Many Different BSODs


Joined
May 9, 2011
Messages
1
Reaction score
0
Hello, I've never used a support site for bsods before but stick with me here as I am almost ready to smash everything.

A couple of months ago I upgraded my old computer with 5 new parts.

RAM - G.Skill Ripjaws Series 8GB DDR1333
Motherboard - Asus m4a79xtd evo
Video card - Evga GeForce GTS 450 (Fermi) 1GB 128-bit GDDR5
Processor - Amd Phenom II X4 965 Black Edition 3.4GHz
OS - Upgrade from XP to 7

It was great for a while, after that period that I started getting one BSoD every once in a while. I looked up the problem online and found something about updating chipset drivers. So I did. Ok so I am not very good at this, I might have not removed the old drivers before installing new ones(solved with new HD later). So I start getting all kinds of bsods. They would happen upon booting up, doing nothing, playing games. Friend tells me to reformat and I do. Still getting many bsods.

My hard drive was pushing 5.5 years so I get a suggestion from a mate that it might be the problem. Yesterday I got a new HD. Got a bsod upon installing Win7 on it (not sure which, cause it restarted automatically). Success on second try of the os install (and reformat), but I got my old dreaded 1e bsod again. I installed the drivers from hardware cds. Now I'm getting all sorts of bsod when booting up, safe mode, normal mode, windows is loading screen. Sometimes the computer gets stuck on "Loading ASUS Express Gate"(if i remember the text correctly), an on the Motherboard welcome screen.

What I've tried:
Using one stick of RAM at a time to see if it might be bad (still crash with both individually)
Running a fresh install without any drivers (still crash)
Processor stress test (someone else did it for me)
My brother might have done a memtest but im not sure

I've reached the end of my issue solving capabilities. Can anyone help? All my new parts are still under manufacturer warranty, although I'd much rather take them out and break them.

In the last few restarts, my computer sometimes boots completely but still crashes after a few min, but I managed to get the dump files off. My computer is up right now but I bet as soon as I start doing things it will crash. HELP! and thanks in advance!
 

Attachments

Ad

Advertisements

Joined
Sep 22, 2010
Messages
613
Reaction score
102
Your crash dumps point to nvidia and DX drivers with the reference to memory access violation. Reinstalling the nvidia driver most likely will fix nothing.


Update Realtek LAN Driver
Rt64win7.sys Thu Aug 20 12:05:06 2009


Attach:

- cpuz memory and cpu tabs
- Passmark RAMMon html.zip


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-30232-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Sun May  8 13:18:51.829 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:45.546
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff880149b9159, fffff880049f4d08, fffff880049f4560}

Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiInterlockedRemoveEntryList+25 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880149b9159, The address that the exception occurred at
Arg3: fffff880049f4d08, Exception Record Address
Arg4: fffff880049f4560, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgmms1!VidSchiInterlockedRemoveEntryList+25
fffff880`149b9159 4c8918          mov     qword ptr [rax],r11

EXCEPTION_RECORD:  fffff880049f4d08 -- (.exr 0xfffff880049f4d08)
ExceptionAddress: fffff880149b9159 (dxgmms1!VidSchiInterlockedRemoveEntryList+0x0000000000000025)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880049f4560 -- (.cxr 0xfffff880049f4560)
rax=ff00fa80088f1b80 rbx=fffff880049f4fb0 rcx=0000000000000000
rdx=0000000000000000 rsi=fffffa8009809f08 rdi=0000000000000000
rip=fffff880149b9159 rsp=fffff880049f4f40 rbp=0000000000000001
 r8=fffff880049f4f60  r9=0000000000000000 r10=0000000000000001
r11=fffffa80088f1b80 r12=fffff8a000f34e50 r13=0000000000000001
r14=fffff8a000f2f180 r15=0000000000000002
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
dxgmms1!VidSchiInterlockedRemoveEntryList+0x25:
fffff880`149b9159 4c8918          mov     qword ptr [rax],r11 ds:002b:ff00fa80`088f1b80=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
dxgmms1!VidSchiInterlockedRemoveEntryList+25
fffff880`149b9159 4c8918          mov     qword ptr [rax],r11

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff880149cc9a4 to fffff880149b9159

STACK_TEXT:  
fffff880`049f4f40 fffff880`149cc9a4 : 00000000`00000001 00000000`00000001 00000000`00000001 fffff8a0`00f31870 : dxgmms1!VidSchiInterlockedRemoveEntryList+0x25
fffff880`049f4f90 fffff880`149c5677 : fffffa80`098af000 00000000`00000001 fffffa80`09809ef0 fffff8a0`00f42078 : dxgmms1!VIDMM_GLOBAL::xWaitOnDMAReferences+0xc4
fffff880`049f5060 fffff880`149ab260 : fffffa80`098af000 fffff960`000e4300 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::BeginCPUAccess+0x7e3
fffff880`049f5130 fffff880`14914c63 : fffff880`049f52c0 fffffa80`09894000 fffff900`c0681ee0 fffff880`148b707b : dxgmms1!VidMmBeginCPUAccess+0x28
fffff880`049f5180 fffff880`148fa742 : fffff8a0`00dc24e0 fffff8a0`00dc24e0 fffff8a0`00f33000 fffff900`c0681ee0 : dxgkrnl!DXGDEVICE::Lock+0x287
fffff880`049f51e0 fffff960`00644bda : fffff900`c00c0020 00000000`00000000 00ff0000`00000120 fffff900`c2add2a0 : dxgkrnl!DxgkCddLock+0x236
fffff880`049f5270 fffff960`0064606c : ffffffff`fffd74f6 00000000`0104002b 00000000`00000001 00000000`00000000 : cdd!CddPresentBlt+0x262
fffff880`049f59b0 fffff800`02d18166 : 00000000`03fceaab fffffa80`088019f0 00000000`00000080 fffffa80`09794730 : cdd!PresentWorkerThread+0xd00
fffff880`049f5d40 fffff800`02a53486 : fffff880`02dd5180 fffffa80`088019f0 fffff880`02ddffc0 00000000`00000202 : nt!PspSystemThreadStartup+0x5a
fffff880`049f5d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VidSchiInterlockedRemoveEntryList+25

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff880049f4560 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiInterlockedRemoveEntryList+25

BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiInterlockedRemoveEntryList+25

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-30232-01 (2).dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Sun May  8 13:18:51.829 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:45.546
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff880149b9159, fffff880049f4d08, fffff880049f4560}

Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiInterlockedRemoveEntryList+25 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880149b9159, The address that the exception occurred at
Arg3: fffff880049f4d08, Exception Record Address
Arg4: fffff880049f4560, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgmms1!VidSchiInterlockedRemoveEntryList+25
fffff880`149b9159 4c8918          mov     qword ptr [rax],r11

EXCEPTION_RECORD:  fffff880049f4d08 -- (.exr 0xfffff880049f4d08)
ExceptionAddress: fffff880149b9159 (dxgmms1!VidSchiInterlockedRemoveEntryList+0x0000000000000025)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880049f4560 -- (.cxr 0xfffff880049f4560)
rax=ff00fa80088f1b80 rbx=fffff880049f4fb0 rcx=0000000000000000
rdx=0000000000000000 rsi=fffffa8009809f08 rdi=0000000000000000
rip=fffff880149b9159 rsp=fffff880049f4f40 rbp=0000000000000001
 r8=fffff880049f4f60  r9=0000000000000000 r10=0000000000000001
r11=fffffa80088f1b80 r12=fffff8a000f34e50 r13=0000000000000001
r14=fffff8a000f2f180 r15=0000000000000002
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0000  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
dxgmms1!VidSchiInterlockedRemoveEntryList+0x25:
fffff880`149b9159 4c8918          mov     qword ptr [rax],r11 ds:002b:ff00fa80`088f1b80=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  2

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
 ffffffffffffffff 

FOLLOWUP_IP: 
dxgmms1!VidSchiInterlockedRemoveEntryList+25
fffff880`149b9159 4c8918          mov     qword ptr [rax],r11

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff880149cc9a4 to fffff880149b9159

STACK_TEXT:  
fffff880`049f4f40 fffff880`149cc9a4 : 00000000`00000001 00000000`00000001 00000000`00000001 fffff8a0`00f31870 : dxgmms1!VidSchiInterlockedRemoveEntryList+0x25
fffff880`049f4f90 fffff880`149c5677 : fffffa80`098af000 00000000`00000001 fffffa80`09809ef0 fffff8a0`00f42078 : dxgmms1!VIDMM_GLOBAL::xWaitOnDMAReferences+0xc4
fffff880`049f5060 fffff880`149ab260 : fffffa80`098af000 fffff960`000e4300 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::BeginCPUAccess+0x7e3
fffff880`049f5130 fffff880`14914c63 : fffff880`049f52c0 fffffa80`09894000 fffff900`c0681ee0 fffff880`148b707b : dxgmms1!VidMmBeginCPUAccess+0x28
fffff880`049f5180 fffff880`148fa742 : fffff8a0`00dc24e0 fffff8a0`00dc24e0 fffff8a0`00f33000 fffff900`c0681ee0 : dxgkrnl!DXGDEVICE::Lock+0x287
fffff880`049f51e0 fffff960`00644bda : fffff900`c00c0020 00000000`00000000 00ff0000`00000120 fffff900`c2add2a0 : dxgkrnl!DxgkCddLock+0x236
fffff880`049f5270 fffff960`0064606c : ffffffff`fffd74f6 00000000`0104002b 00000000`00000001 00000000`00000000 : cdd!CddPresentBlt+0x262
fffff880`049f59b0 fffff800`02d18166 : 00000000`03fceaab fffffa80`088019f0 00000000`00000080 fffffa80`09794730 : cdd!PresentWorkerThread+0xd00
fffff880`049f5d40 fffff800`02a53486 : fffff880`02dd5180 fffffa80`088019f0 fffff880`02ddffc0 00000000`00000202 : nt!PspSystemThreadStartup+0x5a
fffff880`049f5d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VidSchiInterlockedRemoveEntryList+25

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc578

STACK_COMMAND:  .cxr 0xfffff880049f4560 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiInterlockedRemoveEntryList+25

BUCKET_ID:  X64_0x7E_dxgmms1!VidSchiInterlockedRemoveEntryList+25

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-27222-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
Debug session time: Sun May  8 13:47:48.995 2011 (UTC - 4:00)
System Uptime: 0 days 0:20:43.712
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88013ee6e43, fffff88007712f60, 0}

Probably caused by : nvlddmkm.sys ( nvlddmkm+211e43 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88013ee6e43, Address of the instruction which caused the bugcheck
Arg3: fffff88007712f60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nvlddmkm+211e43
fffff880`13ee6e43 493b5008        cmp     rdx,qword ptr [r8+8]

CONTEXT:  fffff88007712f60 -- (.cxr 0xfffff88007712f60)
rax=ff00fa8007c5a1e8 rbx=0000000000000000 rcx=fffffa80082daba8
rdx=00000000caf00117 rsi=0000000000000000 rdi=fffffa80096bc298
rip=fffff88013ee6e43 rsp=fffff88007713940 rbp=fffffa80093dde20
 r8=ff00fa8007c5a1e8  r9=fffffa80096bc348 r10=00000000caf00117
r11=fffff88007713940 r12=fffff88007713b88 r13=00000000c1d00610
r14=00000000ff010000 r15=00000000caf00117
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0x211e43:
fffff880`13ee6e43 493b5008        cmp     rdx,qword ptr [r8+8] ds:002b:ff00fa80`07c5a1f0=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  hon.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88013ee6e43

STACK_TEXT:  
fffff880`07713940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x211e43


FOLLOWUP_IP: 
nvlddmkm+211e43
fffff880`13ee6e43 493b5008        cmp     rdx,qword ptr [r8+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nvlddmkm+211e43

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d27c6da

STACK_COMMAND:  .cxr 0xfffff88007712f60 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nvlddmkm+211e43

BUCKET_ID:  X64_0x3B_nvlddmkm+211e43

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-27222-01 (2).dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02c49000 PsLoadedModuleList = 0xfffff800`02e86e50
Debug session time: Sun May  8 13:47:48.995 2011 (UTC - 4:00)
System Uptime: 0 days 0:20:43.712
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88013ee6e43, fffff88007712f60, 0}

Probably caused by : nvlddmkm.sys ( nvlddmkm+211e43 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88013ee6e43, Address of the instruction which caused the bugcheck
Arg3: fffff88007712f60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nvlddmkm+211e43
fffff880`13ee6e43 493b5008        cmp     rdx,qword ptr [r8+8]

CONTEXT:  fffff88007712f60 -- (.cxr 0xfffff88007712f60)
rax=ff00fa8007c5a1e8 rbx=0000000000000000 rcx=fffffa80082daba8
rdx=00000000caf00117 rsi=0000000000000000 rdi=fffffa80096bc298
rip=fffff88013ee6e43 rsp=fffff88007713940 rbp=fffffa80093dde20
 r8=ff00fa8007c5a1e8  r9=fffffa80096bc348 r10=00000000caf00117
r11=fffff88007713940 r12=fffff88007713b88 r13=00000000c1d00610
r14=00000000ff010000 r15=00000000caf00117
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nvlddmkm+0x211e43:
fffff880`13ee6e43 493b5008        cmp     rdx,qword ptr [r8+8] ds:002b:ff00fa80`07c5a1f0=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  hon.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff88013ee6e43

STACK_TEXT:  
fffff880`07713940 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x211e43


FOLLOWUP_IP: 
nvlddmkm+211e43
fffff880`13ee6e43 493b5008        cmp     rdx,qword ptr [r8+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nvlddmkm+211e43

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME:  nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d27c6da

STACK_COMMAND:  .cxr 0xfffff88007712f60 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nvlddmkm+211e43

BUCKET_ID:  X64_0x3B_nvlddmkm+211e43

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`14932000 fffff880`14970000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00eb7000 fffff880`00f0e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02b30000 fffff880`02bba000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`149df000 fffff880`149f5000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03db8000 fffff880`03dcd000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00c2a000 fffff880`00c35000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`03ec5000 fffff880`03ecd000   ASACPI   ASACPI.sys   Wed Jul 15 23:31:29 2009 (4A5E9F11)
fffff880`00df3000 fffff880`00dfc000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`015ef000 fffff880`015f7000   AtiPcie  AtiPcie.sys  Mon Aug 24 04:25:26 2009 (4A924E76)
fffff880`02a84000 fffff880`02a8b000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`03d81000 fffff880`03d92000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`05952000 fffff880`05970000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`006a0000 fffff960`006c7000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`043c5000 fffff880`043e2000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`02a51000 fffff880`02a7b000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d19000 fffff880`00dd9000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01000000 fffff880`01030000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cbb000 fffff880`00d19000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`012d4000 fffff880`01347000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`149cf000 fffff880`149df000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`043e2000 fffff880`043f0000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03ce0000 fffff880`03d63000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03d63000 fffff880`03d81000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03cd1000 fffff880`03ce0000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0123a000 fffff880`01250000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0439d000 fffff880`043bf000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`04268000 fffff880`04271000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`043f0000 fffff880`043fc000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`03dcd000 fffff880`03de0000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`0425c000 fffff880`04268000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`03ecf000 fffff880`03fc3000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`03e00000 fffff880`03e46000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`00c81000 fffff880`00c95000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`00c35000 fffff880`00c81000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01358000 fffff880`01362000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01200000 fffff880`0123a000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`01362000 fffff880`013ac000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02c00000 fffff800`02c49000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`03e46000 fffff880`03e6a000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04200000 fffff880`0425c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`03c00000 fffff880`03c19000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`149f5000 fffff880`149fd080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`03dee000 fffff880`03dfc000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0588a000 fffff880`05952000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015e6000 fffff880`015ef000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`03fcf000 fffff880`03fed000   i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03fed000 fffff880`03ffc000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff800`00ba6000 fffff800`00bb0000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`04273000 fffff880`042b6000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`012ba000 fffff880`012d4000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01591000 fffff880`015bc000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`043bf000 fffff880`043c4200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0585d000 fffff880`05872000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`0583a000 fffff880`0585d000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c9a000 fffff880`00ca7000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`03de0000 fffff880`03dee000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`13cc0000 fffff880`13ccf000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`02a3e000 fffff880`02a4b000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dd9000 fffff880`00df3000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`05970000 fffff880`05988000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`05988000 fffff880`059b4000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`062dc000 fffff880`06329000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`06329000 fffff880`0634c000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`02ae9000 fffff880`02af4000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f17000 fffff880`00f21000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0125c000 fffff880`012ba000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03cc6000 fffff880`03cd1000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015d4000 fffff880`015e6000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0143f000 fffff880`01531000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`13c24000 fffff880`13c30000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`13c30000 fffff880`13c5f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04322000 fffff880`04337000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02a2f000 fffff880`02a3e000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02bba000 fffff880`02bff000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01531000 fffff880`01591000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`02af4000 fffff880`02b05000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03cba000 fffff880`03cc6000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02c49000 fffff800`03226000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`0103b000 fffff880`011de000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`02a7b000 fffff880`02a84000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`14930000 fffff880`14931180   nvBridge nvBridge.kmd Fri Jan 07 20:57:22 2011 (4D27C482)
fffff880`04337000 fffff880`04360000   nvhda64v nvhda64v.sys Thu Nov 11 18:10:36 2010 (4CDC77EC)
fffff880`13cd5000 fffff880`1492fd00   nvlddmkm nvlddmkm.sys Fri Jan 07 21:07:22 2011 (4D27C6DA)
fffff880`02a09000 fffff880`02a2f000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f61000 fffff880`00f76000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f21000 fffff880`00f54000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fe7000 fffff880`00fee000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fee000 fffff880`00ffe000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01347000 fffff880`01358000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`0634c000 fffff880`063f2000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04360000 fffff880`0439d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00ca7000 fffff880`00cbb000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`13c00000 fffff880`13c24000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`13c5f000 fffff880`13c7a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`13c7a000 fffff880`13c9b000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`13c9b000 fffff880`13cb5000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03c69000 fffff880`03cba000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`13cb5000 fffff880`13cc0000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`02ace000 fffff880`02ad7000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ad7000 fffff880`02ae0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`02ae0000 fffff880`02ae9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01400000 fffff880`0143a000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05872000 fffff880`0588a000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`03e6a000 fffff880`03ea9000   Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)
fffff880`063f2000 fffff880`063fd000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`03fc3000 fffff880`03fcf000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`03c1d000 fffff880`03c3a000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015cc000 fffff880`015d4000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06963000 fffff880`069d4000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`068cb000 fffff880`06963000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`0623f000 fffff880`062a8000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`06200000 fffff880`0622d000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`03ffc000 fffff880`03ffd480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01603000 fffff880`01800000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`0622d000 fffff880`0623f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`02b23000 fffff880`02b30000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`02b05000 fffff880`02b23000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03c55000 fffff880`03c69000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004c0000 fffff960`004ca000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03d92000 fffff880`03db8000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`042b6000 fffff880`042c8000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`04271000 fffff880`04272f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`03eb4000 fffff880`03ec5000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042c8000 fffff880`04322000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`03ea9000 fffff880`03eb4000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`14970000 fffff880`149c6000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f54000 fffff880`00f61000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`02a8b000 fffff880`02a99000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`02a99000 fffff880`02abe000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015bc000 fffff880`015cc000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f76000 fffff880`00f8b000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f8b000 fffff880`00fe7000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`013ac000 fffff880`013f8000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03c3a000 fffff880`03c55000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`02abe000 fffff880`02ace000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e04000 fffff880`00ea8000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea8000 fffff880`00eb7000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02a00000 fffff880`02a09000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003ef000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`149c6000 fffff880`149cf000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f0e000 fffff880`00f17000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`011de000 fffff880`011ec000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01250000 fffff880`0125c000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`015f7000 fffff880`01600000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`011ec000 fffff880`011ff000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top