Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Blue Screen, physical memory dumb


  • Please log in to reply
3 replies to this topic

#1 Naviris

Naviris

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:58 AM

Posted 09 May 2011 - 06:21 PM

I updated my video card drivers in order to run a new application correctly. The new application runs great, however, Now I am getting a frequent blue screen. I am on a windows 7 64 bit machine with an Nvidia GeForce 8700M GT. Here is the code from the memory dump via the windows debugging tool:



Microsoft ® Windows Debugger Version 6.12.0002.633 AMD64
Copyright © Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0305b000 PsLoadedModuleList = 0xfffff800`032a0e90
Debug session time: Mon May 9 16:38:54.098 2011 (UTC - 6:00)
System Uptime: 0 days 0:39:47.924
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols

Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 7F, {8, 80050031, 6f8, fffff8800f569a69}

*** ERROR: Symbol file could not be found. Defaulted to export symbols for nvlddmkm.sys -
*** ERROR: Module load completed but symbols could not be loaded for vsdatant.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+c1a69 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff8800f569a69

Debugging Details:
------------------


BUGCHECK_STR: 0x7f_8

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

PROCESS_NAME: System

CURRENT_IRQL: 5

LAST_CONTROL_TRANSFER: from fffff800030dabe9 to fffff800030db640

STACK_TEXT:
fffff800`046b3d28 fffff800`030dabe9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`046b3d30 fffff800`030d90b2 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`046b3e70 fffff880`0f569a69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`0e00a000 fffff880`0f569e65 : fffffa80`063ec000 fffffa80`063ec000 00000000`00000000 fffff880`0e00a1c0 : nvlddmkm+0xc1a69
fffff880`0e00a090 fffff880`0f5ee0d2 : 00000000`00000000 fffffa80`063ec000 00000000`00000000 00000000`00300110 : nvlddmkm+0xc1e65
fffff880`0e00a140 fffff880`0f5eea1d : fffff880`0f5ede5f fffffa80`063ec000 fffffa80`088f2000 fffff880`0f6f66c1 : nvlddmkm+0x1460d2
fffff880`0e00a310 fffff880`0f679c85 : 00000000`00588024 00000000`00000000 fffffa80`00000000 00000000`000002d8 : nvlddmkm+0x146a1d
fffff880`0e00a400 fffff880`0f679dc9 : fffffa80`06c840a0 00000000`00000002 00000000`00000001 fffffa80`05ef4000 : nvlddmkm+0x1d1c85
fffff880`0e00a480 fffff880`0f6879cd : fffffa80`03cd5000 fffffa80`03cd5000 00000000`00000001 fffffa80`062269e0 : nvlddmkm+0x1d1dc9
fffff880`0e00a4e0 fffff880`0f679a32 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x1df9cd
fffff880`0e00a630 fffff880`0f5d83c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x1d1a32
fffff880`0e00a690 fffff880`0f5d9343 : 00000000`00000000 fffff880`0f5d835e 00000000`00000000 00000000`00000000 : nvlddmkm+0x1303c0
fffff880`0e00a720 fffff880`0f56a5af : fffff880`0e00a84c fffffa80`06486398 fffffa80`03cd0040 00000000`00000001 : nvlddmkm+0x131343
fffff880`0e00a750 fffff880`0f4ce9e1 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`063ec000 : nvlddmkm+0xc25af
fffff880`0e00a780 fffff880`0f60c426 : fffff880`0f4ce974 fffffa80`046b3848 fffff880`0e00a910 fffffa80`046b3840 : nvlddmkm+0x269e1
fffff880`0e00a810 fffff800`030d7279 : fffffa80`046b3848 fffff800`00000000 fffffa80`046b3840 00000000`00000002 : nvlddmkm+0x164426
fffff880`0e00a840 fffff800`030d7058 : fffff880`0e00aa50 00000000`00000002 fffffa80`03cd0040 00000000`00000001 : nt!KiScanInterruptObjectList+0x69
fffff880`0e00a890 fffff800`03116670 : fffff800`031936a6 00000000`000023dc 00000000`00000000 fffff880`0e00ab50 : nt!KiChainedDispatch+0x128
fffff880`0e00aa28 fffff800`031936a6 : 00000000`000023dc 00000000`00000000 fffff880`0e00ab50 00000000`00012ec9 : nt!MiIsAddressValid
fffff880`0e00aa30 fffff800`03194ac3 : fffffa80`05f6b4d0 fffff880`00000008 00000004`00000000 ffa7110a`00000002 : nt!RtlpWalkFrameChain+0x296
fffff880`0e00b0d0 fffff800`0319594b : 00000000`00000001 fffffa80`05f6b4d0 fffff880`0e00b158 00000000`00000001 : nt!RtlWalkFrameChain+0x63
fffff880`0e00b100 fffff880`04286ec9 : fffffa80`0a177010 00000000`00000001 00000000`00247300 00000000`00247300 : nt!RtlCaptureStackBackTrace+0x4b
fffff880`0e00b130 fffff880`0427f255 : fffffa80`0a177010 fffffa80`00010103 00000000`00000000 00000000`00247332 : vsdatant+0x12ec9
fffff880`0e00b1a0 fffff880`0181dacf : fffff880`0e00b880 fffffa80`04b64db0 fffffa80`03f73e20 fffffa80`09c51a20 : vsdatant+0xb255
fffff880`0e00b2a0 fffff880`01804f68 : 00000000`0000002c fffff880`0e00b880 fffffa80`09bef068 fffffa80`03f73e20 : NETIO! ?? ::FNODOBFM::`string'+0x7297
fffff880`0e00b3c0 fffff880`018065e2 : 00000000`0000002c fffff880`0e00b880 fffffa80`04b64db0 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x238
fffff880`0e00b490 fffff880`01b1b819 : fffffa80`04b64db0 fffff880`0e00b880 00000000`0010000f fffffa80`03f73e20 : NETIO!KfdClassify+0x934
fffff880`0e00b800 fffff880`01b1d9a4 : fffffa80`04b64db0 fffffa80`09600950 fffff880`0e00c4b8 fffffa80`09bef060 : tcpip!WfpAleClassify+0x49
fffff880`0e00b850 fffff880`01b1dd35 : 00000000`00000000 fffffa80`00000000 00000000`00000000 00000000`00000002 : tcpip!WfpAlepReauthorizeInboundConnection+0x5f4
fffff880`0e00bb50 fffff880`01af9eab : fffffa80`09600950 00000000`00000000 00000000`00000011 fffffa80`09bef010 : tcpip!WfpAleReauthorizeInboundConnection+0x1f5
fffff880`0e00bcb0 fffff880`01af46da : fffff880`0e00c4b8 00000000`00000001 fffffa80`0933baa0 fffffa80`09bef010 : tcpip!WfpAleReauthorizeConnection+0x31b
fffff880`0e00bf40 fffff880`01b1b24a : fffffa80`09600950 00000000`00000002 00000000`00000000 00000000`00000100 : tcpip!TlShimOptionalReauthorizeConnection+0x2ca
fffff880`0e00c080 fffff880`01b1c087 : 00000000`00000000 fffff880`0f69bfdc 00000000`00008900 00000000`00000000 : tcpip!ProcessALEForTransportPacket+0x3ea
fffff880`0e00c2f0 fffff880`01af97d1 : fffffa80`09600950 fffffa80`09600bb0 fffffa80`04fa8140 00000000`000033c0 : tcpip!WfpProcessInTransportStackIndication+0x7b7
fffff880`0e00c7e0 fffff880`01b202c3 : fffffa80`09600bb0 fffffa80`04ba2b90 00000000`00000000 fffffa80`04fa8140 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0e00c8a0 fffff880`01b20675 : fffffa80`09600bb0 00000000`00000000 fffff880`0e00cbc0 00000000`00000002 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0e00c9f0 fffff880`01b1a402 : fffffa80`00000000 fffffa80`09600bb0 00000000`00000000 fffffa80`0683890c : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0e00cb80 fffff880`01af4197 : fffffa80`04b87820 00000000`00000000 00000002`00100020 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x332
fffff880`0e00cc90 fffff880`01af3caa : 00000000`00000000 fffff880`01c089a0 fffff880`0e00ce50 fffff880`0e010000 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0e00cd50 fffff880`01af32a9 : fffff880`01c089a0 fffffa80`03f73f50 00000000`00000011 fffff880`0e00ce40 : tcpip!IppProcessDeliverList+0x5a
fffff880`0e00cdf0 fffff880`01af0fff : 00000000`ffa7110a fffffa80`04fa8140 fffff880`01c089a0 00000000`061bac01 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0e00ced0 fffff880`01bc51e2 : fffffa80`0933ca50 00000000`00000000 fffffa80`061bac01 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0e00d0d0 fffff880`01ca4af6 : fffffa80`04152202 fffffa80`04152220 00000000`00000002 00000000`00000000 : tcpip!IppInspectInjectReceive+0xf2
fffff880`0e00d110 fffff880`0428a37f : fffffa80`09c50590 fffffa80`061bac90 00000000`00000000 00000000`00000000 : fwpkclnt!FwpsInjectTransportReceiveAsync0+0x256
fffff880`0e00d1c0 fffff880`0428959c : fffffa80`061bac90 fffffa80`05f6b2c0 fffffa80`0a177148 fffffa80`0a177010 : vsdatant+0x1637f
fffff880`0e00d250 fffff880`04282ca1 : fffffa80`061bac90 fffffa80`061bac90 fffff880`0e00da00 fffffa80`061bad88 : vsdatant+0x1559c
fffff880`0e00d350 fffff880`0181dacf : fffff880`0e00d968 fffff880`0e00da80 fffffa80`03e6d030 fffffa80`095af7f0 : vsdatant+0xeca1
fffff880`0e00d480 fffff880`01805f0c : fffffa80`092e0018 fffff880`0e00d968 fffffa80`09bef068 fffffa80`03e6d030 : NETIO! ?? ::FNODOBFM::`string'+0x7297
fffff880`0e00d5a0 fffff880`01b9b96b : fffff880`0e00e0a8 fffff880`0e00d968 fffff880`0e00e0a8 fffffa80`03e6d030 : NETIO!KfdClassify+0x24c
fffff880`0e00d910 fffff880`01b4ee22 : 00000000`00000000 fffffa80`09600950 fffffa80`09bef170 00000000`00000100 : tcpip!WFPDatagramDataShimV4+0x49b
fffff880`0e00dc70 fffff880`01b1c087 : 00000000`00000000 00000000`00000000 00000000`00008900 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x2b2b2
fffff880`0e00dee0 fffff880`01af97d1 : fffffa80`09600950 fffffa80`09600bb0 fffffa80`04fa8000 00000000`000033c0 : tcpip!WfpProcessInTransportStackIndication+0x7b7
fffff880`0e00e3d0 fffff880`01b202c3 : fffffa80`09600bb0 fffffa80`04ba2b90 00000000`00000000 fffffa80`04fa8000 : tcpip!InetInspectReceiveDatagram+0x121
fffff880`0e00e490 fffff880`01b20675 : fffffa80`09600bb0 00000000`00000000 00000000`00000000 ffffe248`ab794461 : tcpip!UdpBeginMessageIndication+0x83
fffff880`0e00e5e0 fffff880`01b1a402 : fffffa80`00000000 fffffa80`09600bb0 00000000`00000000 fffffa80`0683890c : tcpip!UdpDeliverDatagrams+0xd5
fffff880`0e00e770 fffff880`01af4197 : fffffa80`04b87820 fffffa80`06478100 00000002`00000020 00000000`00000000 : tcpip!UdpReceiveDatagrams+0x332
fffff880`0e00e880 fffff880`01af3caa : 00000000`00000000 fffff880`01c089a0 fffff880`0e00ea40 fffffa80`03e6d030 : tcpip!IppDeliverListToProtocol+0xf7
fffff880`0e00e940 fffff880`01af32a9 : fffff880`01c089a0 fffffa80`03e30160 00000000`00000011 fffff880`0e00ea30 : tcpip!IppProcessDeliverList+0x5a
fffff880`0e00e9e0 fffff880`01af0fff : 00000000`ffa7110a fffffa80`04fa8000 fffff880`01c089a0 00000000`09338801 : tcpip!IppReceiveHeaderBatch+0x23a
fffff880`0e00eac0 fffff880`01af05f2 : fffffa80`0933ca50 00000000`00000000 fffffa80`09338801 fffff780`00000001 : tcpip!IpFlcReceivePackets+0x64f
fffff880`0e00ecc0 fffff880`01aefa8a : fffffa80`09338850 fffff880`0e00edf0 fffffa80`09338850 00000000`00000000 : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
fffff880`0e00eda0 fffff800`030e8078 : fffffa80`03e6d030 00000000`00004800 fffffa80`057b4b60 00000000`00000000 : tcpip!FlReceiveNetBufferListChainCalloutRoutine+0xda
fffff880`0e00edf0 fffff880`01af0152 : fffff880`01aef9b0 00000000`00000000 00000000`e0000002 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xd8
fffff880`0e00eed0 fffff880`019790eb : fffffa80`0933b010 00000000`00000000 fffffa80`064781a0 fffffa80`064781a0 : tcpip!FlReceiveNetBufferListChain+0xb2
fffff880`0e00ef40 fffff880`01942ad6 : fffffa80`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ndis!ndisMIndicateNetBufferListsToOpen+0xdb
fffff880`0e00efb0 fffff880`018c49c4 : fffffa80`064781a0 00000000`00000002 00000000`00000001 fffff880`09a6441b : ndis!ndisMDispatchReceiveNetBufferLists+0x1d6
fffff880`0e00f430 fffff880`018c4939 : 00000000`00000002 fffff880`018bbeef fffffa80`0933c230 00000000`00000000 : ndis!ndisMTopReceiveNetBufferLists+0x24
fffff880`0e00f470 fffff880`018c48d0 : fffffa80`068388e2 fffffa80`092d2010 ffff0000`0a2d71f4 fffff880`09a41355 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`0e00f4b0 fffff880`0428dba5 : fffffa80`09334960 00000000`00000000 00000000`00000001 fffffa80`03e6d030 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`0e00f4f0 fffff880`018c4939 : fffffa80`09334960 fffffa80`03e6d030 fffffa80`00000000 00000000`00000001 : vsdatant+0x19ba5
fffff880`0e00f590 fffff880`018c48d0 : fffff880`09a7b5c0 fffffa80`092d2010 fffffa80`0933c230 00000000`00000001 : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`0e00f5d0 fffff880`09a447ee : fffffa80`092d2010 00000000`00000000 fffffa80`03e6d030 fffff880`09a7b5c0 : ndis!NdisFIndicateReceiveNetBufferLists+0x50
fffff880`0e00f610 fffff880`018c4939 : fffffa80`0670ec90 00000000`00000000 00000000`00000001 00000000`000003f8 : nwifi!Pt6Receive+0x296
fffff880`0e00f670 fffff880`018c48d0 : fffffa80`0684f028 fffff880`043420c7 fffff880`04343340 fffff800`030f66bb : ndis!ndisFilterIndicateReceiveNetBufferLists+0x29
fffff880`0e00f6b0 fffff880`0433e9c0 : fffff880`04345110 00000000`00000000 00000000`00000001 fffffa80`0684fa78 : ndis!NdisFIndicateReceiveNetBufferLists+0x50


STACK_COMMAND: kb

FOLLOWUP_IP:
nvlddmkm+c1a69
fffff880`0f569a69 e8328a0600 call nvlddmkm+0x12a4a0 (fffff880`0f5d24a0)

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nvlddmkm+c1a69

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4d9e7f64

FAILURE_BUCKET_ID: X64_0x7f_8_nvlddmkm+c1a69

BUCKET_ID: X64_0x7f_8_nvlddmkm+c1a69

Followup: MachineOwner
---------

I am at a complete loss, so any help is much apreciated, thank you!

BC AdBot (Login to Remove)

 


#2 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,489 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:09:58 AM

Posted 09 May 2011 - 09:41 PM

There is a program which produces better results than a dump file, please download BlueScreenView BlueScreenView

No installation required.

Unzip downloaded file and double click on BlueScreenView.exe file to run the program.
When scanning is done, go Edit>Select All.
Go File>Save Selected Items, and save the report as BSOD.txt.
Open BSOD.txt in Notepad, copy all content, and paste it into your next reply.

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#3 Naviris

Naviris
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:58 AM

Posted 10 May 2011 - 07:39 AM

Okay, here is the report from blue screen viewer, thanks for the help!

==================================================
Dump File : 050911-22588-01.dmp
Crash Time : 5/9/2011 4:39:52 PM
Bug Check String : UNEXPECTED_KERNEL_MODE_TRAP
Bug Check Code : 0x0000007f
Parameter 1 : 00000000`00000008
Parameter 2 : 00000000`80050031
Parameter 3 : 00000000`000006f8
Parameter 4 : fffff880`0f569a69
Caused By Driver : nvlddmkm.sys
Caused By Address : nvlddmkm.sys+c1a69
File Description :
Product Name :
Company :
File Version :
Processor : x64
Computer Name :
Full Path : C:\Windows\Minidump\050911-22588-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 7601
Dump File Size : 290,896
==================================================

==================================================
Dump File : 050911-22713-01.dmp
Crash Time : 5/9/2011 3:45:58 PM
Bug Check String : UNEXPECTED_KERNEL_MODE_TRAP
Bug Check Code : 0x0000007f
Parameter 1 : 00000000`00000008
Parameter 2 : 00000000`80050031
Parameter 3 : 00000000`000006f8
Parameter 4 : fffff880`0f557e5a
Caused By Driver : nvlddmkm.sys
Caused By Address : nvlddmkm.sys+145e5a
File Description :
Product Name :
Company :
File Version :
Processor : x64
Computer Name :
Full Path : C:\Windows\Minidump\050911-22713-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 7601
Dump File Size : 288,816
==================================================

==================================================
Dump File : 050911-21777-01.dmp
Crash Time : 5/9/2011 10:55:56 AM
Bug Check String : UNEXPECTED_KERNEL_MODE_TRAP
Bug Check Code : 0x0000007f
Parameter 1 : 00000000`00000008
Parameter 2 : 00000000`80050031
Parameter 3 : 00000000`000006f8
Parameter 4 : fffff880`0f61ce5a
Caused By Driver : nvlddmkm.sys
Caused By Address : nvlddmkm.sys+145e5a
File Description :
Product Name :
Company :
File Version :
Processor : x64
Computer Name :
Full Path : C:\Windows\Minidump\050911-21777-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 7601
Dump File Size : 288,432
==================================================

==================================================
Dump File : 050911-21528-01.dmp
Crash Time : 5/9/2011 10:33:12 AM
Bug Check String : UNEXPECTED_KERNEL_MODE_TRAP
Bug Check Code : 0x0000007f
Parameter 1 : 00000000`00000008
Parameter 2 : 00000000`80050031
Parameter 3 : 00000000`000006f8
Parameter 4 : fffff800`0300c763
Caused By Driver : hal.dll
Caused By Address : hal.dll+f763
File Description :
Product Name :
Company :
File Version :
Processor : x64
Computer Name :
Full Path : C:\Windows\Minidump\050911-21528-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 7601
Dump File Size : 291,824
==================================================

#4 Allan

Allan

  • BC Advisor
  • 8,589 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New Jersey
  • Local time:12:58 PM

Posted 10 May 2011 - 07:43 AM

The issues are clearly with your video card driver. Did you obtain the new driver directly from the nvidia website? If so, did you uninstall the old driver before installing the new one? If you did, then your best option at this point is to go into device manager and roll back to the previous driver.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users