1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Frequent BSODs and hang-ups.

Discussion in 'Windows XP' started by MacCybex, 2007/08/15.

  1. 2007/08/15
    MacCybex

    MacCybex Inactive Thread Starter

    Joined:
    2007/08/12
    Messages:
    6
    Likes Received:
    0
    Hi!
    I receive non-constant BSODs and hang-ups on my computer. Mostly when I play Counter Strike Source or when I play HD
    video. Sometimes when just play video or audio (non-HD) or copy files.
    Here is the information about my system (tell if you need more).
    I have tested RAM with Memtest86+ and Memory diagnostic from Microsoft and none have showed anything. I am pretty
    much sure it is software problem just can't find which one. Also I had a similar thing started some time ago on my
    second PC, but it wasn't modified physically at all. Maybe it is DirectX 9.0c or ForceWare, but I have tried many
    ForceWare versions and also have tried another Windows XP SP2 (integrated) and the result was same.

    I haven't overclocked any of these PCs and I don't have any firewalls or antivirus software installed (only Windows XP SP2 built-in firewall).
    I have tried to replace memory sticks positions and tried to work with single stick, but no success. Voltages for memory and CPU are correct.

    Systems specifications:
    AMD Athlon 4400+
    Abit KN9 Ultra (Latest BIOS)
    2 x 1GB RAM DDR2-800MHz Apacer AM1
    MSI GeForce 7600GT (heatpipes+ 8 cm cooler) (Latest BIOS)
    Seagate Barracuda 7200.10, 400GB, 16MB, SATAII
    Fortron Blue Storm II 500W, 24pin, 12cm FAN
    Nec 2500A IDE DVD-RW
    Logitech 3200 combo (mouse + keyboard)
    Temperatures (min-max):
    System: 30-32 C
    CPU: 35-45 C
    Video: 48-65 C
    HDD: 32-34 C
    Installed software:
    Windows XP ServicePack2 (separately installed)(build 2600)
    For MB
    Ethernet Driver MCP55 (v55.21) "WHQL "
    Network Management Tools MCP55 (v55.23)
    SMBus Driver (v4.52) "WHQL "
    Installer (v5.05)
    WinXP IDE SataRAID Driver (v6.54) "WHQL "
    WinXP IDE SataIDE Driver (v6.54) "WHQL "
    WinXP RAIDTOOL Application (v6.54)
    For videocard:
    ForceWare 91.47
    Auido:
    Realtek High Definition Audio System Software Ver:R1.72
    Mouse and Keyboard
    Logitech SetPoint 4.00.121
    DirectX 9.0c (was with Nero 7)

    I have posted the dump files below.
     
    Last edited: 2007/08/15
  2. 2007/08/15
    MacCybex

    MacCybex Inactive Thread Starter

    Joined:
    2007/08/12
    Messages:
    6
    Likes Received:
    0
    Microsoft (R) Windows Debugger Version 6.6.0007.5
    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\WINDOWS\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available
    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is: C:\WINDOWS
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Fri Aug 10 23:47:56.468 2007 (GMT+3)
    System Uptime: 0 days 0:07:35.171
    WARNING: Process directory table base 0A4B8020 doesn't match CR3 00732000
    WARNING: Process directory table base 0A4B8020 doesn't match CR3 00732000
    Loading Kernel Symbols
    .................................................. .................................................. ......................
    Loading User Symbols
    Loading unloaded module list
    ................
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    Use !analyze -v to get detailed debugging information.
    BugCheck 7F, {8, bab38d70, 0, 0}
    Probably caused by : ntkrpamp.exe ( nt!KiTrap0E+d0 )
    Followup: MachineOwner
    ---------
    1: kd> !analyze -v
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: bab38d70
    Arg3: 00000000
    Arg4: 00000000
    Debugging Details:
    ------------------

    BUGCHECK_STR: 0x7f_8
    TSS: 00000028 -- (.tss 28)
    eax=00000000 ebx=bacdd0d4 ecx=ba52b3ac edx=89845008 esi=bacdf950 edi=89e3fcdc
    eip=8051ead2 esp=bacdd000 ebp=bacdd014 iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    nt!MmAccessFault+0x2:
    8051ead2 55 push ebp
    Resetting default scope
    DEFAULT_BUCKET_ID: DRIVER_FAULT
    PROCESS_NAME: System
    TRAP_FRAME: bacdd29c -- (.trap ffffffffbacdd29c)
    ErrCode = 00000009
    eax=89e3fc98 ebx=bacdd434 ecx=ba52b3ac edx=89845008 esi=bacdf950 edi=89e3fcdc
    eip=8051eae5 esp=bacdd310 ebp=bacdd35c iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    nt!MmAccessFault+0x15:
    8051eae5 8b4044 mov eax,dword ptr [eax+44h] ds:0023:89e3fcdc=89e40830
    Resetting default scope
    LAST_CONTROL_TRANSFER: from 80543568 to 8051ead2
    STACK_TEXT:
    bacdcffc 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x2
    bacdcffc 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd0d4 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd0d4 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd1ac 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd1ac 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd284 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd284 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd35c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd35c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd434 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd434 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd50c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd50c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd5e4 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd5e4 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd6bc 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd6bc 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd794 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd794 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd86c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd86c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdd944 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdd944 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdda1c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdda1c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacddaf4 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacddaf4 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacddbcc 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacddbcc 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacddca4 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacddca4 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacddd7c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacddd7c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdde54 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdde54 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacddf2c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacddf2c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde004 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde004 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde0dc 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde0dc 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde1b4 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde1b4 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde28c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde28c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde364 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde364 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde43c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde43c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde514 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde514 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde5ec 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde5ec 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde6c4 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde6c4 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde79c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde79c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde874 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde874 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacde94c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacde94c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdea24 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdea24 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdeafc 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdeafc 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdebd4 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdebd4 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdecac 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdecac 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacded84 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacded84 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdee5c 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15
    bacdee5c 8051eae5 00000000 89e3fcdc 00000000 nt!KiTrap0E+0xd0
    bacdef34 80543568 00000000 89e3fcdc 00000000 nt!MmAccessFault+0x15

    STACK_COMMAND: .tss 0x28 ; kb
    MODULE_NAME: nt
    IMAGE_NAME: ntkrpamp.exe
    FOLLOWUP_NAME: MachineOwner
    DEBUG_FLR_IMAGE_TIMESTAMP: 41107b0d
    FOLLOWUP_IP:
    nt!KiTrap0E+d0
    80543568 85c0 test eax,eax
    SYMBOL_STACK_INDEX: 1
    SYMBOL_NAME: nt!KiTrap0E+d0
    FAILURE_BUCKET_ID: TRAP_FRAME_RECURSION
    BUCKET_ID: TRAP_FRAME_RECURSION
    Followup: MachineOwner
    ---------
    1: kd> lmvm nt
    start end module name
    804d7000 806e2000 nt (pdb symbols) C:\WINDOWS\Symbols\exe\ntkrpamp.pdb
    Loaded symbol image file: ntkrpamp.exe
    Image path: ntkrpamp.exe
    Image name: ntkrpamp.exe
    Timestamp: Wed Aug 04 08:58:37 2004 (41107B0D)
    CheckSum: 001F22D9
    ImageSize: 0020B000
    File version: 5.1.2600.2180
    Product version: 5.1.2600.2180
    File flags: 0 (Mask 3F)
    File OS: 40004 NT Win32
    File type: 1.0 App
    File date: 00000000.00000000
    Translations: 0409.04b0
    CompanyName: Microsoft Corporation
    ProductName: Microsoft® Windows® Operating System
    InternalName: ntkrpamp.exe
    OriginalFilename: ntkrpamp.exe
    ProductVersion: 5.1.2600.2180
    FileVersion: 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
    FileDescription: NT Kernel & System
    LegalCopyright: © Microsoft Corporation. All rights reserved.
     

  3. to hide this advert.

  4. 2007/08/15
    MacCybex

    MacCybex Inactive Thread Starter

    Joined:
    2007/08/12
    Messages:
    6
    Likes Received:
    0
    Microsoft (R) Windows Debugger Version 6.6.0007.5
    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\WINDOWS\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available
    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is: C:\WINDOWS
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Sat Aug 11 10:33:03.015 2007 (GMT+3)
    System Uptime: 0 days 0:08:02.581
    WARNING: Process directory table base 0A4B83C0 doesn't match CR3 00732000
    WARNING: Process directory table base 0A4B83C0 doesn't match CR3 00732000
    Loading Kernel Symbols
    .................................................. .................................................. ........................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 7ffd800c). Type ".hh dbgerr001" for details
    Loading unloaded module list
    ..............
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    Use !analyze -v to get detailed debugging information.
    BugCheck 7F, {8, bab38d70, 0, 0}
    Probably caused by : ntkrpamp.exe ( nt!KiTrap08+48 )
    Followup: MachineOwner
    ---------
    1: kd> !analyze -v
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
    Arg2: bab38d70
    Arg3: 00000000
    Arg4: 00000000
    Debugging Details:
    ------------------

    BUGCHECK_STR: 0x7f_8
    TSS: 00000028 -- (.tss 28)
    eax=0cdc0010 ebx=00000020 ecx=24462954 edx=0cdbd000 esi=24462954 edi=00000020
    eip=25095a30 esp=0012df20 ebp=00000020 iopl=0 nv up ei pl nz ac pe cy
    cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210217
    001b:25095a30 ?? ???
    Resetting default scope
    DEFAULT_BUCKET_ID: DRIVER_FAULT
    PROCESS_NAME: hl2.exe
    LAST_CONTROL_TRANSFER: from 25095a30 to 80542541
    STACK_TEXT:
    00000000 25095a30 00000000 00000000 00000000 nt!KiTrap08+0x48
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    00000020 00000000 00000000 00000000 00000000 0x25095a30

    STACK_COMMAND: kb
    FOLLOWUP_IP:
    nt!KiTrap08+48
    80542541 ebee jmp nt!KiTrap08+0x38 (80542531)
    SYMBOL_STACK_INDEX: 0
    SYMBOL_NAME: nt!KiTrap08+48
    FOLLOWUP_NAME: MachineOwner
    MODULE_NAME: nt
    IMAGE_NAME: ntkrpamp.exe
    DEBUG_FLR_IMAGE_TIMESTAMP: 41107b0d
    FAILURE_BUCKET_ID: 0x7f_8_nt!KiTrap08+48
    BUCKET_ID: 0x7f_8_nt!KiTrap08+48
    Followup: MachineOwner
    ---------
    1: kd> lmvm nt
    start end module name
    804d7000 806e2000 nt (pdb symbols) C:\WINDOWS\Symbols\exe\ntkrpamp.pdb
    Loaded symbol image file: ntkrpamp.exe
    Image path: ntkrpamp.exe
    Image name: ntkrpamp.exe
    Timestamp: Wed Aug 04 08:58:37 2004 (41107B0D)
    CheckSum: 001F22D9
    ImageSize: 0020B000
    File version: 5.1.2600.2180
    Product version: 5.1.2600.2180
    File flags: 0 (Mask 3F)
    File OS: 40004 NT Win32
    File type: 1.0 App
    File date: 00000000.00000000
    Translations: 0409.04b0
    CompanyName: Microsoft Corporation
    ProductName: Microsoft® Windows® Operating System
    InternalName: ntkrpamp.exe
    OriginalFilename: ntkrpamp.exe
    ProductVersion: 5.1.2600.2180
    FileVersion: 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
    FileDescription: NT Kernel & System
    LegalCopyright: © Microsoft Corporation. All rights reserved.
     
  5. 2007/08/15
    MacCybex

    MacCybex Inactive Thread Starter

    Joined:
    2007/08/12
    Messages:
    6
    Likes Received:
    0
    Here is one more.
    /////////////////////////////////////////////////////////////////////////////////////

    Microsoft (R) Windows Debugger Version 6.6.0007.5
    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\WINDOWS\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available
    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is: C:\WINDOWS
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Tue Aug 14 19:49:32.359 2007 (GMT+3)
    System Uptime: 0 days 2:41:12.935
    Loading Kernel Symbols
    .................................................. .................................................. ......................
    Loading User Symbols
    Loading unloaded module list
    .....................
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    Use !analyze -v to get detailed debugging information.
    BugCheck D1, {0, 2, 8, 0}
    *** ERROR: Symbol file could not be found. Defaulted to export symbols for NVNRM.SYS -
    Probably caused by : NVNRM.SYS ( NVNRM!DllInitialize+49bf )
    Followup: MachineOwner
    ---------
    1: kd> !analyze -v
    ************************************************** *****************************
    * *
    * Bugcheck Analysis *
    * *
    ************************************************** *****************************
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000000, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000008, value 0 = read operation, 1 = write operation
    Arg4: 00000000, address which referenced memory
    Debugging Details:
    ------------------

    WRITE_ADDRESS: 00000000
    CURRENT_IRQL: 2
    FAULTING_IP:
    +0
    00000000 ?? ???
    PROCESS_NAME: Idle
    DEFAULT_BUCKET_ID: DRIVER_FAULT
    BUGCHECK_STR: 0xD1
    TRAP_FRAME: bacd3c44 -- (.trap ffffffffbacd3c44)
    ErrCode = 00000010
    eax=8885a768 ebx=00000000 ecx=b9a1a7a0 edx=bb1ebc49 esi=b9a19ea0 edi=88c53964
    eip=00000000 esp=bacd3cb8 ebp=bacd3cd4 iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    00000000 ?? ???
    Resetting default scope
    LAST_CONTROL_TRANSFER: from 00000000 to 805436d0
    STACK_TEXT:
    bacd3c44 00000000 badb0d00 bb1ebc49 804fb5d3 nt!KiTrap0E+0x238
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    bacd3cb4 b99a4125 00000000 8885a768 00000001 0x0
    bacd3cd4 b99a4b2c 00000001 88c55d14 00000000 NVNRM!DllInitialize+0x49bf
    bacd3d10 b99a73c0 b9a19ea0 bab38000 8055b0a0 NVNRM!DllInitialize+0x53c6
    bacd3d28 80544e5f 88c55cc4 00000000 00000000 NVNRM!DllInitialize+0x7c5a
    bacd3d50 80544d44 00000000 0000000e 00000000 nt!KiRetireDpcList+0x61
    bacd3d54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28

    STACK_COMMAND: kb
    FOLLOWUP_IP:
    NVNRM!DllInitialize+49bf
    b99a4125 8b8660060000 mov eax,dword ptr [esi+660h]
    SYMBOL_STACK_INDEX: 2
    FOLLOWUP_NAME: MachineOwner
    MODULE_NAME: NVNRM
    IMAGE_NAME: NVNRM.SYS
    DEBUG_FLR_IMAGE_TIMESTAMP: 4421c05b
    SYMBOL_NAME: NVNRM!DllInitialize+49bf
    FAILURE_BUCKET_ID: 0xD1_W_NVNRM!DllInitialize+49bf
    BUCKET_ID: 0xD1_W_NVNRM!DllInitialize+49bf
    Followup: MachineOwner
    ---------
    1: kd> lmvm NVNRM
    start end module name
    b9997000 b9a9bf00 NVNRM (export symbols) NVNRM.SYS
    Loaded symbol image file: NVNRM.SYS
    Image path: \SystemRoot\system32\DRIVERS\NVNRM.SYS
    Image name: NVNRM.SYS
    Timestamp: Wed Mar 22 23:23:39 2006 (4421C05B)
    CheckSum: 00110B22
    ImageSize: 00104F00
    File version: 5.0.5.5521
    Product version: 5.0.5.5521
    File flags: 0 (Mask 3F)
    File OS: 4 Unknown Win32
    File type: 2.0 Dll
    File date: 00000000.00000000
    Translations: 0409.04e2
    CompanyName: NVIDIA Corporation
    ProductName: NVNRM
    InternalName: NVNRM
    OriginalFilename: NVNRM.SYS
    ProductVersion: 5.00.05.05521
    FileVersion: 5.00.05.05521
    FileDescription: NVIDIA Network Resource Manager.
    LegalCopyright: Copyright © 2001-2007 NVIDIA Corporation
     
  6. 2007/08/15
    MacCybex

    MacCybex Inactive Thread Starter

    Joined:
    2007/08/12
    Messages:
    6
    Likes Received:
    0
    My very last dump file.
    ///////////////////////////////////////////////////////////////////////////
    Microsoft (R) Windows Debugger Version 6.6.0007.5
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\MEMORY.DMP]
    Kernel Summary Dump File: Only kernel address space is available

    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is: C:\WINDOWS
    Windows XP Kernel Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_rtm.040803-2158
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
    Debug session time: Tue Aug 14 19:49:32.359 2007 (GMT+3)
    System Uptime: 0 days 2:41:12.935
    Loading Kernel Symbols
    ..........................................................................................................................
    Loading User Symbols

    Loading unloaded module list
    .....................
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {0, 2, 8, 0}

    *** ERROR: Symbol file could not be found. Defaulted to export symbols for NVNRM.SYS -
    Probably caused by : NVNRM.SYS ( NVNRM!DllInitialize+49bf )

    Followup: MachineOwner
    ---------

    1: kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000000, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000008, value 0 = read operation, 1 = write operation
    Arg4: 00000000, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: 00000000

    CURRENT_IRQL: 2

    FAULTING_IP:
    +0
    00000000 ?? ???

    PROCESS_NAME: Idle

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xD1

    TRAP_FRAME: bacd3c44 -- (.trap ffffffffbacd3c44)
    ErrCode = 00000010
    eax=8885a768 ebx=00000000 ecx=b9a1a7a0 edx=bb1ebc49 esi=b9a19ea0 edi=88c53964
    eip=00000000 esp=bacd3cb8 ebp=bacd3cd4 iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    00000000 ?? ???
    Resetting default scope

    LAST_CONTROL_TRANSFER: from 00000000 to 805436d0

    STACK_TEXT:
    bacd3c44 00000000 badb0d00 bb1ebc49 804fb5d3 nt!KiTrap0E+0x238
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    bacd3cb4 b99a4125 00000000 8885a768 00000001 0x0
    bacd3cd4 b99a4b2c 00000001 88c55d14 00000000 NVNRM!DllInitialize+0x49bf
    bacd3d10 b99a73c0 b9a19ea0 bab38000 8055b0a0 NVNRM!DllInitialize+0x53c6
    bacd3d28 80544e5f 88c55cc4 00000000 00000000 NVNRM!DllInitialize+0x7c5a
    bacd3d50 80544d44 00000000 0000000e 00000000 nt!KiRetireDpcList+0x61
    bacd3d54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    NVNRM!DllInitialize+49bf
    b99a4125 8b8660060000 mov eax,dword ptr [esi+660h]

    SYMBOL_STACK_INDEX: 2

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: NVNRM

    IMAGE_NAME: NVNRM.SYS

    DEBUG_FLR_IMAGE_TIMESTAMP: 4421c05b

    SYMBOL_NAME: NVNRM!DllInitialize+49bf

    FAILURE_BUCKET_ID: 0xD1_W_NVNRM!DllInitialize+49bf

    BUCKET_ID: 0xD1_W_NVNRM!DllInitialize+49bf

    Followup: MachineOwner
    ---------

    1: kd> lmvm NVNRM
    start end module name
    b9997000 b9a9bf00 NVNRM (export symbols) NVNRM.SYS
    Loaded symbol image file: NVNRM.SYS
    Image path: \SystemRoot\system32\DRIVERS\NVNRM.SYS
    Image name: NVNRM.SYS
    Timestamp: Wed Mar 22 23:23:39 2006 (4421C05B)
    CheckSum: 00110B22
    ImageSize: 00104F00
    File version: 5.0.5.5521
    Product version: 5.0.5.5521
    File flags: 0 (Mask 3F)
    File OS: 4 Unknown Win32
    File type: 2.0 Dll
    File date: 00000000.00000000
    Translations: 0409.04e2
    CompanyName: NVIDIA Corporation
    ProductName: NVNRM
    InternalName: NVNRM
    OriginalFilename: NVNRM.SYS
    ProductVersion: 5.00.05.05521
    FileVersion: 5.00.05.05521
    FileDescription: NVIDIA Network Resource Manager.
    LegalCopyright: Copyright © 2001-2007 NVIDIA Corporation
     
  7. 2007/08/15
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Update your video driver. I see several references to NVIDIA in your dumps.
     
    Arie,
    #6
  8. 2007/08/15
    MacCybex

    MacCybex Inactive Thread Starter

    Joined:
    2007/08/12
    Messages:
    6
    Likes Received:
    0
    I have tried many variations of the ForceWare (including 7x.xx, 9x.xx, 11x.xx), but it hasn'y changed situation much. I am thinking abut DirectX 9.0C, as it frequently happens when video is being played (or audio).
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.