Blue screens while rendering a 3D project


  1. Posts : 17
    Windows 7 Pro 64bit
       #1

    Blue screens while rendering a 3D project


    A bit of background info: just upgraded my computer in the past few days. New Asus mobo, and 8 gigs of RAM. I have NOT reformated my hard drive yet and performed a clean install of Windows 7.

    I was rendering a project in Cinema 4D when all of the sudden the program crashed followed by artifacts and graphics glitches everywhere. I restarted the computer, no more glitches, started rendering and got a blue screen. Restarted, rendered again (I render by frame so even when I crash I can pick up where I left off) and another blue screen.

    I have attached the dmp files. I suspect I have a bad graphics card. I also suspect a reformat would be in order to put fresh new drivers on, however I have to wait until I have enough money to get another hard drive to transfer my files to.

    Thanks for your time and help!
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    helpcomputa said:
    A bit of background info: just upgraded my computer in the past few days. New Asus mobo, and 8 gigs of RAM. I have NOT reformated my hard drive yet and performed a clean install of Windows 7.

    I was rendering a project in Cinema 4D when all of the sudden the program crashed followed by artifacts and graphics glitches everywhere. I restarted the computer, no more glitches, started rendering and got a blue screen. Restarted, rendered again (I render by frame so even when I crash I can pick up where I left off) and another blue screen.

    I have attached the dmp files. I suspect I have a bad graphics card. I also suspect a reformat would be in order to put fresh new drivers on, however I have to wait until I have enough money to get another hard drive to transfer my files to.

    Thanks for your time and help!
    Simple and straight forward. Your AVG is causing these. Let us know if you need further assistance with these.

    I would remove and replace with Microsoft Security Essentials.

    AVG - Download tools

    http://www.microsoft.com/security_essentials/

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\031311-29421-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
    *http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16695.x86fre.win7_gdr.101026-1503
    Machine Name:
    Kernel base = 0x82e1e000 PsLoadedModuleList = 0x82f66810
    Debug session time: Sun Mar 13 16:50:33.099 2011 (GMT-4)
    System Uptime: 0 days 0:12:00.270
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ........
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_OVERRAN_STACK_BUFFER (f7)
    A driver has overrun a stack-based buffer.  This overrun could potentially
    allow a malicious user to gain control of this machine.
    DESCRIPTION
    A driver overran a stack-based buffer (or local variable) in a way that would
    have overwritten the function's return address and jumped back to an arbitrary
    address when the function returned.  This is the classic "buffer overrun"
    hacking attack and the system has been brought down to prevent a malicious user
    from gaining complete control of it.
    Do a kb to get a stack backtrace -- the last routine on the stack before the
    buffer overrun handlers and bugcheck call is the one that overran its local
    variable(s).
    Arguments:
    Arg1: 8db55ceb, Actual security check cookie from the stack
    Arg2: 37431484, Expected security check cookie
    Arg3: c8bceb7b, Complement of the expected security check cookie
    Arg4: 00000000, zero
    
    Debugging Details:
    ------------------
    
    *** WARNING: Unable to verify timestamp for avgtdix.sys
    *** ERROR: Module load completed but symbols could not be loaded for avgtdix.sys
    Unable to load image \SystemRoot\system32\DRIVERS\HssDrv.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for HssDrv.sys
    *** ERROR: Module load completed but symbols could not be loaded for HssDrv.sys
    Unable to load image \SystemRoot\system32\DRIVERS\netr28u.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for netr28u.sys
    *** ERROR: Module load completed but symbols could not be loaded for netr28u.sys
    
    FAULTING_IP: 
    nt!KiDeferredReadyThread+8f2
    82e8aca9 8be5            mov     esp,ebp
    
    SECURITY_COOKIE:  Expected 37431484 found 8db55ceb
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xF7
    
    PROCESS_NAME:  CINEMA 4D.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from 82eeca99 to 82efadfc
    
    STACK_TEXT:  
    8db55cbc 82eeca99 000000f7 8db55ceb 37431484 nt!KeBugCheckEx+0x1e
    8db55cdc 82e8aca9 8bcdb000 00bfa0e0 00000000 nt!__report_gsfailure+0x24
    8db55d4c 82e8b6c9 88361030 00000000 88361030 nt!KiDeferredReadyThread+0x8f2
    8db55d68 82e8b687 00000000 8db36120 88361090 nt!KiReadyThread+0x30
    8db55d80 82e858f1 00000002 00000001 88361030 nt!KiProcessThreadWaitList+0x3f
    8db55dbc 82ed8a67 8db36120 00000000 00000001 nt!KiExitDispatcher+0x2a
    8db55df8 82e86f1f 85be9048 8835e288 00000000 nt!KeInsertQueueApc+0xb9
    8db55e44 91265764 86e3e157 86e3e0c0 8db55e9c nt!IopfCompleteRequest+0x3f4
    WARNING: Stack unwind information not available. Following frames may be wrong.
    8db55e54 82e86c53 00000000 86e3e0c0 85be9008 avgtdix+0x4764
    8db55e9c 912448f0 85a97828 8703f0b0 8db56080 nt!IopfCompleteRequest+0x128
    8db55eb4 8be8988a 02e3e100 00000000 000005b4 tdx!TdxReceiveConnectionTlRequestComplete+0xde
    8db55f2c 8be7e25c 8703f0b0 00000000 85a97828 tcpip!TcpCompleteClientReceiveRequest+0x1c
    8db56080 8be97ce4 85a97828 00000000 85a97920 tcpip!TcpSatisfyReceiveRequests+0x3fe
    8db5611c 8be98661 85a97828 85a97920 8db56158 tcpip!TcpDeliverDataToClient+0x79
    8db56170 8be9d369 85a97828 85a97920 85d08480 tcpip!TcpDeliverReceive+0x96
    8db561c0 8be9c5a6 85a97828 8db561e4 8db5621c tcpip!TcpTcbFastDatagram+0x304
    8db56228 8be9c9ac 864c9f40 85a97828 00b5629c tcpip!TcpTcbReceive+0x142
    8db56290 8be8bb4c 864339f0 864c4000 00000000 tcpip!TcpMatchReceive+0x237
    8db562e0 8be8b8ae 864c9f40 864c4000 00005000 tcpip!TcpPreValidatedReceive+0x293
    8db562fc 8be91273 864c9f40 864c4000 8db56338 tcpip!TcpReceive+0x2d
    8db5630c 8bec350e 8db56320 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12
    8db56338 8bec32d1 8bf22f88 8db5638c c000023e tcpip!IppDeliverListToProtocol+0x49
    8db56358 8bec2fa6 8bf22d98 00000006 8db5638c tcpip!IppProcessDeliverList+0x2a
    8db563b0 8bec0be4 8bf22d98 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1f2
    8db56444 8bebfb75 87d2e9d8 00000000 00000001 tcpip!IpFlcReceivePackets+0xbe5
    8db564c0 8bebfce6 87d39d00 85d08480 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x746
    8db564f4 82eae092 85d08480 baf671d8 864c8fd0 tcpip!FlReceiveNetBufferListChainCalloutRoutine+0x11e
    8db5655c 8bebfd6e 8bebfbc8 8db56584 00000000 nt!KeExpandKernelStackAndCalloutEx+0x132
    8db56598 8bd0218d 87d39d02 85d08400 00000000 tcpip!FlReceiveNetBufferListChain+0x7c
    8db565d0 8bcf0670 87d397a0 85d08480 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0x188
    8db565f8 8bcf05e7 00000000 00000001 86bfa0e0 ndis!ndisIndicateSortedNetBufferLists+0x4a
    8db56774 8bc9bca5 86bfa0e0 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129
    8db56790 8bd07e74 86bfa0e0 85d08480 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    8db567dc 91b5a48f 02bfa0e0 8db567f8 00000001 ndis!ndisMIndicatePacketsToNetBufferLists+0xea
    8db56898 91b5a8f5 00000001 00000000 8db56900 HssDrv+0x248f
    8db568a8 8bd25496 87d17278 00000001 8db56a1c HssDrv+0x28f5
    8db56900 8bd01bb4 00b2c010 8db56920 00000001 ndis!ethFilterDprIndicateReceivePacket+0x895
    8db569cc 8bcf05af 02b569e4 85aa92d8 87d23878 ndis!ndisIndicateXlatedPacketsToNdis5Protocols+0xba
    8db56b48 8bc9bca5 867780e0 87d29008 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0xf1
    8db56b64 8bccba87 867780e0 85aa92d8 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2d
    8db56b80 8bccba21 87d17008 85aa92d8 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
    8db56b9c 992b8837 87d17008 85aa92d8 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
    8db56bc4 992bc497 87d17008 876f6a10 876f69c0 nwifi!Dot11IndicateRecvPackets+0x51
    8db56be4 8bccba87 87d18c08 85aa92d8 00000000 nwifi!Pt6Receive+0x1d3
    8db56c00 8bccba21 87705d08 86e5e898 00000000 ndis!ndisFilterIndicateReceiveNetBufferLists+0x46
    8db56c1c 9135dc85 87705d08 86e5e898 00000000 ndis!NdisFIndicateReceiveNetBufferLists+0x2f
    8db56c48 8bcf0a2e 876f6014 86e5e898 00000000 vwififlt!FilterReceiveNetBufferLists+0xcf
    8db56c70 8bc9bc1e 867780e0 86e5e898 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x62
    8db56c98 92946e99 00000000 00000000 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x52
    8db56ccc 00000000 00000000 00000000 00000000 netr28u+0x7e99
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    avgtdix+4764
    91265764 ??              ???
    
    SYMBOL_STACK_INDEX:  8
    
    SYMBOL_NAME:  avgtdix+4764
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: avgtdix
    
    IMAGE_NAME:  avgtdix.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cdd1f96
    
    FAILURE_BUCKET_ID:  0xF7_avgtdix+4764
    
    BUCKET_ID:  0xF7_avgtdix+4764
    
    Followup: MachineOwner
    ---------
    
    3: kd> lmvm avgtdix
    start    end        module name
    91261000 912a8980   avgtdix  T (no symbols)           
        Loaded symbol image file: avgtdix.sys
        Image path: \SystemRoot\system32\DRIVERS\avgtdix.sys
        Image name: avgtdix.sys
        Timestamp:        Fri Nov 12 06:05:58 2010 (4CDD1F96)
        CheckSum:         0004E2DF
        ImageSize:        00047980
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 15:33.
Find Us