Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\010513-58047-01.dmp]
Liegt das an der Grafikkarte, oder WLAN-Netwerkadapter? Schon mehrmals in unterschiedlichen Abständen abgestürzt
Ich kann mit der Loading Dump nichts anfangen, vielleicht kann das mir jemand übersetzen.Danke Gruss
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\010513-58047-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*c:\cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16461.amd64fre.win8_gdr.121119-1606
Machine Name:
Kernel base = 0xfffff803`2b813000 PsLoadedModuleList = 0xfffff803`2badda80
Debug session time: Sat Jan 5 11:59:54.781 2013 (UTC + 1:00)
System Uptime: 7 days 1:01:54.864
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
...............................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff880030d2c40, 2, 0, fffff880050829e4}
*** WARNING: Unable to verify timestamp for netwlv64.sys
*** ERROR: Module load completed but symbols could not be loaded for netwlv64.sys
Probably caused by : netwlv64.sys ( netwlv64+419e4 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff880030d2c40, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880050829e4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8032bb69168
GetUlongFromAddress: unable to read from fffff8032bb691f8
fffff880030d2c40 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
netwlv64+419e4
fffff880`050829e4 41813c2400005555 cmp dword ptr [r12],55550000h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: fffff880009da690 -- (.trap 0xfffff880009da690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000036c1 rbx=0000000000000000 rcx=0000000000010000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880050829e4 rsp=fffff880009da820 rbp=fffffa8006a186c0
r8=00000000ffffffff r9=0000000000000000 r10=fffff880009c6a60
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
netwlv64+0x419e4:
fffff880`050829e4 41813c2400005555 cmp dword ptr [r12],55550000h ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8032b88d669 to fffff8032b88e340
STACK_TEXT:
fffff880`009da548 fffff803`2b88d669 : 00000000`0000000a fffff880`030d2c40 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009da550 fffff803`2b88bee0 : 00000000`00000000 fffffa80`06bedad0 00000000`00000000 fffff880`009da690 : nt!KiBugCheckDispatch+0x69
fffff880`009da690 fffff880`050829e4 : fffff880`030ce104 fffffa80`06bedad0 fffff880`030ce004 fffff880`03aa22ea : nt!KiPageFault+0x260
fffff880`009da820 fffff880`030ce104 : fffffa80`06bedad0 fffff880`030ce004 fffff880`03aa22ea 00000000`00000000 : netwlv64+0x419e4
fffff880`009da828 fffffa80`06bedad0 : fffff880`030ce004 fffff880`03aa22ea 00000000`00000000 00000000`00000000 : 0xfffff880`030ce104
fffff880`009da830 fffff880`030ce004 : fffff880`03aa22ea 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`06bedad0
fffff880`009da838 fffff880`03aa22ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`030ce004
fffff880`009da840 00000000`00000001 : fffffa80`06a57990 00000000`00000000 00000000`000000fb fffff880`0508242a : dxgkrnl!DxgNotifyDpcCB+0x5a
fffff880`009da870 fffffa80`06a57990 : 00000000`00000000 00000000`000000fb fffff880`0508242a fffffa80`06a18e40 : 0x1
fffff880`009da878 00000000`00000000 : 00000000`000000fb fffff880`0508242a fffffa80`06a18e40 00000159`0d75e645 : 0xfffffa80`06a57990
STACK_COMMAND: kb
FOLLOWUP_IP:
netwlv64+419e4
fffff880`050829e4 41813c2400005555 cmp dword ptr [r12],55550000h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: netwlv64+419e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netwlv64
IMAGE_NAME: netwlv64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cadb903
FAILURE_BUCKET_ID: AV_netwlv64+419e4
BUCKET_ID: AV_netwlv64+419e4
Followup: MachineOwner
---------
1: kd> lmvm netwlv64
start end module name
fffff880`05041000 fffff880`0577c000 netwlv64 T (no symbols)
Loaded symbol image file: netwlv64.sys
Image path: netwlv64.sys
Image name: netwlv64.sys
Timestamp: Thu Oct 07 14:11:47 2010 (4CADB903)
CheckSum: 007321D3
ImageSize: 0073B000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Symbol search path is: srv*c:\cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16461.amd64fre.win8_gdr.121119-1606
Machine Name:
Kernel base = 0xfffff803`2b813000 PsLoadedModuleList = 0xfffff803`2badda80
Debug session time: Sat Jan 5 11:59:54.781 2013 (UTC + 1:00)
System Uptime: 7 days 1:01:54.864
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
...............................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff880030d2c40, 2, 0, fffff880050829e4}
*** WARNING: Unable to verify timestamp for netwlv64.sys
*** ERROR: Module load completed but symbols could not be loaded for netwlv64.sys
Probably caused by : netwlv64.sys ( netwlv64+419e4 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff880030d2c40, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880050829e4, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8032bb69168
GetUlongFromAddress: unable to read from fffff8032bb691f8
fffff880030d2c40 Nonpaged pool
CURRENT_IRQL: 2
FAULTING_IP:
netwlv64+419e4
fffff880`050829e4 41813c2400005555 cmp dword ptr [r12],55550000h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
TRAP_FRAME: fffff880009da690 -- (.trap 0xfffff880009da690)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000036c1 rbx=0000000000000000 rcx=0000000000010000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880050829e4 rsp=fffff880009da820 rbp=fffffa8006a186c0
r8=00000000ffffffff r9=0000000000000000 r10=fffff880009c6a60
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
netwlv64+0x419e4:
fffff880`050829e4 41813c2400005555 cmp dword ptr [r12],55550000h ds:00000000`00000000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8032b88d669 to fffff8032b88e340
STACK_TEXT:
fffff880`009da548 fffff803`2b88d669 : 00000000`0000000a fffff880`030d2c40 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`009da550 fffff803`2b88bee0 : 00000000`00000000 fffffa80`06bedad0 00000000`00000000 fffff880`009da690 : nt!KiBugCheckDispatch+0x69
fffff880`009da690 fffff880`050829e4 : fffff880`030ce104 fffffa80`06bedad0 fffff880`030ce004 fffff880`03aa22ea : nt!KiPageFault+0x260
fffff880`009da820 fffff880`030ce104 : fffffa80`06bedad0 fffff880`030ce004 fffff880`03aa22ea 00000000`00000000 : netwlv64+0x419e4
fffff880`009da828 fffffa80`06bedad0 : fffff880`030ce004 fffff880`03aa22ea 00000000`00000000 00000000`00000000 : 0xfffff880`030ce104
fffff880`009da830 fffff880`030ce004 : fffff880`03aa22ea 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`06bedad0
fffff880`009da838 fffff880`03aa22ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`030ce004
fffff880`009da840 00000000`00000001 : fffffa80`06a57990 00000000`00000000 00000000`000000fb fffff880`0508242a : dxgkrnl!DxgNotifyDpcCB+0x5a
fffff880`009da870 fffffa80`06a57990 : 00000000`00000000 00000000`000000fb fffff880`0508242a fffffa80`06a18e40 : 0x1
fffff880`009da878 00000000`00000000 : 00000000`000000fb fffff880`0508242a fffffa80`06a18e40 00000159`0d75e645 : 0xfffffa80`06a57990
STACK_COMMAND: kb
FOLLOWUP_IP:
netwlv64+419e4
fffff880`050829e4 41813c2400005555 cmp dword ptr [r12],55550000h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: netwlv64+419e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: netwlv64
IMAGE_NAME: netwlv64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cadb903
FAILURE_BUCKET_ID: AV_netwlv64+419e4
BUCKET_ID: AV_netwlv64+419e4
Followup: MachineOwner
---------
1: kd> lmvm netwlv64
start end module name
fffff880`05041000 fffff880`0577c000 netwlv64 T (no symbols)
Loaded symbol image file: netwlv64.sys
Image path: netwlv64.sys
Image name: netwlv64.sys
Timestamp: Thu Oct 07 14:11:47 2010 (4CADB903)
CheckSum: 007321D3
ImageSize: 0073B000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Liegt das an der Grafikkarte, oder WLAN-Netwerkadapter? Schon mehrmals in unterschiedlichen Abständen abgestürzt
Ich kann mit der Loading Dump nichts anfangen, vielleicht kann das mir jemand übersetzen.Danke Gruss
Zuletzt bearbeitet von einem Moderator: