audianer
Urgestein
Thread Starter
- Mitglied seit
- 05.11.2010
- Beiträge
- 5.290
- Laptop
- Lenovo Legion 5 17ACH6H
- Details zu meinem Laptop
- Prozessor
- Ryzen 5 5600H
- Speicher
- 16GB DDR4 3200MHz
- Grafikprozessor
- GeForce RTX 3060 130Watt - UV: 1750MHz @ 800mV / 1950MHz 880mV
- Display
- 17" LED FHD 144hz
- SSD
- 1TB SSD
- Betriebssystem
- W10
- Internet
- ▼50 Mbit ▲10 Mbit
Mahlzeit!
Zum Gerät:
ThinkPad T61
C2D T8300
4GB DDR2
Nvidia Quadro NVS 140m
256GB Samsung SSD
Windows 10 Pro
Ich verwende das Gerät in der Mittagspause zum schauen einer Serie ^^
Alle 2-3 Tage friert das Gerät (Ton/Bild) ein, gibt einen Bluescreen aus und startet neu. Manchmal nach 10min, manchmal nach 45min manchmal gar nicht.
In der Ereignisanzeige finde ich das:
Hier die erzeugte Memory.DMP
Kann jemand damit was anfangen?
---------
Zum Gerät:
ThinkPad T61
C2D T8300
4GB DDR2
Nvidia Quadro NVS 140m
256GB Samsung SSD
Windows 10 Pro
Ich verwende das Gerät in der Mittagspause zum schauen einer Serie ^^
Alle 2-3 Tage friert das Gerät (Ton/Bild) ein, gibt einen Bluescreen aus und startet neu. Manchmal nach 10min, manchmal nach 45min manchmal gar nicht.
In der Ereignisanzeige finde ich das:
Hier die erzeugte Memory.DMP
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 45
Microsoft (R) Windows Debugger Version 10.0.27871.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff804`5a800000 PsLoadedModuleList = 0xfffff804`5b42a8d0
Debug session time: Thu Aug 7 11:55:36.161 2025 (UTC + 2:00)
System Uptime: 0 days 0:27:44.940
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`5abfd270 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`5e674450=000000000000000a
0: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffad0090d17540, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8046b8619d4, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1515
Key : Analysis.Elapsed.mSec
Value: 1517
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 11
Key : Analysis.IO.Write.Mb
Value: 35
Key : Analysis.Init.CPU.mSec
Value: 4265
Key : Analysis.Init.Elapsed.mSec
Value: 409462
Key : Analysis.Memory.CommitPeak.Mb
Value: 126
Key : Analysis.Version.DbgEng
Value: 10.0.27871.1001
Key : Analysis.Version.Description
Value: 10.2505.01.02 amd64fre
Key : Analysis.Version.Ext
Value: 1.2505.1.2
Key : Bugcheck.Code.KiBugCheckData
Value: 0xd1
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Failure.Bucket
Value: AV_netwlv64!prvRfdQueueDispatch
Key : Failure.Exception.IP.Address
Value: 0xfffff8046b8619d4
Key : Failure.Exception.IP.Module
Value: netwlv64
Key : Failure.Exception.IP.Offset
Value: 0x419d4
Key : Failure.Hash
Value: {7dcb966c-d4d2-82e2-eeb7-814a1d2b988e}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0x0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 0
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 0
Key : Hypervisor.Flags.ValueHex
Value: 0x0
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0x0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffad0090d17540
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8046b8619d4
FILE_IN_CAB: MEMORY.DMP
FAULTING_THREAD: fffff8045b527a00
READ_ADDRESS: unable to get nt!PspSessionIdBitmap
ffffad0090d17540
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
STACK_TEXT:
fffff804`5e674448 fffff804`5ac11aa9 : 00000000`0000000a ffffad00`90d17540 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`5e674450 fffff804`5ac0d478 : 00000000`000000b0 00000000`a7998050 00000000`00000048 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`5e674590 fffff804`6b8619d4 : ffffad00`90d14b04 ffffbe04`a7f895b0 ffffad00`00000000 fffff804`0001a03c : nt!KiPageFault+0x478
fffff804`5e674720 fffff804`6b86141a : ffffbe04`a7aba520 00000003`e078cc6b 00000000`0000006a ffffbe04`a73640a0 : netwlv64!prvRfdQueueDispatch+0xe4
fffff804`5e674790 fffff804`6b855cb7 : ffffbe04`a7aba501 ffffbe04`a73647e0 ffffbe04`a7b3f3ff 00000000`00000001 : netwlv64!rfdQueueProcessFragments+0x18a
fffff804`5e674820 fffff804`6bb50142 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`ffffffff : netwlv64!isrHandlerRoutineMsi+0x1b7
fffff804`5e674890 fffff804`5d977977 : 00000003`e078cb59 ffffbe04`a7b3f0f0 00000000`ffffffff ffffbe04`ffffffff : netwlv64!oscHandleInterrupt+0x22
fffff804`5e6748c0 fffff804`5aa46f2e : fffff804`5703c240 00000000`00000000 00000000`00000004 fffff804`57039180 : ndis!ndisInterruptDpc+0x197
fffff804`5e6749a0 fffff804`5aa46214 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff804`5e674b10 fffff804`5ac01d6e : 00000000`00000000 fffff804`57039180 fffff804`5b527a00 ffffbe04`af10d080 : nt!KiRetireDpcList+0x1f4
fffff804`5e674da0 00000000`00000000 : fffff804`5e675000 fffff804`5e66f000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: netwlv64!prvRfdQueueDispatch+e4
MODULE_NAME: netwlv64
IMAGE_NAME: netwlv64.sys
STACK_COMMAND: .process /r /p 0xfffff8045b524a00; .thread 0xfffff8045b527a00 ; kb
BUCKET_ID_FUNC_OFFSET: e4
FAILURE_BUCKET_ID: AV_netwlv64!prvRfdQueueDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7dcb966c-d4d2-82e2-eeb7-814a1d2b988e}
Followup: MachineOwner
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
NonInteractiveNuget : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true
EnableRedirectToChakraJsProvider : false
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 45
Microsoft (R) Windows Debugger Version 10.0.27871.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [I:\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff804`5a800000 PsLoadedModuleList = 0xfffff804`5b42a8d0
Debug session time: Thu Aug 7 11:55:36.161 2025 (UTC + 2:00)
System Uptime: 0 days 0:27:44.940
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`5abfd270 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff804`5e674450=000000000000000a
0: kd> !analyze -v
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..........
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffad0090d17540, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8046b8619d4, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1515
Key : Analysis.Elapsed.mSec
Value: 1517
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 11
Key : Analysis.IO.Write.Mb
Value: 35
Key : Analysis.Init.CPU.mSec
Value: 4265
Key : Analysis.Init.Elapsed.mSec
Value: 409462
Key : Analysis.Memory.CommitPeak.Mb
Value: 126
Key : Analysis.Version.DbgEng
Value: 10.0.27871.1001
Key : Analysis.Version.Description
Value: 10.2505.01.02 amd64fre
Key : Analysis.Version.Ext
Value: 1.2505.1.2
Key : Bugcheck.Code.KiBugCheckData
Value: 0xd1
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Bugcheck.Code.TargetModel
Value: 0xd1
Key : Failure.Bucket
Value: AV_netwlv64!prvRfdQueueDispatch
Key : Failure.Exception.IP.Address
Value: 0xfffff8046b8619d4
Key : Failure.Exception.IP.Module
Value: netwlv64
Key : Failure.Exception.IP.Offset
Value: 0x419d4
Key : Failure.Hash
Value: {7dcb966c-d4d2-82e2-eeb7-814a1d2b988e}
Key : Hypervisor.Enlightenments.Value
Value: 0
Key : Hypervisor.Enlightenments.ValueHex
Value: 0x0
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 0
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 0
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 0
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 0
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 0
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 0
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 0
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 0
Key : Hypervisor.Flags.Phase0InitDone
Value: 0
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 0
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 0
Key : Hypervisor.Flags.ValueHex
Value: 0x0
Key : Hypervisor.Flags.VpAssistPage
Value: 0
Key : Hypervisor.Flags.VsmAvailable
Value: 0
Key : Hypervisor.RootFlags.AccessStats
Value: 0
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 0
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 0
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 0
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 0
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 0
Key : Hypervisor.RootFlags.MceEnlightened
Value: 0
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 0
Key : Hypervisor.RootFlags.Value
Value: 0
Key : Hypervisor.RootFlags.ValueHex
Value: 0x0
Key : SecureKernel.HalpHvciEnabled
Value: 0
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffad0090d17540
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8046b8619d4
FILE_IN_CAB: MEMORY.DMP
FAULTING_THREAD: fffff8045b527a00
READ_ADDRESS: unable to get nt!PspSessionIdBitmap
ffffad0090d17540
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: System
STACK_TEXT:
fffff804`5e674448 fffff804`5ac11aa9 : 00000000`0000000a ffffad00`90d17540 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`5e674450 fffff804`5ac0d478 : 00000000`000000b0 00000000`a7998050 00000000`00000048 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff804`5e674590 fffff804`6b8619d4 : ffffad00`90d14b04 ffffbe04`a7f895b0 ffffad00`00000000 fffff804`0001a03c : nt!KiPageFault+0x478
fffff804`5e674720 fffff804`6b86141a : ffffbe04`a7aba520 00000003`e078cc6b 00000000`0000006a ffffbe04`a73640a0 : netwlv64!prvRfdQueueDispatch+0xe4
fffff804`5e674790 fffff804`6b855cb7 : ffffbe04`a7aba501 ffffbe04`a73647e0 ffffbe04`a7b3f3ff 00000000`00000001 : netwlv64!rfdQueueProcessFragments+0x18a
fffff804`5e674820 fffff804`6bb50142 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`ffffffff : netwlv64!isrHandlerRoutineMsi+0x1b7
fffff804`5e674890 fffff804`5d977977 : 00000003`e078cb59 ffffbe04`a7b3f0f0 00000000`ffffffff ffffbe04`ffffffff : netwlv64!oscHandleInterrupt+0x22
fffff804`5e6748c0 fffff804`5aa46f2e : fffff804`5703c240 00000000`00000000 00000000`00000004 fffff804`57039180 : ndis!ndisInterruptDpc+0x197
fffff804`5e6749a0 fffff804`5aa46214 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs+0x30e
fffff804`5e674b10 fffff804`5ac01d6e : 00000000`00000000 fffff804`57039180 fffff804`5b527a00 ffffbe04`af10d080 : nt!KiRetireDpcList+0x1f4
fffff804`5e674da0 00000000`00000000 : fffff804`5e675000 fffff804`5e66f000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e
SYMBOL_NAME: netwlv64!prvRfdQueueDispatch+e4
MODULE_NAME: netwlv64
IMAGE_NAME: netwlv64.sys
STACK_COMMAND: .process /r /p 0xfffff8045b524a00; .thread 0xfffff8045b527a00 ; kb
BUCKET_ID_FUNC_OFFSET: e4
FAILURE_BUCKET_ID: AV_netwlv64!prvRfdQueueDispatch
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7dcb966c-d4d2-82e2-eeb7-814a1d2b988e}
Followup: MachineOwner
Kann jemand damit was anfangen?
---------