New
#1
Hello,
I get pretty often this BSOD 0x0000007F while playing WOW or sometimes other games, mine girlfriend likes to play Sims so she gets it too while playing. I tried to debug the information and this is what i got, i have to say i'm not too much experienced at it but that's all i got. Any advice and explanation of debug and BSOD also how to fix it will be greatly appreciated, because this problem is on my nerves already for years. Thank you!
Code:----------------------------------------------------------------------------------- Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\100912-28922-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*D:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.x86fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0x82c4f000 PsLoadedModuleList = 0x82d97810 Debug session time: Tue Oct 9 13:15:19.504 2012 (UTC + 3:00) System Uptime: 0 days 4:18:10.283 Loading Kernel Symbols ............................................................... ................................................................ ............................ Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000008E, {c0000005, 82e9c357, 9cfe58dc, 0} Probably caused by : hardware ( dxgkrnl!DXGCONTEXT::ResizeUserModeBuffers+90 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: c0000005, The exception code that was not handled Arg2: 82e9c357, The address that the exception occurred at Arg3: 9cfe58dc, Trap Frame Arg4: 00000000 Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!NtAllocateVirtualMemory+1548 82e9c357 0000 add byte ptr [eax],al TRAP_FRAME: 9cfe58dc -- (.trap 0xffffffff9cfe58dc) ErrCode = 00000002 eax=00000000 ebx=8918fd88 ecx=85d87130 edx=85d87130 esi=00003000 edi=85d87030 eip=82e9c357 esp=9cfe5950 ebp=9cfe5a34 iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282 nt!NtAllocateVirtualMemory+0x1548: 82e9c357 0000 add byte ptr [eax],al ds:0023:00000000=?? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x8E PROCESS_NAME: Wow.exe CURRENT_IRQL: 0 MISALIGNED_IP: nt!NtAllocateVirtualMemory+1548 82e9c357 0000 add byte ptr [eax],al LAST_CONTROL_TRANSFER: from 82c9242a to 82e9c357 STACK_TEXT: 9cfe5a34 82c9242a ffffffff 9cfe5b04 00000000 nt!NtAllocateVirtualMemory+0x1548 9cfe5a34 82c8fb21 ffffffff 9cfe5b04 00000000 nt!KiFastCallEntry+0x12a 9cfe5ac4 91dc59a4 ffffffff 9cfe5b04 00000000 nt!ZwAllocateVirtualMemory+0x11 9cfe5b3c 91d5aaf1 8849b580 00003000 00000400 dxgkrnl!DXGCONTEXT::ResizeUserModeBuffers+0x90 9cfe5d28 82c9242a 00000000 05a8fc20 76f464f4 dxgkrnl!DxgkRender+0x3ee 9cfe5d28 76f464f4 00000000 05a8fc20 76f464f4 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 05a8fc20 00000000 00000000 00000000 00000000 0x76f464f4 STACK_COMMAND: kb FOLLOWUP_IP: dxgkrnl!DXGCONTEXT::ResizeUserModeBuffers+90 91dc59a4 8945e4 mov dword ptr [ebp-1Ch],eax SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: dxgkrnl!DXGCONTEXT::ResizeUserModeBuffers+90 FOLLOWUP_NAME: MachineOwner IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 MODULE_NAME: hardware FAILURE_BUCKET_ID: IP_MISALIGNED BUCKET_ID: IP_MISALIGNED Followup: MachineOwner ---------
Also i did another file debug which was other kind than the past one, and the problem was bittorrent.exe here is the debug:
Code:--------------------------------------- Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\050312-18049-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*D:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.x86fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0x82a11000 PsLoadedModuleList = 0x82b59810 Debug session time: Thu May 3 20:44:57.106 2012 (UTC + 3:00) System Uptime: 0 days 3:34:21.510 Loading Kernel Symbols ............................................................... ................................................................ ....................... Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {0, 2, 1, 82b043d8} Probably caused by : ntkrpamp.exe ( nt!PpmPerfSelectProcessorStates+75 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000000, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 82b043d8, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82b79718 Unable to read MiSystemVaType memory at 82b59160 00000000 CURRENT_IRQL: 2 FAULTING_IP: nt!PpmPerfSelectProcessorStates+75 82b043d8 3b056c99b782 cmp eax,dword ptr [nt!KeNumberProcessors (82b7996c)] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: BitTorrent.exe TAG_NOT_DEFINED_c000000f: FFFFFFFF8DD21000 TRAP_FRAME: 8dd20ec4 -- (.trap 0xffffffff8dd20ec4) ErrCode = 00000002 eax=00000000 ebx=8dd01a00 ecx=fffffffe edx=82b3934c esi=0000000e edi=00000000 eip=82b043d8 esp=8dd20f38 ebp=8dd20f44 iopl=0 nv up ei pl zr na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246 nt!PpmPerfSelectProcessorStates+0x75: 82b043d8 3b056c99b782 cmp eax,dword ptr [nt!KeNumberProcessors (82b7996c)] ds:0023:82b7996c=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82b043d8 to 82a577eb STACK_TEXT: 8dd20ec4 82b043d8 badb0d00 82b3934c 8dd20fa4 nt!KiTrap0E+0x2cf 8dd20f44 82b02f69 82a793b5 82b48c78 00000000 nt!PpmPerfSelectProcessorStates+0x75 8dd20f48 82a793b5 82b48c78 00000000 00000000 nt!PpmCheckRun+0x5a 8dd20fa4 82a79218 8dd00120 87cb66c8 00000000 nt!KiExecuteAllDpcs+0xf9 8dd20ff4 82a789dc a2f42ce4 00000000 00000000 nt!KiRetireDpcList+0xd5 8dd20ff8 a2f42ce4 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c WARNING: Frame IP not in any known module. Following frames may be wrong. 82a789dc 00000000 0000001a 00d6850f bb830000 0xa2f42ce4 STACK_COMMAND: kb FOLLOWUP_IP: nt!PpmPerfSelectProcessorStates+75 82b043d8 3b056c99b782 cmp eax,dword ptr [nt!KeNumberProcessors (82b7996c)] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!PpmPerfSelectProcessorStates+75 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrpamp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007 FAILURE_BUCKET_ID: 0xA_nt!PpmPerfSelectProcessorStates+75 BUCKET_ID: 0xA_nt!PpmPerfSelectProcessorStates+75 Followup: MachineOwner ---------
Last edited by Brink; 11 Oct 2012 at 01:48. Reason: merged and code box