Go Back   Steam Users' Forums > Steam Discussions > Hardware and Operating Systems

Reply
 
Thread Tools Display Modes
Old 01-19-2010, 05:22 AM   #1
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
BSOD problem.

Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Ginge\Documents\New folder\011610-24351-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02817000 PsLoadedModuleList = 0xfffff800`02a54e50
Debug session time: Sat Jan 16 16:18:57.593 2010 (GMT+0)
System Uptime: 0 days 2:05:25.091
Loading Kernel Symbols
.................................................. .............
.................................................. ..............
....................
Loading User Symbols
Loading unloaded module list
......
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {dd2c, 2, 0, fffff88000fd0977}

Probably caused by : ataport.SYS ( ataport!GenPnpRefPdoExtensionWithTag+4f )

Followup: MachineOwner
---------

I got this by opening the most recent minidump file, not sure if it's any use.


http://www.ebuyer.com/product/169532 - Asus M4A785TD-V EVO 785G Socket AM3 onboard DVI VGA HDMI 8 channel audio ATX Motherboard

http://www.ebuyer.com/product/173804 - Samsung HD103SJ Spinpoint F3 1TB Hard Drive SATAII 7200rpm 32MB Cache - OEM

http://www.ebuyer.com/product/143854 - Antec 300

http://www.ebuyer.com/product/135514 - Corsair 650W TX Series PSU - 120mm Fan, 80+% Efficiency, Single +12V Rail

http://www.ebuyer.com/product/164047 - AMD Phenom II X4 955 Black Edition 3.2 GHz Socket AM3 8MB Cache Retail Boxed Processor

http://www.ebuyer.com/product/177345 - Corsair 4GB (2x2GB) DDR3 1600MHz/PC3-12800 XMS3 Dominator Memory CL9 (9-9-9-24) (doesn't run full speed as the mobo only can run it at 1033mhz, but can OC to proper speeds, not sure if that's an issue)

8800GTS Alpha Dog edition OC (OC seems to have disapeared, I think due to the latest Nvidia drivers)

Windows 7 Ultimate 64 bit



It was BSODING more with the 19X.XX Nvidia drivers, now on 186.18 and they feel a little more stable in game, although I've had my first BSOD while idling with them installed, not sure if related.

Last edited by IGingerMadManI: 02-16-2010 at 02:03 AM.
IGingerMadManI is offline  
Reply With Quote
Old 01-19-2010, 09:50 AM   #2
richard.eid
 
 
 
Join Date: Jul 2006
Reputation: 2169
Posts: 5,137
Run the debugger again, but this time, either click on the link for !analyze -v or type it into the command line there. You should get a more detailed output. Post that here.
richard.eid is offline   Reply With Quote
Old 01-19-2010, 10:51 AM   #3
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000dd2c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88000fd0977, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abf0e0
000000000000dd2c

CURRENT_IRQL: 2

FAULTING_IP:
ataport!GenPnpRefPdoExtensionWithTag+4f
fffff880`00fd0977 397b54 cmp dword ptr [rbx+54h],edi

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xD1

PROCESS_NAME: firefox.exe

TRAP_FRAME: fffff80000ba2500 -- (.trap 0xfffff80000ba2500)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffffa80043ff238
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88000fd0977 rsp=fffff80000ba2690 rbp=0000000000000002
r8=fffff88000fd7818 r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
ataport!GenPnpRefPdoExtensionWithTag+0x4f:
fffff880`00fd0977 397b54 cmp dword ptr [rbx+54h],edi ds:ee10:00000000`00000054=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002888469 to fffff80002888f00

STACK_TEXT:
fffff800`00ba23b8 fffff800`02888469 : 00000000`0000000a 00000000`0000dd2c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba23c0 fffff800`028870e0 : 00000000`01ca96c7 00000000`0000dcd8 00000001`00ba2700 00000000`00000002 : nt!KiBugCheckDispatch+0x69
fffff800`00ba2500 fffff880`00fd0977 : fffffa80`043ff238 fffffa80`056226e0 00000000`00000000 fffffa80`043ff1a0 : nt!KiPageFault+0x260
fffff800`00ba2690 fffff880`00fdb51d : fffff880`00fd7818 00000000`00000003 fffff880`00fd7818 00000000`00000004 : ataport!GenPnpRefPdoExtensionWithTag+0x4f
fffff800`00ba26e0 fffff880`00fdb868 : 00000000`00000000 fffffa80`04408150 00000000`00000002 fffffa80`04e1df02 : ataport!RefPdoExtensionWithTag+0x1d
fffff800`00ba2710 fffff880`00fd7932 : fffff800`00ba2860 fffffa80`043ff1a0 fffff800`02a01e80 fffff800`02a01e80 : ataport!RefNextPdoExtensionWithTag+0x30
fffff800`00ba2740 fffff800`02894fa6 : fffff800`00ba2860 00000000`00000000 00000000`00000000 00000000`00000000 : ataport!IdePortTickHandler+0x11a
fffff800`00ba27a0 fffff800`02894326 : fffffa80`043f7460 00000000`00075c46 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`00ba2810 fffff800`02894e7e : 00000011`854ddefe fffff800`00ba2e88 00000000`00075c46 fffff800`02a04b48 : nt!KiProcessExpiredTimerList+0xc6
fffff800`00ba2e60 fffff800`02894697 : fffff800`02a01ec5 fffff800`00075c46 00000000`00000000 00000000`00000046 : nt!KiTimerExpiration+0x1be
fffff800`00ba2f00 fffff800`0288f065 : 00000000`00000000 fffffa80`04ef4760 00000000`00000000 fffff800`029a7c80 : nt!KiRetireDpcList+0x277
fffff800`00ba2fb0 fffff800`0288ee7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`0565ab30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND: kb

FOLLOWUP_IP:
ataport!GenPnpRefPdoExtensionWithTag+4f
fffff880`00fd0977 397b54 cmp dword ptr [rbx+54h],edi

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: ataport!GenPnpRefPdoExtensionWithTag+4f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: ataport

IMAGE_NAME: ataport.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc118

FAILURE_BUCKET_ID: X64_0xD1_ataport!GenPnpRefPdoExtensionWithTag+4f

BUCKET_ID: X64_0xD1_ataport!GenPnpRefPdoExtensionWithTag+4f

Followup: MachineOwner
---------
IGingerMadManI is offline   Reply With Quote
Old 01-19-2010, 01:27 PM   #4
IceDragon
 
 
 
Join Date: Oct 2009
Reputation: 370
Posts: 397
When does the BSOD occur, when you do something specifically or randomly? If specifically, what can you do that causes the BSOD?
Try going to an elevated command prompt and typing:
Code:
chkdsk /r
Post back with what the output of the operation is.

Last edited by IceDragon: 01-19-2010 at 01:45 PM.
IceDragon is offline   Reply With Quote
Old 01-19-2010, 01:36 PM   #5
Suomis
 
 
 
Join Date: Oct 2007
Reputation: 6962
Posts: 7,513
Well I was getring bsods lately and thankfully the people here on the forums helped me out

so Im gonna suggest the same thing uR suggested to me that helped. I definetley dont know how to read your errormessages but I had this problem: One of my Ram s was placed wrong. It was in the wrong slot.
Suomis is offline   Reply With Quote
Old 01-19-2010, 01:44 PM   #6
IceDragon
 
 
 
Join Date: Oct 2009
Reputation: 370
Posts: 397
Quote:
Originally Posted by Suomis View Post
Well I was getring bsods lately and thankfully the people here on the forums helped me out

so Im gonna suggest the same thing uR suggested to me that helped. I definetley dont know how to read your errormessages but I had this problem: One of my Ram s was placed wrong. It was in the wrong slot.
Your BSOD was different than his. His doesn't point to his RAM at all.
IceDragon is offline   Reply With Quote
Old 01-20-2010, 11:03 AM   #7
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
First one was doing nothing in fact, I was just simply checking out some windows 7 features, clicked on the desktop and BSOD.

The other two have been during games. (Killing Floor and Team fortress)

Awaiting the fourth
IGingerMadManI is offline   Reply With Quote
Old 01-21-2010, 05:30 AM   #8
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
Fourth yin. During TF2.



Page_fault_in_nonpaged_Area

0x00000050
(0xfffff96000d4345b ,
0x0000000000000008
0xfffff960004345b
0x0000000000000002


Anyone got any ideas?

I tried doing that chkdisk thing, says I don't have permission to elevate it.
IGingerMadManI is offline   Reply With Quote
Old 01-25-2010, 04:54 AM   #9
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
bump

10bumps
IGingerMadManI is offline   Reply With Quote
Old 01-25-2010, 09:15 AM   #10
DarkWasp
 
Join Date: Jul 2004
Reputation: 105
Posts: 3,603
When starting Command Prompt, right click it and choose to run as administrator. That should give you permission.
DarkWasp is offline   Reply With Quote
Old 02-06-2010, 10:16 AM   #11
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
Got my PSU repaired, surprisingly still bsoding

Once with this code


BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000005d55760, Memory contents of the pool block
Arg4: fffffa8006b000b0, Address of the block of pool being deallocated

Debugging Details:
------------------

GetUlongFromAddress: unable to read from fffff80002c2d1b0

POOL_ADDRESS: fffffa8006b000b0

BUGCHECK_STR: 0xc2_7

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff80002bba60e to fffff80002a88f00

STACK_TEXT:
fffff880`031a8a68 fffff800`02bba60e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`05d55760 : nt!KeBugCheckEx
fffff880`031a8a70 fffff880`0163d3c4 : fffffa80`04833100 00000000`00194e01 fffffa80`34616c41 fffff880`00000278 : nt!ExFreePool+0xccb
fffff880`031a8b20 fffff880`0163d6e8 : fffffa80`0803a2f8 00000000`00194e01 00000000`00000000 fffff880`0177d188 : tcpip!WfpAleFreeRemoteEndpoint+0x224
fffff880`031a8b90 fffff880`0163d4c5 : fffffa80`030000ff 00000000`00000006 fffff800`02c2c5f8 00000000`00000000 : tcpip!WfpAlepDeleteDeferredEntries+0x18c
fffff880`031a8c00 fffff880`0158299b : fffffa80`039eab60 fffff800`02c2c5f8 fffff880`0177d1a0 00000000`00000000 : tcpip!WfpAlepDeferredCleanupWorkQueueRoutine+0x15
fffff880`031a8c30 fffff800`02d82541 : fffffa80`04828d00 fffffa80`039eab60 fffffa80`08392fc0 fffffa80`039eab60 : NETIO!NetiopIoWorkItemRoutine+0x3b
fffff880`031a8c80 fffff800`02a96161 : fffff800`02c2c500 fffff800`02d82504 fffffa80`039eab60 00000000`00000000 : nt!IopProcessWorkItem+0x3d
fffff880`031a8cb0 fffff800`02d2c166 : 00000538`00000000 fffffa80`039eab60 00000000`00000080 fffffa80`03973890 : nt!ExpWorkerThread+0x111
fffff880`031a8d40 fffff800`02a67486 : fffff880`02f63180 fffffa80`039eab60 fffff880`02f6dfc0 00000538`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`031a8d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND: kb

FOLLOWUP_IP:
NETIO!NetiopIoWorkItemRoutine+3b
fffff880`0158299b 488d542420 lea rdx,[rsp+20h]

SYMBOL_STACK_INDEX: 5

SYMBOL_NAME: NETIO!NetiopIoWorkItemRoutine+3b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME: NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc18a

FAILURE_BUCKET_ID: X64_0xc2_7_NETIO!NetiopIoWorkItemRoutine+3b

BUCKET_ID: X64_0xc2_7_NETIO!NetiopIoWorkItemRoutine+3b

Followup: MachineOwner
---------




second one
----------------------------------------------------------------------------------









SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002a84fb1, Address of the exception record for the exception that caused the bugcheck
Arg3: fffff8800478b020, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:
nt!KeSetEvent+121
fffff800`02a84fb1 488908 mov qword ptr [rax],rcx

CONTEXT: fffff8800478b020 -- (.cxr 0xfffff8800478b020)
rax=2f004d004d004d00 rbx=fffffa80070589e0 rcx=2f00640064000b00
rdx=0000000000125c35 rsi=0000000000000000 rdi=fffff88002dd3180
rip=fffff80002a84fb1 rsp=fffff8800478ba00 rbp=0000000000000000
r8=0000000000000000 r9=000000000000000d r10=fffff80002a0f000
r11=fffff8800478b9d0 r12=0000000000000000 r13=fffff960003af2c0
r14=0000000000000002 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010217
nt!KeSetEvent+0x121:
fffff800`02a84fb1 488908 mov qword ptr [rax],rcx ds:002b:2f004d00`4d004d00=????????????????
Resetting default scope

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from fffff9600019b1dc to fffff80002a84fb1

STACK_TEXT:
fffff880`0478ba00 fffff960`0019b1dc : 0000020c`00000000 fffff960`00000002 00000000`00000000 2f006400`64000b00 : nt!KeSetEvent+0x121
fffff880`0478ba70 fffff960`00192bb7 : fffff900`c07e1a60 00000000`00000001 00000000`00000004 fffff800`02a8d04b : win32k!SetWakeBit+0xf8
fffff880`0478baa0 fffff960`001935d4 : 00000000`00000000 fffff960`003afa90 00000000`00000004 00000000`00000001 : win32k!TimersProc+0x157
fffff880`0478baf0 fffff960`00124714 : fffffa80`0000007b 00000000`0000000f fffff880`00000001 ffffffff`800002e4 : win32k!RawInputThread+0x9b4
fffff880`0478bbc0 fffff960`001a3ea6 : fffffa80`00000002 fffff880`03b2bf40 00000000`00000020 00000000`00000000 : win32k!xxxCreateSystemThreads+0x58
fffff880`0478bbf0 fffff800`02a80153 : fffffa80`060751f0 00000000`00000004 000007ff`fffd3000 00000000`00000000 : win32k!NtUserCallNoParam+0x36
fffff880`0478bc20 000007fe`fd053d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`01d7f9a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd053d3a


FOLLOWUP_IP:
win32k!SetWakeBit+f8
fffff960`0019b1dc 488b5c2430 mov rbx,qword ptr [rsp+30h]

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: win32k!SetWakeBit+f8

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: win32k

IMAGE_NAME: win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0

STACK_COMMAND: .cxr 0xfffff8800478b020 ; kb

FAILURE_BUCKET_ID: X64_0x3B_win32k!SetWakeBit+f8

BUCKET_ID: X64_0x3B_win32k!SetWakeBit+f8

Followup: MachineOwner
---------

Last edited by IGingerMadManI: 02-06-2010 at 10:48 AM.
IGingerMadManI is offline   Reply With Quote
Old 02-08-2010, 07:59 AM   #12
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
up this goes yo.
IGingerMadManI is offline   Reply With Quote
Old 02-08-2010, 08:12 AM   #13
666Warlock
 
Join Date: Nov 2009
Reputation: 38
Posts: 437
you would be better off posting on Cybertech forums for this kind of problem.

http://www.cybertechhelp.com/

Good luck
666Warlock is offline   Reply With Quote
Old 02-14-2010, 02:15 PM   #14
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
Nah that forum doesn't have anyone who actually posts, so it's probably as better off here

Been BSODING in Company of heroes after installing latest nvidia drivers now too, with the ending codes in 007E and 001A

so tempted to go back to XP and get problem free gaming, windows 7 is a bit of a joke.

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003f3d57a, The address that the exception occurred at
Arg3: fffff880063ee598, Exception Record Address
Arg4: fffff880063eddf0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:
dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+14e
fffff880`03f3d57a 48398d90000000 cmp qword ptr [rbp+90h],rcx

EXCEPTION_RECORD: fffff880063ee598 -- (.exr 0xfffff880063ee598)
ExceptionAddress: fffff88003f3d57a (dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+0x0000000 00000014e)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000000ae52b
Attempt to read from address 00000000000ae52b

CONTEXT: fffff880063eddf0 -- (.cxr 0xfffff880063eddf0)
rax=fffffa800607e000 rbx=000000000000000c rcx=00000000000b050a
rdx=0000000000000000 rsi=fffffa80053fd280 rdi=fffff8a00c508530
rip=fffff88003f3d57a rsp=fffff880063ee7d0 rbp=00000000000ae49b
r8=fffff880063ee7a8 r9=0000000000000000 r10=fffff8a003a6cb00
r11=fffff88003e35a08 r12=fffffa800603f690 r13=0000000000000000
r14=fffff8a000fa9d80 r15=fffff8a00c508558
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+0x14e:
fffff880`03f3d57a 48398d90000000 cmp qword ptr [rbp+90h],rcx ss:0018:00000000`000ae52b=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 00000000000ae52b

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf20e0
00000000000ae52b

FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+14e
fffff880`03f3d57a 48398d90000000 cmp qword ptr [rbp+90h],rcx

BUGCHECK_STR: 0x7E

LAST_CONTROL_TRANSFER: from fffff88003f2f0a5 to fffff88003f3d57a

STACK_TEXT:
fffff880`063ee7d0 fffff880`03f2f0a5 : fffffa80`0603f690 00000000`0000000c 00000000`00000000 fffff880`13dc9fc0 : dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+0x14e
fffff880`063ee8a0 fffff880`03f2aa8f : fffff8a0`092777f0 fffff8a0`092777f0 fffffa80`0607e000 fffffa80`04264a60 : dxgmms1!VIDMM_GLOBAL::AllocateResourceForPinnedAll ocation+0x55
fffff880`063ee920 fffff880`03f2a38f : fffff880`063eec78 00000000`00000000 fffff880`063eebf0 fffff880`063eec88 : dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x19f
fffff880`063eea40 fffff880`03f44231 : 00000000`00000001 fffff880`03f160d4 fffffa80`060785a0 fffffa80`060785a0 : dxgmms1!VidMmiProcessSystemCommand+0x23
fffff880`063eea70 fffff880`03f433bc : fffff880`063eebd0 00000000`00000000 fffffa80`06044720 00000000`00000001 : dxgmms1!VidSchiSubmitSystemCommand+0x39
fffff880`063eeaa0 fffff880`03f1577a : 00000000`00000000 fffffa80`060785a0 fffffa80`06044720 fffffa80`06044720 : dxgmms1!VidSchiSubmitQueueCommand+0x74
fffff880`063eead0 fffff880`03f45927 : fffffa80`0607d5d0 fffffa80`0608d000 fffffa80`06044720 fffff880`6d4d6956 : dxgmms1!VidSchiSubmitQueueCommandDirect+0x1e6
fffff880`063eeb60 fffff880`03f2a4b9 : fffffa80`00000001 fffffa80`0607b010 fffffa80`0607e000 fffff880`063eec78 : dxgmms1!VidSchiSubmitCommandPacketToQueue+0x15f
fffff880`063eebd0 fffff880`03f2a8dc : fffff880`063eed30 fffff8a0`092777f0 fffff880`063eed30 fffff8a0`092777f0 : dxgmms1!VIDMM_GLOBAL::QueueSystemCommandAndWait+0x f9
fffff880`063eec40 fffff880`03f25faa : 00000000`00000000 00000000`00000000 fffffa80`0607e000 fffff8a0`03cd2f80 : dxgmms1!VIDMM_GLOBAL::QueueDeferredCommandAndWait+ 0x4c
fffff880`063eecb0 fffff880`03f0caa7 : fffff8a0`08b5ad90 fffff8a0`03b6b5b0 fffff880`063eee20 00000000`00000020 : dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+0x2da
fffff880`063eed90 fffff880`03e583a1 : fffff8a0`03b57d00 fffff880`063ef260 00000000`00000000 00000000`00000000 : dxgmms1!VidMmOpenAllocation+0xeb
fffff880`063eede0 fffff8a0`03b57d00 : fffff880`063ef260 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl+0x413a1
fffff880`063eede8 fffff880`063ef260 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff8a0`03b57d00 : 0xfffff8a0`03b57d00
fffff880`063eedf0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff8a0`03b57d00 fffff880`063eee20 : 0xfffff880`063ef260


SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+14e

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME: dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578

STACK_COMMAND: .cxr 0xfffff880063eddf0 ; kb

FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+1 4e

BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_SEGMENT::TrimAllProcesses+1 4e

Followup: MachineOwner
---------

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002d8fcbb, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000038, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:
nt!MmExtendSection+1f
fffff800`02d8fcbb 0fba66380a bt dword ptr [rsi+38h],0Ah

EXCEPTION_PARAMETER1: 0000000000000000

EXCEPTION_PARAMETER2: 0000000000000038

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb10e0
0000000000000038

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x1E

PROCESS_NAME: firefox.exe

CURRENT_IRQL: 0

TRAP_FRAME: fffff88007736fe0 -- (.trap 0xfffff88007736fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a003bde4c0 rbx=0000000000000000 rcx=fffff8a00a71daf0
rdx=fffff88007737350 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d8fcbb rsp=fffff88007737170 rbp=fffff8a003bde4c0
r8=0000000000000000 r9=0000000000000000 r10=fffff88007737400
r11=fffff8a00a71daf0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MmExtendSection+0x1f:
fffff800`02d8fcbb 0fba66380a bt dword ptr [rsi+38h],0Ah ds:00000000`00000038=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002abaa17 to fffff80002a7af00

STACK_TEXT:
fffff880`07736758 fffff800`02abaa17 : 00000000`0000001e ffffffff`c0000005 fffff800`02d8fcbb 00000000`00000000 : nt!KeBugCheckEx
fffff880`07736760 fffff800`02a7a542 : fffff880`07736f38 00000000`0000000c fffff880`07736fe0 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x460da
fffff880`07736e00 fffff800`02a790ba : 00000000`00000000 00000000`0000000c fffffa80`043c0800 fffff800`02d6a601 : nt!KiExceptionDispatch+0xc2
fffff880`07736fe0 fffff800`02d8fcbb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
fffff880`07737170 fffff800`02d7329b : 00000000`0000000c 00000000`0000000c 00000000`00000000 00000000`0000c080 : nt!MmExtendSection+0x1f
fffff880`077372a0 fffff800`02d68893 : fffff880`07737500 00000000`00000000 fffff880`077375a8 fffffa80`063e4f48 : nt!MmCreateSection+0x4ef
fffff880`077374b0 fffff800`02ed6205 : fffff8a0`01be7db8 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x162
fffff880`07737530 fffff800`02ed65b7 : 00000000`00000002 fffff8a0`087590a0 fffff880`077376c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
fffff880`07737620 fffff800`02ed69cd : fffff880`07737740 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
fffff880`07737710 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchScenario+0x16d


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MmExtendSection+1f
fffff800`02d8fcbb 0fba66380a bt dword ptr [rsi+38h],0Ah

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: nt!MmExtendSection+1f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: X64_0x1E_nt!MmExtendSection+1f

BUCKET_ID: X64_0x1E_nt!MmExtendSection+1f

Followup: MachineOwner
---------

Last edited by rotNdude: 02-14-2010 at 03:14 PM.
IGingerMadManI is offline   Reply With Quote
Old 02-15-2010, 02:03 PM   #15
IGingerMadManI
 
Banned
Join Date: Nov 2009
Reputation: 3
Posts: 506
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cad0e0
00000000000003f0

CURRENT_IRQL: 2

FAULTING_IP:
nt!RtlContractHashTable+ec
fffff800`02a7c1fc 483909 cmp qword ptr [rcx],rcx

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

TRAP_FRAME: fffff88002f1b2b0 -- (.trap 0xfffff88002f1b2b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000013 rbx=0000000000000000 rcx=00000000000003f0
rdx=fffffa8003cee800 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a7c1fc rsp=fffff88002f1b440 rbp=0000000000000019
r8=000000000000137f r9=0000000000000000 r10=000000000000003f
r11=fffffa80047d6010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!RtlContractHashTable+0xec:
fffff800`02a7c1fc 483909 cmp qword ptr [rcx],rcx ds:9180:00000000`000003f0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002a76469 to fffff80002a76f00

STACK_TEXT:
fffff880`02f1b168 fffff800`02a76469 : 00000000`0000000a 00000000`000003f0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f1b170 fffff800`02a750e0 : fffffa80`04166030 fffffa80`047e5c70 fffffa80`03d7b7ac 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f1b2b0 fffff800`02a7c1fc : 00000000`00000000 00000000`00000001 00000000`00000004 00000000`00000019 : nt!KiPageFault+0x260
fffff880`02f1b440 fffff880`0167d8a3 : 00000000`0014788b 00000000`000001e0 00000000`00000bb8 00000000`00000000 : nt!RtlContractHashTable+0xec
fffff880`02f1b470 fffff880`0167d7f0 : fffffa80`047efbc8 00000000`00000015 fffffa80`047e3c70 00000000`000001e0 : tcpip!TcpRestructureHashTable+0x53
fffff880`02f1b4a0 fffff880`0167153a : 00000000`00000021 00000000`00147891 00000000`00000000 fffffa80`047efbc8 : tcpip!TcpRestructureHashTablePartitions+0xa0
fffff880`02f1b4f0 fffff800`02a82fa6 : fffff880`02f1b600 fffffa80`000b3d66 00000000`00000001 00000000`00000000 : tcpip!TcpPeriodicTimeoutHandler+0x2db
fffff880`02f1b570 fffff800`02a82326 : fffff880`09506ad0 fffff880`09506ad0 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff880`02f1b5e0 fffff800`02a82e7e : 0000001f`3bf37fe7 fffff880`02f1bc58 00000000`000d1f19 fffff880`009eb8a8 : nt!KiProcessExpiredTimerList+0xc6
fffff880`02f1bc30 fffff800`02a82697 : 00000009`cdf493c4 00000009`000d1f19 00000009`cdf49342 00000000`00000018 : nt!KiTimerExpiration+0x1be
fffff880`02f1bcd0 fffff800`02a7f6fa : fffff880`009e9180 fffff880`009f3fc0 00000000`00000000 fffff800`02b2e1d0 : nt!KiRetireDpcList+0x277
fffff880`02f1bd80 00000000`00000000 : fffff880`02f1c000 fffff880`02f16000 fffff880`02f1bd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND: kb

FOLLOWUP_IP:
tcpip!TcpRestructureHashTable+53
fffff880`0167d8a3 84c0 test al,al

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: tcpip!TcpRestructureHashTable+53

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: tcpip

IMAGE_NAME: tcpip.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc26e

FAILURE_BUCKET_ID: X64_0xA_tcpip!TcpRestructureHashTable+53

BUCKET_ID: X64_0xA_tcpip!TcpRestructureHashTable+53

Followup: MachineOwner
---------
IGingerMadManI is offline   Reply With Quote
Reply

Go Back   Steam Users' Forums > Steam Discussions > Hardware and Operating Systems


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



All times are GMT -7. The time now is 12:58 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site Content Copyright Valve Corporation 1998-2012, All Rights Reserved.