kurzer Nachtrag
Zusätzlich kommen zwischen den oben genannten BlueScreens auch noch welche mit der Meldung "Bad Pool Caller".
Habe grad Driver Genius mal schauen lassen, der hat direkt fünf Treiber gefunden welche unbedingt aktualisiert werden sollten. Allerdings finde ich auf der Asus Seite die vermeintlich aktuellen nicht. Nun bin ich bissl irritiert. Weiß nich ob ich mir die neuen von den Seiten der Chipsatzhersteller suchen soll und ob ich dann auch noch die richtigen erwische.
Windows Debugging Tool schaufelt's mir grad auf die Platte. Spät heut abend werde ich dann die letzten vier Crashdumps ausgelesen hier einstellen.
Bis später
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000000000000, Memory contents of the pool block
Arg4: fffff900c5fa1590, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: fffff900c5fa1590
FREED_POOL_TAG: Gla:
BUGCHECK_STR: 0xc2_7_Gla:
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002df460e to fffff80002cc1740
STACK_TEXT:
fffff880`0a438ae8 fffff800`02df460e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a438af0 fffff960`00194ef8 : 00000000`00000000 fffff900`c0082dd0 00000000`7b012731 fffff960`00194726 : nt!ExDeferredFreePool+0x11eb
fffff880`0a438ba0 fffff960`00197603 : fffff900`c645b010 00000000`00000000 0000001f`00000000 00000000`00000000 : win32k!FreeObject+0x58
fffff880`0a438bd0 fffff960`002cdf59 : fffff900`c0082dd0 fffff880`0a438c80 ffffffff`00000000 00000000`00000000 : win32k!DC::vReleaseVis+0x3f
fffff880`0a438c00 fffff960`00197766 : fffff880`0a438c80 00000000`00000000 00000000`00000000 ffffffff`e8052a70 : win32k!bDeleteDCInternalWorker+0x159
fffff880`0a438c60 fffff960`001565b0 : 00000000`7b012731 fffff880`0a438d60 00000000`00000000 00000000`00000000 : win32k!bDeleteDCInternal+0x56
fffff880`0a438cb0 fffff800`02cc0993 : fffffa80`062d5b60 fffff880`0a438d60 00000000`0185000f 00000000`00000001 : win32k!NtGdiDeleteObjectApp+0x120
fffff880`0a438ce0 000007fe`ff01118a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0adae268 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`ff01118a
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!FreeObject+58
fffff960`00194ef8 488b5c2430 mov rbx,qword ptr [rsp+30h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: win32k!FreeObject+58
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d6f11c9
FAILURE_BUCKET_ID: X64_0xc2_7_Gla:_win32k!FreeObject+58
BUCKET_ID: X64_0xc2_7_Gla:_win32k!FreeObject+58
Followup: MachineOwner
--------------------------------------------------------------------------------------------------------------------------------------
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffff8a0037cfce0, the pool entry being checked.
Arg3: fffff8a0037c7ce0, the read back flink freelist value (should be the same as 2).
Arg4: 0000000000000000, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002e00130 to fffff80002ccd740
STACK_TEXT:
fffff880`07c94658 fffff800`02e00130 : 00000000`00000019 00000000`00000003 fffff8a0`037cfce0 fffff8a0`037c7ce0 : nt!KeBugCheckEx
fffff880`07c94660 fffff800`02e024c1 : fffff880`07c947d0 fffff8a0`030ce780 fffff880`07c94738 00000000`00401802 : nt!ExDeferredFreePool+0xca0
fffff880`07c946f0 fffff880`0115a633 : 00000000`00000703 fffff880`011a8763 fffff8a0`73634946 fffff8a0`030ce7f0 : nt!ExFreePoolWithTag+0x411
fffff880`07c947a0 fffff880`0116058b : fffff8a0`030ce790 fffff8a0`030ce7f0 fffff8a0`00000003 fffff8a0`030ce820 : fltmgr! ?? ::FNODOBFM::`string'+0x429
fffff880`07c947d0 fffff880`01161666 : fffff8a0`030ce790 fffff8a0`02e76900 ffffffff`ffffffff fffffa80`05ccdd90 : fltmgr!DoFreeContextMemory+0x6b
fffff880`07c94800 fffff880`0117d22d : fffff8a0`030ce7a8 fffff880`01153000 00000000`00000000 fffff880`012cad81 : fltmgr!DoFreeContext+0x86
fffff880`07c94830 fffff880`01178bc1 : fffffa80`05313010 00000000`00000130 fffff8a0`087bbbc0 fffff8a0`087bbbc0 : fltmgr! ?? ::NNGAKEGL::`string'+0x1196
fffff880`07c94860 fffff880`01178b7b : fffffa80`05313010 00000000`00000000 fffffa80`05313010 fffff880`01178c00 : fltmgr!CleanupStreamListCtrl+0x21
fffff880`07c94890 fffff800`02fba5a6 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`087cb401 : fltmgr!DeleteStreamListCtrlCallback+0x6b
fffff880`07c948c0 fffff880`012d1bcc : fffff8a0`087bbbc0 fffffa80`06f37b00 fffff880`07c94998 00000000`00000706 : nt!FsRtlTeardownPerStreamContexts+0xe2
fffff880`07c94910 fffff880`012d18d5 : 00000000`00000000 00000000`00000000 fffff800`02e72500 00000000`00000001 : Ntfs!NtfsDeleteScb+0x108
fffff880`07c94950 fffff880`01244cb4 : fffff8a0`087bbac0 fffff8a0`087bbbc0 fffff800`02e72500 fffff8a0`087cb040 : Ntfs!NtfsRemoveScb+0x61
fffff880`07c94990 fffff880`01245037 : fffff8a0`087bba90 fffff800`02e725a0 fffff880`07c94b01 fffffa80`05b2a1a0 : Ntfs!NtfsPrepareFcbForRemoval+0x50
fffff880`07c949c0 fffff880`012cf2cc : fffffa80`05b2a1a0 fffffa80`04bd6180 fffff8a0`087cb010 fffff8a0`087cb450 : Ntfs!NtfsTeardownFromLcb+0x2b7
fffff880`07c94a50 fffff880`0124d882 : fffffa80`05b2a1a0 fffffa80`05b2a1a0 fffff8a0`087cb010 fffff880`07c94c00 : Ntfs!NtfsTeardownStructures+0xcc
fffff880`07c94ad0 fffff880`012e6813 : fffffa80`05b2a1a0 fffff800`02e725a0 fffff8a0`6446744e 00000000`00000009 : Ntfs!NtfsDecrementCloseCounts+0xa2
fffff880`07c94b10 fffff880`012c038f : fffffa80`05b2a1a0 fffff8a0`087cb140 fffff8a0`087cb010 fffffa80`04bd6180 : Ntfs!NtfsCommonClose+0x353
fffff880`07c94be0 fffff800`02cda961 : 00000000`00000000 fffff800`02cc1300 fffff800`02ed4101 fffffa80`00000003 : Ntfs!NtfsFspClose+0x15f
fffff880`07c94cb0 fffff800`02f707c6 : 00000000`20a28020 fffffa80`06f37b00 00000000`00000080 fffffa80`039d3040 : nt!ExpWorkerThread+0x111
fffff880`07c94d40 fffff800`02cabc26 : fffff880`009e9180 fffffa80`06f37b00 fffffa80`039fd680 fffff880`0124a534 : nt!PspSystemThreadStartup+0x5a
fffff880`07c94d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+ca0
fffff800`02e00130 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+ca0
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+ca0
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+ca0
Followup: Pool_corruption
----------------------------------------------------------------------------------------------------------------------------------------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff683ff7e95e8
Arg3: bfe00000c3f15025
Arg4: fffffa8006b19780
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41201
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002aedb3e to fffff80002a8f740
STACK_TEXT:
fffff880`099e89b8 fffff800`02aedb3e : 00000000`0000001a 00000000`00041201 fffff683`ff7e95e8 bfe00000`c3f15025 : nt!KeBugCheckEx
fffff880`099e89c0 fffff800`02a5db5e : 00000000`00000000 fffffa80`0750ab60 00000000`00000000 bfe00000`c3f15025 : nt! ?? ::FNODOBFM::`string'+0x13bb2
fffff880`099e8a00 fffff800`02a5d7fa : fffffa80`06b19780 fffffa80`0674a730 fffffa80`0674a730 000007fe`fd2bd000 : nt!MiQueryAddressState+0x2ae
fffff880`099e8a50 fffff800`02d74928 : fffff880`00000002 000007fe`fd2be000 fffffa80`06b19780 00000000`00000000 : nt!MiQueryAddressSpan+0xaa
fffff880`099e8ac0 fffff800`02a8e993 : 00000000`0000017c fffffa80`0750ab60 fffff880`099e8bc8 00000000`001cac08 : nt!NtQueryVirtualMemory+0x386
fffff880`099e8bb0 00000000`778df8ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001cabe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778df8ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+13bb2
fffff800`02aedb3e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+13bb2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
Followup: MachineOwner
----------------------------------------------------------------------------------------------------------------------------------------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: fffff900c73d8001
Arg3: 0000000000005a5c
Arg4: fffff90000812000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41284
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002ad33b3 to fffff80002a7e740
STACK_TEXT:
fffff880`047fa758 fffff800`02ad33b3 : 00000000`0000001a 00000000`00041284 fffff900`c73d8001 00000000`00005a5c : nt!KeBugCheckEx
fffff880`047fa760 fffff800`02a23fbe : 00000000`00005a5c fffffa80`010a6100 00000000`00000000 fffffa80`0653c060 : nt! ?? ::FNODOBFM::`string'+0x4a83
fffff880`047fa7a0 fffff800`02e2e260 : fffff900`c73d8000 fffff880`00000618 fffffa80`03a65b90 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2df20
fffff880`047fa8f0 fffff800`02e2e333 : fffff900`c00c0020 00000000`00000002 00000000`00000006 00000000`00000002 : nt!MiRemoveFromSystemSpace+0x1d0
fffff880`047fa950 fffff960`0076264f : 00000000`00000001 00000000`00000000 00000000`64646344 00000000`64646344 : nt!MmUnmapViewInSystemSpace+0x73
fffff880`047fa980 fffff960`00765e31 : ffffffff`00000004 ffffffff`fffd744f 00000000`00000002 00000000`00000006 : cdd!CddFreeShadowSysMem+0x6b
fffff880`047fa9b0 fffff800`02d22c06 : 00000000`0f8a30bc fffffa80`0653c060 00000000`00000080 fffffa80`06509060 : cdd!PresentWorkerThread+0xac5
fffff880`047fad40 fffff800`02a5cc26 : fffff800`02bf8e80 fffffa80`0653c060 fffff800`02c06c40 fffff880`01235a90 : nt!PspSystemThreadStartup+0x5a
fffff880`047fad80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
cdd!CddFreeShadowSysMem+6b
fffff960`0076264f 4883a36807000000 and qword ptr [rbx+768h],0
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: cdd!CddFreeShadowSysMem+6b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cdd
IMAGE_NAME: cdd.dll
DEBUG_FLR_IMAGE_TIMESTAMP: 4bf4408a
FAILURE_BUCKET_ID: X64_0x1a_41284_cdd!CddFreeShadowSysMem+6b
BUCKET_ID: X64_0x1a_41284_cdd!CddFreeShadowSysMem+6b
Followup: MachineOwner
----------------------------------------------------------------------------------------------------------------------------------------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff683ff7e95e8
Arg3: bfe00000c3f15025
Arg4: fffffa8006b19780
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41201
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002aedb3e to fffff80002a8f740
STACK_TEXT:
fffff880`099e89b8 fffff800`02aedb3e : 00000000`0000001a 00000000`00041201 fffff683`ff7e95e8 bfe00000`c3f15025 : nt!KeBugCheckEx
fffff880`099e89c0 fffff800`02a5db5e : 00000000`00000000 fffffa80`0750ab60 00000000`00000000 bfe00000`c3f15025 : nt! ?? ::FNODOBFM::`string'+0x13bb2
fffff880`099e8a00 fffff800`02a5d7fa : fffffa80`06b19780 fffffa80`0674a730 fffffa80`0674a730 000007fe`fd2bd000 : nt!MiQueryAddressState+0x2ae
fffff880`099e8a50 fffff800`02d74928 : fffff880`00000002 000007fe`fd2be000 fffffa80`06b19780 00000000`00000000 : nt!MiQueryAddressSpan+0xaa
fffff880`099e8ac0 fffff800`02a8e993 : 00000000`0000017c fffffa80`0750ab60 fffff880`099e8bc8 00000000`001cac08 : nt!NtQueryVirtualMemory+0x386
fffff880`099e8bb0 00000000`778df8ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`001cabe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x778df8ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+13bb2
fffff800`02aedb3e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+13bb2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
Followup: MachineOwner