Hallo,
every couple of days I get a BSOD, with the error above. For detailed minidumpo see below.
Furthermore the PC doesn't autmoatically restart (even it is activated in system properties / advances / startup and recovery).
Does anybody have a solution? I already tried reg-cleaning, crc and memtest86 checking.
Thank you,
Max
every couple of days I get a BSOD, with the error above. For detailed minidumpo see below.
Furthermore the PC doesn't autmoatically restart (even it is activated in system properties / advances / startup and recovery).
Does anybody have a solution? I already tried reg-cleaning, crc and memtest86 checking.
Thank you,
Max
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Maximilian\Desktop\021715-30843-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17630.amd64fre.winblue_r7.150109-2022
Machine Name:
Kernel base = 0xfffff801`84a1b000 PsLoadedModuleList = 0xfffff801`84cf4250
Debug session time: Mon Feb 16 06:18:19.329 2015 (UTC + 1:00)
System Uptime: 3 days 16:11:09.816
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {ffffffe2fc, 2, 0, fffff80184ad526f}
Probably caused by : ntkrnlmp.exe ( nt!KiAbTryIncrementIoWaiterCount+3f )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000ffffffe2fc, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80184ad526f, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80184d7e138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
000000ffffffe2fc
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiAbTryIncrementIoWaiterCount+3f
fffff801`84ad526f f780fc02000000001000 test dword ptr [rax+2FCh],100000h
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: AV
PROCESS_NAME: tv_w32.exe
ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre
TRAP_FRAME: ffffd000a3cfa6c0 -- (.trap 0xffffd000a3cfa6c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000024 rbx=0000000000000000 rcx=ffffc001fc4c34e0
rdx=0000000000000026 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80184a855a0 rsp=ffffd000a3cfa850 rbp=ffffd000a3cfab80
r8=ffffc001fc4c34e0 r9=7fffc001fd72a5d0 r10=ffffc001fd72a5d0
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfReferenceObject+0x20:
fffff801`84a855a0 f0480fc11f lock xadd qword ptr [rdi],rbx ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80184b774e9 to fffff80184b6b9a0
STACK_TEXT:
ffffd000`a3cf9ef8 fffff801`84b774e9 : 00000000`0000000a 000000ff`ffffe2fc 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`a3cf9f00 fffff801`84b75d3a : 00000000`00000000 80000000`00000000 fffff801`84d20f00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`a3cfa040 fffff801`84ad526f : fffff801`84ab66de 80000000`00000000 80000000`00000000 ffffd000`a3cfa219 : nt!KiPageFault+0x23a
ffffd000`a3cfa1d8 fffff801`84ab66de : 80000000`00000000 80000000`00000000 ffffd000`a3cfa219 00000000`00000002 : nt!KiAbTryIncrementIoWaiterCount+0x3f
ffffd000`a3cfa1e0 fffff801`84ab53f0 : ffffd000`9fec0180 fffff801`00000000 ffffe000`425e5880 fffff801`84ad020f : nt!KiAbProcessContextSwitch+0x1be
ffffd000`a3cfa280 fffff801`84ab4f79 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x40
ffffd000`a3cfa320 fffff801`84a81c40 : 00000000`00000001 ffffd000`9fec0180 00000000`00000000 fffff6fc`00c26e10 : nt!KiCommitThreadWait+0x129
ffffd000`a3cfa3a0 fffff801`84aa2918 : fffff801`84d76dd0 ffffe000`425e5ba0 fffff801`84d76dd0 ffffd000`a3cfa400 : nt!ExfAcquirePushLockExclusiveEx+0x2e0
ffffd000`a3cfa460 fffff801`84a85d29 : 00000000`00000001 ffffe000`40cff080 ffffd000`a3cfa6c0 ffffd000`a3cfa7f0 : nt!MiSystemFault+0x968
ffffd000`a3cfa500 fffff801`84b75c2f : 00000000`00000001 00000000`00000001 00000000`00000000 ffffc002`00001000 : nt!MmAccessFault+0x769
ffffd000`a3cfa6c0 fffff801`84a855a0 : fffff801`84b77198 fffff801`84e97628 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
ffffd000`a3cfa850 fffff801`84dc2674 : ffffc001`fd72a060 00000000`00000000 fffff801`84a1b000 ffffc001`fd72a060 : nt!ObfReferenceObject+0x20
ffffd000`a3cfa890 fffff801`84e9776b : ffffc001`fd72a5f0 00000000`00d7db00 ffffd000`00000210 ffffd000`a3cfa9e8 : nt!ObQueryNameStringMode+0x27c
ffffd000`a3cfa990 fffff801`84b771b3 : ffffe000`425e5880 00000000`00d7da88 ffffd000`a3cfaaa8 00000000`7ef9d000 : nt!NtQueryObject+0x143
ffffd000`a3cfaa90 00007ffb`53960eda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00d7da68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`53960eda
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiAbTryIncrementIoWaiterCount+3f
fffff801`84ad526f f780fc02000000001000 test dword ptr [rax+2FCh],100000h
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiAbTryIncrementIoWaiterCount+3f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54b0c2f7
IMAGE_VERSION: 6.3.9600.17630
BUCKET_ID_FUNC_OFFSET: 3f
FAILURE_BUCKET_ID: AV_VRF_nt!KiAbTryIncrementIoWaiterCount
BUCKET_ID: AV_VRF_nt!KiAbTryIncrementIoWaiterCount
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_vrf_nt!kiabtryincrementiowaitercount
FAILURE_ID_HASH: {447846c0-3554-8894-8818-c8d0c3d254ab}
Followup: MachineOwner
---------
5: kd> lmvm nt
start end module name
fffff801`84a1b000 fffff801`851af000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\2BCBB42C1BC741DF9E1D4E2D28DAC9631\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Mapped memory image file: c:\symbols\ntoskrnl.exe\54B0C2F7794000\ntoskrnl.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Timestamp: Sat Jan 10 07:13:11 2015 (54B0C2F7)
CheckSum: 0072D721
ImageSize: 00794000
File version: 6.3.9600.17630
Product version: 6.3.9600.17630
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 1.0 App
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: ntkrnlmp.exe
OriginalFilename: ntkrnlmp.exe
ProductVersion: 6.3.9600.17630
FileVersion: 6.3.9600.17630 (winblue_r7.150109-2022)
FileDescription: NT Kernel & System
LegalCopyright: © Microsoft Corporation. All rights reserved.