New
#1
BSOD launching TERA MMO, error 0x00000050
Ive already run check disck and two different memtests for four passes and got no errors on either, I blue screen every time I try to launch TERA. I also posted about this on the forums there and someone mentioned that TERA has a memory leak and that will sometimes cause it to use a lot of memory. I have a few different crash logs:
Code:Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Bruce\Documents\crash\052914-87329-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17835.amd64fre.win7sp1_gdr.120503-2030 Machine Name: Kernel base = 0xfffff800`0480d000 PsLoadedModuleList = 0xfffff800`04a51670 Debug session time: Thu May 29 01:29:00.309 2014 (UTC - 4:00) System Uptime: 0 days 1:34:52.166 Loading Kernel Symbols . Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. .............................................................. ................................................................ ......................................................... Loading User Symbols Loading unloaded module list .................................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff880afc88cd0, 1, fffffa80095df2e6, 5} Could not read faulting driver name Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f ) Followup: MachineOwner --------- 6: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff880afc88cd0, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffffa80095df2e6, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abb100 GetUlongFromAddress: unable to read from fffff80004abb1c0 fffff880afc88cd0 Nonpaged pool FAULTING_IP: +ab3783872089359 fffffa80`095df2e6 f3aa rep stos byte ptr [rdi] MM_INTERNAL_CODE: 5 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: CTAELicensing. CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre TRAP_FRAME: fffff8800c942380 -- (.trap 0xfffff8800c942380) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000057371200 rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000 rip=fffffa80095df2e6 rsp=fffff8800c942518 rbp=fffffa8006ed04e0 r8=0000000057371200 r9=0000000000000001 r10=fffff88006ff9cd0 r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc fffffa80`095df2e6 f3aa rep stos byte ptr [rdi] Resetting default scope LAST_CONTROL_TRANSFER: from fffff80004832f0f to fffff8000488c1c0 STACK_TEXT: fffff880`0c942518 fffffa80`095df7e4 : 00000000`00000022 fffffa80`06ed0380 fffffa80`00000001 fffffa80`06ed04e0 : 0xfffffa80`095df2e6 fffff880`0c942520 00000000`00000022 : fffffa80`06ed0380 fffffa80`00000001 fffffa80`06ed04e0 fffffa80`00000001 : 0xfffffa80`095df7e4 fffff880`0c942528 fffffa80`06ed0380 : fffffa80`00000001 fffffa80`06ed04e0 fffffa80`00000001 fffffa80`00000000 : 0x22 fffff880`0c942530 fffffa80`00000001 : fffffa80`06ed04e0 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`06ed0380 fffff880`0c942538 fffffa80`06ed04e0 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001 fffff880`0c942540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`06ed04e0 : 0xfffffa80`06ed04e0 fffff880`0c942548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`06ed04e0 fffffa80`06ed0380 : 0xfffffa80`00000001 fffff880`0c942550 00000000`00000200 : 00000000`00000200 fffffa80`06ed04e0 fffffa80`06ed0380 fffffa80`06ed0380 : 0xfffffa80`00000000 fffff880`0c942558 00000000`00000200 : fffffa80`06ed04e0 fffffa80`06ed0380 fffffa80`06ed0380 fffff880`0100b7a7 : 0x200 fffff880`0c942560 fffffa80`06ed04e0 : fffffa80`06ed0380 fffffa80`06ed0380 fffff880`0100b7a7 fffffa80`06ed0380 : 0x200 fffff880`0c942568 fffffa80`06ed0380 : fffffa80`06ed0380 fffff880`0100b7a7 fffffa80`06ed0380 fffffa80`06ed0380 : 0xfffffa80`06ed04e0 fffff880`0c942570 fffffa80`06ed0380 : fffff880`0100b7a7 fffffa80`06ed0380 fffffa80`06ed0380 fffffa80`07598550 : 0xfffffa80`06ed0380 fffff880`0c942578 fffff880`0100b7a7 : fffffa80`06ed0380 fffffa80`06ed0380 fffffa80`07598550 fffff8a0`1d675298 : 0xfffffa80`06ed0380 fffff880`0c942580 fffff880`01013789 : fffff880`01031b50 fffff880`0c942738 00000000`00000200 fffffa80`06ed04e0 : ACPI!ACPIDispatchForwardIrp+0x37 fffff880`0c9425b0 fffff880`0100ba3f : fffff880`01031b50 fffffa80`074bda90 fffffa80`06ed0380 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75 fffff880`0c9425e0 fffff880`00dcb445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b fffff880`0c942660 fffff880`00dcb975 : fffffa80`078bd010 fffffa80`07598550 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355 fffff880`0c942700 fffff880`012340af : fffffa80`111d9c10 fffffa80`111d9c10 fffffa80`111d9e00 fffffa80`11aba320 : CLASSPNP!ClassReadWrite+0xd5 fffff880`0c942750 fffff800`04af31b0 : fffffa80`111d9e48 fffffa80`06e04c40 fffffa80`11670f20 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f fffff880`0c942780 fffff800`04af2e4d : 00000000`00000000 fffff880`0c942860 fffffa80`111d9c10 fffff800`04881ddd : nt!RawReadWriteDeviceControl+0xa8 fffff880`0c9427c0 fffff880`00f4cbcf : fffffa80`111d9e48 fffffa80`11485690 00000000`00000000 fffffa80`111d9c10 : nt!RawDispatch+0x7d fffff880`0c942820 fffff880`00f4b6df : fffffa80`09430bd0 00000000`00000001 fffffa80`09430b00 fffffa80`111d9c10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`0c9428b0 fffff800`04b8feab : 00000000`00000000 fffffa80`11670f20 00000000`00000001 fffffa80`111d9c10 : fltmgr!FltpDispatch+0xcf fffff880`0c942910 fffff800`04b71753 : fffffa80`11670f20 fffffa80`111d9c01 fffffa80`11670f20 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb fffff880`0c942980 fffff800`0488b453 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631 fffff880`0c942a70 00000000`750a2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0049f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x750a2e09 STACK_COMMAND: .trap 0xfffff8800c942380 ; kb FOLLOWUP_IP: partmgr!PmGlobalDispatch+9f fffff880`012340af 8bf0 mov esi,eax SYMBOL_STACK_INDEX: 12 SYMBOL_NAME: partmgr!PmGlobalDispatch+9f FOLLOWUP_NAME: MachineOwner MODULE_NAME: partmgr IMAGE_NAME: partmgr.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4f641bc1 IMAGE_VERSION: 6.1.7601.17796 FAILURE_BUCKET_ID: X64_0x50_partmgr!PmGlobalDispatch+9f BUCKET_ID: X64_0x50_partmgr!PmGlobalDispatch+9f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x50_partmgr!pmglobaldispatch+9f FAILURE_ID_HASH: {52e5f7db-32c8-b25d-7537-9fbcea4fd678} Followup: MachineOwner ---------Code:Microsoft (R) Windows Debugger Version 6.3.9600.17029 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Bruce\Documents\crash\052914-65333-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.18247.amd64fre.win7sp1_gdr.130828-1532 Machine Name: Kernel base = 0xfffff800`04812000 PsLoadedModuleList = 0xfffff800`04a556d0 Debug session time: Thu May 29 23:09:14.905 2014 (UTC - 4:00) System Uptime: 0 days 0:11:30.873 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ..................................................... Loading User Symbols Loading unloaded module list .................................................. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff880b36ba520, 1, fffffa8007a632e6, 5} Could not read faulting driver name Probably caused by : partmgr.sys ( partmgr!PmGlobalDispatch+9f ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff880b36ba520, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffffa8007a632e6, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Nnn Debugging Details: ------------------ Could not read faulting driver name OVERLAPPED_MODULE: Address regions for 'lltdio' and 'RtsUVStor.sy' overlap WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80004abf100 GetUlongFromAddress: unable to read from fffff80004abf1c0 fffff880b36ba520 Nonpaged pool FAULTING_IP: +7b371f073829359 fffffa80`07a632e6 f3aa rep stos byte ptr [rdi] MM_INTERNAL_CODE: 5 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: CTAELicensing. CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) x86fre TRAP_FRAME: fffff8800a944380 -- (.trap 0xfffff8800a944380) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000057373a00 rdx=0000000000000022 rsi=0000000000000000 rdi=0000000000000000 rip=fffffa8007a632e6 rsp=fffff8800a944518 rbp=fffffa801048c170 r8=0000000057373a00 r9=0000000000000001 r10=fffff8800aa2dd20 r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc fffffa80`07a632e6 f3aa rep stos byte ptr [rdi] Resetting default scope LAST_CONTROL_TRANSFER: from fffff800049045b3 to fffff80004887bc0 STACK_TEXT: fffff880`0a944518 fffffa80`07a637e4 : 00000000`00000022 fffffa80`1048c010 fffffa80`00000001 fffffa80`1048c170 : 0xfffffa80`07a632e6 fffff880`0a944520 00000000`00000022 : fffffa80`1048c010 fffffa80`00000001 fffffa80`1048c170 fffffa80`00000001 : 0xfffffa80`07a637e4 fffff880`0a944528 fffffa80`1048c010 : fffffa80`00000001 fffffa80`1048c170 fffffa80`00000001 fffffa80`00000000 : 0x22 fffff880`0a944530 fffffa80`00000001 : fffffa80`1048c170 fffffa80`00000001 fffffa80`00000000 00000000`00000200 : 0xfffffa80`1048c010 fffff880`0a944538 fffffa80`1048c170 : fffffa80`00000001 fffffa80`00000000 00000000`00000200 00000000`00000200 : 0xfffffa80`00000001 fffff880`0a944540 fffffa80`00000001 : fffffa80`00000000 00000000`00000200 00000000`00000200 fffffa80`1048c170 : 0xfffffa80`1048c170 fffff880`0a944548 fffffa80`00000000 : 00000000`00000200 00000000`00000200 fffffa80`1048c170 fffffa80`1048c010 : 0xfffffa80`00000001 fffff880`0a944550 00000000`00000200 : 00000000`00000200 fffffa80`1048c170 fffffa80`1048c010 fffffa80`1048c010 : 0xfffffa80`00000000 fffff880`0a944558 00000000`00000200 : fffffa80`1048c170 fffffa80`1048c010 fffffa80`1048c010 fffff880`00f467a7 : 0x200 fffff880`0a944560 fffffa80`1048c170 : fffffa80`1048c010 fffffa80`1048c010 fffff880`00f467a7 fffffa80`1048c010 : 0x200 fffff880`0a944568 fffffa80`1048c010 : fffffa80`1048c010 fffff880`00f467a7 fffffa80`1048c010 fffffa80`1048c010 : 0xfffffa80`1048c170 fffff880`0a944570 fffffa80`1048c010 : fffff880`00f467a7 fffffa80`1048c010 fffffa80`1048c010 fffffa80`075656e0 : 0xfffffa80`1048c010 fffff880`0a944578 fffff880`00f467a7 : fffffa80`1048c010 fffffa80`1048c010 fffffa80`075656e0 fffff8a0`1f74fa98 : 0xfffffa80`1048c010 fffff880`0a944580 fffff880`00f4e789 : fffff880`00f6cb50 fffff880`0a944738 00000000`00000200 fffffa80`1048c170 : ACPI!ACPIDispatchForwardIrp+0x37 fffff880`0a9445b0 fffff880`00f46a3f : fffff880`00f6cb50 fffffa80`074c7010 fffffa80`1048c010 00000000`00000000 : ACPI!ACPIIrpDispatchDeviceControl+0x75 fffff880`0a9445e0 fffff880`01401445 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : ACPI!ACPIDispatchIrp+0x12b fffff880`0a944660 fffff880`01401975 : fffffa80`078c3010 fffffa80`075656e0 00000000`00020000 fffff880`00000000 : CLASSPNP!ServiceTransferRequest+0x355 fffff880`0a944700 fffff880`010340af : fffffa80`10af98b0 fffffa80`10af98b0 fffffa80`10af9aa0 fffffa80`10b9b800 : CLASSPNP!ClassReadWrite+0xd5 fffff880`0a944750 fffff800`04af4a28 : fffffa80`10af9ae8 fffffa80`10847e50 fffffa80`10192630 00000000`00000000 : partmgr!PmGlobalDispatch+0x9f fffff880`0a944780 fffff800`04af46bd : 00000000`00000000 fffff880`0a944860 fffffa80`10af98b0 fffff800`0487d7fd : nt!RawReadWriteDeviceControl+0xa8 fffff880`0a9447c0 fffff880`01242bcf : fffffa80`10af9ae8 fffffa80`096a7e30 00000000`00000000 fffffa80`10af98b0 : nt!RawDispatch+0x7d fffff880`0a944820 fffff880`012416df : fffffa80`10bc1990 00000000`00000001 fffffa80`10bc1900 fffffa80`10af98b0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`0a9448b0 fffff800`04b9117b : 00000000`00000000 fffffa80`10192630 00000000`00000001 fffffa80`10af98b0 : fltmgr!FltpDispatch+0xcf fffff880`0a944910 fffff800`04b70e53 : fffffa80`10192630 fffffa80`10af9801 fffffa80`10192630 00000000`00000002 : nt!IopSynchronousServiceTail+0xfb fffff880`0a944980 fffff800`04886e53 : 00000000`000000ec 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x631 fffff880`0a944a70 00000000`756e2e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`00d6f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x756e2e09 STACK_COMMAND: .trap 0xfffff8800a944380 ; kb FOLLOWUP_IP: partmgr!PmGlobalDispatch+9f fffff880`010340af 8bf0 mov esi,eax SYMBOL_STACK_INDEX: 12 SYMBOL_NAME: partmgr!PmGlobalDispatch+9f FOLLOWUP_NAME: MachineOwner MODULE_NAME: partmgr IMAGE_NAME: partmgr.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4f641bc1 IMAGE_VERSION: 6.1.7601.17796 FAILURE_BUCKET_ID: X64_0x50_partmgr!PmGlobalDispatch+9f BUCKET_ID: X64_0x50_partmgr!PmGlobalDispatch+9f ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x50_partmgr!pmglobaldispatch+9f FAILURE_ID_HASH: {52e5f7db-32c8-b25d-7537-9fbcea4fd678} Followup: MachineOwner ---------