Hallo,
ich wende mich an dieses Forum, da ich bei meinem System einfach nicht mehr weiterkomme. Nach längerem zocken bekomme ich ein Bluescreen angezeit. Ich habe schon die Festplatte formatiert und Windows neu installiert. Leider habe ich immer noch das gleiche Problem.
Zu meinem System:
MSI GX623 Laptop
Intel Core 2 Duo P8700 @ 2,53 GHz
4 GB Ram
500 GB HDD
ATI Mobile Radeon 4670
Windows 7 32bit
Von Windows bekomme ich folgende Fehlermeldung nach dem Blue Screen:
Problemsignatur:
Problemereignisname: BlueScreen
Betriebsystemversion: 6.1.7600.2.0.0.256.1
Gebietsschema-ID: 1031
Zusatzinformationen zum Problem:
BCCode: a
BCP1: F4315FD8
BCP2: 00000002
BCP3: 00000001
BCP4: 828DEE0D
OS Version: 6_1_7600
Service Pack: 0_0
Product: 256_1
Dateien, die bei der Beschreibung des Problems hilfreich sind:
C:\Windows\Minidump\071311-17066-01.dmp
C:\Users\Zed\AppData\Local\Temp\WER-35911-0.sysdata.xml
Lesen Sie unsere Datenschutzbestimmungen online:
http://go.microsoft.com/fwlink/?linkid=104288&clcid=0x0407
Wenn die Onlinedatenschutzbestimmungen nicht verfügbar sind, lesen Sie unsere Datenschutzbestimmungen offline:
C:\Windows\system32\de-DE\erofflps.txt
Über WinDbg bekomme ich folgende analyse der Minidumpdatei angezeigt:
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: f4315fd8, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 828dee0d, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 829b3718
Unable to read MiSystemVaType memory at 82993160
f4315fd8
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiUnlinkFreeOrZeroedPage+c9
828dee0d 834c0804ff or dword ptr [eax+ecx+4],0FFFFFFFFh
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: League of Lege
TRAP_FRAME: a7ebfb24 -- (.trap 0xffffffffa7ebfb24)
ErrCode = 00000002
eax=70915fd4 ebx=00000023 ecx=83a00000 edx=84eff68e esi=83dee7d4 edi=84eff67c
eip=828dee0d esp=a7ebfb98 ebp=a7ebfbbc iopl=0 nv up ei pl nz ac pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00210216
nt!MiUnlinkFreeOrZeroedPage+0xc9:
828dee0d 834c0804ff or dword ptr [eax+ecx+4],0FFFFFFFFh ds:0023:f4315fd8=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 828dee0d to 828917fb
STACK_TEXT:
a7ebfb24 828dee0d badb0d00 84eff68e 00000000 nt!KiTrap0E+0x2cf
a7ebfbbc 828d75e7 00023f23 00000000 856400ff nt!MiUnlinkFreeOrZeroedPage+0xc9
a7ebfc20 828df39b 00000023 00000002 00000000 nt!MiRemoveAnyPage+0x41d
a7ebfc48 828d99fd 00000023 00000002 8896eb28 nt!MiGetPage+0x28a
a7ebfc90 828d26c8 00000001 218e8000 a7ebfd34 nt!MiResolveDemandZeroFault+0x121
a7ebfd1c 82891608 00000001 218e8000 00000001 nt!MmAccessFault+0x1dc1
a7ebfd1c 7142500a 00000001 218e8000 00000001 nt!KiTrap0E+0xdc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0011a354 00000000 00000000 00000000 00000000 0x7142500a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkFreeOrZeroedPage+c9
828dee0d 834c0804ff or dword ptr [eax+ecx+4],0FFFFFFFFh
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiUnlinkFreeOrZeroedPage+c9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fd915
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiUnlinkFreeOrZeroedPage+c9
BUCKET_ID: 0xA_nt!MiUnlinkFreeOrZeroedPage+c9
Followup: MachineOwner
---------
Nachdem ich über verifier versucht habe einen Treiber als Verursacher einzugrenzen bekomme ich folgende Blue Screens:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 000000f6, Referencing user handle as KernelMode.
Arg2: 00000c08, Handle value being referenced.
Arg3: b3290d40, Address of the current process.
Arg4: 82a254bd, Address inside the driver that is performing the incorrect reference.
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for avipbb.sys
*** ERROR: Module load completed but symbols could not be loaded for avipbb.sys
BUGCHECK_STR: 0xc4_f6
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82b35f03 to 828dde3c
STACK_TEXT:
9ef20834 82b35f03 000000c4 000000f6 00000c08 nt!KeBugCheckEx+0x1e
9ef20854 82b3a766 00000c08 b3290d40 8e07fbc0 nt!VerifierBugCheckIfAppropriate+0x30
9ef208e8 82a25603 00000000 00000000 9ef20cf4 nt!VfCheckUserHandle+0x14f
9ef20918 82a254bd 00000c08 00001000 82e48f78 nt!ObReferenceObjectByHandleWithTag+0x13b
9ef2093c 82a4a83d 00000c08 00001000 82e48f78 nt!ObReferenceObjectByHandle+0x21
9ef20c40 8284441a 00000c08 00000018 9ef20cf4 nt!NtQueryInformationProcess+0x329
9ef20c40 82842bcd 00000c08 00000018 9ef20cf4 nt!KiFastCallEntry+0x12a
9ef20ccc 936308b0 00000c08 00000000 9ef20cf4 nt!ZwQueryInformationProcess+0x11
WARNING: Stack unwind information not available. Following frames may be wrong.
9ef20d24 8284441a 00000da4 c000042c 07f4e66c avipbb+0xa8b0
9ef20d24 77966344 00000da4 c000042c 07f4e66c nt!KiFastCallEntry+0x12a
07f4e66c 00000000 00000000 00000000 00000000 0x77966344
STACK_COMMAND: kb
FOLLOWUP_IP:
avipbb+a8b0
936308b0 ?? ???
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: avipbb+a8b0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: avipbb
IMAGE_NAME: avipbb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4da596dd
FAILURE_BUCKET_ID: 0xc4_f6_VRFK_avipbb+a8b0
BUCKET_ID: 0xc4_f6_VRFK_avipbb+a8b0
Followup: MachineOwner
---------
Ich wäre über jede hilfe sehr dankbar
Gruß
Z
Zed23 (2) |