282a832 498b00 mov rax,qword ptr [r8] ds:ffff8400`006f56d8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800a29a9c56 to fffff800a2958510
STACK_TEXT:
ffffe580`b7f622d8 fffff800`a29a9c56 : 00000000`00000050 ffff8400`006f56d8 00000000`00000000 ffffe580`b7f625d0 : nt!KeBugCheckEx
ffffe580`b7f622e0 fffff800`a28b65da : 00000000`00000000 00000000`00000000 ffffe580`b7f625d0 fffff800`a2822cca : nt! ?? ::FNODOBFM::`string'+0x422b6
ffffe580`b7f623d0 fffff800`a2961afc : 00000000`00000000 ffffd20a`b75cc000 00000000`00000000 ffffd20a`c9800000 : nt!MmAccessFault+0x9ca
ffffe580`b7f625d0 fffff800`a282a832 : ffffd20a`af9343d0 fffff804`9af567fc ffffd20a`b73de170 fffff800`a28702b2 : nt!KiPageFault+0x13c
ffffe580`b7f62760 fffff804`95edf891 : ffffd20a`b4336000 ffffd20a`c9800000 ffffd20a`b4336000 00000000`d678489c : nt!MmBuildMdlForNonPagedPool+0x312
ffffe580`b7f627f0 fffff804`9af21d1f : fffff800`a2b50180 ffffd20a`bd0761f0 ffffd20a`b52aa000 ffffd20a`b4336000 : ndis!NdisAllocateMdl+0x31
ffffe580`b7f62830 fffff800`a2b50180 : ffffd20a`bd0761f0 ffffd20a`b52aa000 ffffd20a`b4336000 00000000`0000018e : bcmwl63a+0xe1d1f
ffffe580`b7f62838 ffffd20a`bd0761f0 : ffffd20a`b52aa000 ffffd20a`b4336000 00000000`0000018e fffff804`9af0413c : nt!KiInitialPCR+0x180
ffffe580`b7f62840 ffffd20a`b52aa000 : ffffd20a`b4336000 00000000`0000018e fffff804`9af0413c ffffd20a`b4457a50 : 0xffffd20a`bd0761f0
ffffe580`b7f62848 ffffd20a`b4336000 : 00000000`0000018e fffff804`9af0413c ffffd20a`b4457a50 ffffd20a`b5264780 : 0xffffd20a`b52aa000
ffffe580`b7f62850 00000000`0000018e : fffff804`9af0413c ffffd20a`b4457a50 ffffd20a`b5264780 00000000`000000c7 : 0xffffd20a`b4336000
ffffe580`b7f62858 fffff804`9af0413c : ffffd20a`b4457a50 ffffd20a`b5264780 00000000`000000c7 ffffd20a`b4457a50 : 0x18e
ffffe580`b7f62860 ffffd20a`b4457a50 : ffffd20a`b5264780 00000000`000000c7 ffffd20a`b4457a50 00000000`00000206 : bcmwl63a+0xc413c
ffffe580`b7f62868 ffffd20a`b5264780 : 00000000`000000c7 ffffd20a`b4457a50 00000000`00000206 fffff800`a286f980 : 0xffffd20a`b4457a50
ffffe580`b7f62870 00000000`000000c7 : ffffd20a`b4457a50 00000000`00000206 fffff800`a286f980 ffffd20a`2000bc80 : 0xffffd20a`b5264780
ffffe580`b7f62878 ffffd20a`b4457a50 : 00000000`00000206 fffff800`a286f980 ffffd20a`2000bc80 ffffd20a`c388e040 : 0xc7
ffffe580`b7f62880 00000000`00000206 : fffff800`a286f980 ffffd20a`2000bc80 ffffd20a`c388e040 ffffb700`a8d25bef : 0xffffd20a`b4457a50
ffffe580`b7f62888 fffff800`a286f980 : ffffd20a`2000bc80 ffffd20a`c388e040 ffffb700`a8d25bef fffff804`9af55e32 : 0x206
ffffe580`b7f62890 ffffd20a`b5291f80 : ffffd20a`b4457a50 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeferredReadyThread+0x280
ffffe580`b7f62930 ffffd20a`b4457a50 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffe580`b795f180 : 0xffffd20a`b5291f80
ffffe580`b7f62938 00000000`00000000 : 00000000`00000000 00000000`00000000 ffffe580`b795f180 fffff800`a28743a2 : 0xffffd20a`b4457a50
STACK_COMMAND: kb
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: LARGE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
BUCKET_ID: X64_MEMORY_CORRUPTION_LARGE
Followup: memory_corruption
---------
LG
Adrian
Zuletzt bearbeitet: