Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD playing World Of Tanks/Sims 4

25 Nov 2015   #1
Omfgorz

Windows 7 Professional x64
 
 
BSOD playing World Of Tanks/Sims 4

I think it can be my PSU, because i hear the coil always. While moving my mouse its buzzing... And before BSOD it start BUZZ louder and then BOOM BSOD. Check this out, maybe you can tell me something. Thank you...

Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Code:
Loading Dump File [C:\Users\Mini\Desktop\111815-12464-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.19045.amd64fre.win7sp1_gdr.151019-1254
Machine Name:
Kernel base = 0xfffff800`03065000 PsLoadedModuleList = 0xfffff800`032ac730
Debug session time: Wed Nov 18 23:13:09.343 2015 (UTC + 2:00)
System Uptime: 0 days 0:59:43.061
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {fffffa8013ea8010, 2, 1, fffff80003199626}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa8013ea8010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003199626, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003316100
GetUlongFromAddress: unable to read from fffff800033161c0
 fffffa8013ea8010 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  chrome.exe

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  fffff8800c066eb0 -- (.trap 0xfffff8800c066eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800fea8010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003199626 rsp=fffff8800c067040 rbp=0000000020000000
 r8=fffff8800c067070  r9=0000000000000002 r10=0000000000000000
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp ds:fffffa80`0fea8010=e33007feff3fffbf
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d81e9 to fffff800030d8c40

STACK_TEXT:  
fffff880`0c066d68 fffff800`030d81e9 : 00000000`0000000a fffffa80`13ea8010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c066d70 fffff800`030d6e60 : fffffa80`11436120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c066eb0 fffff800`03199626 : fffffa80`1216fc80 00000000`00000000 fffffa80`0f97f850 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0c067040 fffff800`03143cd1 : 20000000`00000180 00000000`00000000 20000000`00000180 fffffa80`107bc000 : nt!MiReleaseConfirmedPageFileSpace+0x86
fffff880`0c0670c0 fffff800`033772af : fffffa80`11ebe990 fffff8a0`033af400 fffffa80`11ebe990 00000000`00180000 : nt! ?? ::FNODOBFM::`string'+0x2ac1d
fffff880`0c067190 fffff800`030e2504 : 00000000`00000000 fffff8a0`033af4b0 fffffa80`0d64f4f0 fffffa80`0d64f4f0 : nt!MiSegmentDelete+0x7b
fffff880`0c0671d0 fffff880`05591327 : fffff8a0`033af4b0 fffff8a0`032d1010 00000000`00000000 fffff8a0`033af4b0 : nt!ObfDereferenceObject+0xd4
fffff880`0c067230 fffff880`055907b8 : fffff8a0`032e00e0 fffff8a0`032e00e0 fffff8a0`034900d0 fffff8a0`0a9ac750 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c067260 fffff880`055906c6 : fffffa80`00000000 fffffa80`11275b10 fffffa80`1135d340 fffffa80`107b5c20 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c067290 fffff880`0557bc93 : fffff880`0c0672b8 fffff8a0`03fd60d0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c0672c0 fffff880`05576637 : fffffa80`1216fc80 00000000`00000000 fffff8a0`033af4b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x11b
fffff880`0c067370 fffff880`0555cecc : fffff880`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c067440 fffff880`0549dccc : 00000000`00000000 fffff8a0`0a6b4000 fffff8a0`0a6b4000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c067470 fffff880`054b08b8 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c067560 fffff880`05495815 : 00000000`fffffeda fffff8a0`09d9f960 fffff8a0`0a6b4000 fffffa80`107ae000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c0675d0 fffff880`054d3fee : 00000000`00000001 fffffa80`107ae000 fffff8a0`09d9f960 fffff8a0`09d9f9e0 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c067600 fffff880`054d3984 : fffff900`c63f1cd0 00000000`00000000 00000000`00000001 fffff900`c63f1cd0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c0676b0 fffff960`000f7db4 : 00000000`00001290 fffff900`c63f1cd0 00000000`00000000 fffff900`c63f1cd0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c067740 fffff960`000f74a7 : 00000000`00000000 fffff880`0c067ae0 fffffa80`11436060 00000000`00000000 : win32k!GdiProcessCallout+0x244
fffff880`0c0677c0 fffff800`033aea97 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`11436000 : win32k!W32pProcessCallout+0x6b
fffff880`0c0677f0 fffff800`03393b5d : 00000000`c000001d 00000000`c0000001 fffffa80`78457300 fffffa80`0f77e060 : nt!PspExitThread+0x4cb
fffff880`0c0678f0 fffff800`030cbf1a : 00000000`00000100 fffffa80`11436120 00000000`00000001 fffff800`030ddcad : nt!PsExitSpecialApc+0x1d
fffff880`0c067920 fffff800`030cc260 : 00000000`00000246 fffff880`0c0679a0 fffff800`03393ad0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0c0679a0 fffff800`030d7f77 : fffffa80`11436060 00000000`00000304 00000000`00000000 fffffa80`10858d90 : nt!KiInitiateUserApc+0x70
fffff880`0c067ae0 00000000`74752e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`063ff028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`05591327 eb22            jmp     dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`0559134b)

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5164dc13

IMAGE_VERSION:  6.1.7601.18126

FAILURE_BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_dxgmms1!vidmm_process_heap::freeblock+2f

FAILURE_ID_HASH:  {74216d2d-b1af-0739-0f35-d93dfb479770}

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa8013ea8010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003199626, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffffa8013ea8010 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  chrome.exe

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  fffff8800c066eb0 -- (.trap 0xfffff8800c066eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800fea8010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003199626 rsp=fffff8800c067040 rbp=0000000020000000
 r8=fffff8800c067070  r9=0000000000000002 r10=0000000000000000
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp ds:fffffa80`0fea8010=e33007feff3fffbf
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d81e9 to fffff800030d8c40

STACK_TEXT:  
fffff880`0c066d68 fffff800`030d81e9 : 00000000`0000000a fffffa80`13ea8010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c066d70 fffff800`030d6e60 : fffffa80`11436120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c066eb0 fffff800`03199626 : fffffa80`1216fc80 00000000`00000000 fffffa80`0f97f850 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0c067040 fffff800`03143cd1 : 20000000`00000180 00000000`00000000 20000000`00000180 fffffa80`107bc000 : nt!MiReleaseConfirmedPageFileSpace+0x86
fffff880`0c0670c0 fffff800`033772af : fffffa80`11ebe990 fffff8a0`033af400 fffffa80`11ebe990 00000000`00180000 : nt! ?? ::FNODOBFM::`string'+0x2ac1d
fffff880`0c067190 fffff800`030e2504 : 00000000`00000000 fffff8a0`033af4b0 fffffa80`0d64f4f0 fffffa80`0d64f4f0 : nt!MiSegmentDelete+0x7b
fffff880`0c0671d0 fffff880`05591327 : fffff8a0`033af4b0 fffff8a0`032d1010 00000000`00000000 fffff8a0`033af4b0 : nt!ObfDereferenceObject+0xd4
fffff880`0c067230 fffff880`055907b8 : fffff8a0`032e00e0 fffff8a0`032e00e0 fffff8a0`034900d0 fffff8a0`0a9ac750 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c067260 fffff880`055906c6 : fffffa80`00000000 fffffa80`11275b10 fffffa80`1135d340 fffffa80`107b5c20 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c067290 fffff880`0557bc93 : fffff880`0c0672b8 fffff8a0`03fd60d0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c0672c0 fffff880`05576637 : fffffa80`1216fc80 00000000`00000000 fffff8a0`033af4b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x11b
fffff880`0c067370 fffff880`0555cecc : fffff880`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c067440 fffff880`0549dccc : 00000000`00000000 fffff8a0`0a6b4000 fffff8a0`0a6b4000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c067470 fffff880`054b08b8 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c067560 fffff880`05495815 : 00000000`fffffeda fffff8a0`09d9f960 fffff8a0`0a6b4000 fffffa80`107ae000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c0675d0 fffff880`054d3fee : 00000000`00000001 fffffa80`107ae000 fffff8a0`09d9f960 fffff8a0`09d9f9e0 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c067600 fffff880`054d3984 : fffff900`c63f1cd0 00000000`00000000 00000000`00000001 fffff900`c63f1cd0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c0676b0 fffff960`000f7db4 : 00000000`00001290 fffff900`c63f1cd0 00000000`00000000 fffff900`c63f1cd0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c067740 fffff960`000f74a7 : 00000000`00000000 fffff880`0c067ae0 fffffa80`11436060 00000000`00000000 : win32k!GdiProcessCallout+0x244
fffff880`0c0677c0 fffff800`033aea97 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`11436000 : win32k!W32pProcessCallout+0x6b
fffff880`0c0677f0 fffff800`03393b5d : 00000000`c000001d 00000000`c0000001 fffffa80`78457300 fffffa80`0f77e060 : nt!PspExitThread+0x4cb
fffff880`0c0678f0 fffff800`030cbf1a : 00000000`00000100 fffffa80`11436120 00000000`00000001 fffff800`030ddcad : nt!PsExitSpecialApc+0x1d
fffff880`0c067920 fffff800`030cc260 : 00000000`00000246 fffff880`0c0679a0 fffff800`03393ad0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0c0679a0 fffff800`030d7f77 : fffffa80`11436060 00000000`00000304 00000000`00000000 fffffa80`10858d90 : nt!KiInitiateUserApc+0x70
fffff880`0c067ae0 00000000`74752e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`063ff028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`05591327 eb22            jmp     dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`0559134b)

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5164dc13

IMAGE_VERSION:  6.1.7601.18126

FAILURE_BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_dxgmms1!vidmm_process_heap::freeblock+2f

FAILURE_ID_HASH:  {74216d2d-b1af-0739-0f35-d93dfb479770}

Followup: MachineOwner
---------



My System SpecsSystem Spec
.
26 Nov 2015   #2
Omfgorz

Windows 7 Professional x64
 
 

Code:
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa8013ea8010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003199626, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffffa8013ea8010 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  chrome.exe

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  fffff8800c066eb0 -- (.trap 0xfffff8800c066eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800fea8010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003199626 rsp=fffff8800c067040 rbp=0000000020000000
 r8=fffff8800c067070  r9=0000000000000002 r10=0000000000000000
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp ds:fffffa80`0fea8010=e33007feff3fffbf
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d81e9 to fffff800030d8c40

STACK_TEXT:  
fffff880`0c066d68 fffff800`030d81e9 : 00000000`0000000a fffffa80`13ea8010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c066d70 fffff800`030d6e60 : fffffa80`11436120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c066eb0 fffff800`03199626 : fffffa80`1216fc80 00000000`00000000 fffffa80`0f97f850 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0c067040 fffff800`03143cd1 : 20000000`00000180 00000000`00000000 20000000`00000180 fffffa80`107bc000 : nt!MiReleaseConfirmedPageFileSpace+0x86
fffff880`0c0670c0 fffff800`033772af : fffffa80`11ebe990 fffff8a0`033af400 fffffa80`11ebe990 00000000`00180000 : nt! ?? ::FNODOBFM::`string'+0x2ac1d
fffff880`0c067190 fffff800`030e2504 : 00000000`00000000 fffff8a0`033af4b0 fffffa80`0d64f4f0 fffffa80`0d64f4f0 : nt!MiSegmentDelete+0x7b
fffff880`0c0671d0 fffff880`05591327 : fffff8a0`033af4b0 fffff8a0`032d1010 00000000`00000000 fffff8a0`033af4b0 : nt!ObfDereferenceObject+0xd4
fffff880`0c067230 fffff880`055907b8 : fffff8a0`032e00e0 fffff8a0`032e00e0 fffff8a0`034900d0 fffff8a0`0a9ac750 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c067260 fffff880`055906c6 : fffffa80`00000000 fffffa80`11275b10 fffffa80`1135d340 fffffa80`107b5c20 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c067290 fffff880`0557bc93 : fffff880`0c0672b8 fffff8a0`03fd60d0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c0672c0 fffff880`05576637 : fffffa80`1216fc80 00000000`00000000 fffff8a0`033af4b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x11b
fffff880`0c067370 fffff880`0555cecc : fffff880`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c067440 fffff880`0549dccc : 00000000`00000000 fffff8a0`0a6b4000 fffff8a0`0a6b4000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c067470 fffff880`054b08b8 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c067560 fffff880`05495815 : 00000000`fffffeda fffff8a0`09d9f960 fffff8a0`0a6b4000 fffffa80`107ae000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c0675d0 fffff880`054d3fee : 00000000`00000001 fffffa80`107ae000 fffff8a0`09d9f960 fffff8a0`09d9f9e0 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c067600 fffff880`054d3984 : fffff900`c63f1cd0 00000000`00000000 00000000`00000001 fffff900`c63f1cd0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c0676b0 fffff960`000f7db4 : 00000000`00001290 fffff900`c63f1cd0 00000000`00000000 fffff900`c63f1cd0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c067740 fffff960`000f74a7 : 00000000`00000000 fffff880`0c067ae0 fffffa80`11436060 00000000`00000000 : win32k!GdiProcessCallout+0x244
fffff880`0c0677c0 fffff800`033aea97 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`11436000 : win32k!W32pProcessCallout+0x6b
fffff880`0c0677f0 fffff800`03393b5d : 00000000`c000001d 00000000`c0000001 fffffa80`78457300 fffffa80`0f77e060 : nt!PspExitThread+0x4cb
fffff880`0c0678f0 fffff800`030cbf1a : 00000000`00000100 fffffa80`11436120 00000000`00000001 fffff800`030ddcad : nt!PsExitSpecialApc+0x1d
fffff880`0c067920 fffff800`030cc260 : 00000000`00000246 fffff880`0c0679a0 fffff800`03393ad0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0c0679a0 fffff800`030d7f77 : fffffa80`11436060 00000000`00000304 00000000`00000000 fffffa80`10858d90 : nt!KiInitiateUserApc+0x70
fffff880`0c067ae0 00000000`74752e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`063ff028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`05591327 eb22            jmp     dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`0559134b)

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5164dc13

IMAGE_VERSION:  6.1.7601.18126

FAILURE_BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_dxgmms1!vidmm_process_heap::freeblock+2f

FAILURE_ID_HASH:  {74216d2d-b1af-0739-0f35-d93dfb479770}

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa8013ea8010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003199626, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffffa8013ea8010 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  chrome.exe

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  fffff8800c066eb0 -- (.trap 0xfffff8800c066eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800fea8010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003199626 rsp=fffff8800c067040 rbp=0000000020000000
 r8=fffff8800c067070  r9=0000000000000002 r10=0000000000000000
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp ds:fffffa80`0fea8010=e33007feff3fffbf
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d81e9 to fffff800030d8c40

STACK_TEXT:  
fffff880`0c066d68 fffff800`030d81e9 : 00000000`0000000a fffffa80`13ea8010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c066d70 fffff800`030d6e60 : fffffa80`11436120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c066eb0 fffff800`03199626 : fffffa80`1216fc80 00000000`00000000 fffffa80`0f97f850 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0c067040 fffff800`03143cd1 : 20000000`00000180 00000000`00000000 20000000`00000180 fffffa80`107bc000 : nt!MiReleaseConfirmedPageFileSpace+0x86
fffff880`0c0670c0 fffff800`033772af : fffffa80`11ebe990 fffff8a0`033af400 fffffa80`11ebe990 00000000`00180000 : nt! ?? ::FNODOBFM::`string'+0x2ac1d
fffff880`0c067190 fffff800`030e2504 : 00000000`00000000 fffff8a0`033af4b0 fffffa80`0d64f4f0 fffffa80`0d64f4f0 : nt!MiSegmentDelete+0x7b
fffff880`0c0671d0 fffff880`05591327 : fffff8a0`033af4b0 fffff8a0`032d1010 00000000`00000000 fffff8a0`033af4b0 : nt!ObfDereferenceObject+0xd4
fffff880`0c067230 fffff880`055907b8 : fffff8a0`032e00e0 fffff8a0`032e00e0 fffff8a0`034900d0 fffff8a0`0a9ac750 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c067260 fffff880`055906c6 : fffffa80`00000000 fffffa80`11275b10 fffffa80`1135d340 fffffa80`107b5c20 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c067290 fffff880`0557bc93 : fffff880`0c0672b8 fffff8a0`03fd60d0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c0672c0 fffff880`05576637 : fffffa80`1216fc80 00000000`00000000 fffff8a0`033af4b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x11b
fffff880`0c067370 fffff880`0555cecc : fffff880`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c067440 fffff880`0549dccc : 00000000`00000000 fffff8a0`0a6b4000 fffff8a0`0a6b4000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c067470 fffff880`054b08b8 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c067560 fffff880`05495815 : 00000000`fffffeda fffff8a0`09d9f960 fffff8a0`0a6b4000 fffffa80`107ae000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c0675d0 fffff880`054d3fee : 00000000`00000001 fffffa80`107ae000 fffff8a0`09d9f960 fffff8a0`09d9f9e0 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c067600 fffff880`054d3984 : fffff900`c63f1cd0 00000000`00000000 00000000`00000001 fffff900`c63f1cd0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c0676b0 fffff960`000f7db4 : 00000000`00001290 fffff900`c63f1cd0 00000000`00000000 fffff900`c63f1cd0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c067740 fffff960`000f74a7 : 00000000`00000000 fffff880`0c067ae0 fffffa80`11436060 00000000`00000000 : win32k!GdiProcessCallout+0x244
fffff880`0c0677c0 fffff800`033aea97 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`11436000 : win32k!W32pProcessCallout+0x6b
fffff880`0c0677f0 fffff800`03393b5d : 00000000`c000001d 00000000`c0000001 fffffa80`78457300 fffffa80`0f77e060 : nt!PspExitThread+0x4cb
fffff880`0c0678f0 fffff800`030cbf1a : 00000000`00000100 fffffa80`11436120 00000000`00000001 fffff800`030ddcad : nt!PsExitSpecialApc+0x1d
fffff880`0c067920 fffff800`030cc260 : 00000000`00000246 fffff880`0c0679a0 fffff800`03393ad0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0c0679a0 fffff800`030d7f77 : fffffa80`11436060 00000000`00000304 00000000`00000000 fffffa80`10858d90 : nt!KiInitiateUserApc+0x70
fffff880`0c067ae0 00000000`74752e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`063ff028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`05591327 eb22            jmp     dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`0559134b)

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5164dc13

IMAGE_VERSION:  6.1.7601.18126

FAILURE_BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_dxgmms1!vidmm_process_heap::freeblock+2f

FAILURE_ID_HASH:  {74216d2d-b1af-0739-0f35-d93dfb479770}

Followup: MachineOwner
---------
My System SpecsSystem Spec
26 Nov 2015   #3
Omfgorz

Windows 7 Professional x64
 
 

Code:
4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa8013ea8010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003199626, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffffa8013ea8010 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  chrome.exe

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  fffff8800c066eb0 -- (.trap 0xfffff8800c066eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800fea8010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003199626 rsp=fffff8800c067040 rbp=0000000020000000
 r8=fffff8800c067070  r9=0000000000000002 r10=0000000000000000
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp ds:fffffa80`0fea8010=e33007feff3fffbf
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d81e9 to fffff800030d8c40

STACK_TEXT:  
fffff880`0c066d68 fffff800`030d81e9 : 00000000`0000000a fffffa80`13ea8010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c066d70 fffff800`030d6e60 : fffffa80`11436120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c066eb0 fffff800`03199626 : fffffa80`1216fc80 00000000`00000000 fffffa80`0f97f850 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0c067040 fffff800`03143cd1 : 20000000`00000180 00000000`00000000 20000000`00000180 fffffa80`107bc000 : nt!MiReleaseConfirmedPageFileSpace+0x86
fffff880`0c0670c0 fffff800`033772af : fffffa80`11ebe990 fffff8a0`033af400 fffffa80`11ebe990 00000000`00180000 : nt! ?? ::FNODOBFM::`string'+0x2ac1d
fffff880`0c067190 fffff800`030e2504 : 00000000`00000000 fffff8a0`033af4b0 fffffa80`0d64f4f0 fffffa80`0d64f4f0 : nt!MiSegmentDelete+0x7b
fffff880`0c0671d0 fffff880`05591327 : fffff8a0`033af4b0 fffff8a0`032d1010 00000000`00000000 fffff8a0`033af4b0 : nt!ObfDereferenceObject+0xd4
fffff880`0c067230 fffff880`055907b8 : fffff8a0`032e00e0 fffff8a0`032e00e0 fffff8a0`034900d0 fffff8a0`0a9ac750 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c067260 fffff880`055906c6 : fffffa80`00000000 fffffa80`11275b10 fffffa80`1135d340 fffffa80`107b5c20 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c067290 fffff880`0557bc93 : fffff880`0c0672b8 fffff8a0`03fd60d0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c0672c0 fffff880`05576637 : fffffa80`1216fc80 00000000`00000000 fffff8a0`033af4b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x11b
fffff880`0c067370 fffff880`0555cecc : fffff880`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c067440 fffff880`0549dccc : 00000000`00000000 fffff8a0`0a6b4000 fffff8a0`0a6b4000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c067470 fffff880`054b08b8 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c067560 fffff880`05495815 : 00000000`fffffeda fffff8a0`09d9f960 fffff8a0`0a6b4000 fffffa80`107ae000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c0675d0 fffff880`054d3fee : 00000000`00000001 fffffa80`107ae000 fffff8a0`09d9f960 fffff8a0`09d9f9e0 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c067600 fffff880`054d3984 : fffff900`c63f1cd0 00000000`00000000 00000000`00000001 fffff900`c63f1cd0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c0676b0 fffff960`000f7db4 : 00000000`00001290 fffff900`c63f1cd0 00000000`00000000 fffff900`c63f1cd0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c067740 fffff960`000f74a7 : 00000000`00000000 fffff880`0c067ae0 fffffa80`11436060 00000000`00000000 : win32k!GdiProcessCallout+0x244
fffff880`0c0677c0 fffff800`033aea97 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`11436000 : win32k!W32pProcessCallout+0x6b
fffff880`0c0677f0 fffff800`03393b5d : 00000000`c000001d 00000000`c0000001 fffffa80`78457300 fffffa80`0f77e060 : nt!PspExitThread+0x4cb
fffff880`0c0678f0 fffff800`030cbf1a : 00000000`00000100 fffffa80`11436120 00000000`00000001 fffff800`030ddcad : nt!PsExitSpecialApc+0x1d
fffff880`0c067920 fffff800`030cc260 : 00000000`00000246 fffff880`0c0679a0 fffff800`03393ad0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0c0679a0 fffff800`030d7f77 : fffffa80`11436060 00000000`00000304 00000000`00000000 fffffa80`10858d90 : nt!KiInitiateUserApc+0x70
fffff880`0c067ae0 00000000`74752e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`063ff028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`05591327 eb22            jmp     dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`0559134b)

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5164dc13

IMAGE_VERSION:  6.1.7601.18126

FAILURE_BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_dxgmms1!vidmm_process_heap::freeblock+2f

FAILURE_ID_HASH:  {74216d2d-b1af-0739-0f35-d93dfb479770}

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa8013ea8010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003199626, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS:  fffffa8013ea8010 Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!MiReleaseConfirmedPageFileSpace+86
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  chrome.exe

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  fffff8800c066eb0 -- (.trap 0xfffff8800c066eb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800fea8010 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003199626 rsp=fffff8800c067040 rbp=0000000020000000
 r8=fffff8800c067070  r9=0000000000000002 r10=0000000000000000
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x86:
fffff800`03199626 480fb328        btr     qword ptr [rax],rbp ds:fffffa80`0fea8010=e33007feff3fffbf
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800030d81e9 to fffff800030d8c40

STACK_TEXT:  
fffff880`0c066d68 fffff800`030d81e9 : 00000000`0000000a fffffa80`13ea8010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c066d70 fffff800`030d6e60 : fffffa80`11436120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c066eb0 fffff800`03199626 : fffffa80`1216fc80 00000000`00000000 fffffa80`0f97f850 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0c067040 fffff800`03143cd1 : 20000000`00000180 00000000`00000000 20000000`00000180 fffffa80`107bc000 : nt!MiReleaseConfirmedPageFileSpace+0x86
fffff880`0c0670c0 fffff800`033772af : fffffa80`11ebe990 fffff8a0`033af400 fffffa80`11ebe990 00000000`00180000 : nt! ?? ::FNODOBFM::`string'+0x2ac1d
fffff880`0c067190 fffff800`030e2504 : 00000000`00000000 fffff8a0`033af4b0 fffffa80`0d64f4f0 fffffa80`0d64f4f0 : nt!MiSegmentDelete+0x7b
fffff880`0c0671d0 fffff880`05591327 : fffff8a0`033af4b0 fffff8a0`032d1010 00000000`00000000 fffff8a0`033af4b0 : nt!ObfDereferenceObject+0xd4
fffff880`0c067230 fffff880`055907b8 : fffff8a0`032e00e0 fffff8a0`032e00e0 fffff8a0`034900d0 fffff8a0`0a9ac750 : dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x2f
fffff880`0c067260 fffff880`055906c6 : fffffa80`00000000 fffffa80`11275b10 fffffa80`1135d340 fffffa80`107b5c20 : dxgmms1!VIDMM_PROCESS_HEAP::FreeSmallAllocation+0xdc
fffff880`0c067290 fffff880`0557bc93 : fffff880`0c0672b8 fffff8a0`03fd60d0 00000000`00000001 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Free+0x13a
fffff880`0c0672c0 fffff880`05576637 : fffffa80`1216fc80 00000000`00000000 fffff8a0`033af4b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x11b
fffff880`0c067370 fffff880`0555cecc : fffff880`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`0c067440 fffff880`0549dccc : 00000000`00000000 fffff8a0`0a6b4000 fffff8a0`0a6b4000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`0c067470 fffff880`054b08b8 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`0c067560 fffff880`05495815 : 00000000`fffffeda fffff8a0`09d9f960 fffff8a0`0a6b4000 fffffa80`107ae000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`0c0675d0 fffff880`054d3fee : 00000000`00000001 fffffa80`107ae000 fffff8a0`09d9f960 fffff8a0`09d9f9e0 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`0c067600 fffff880`054d3984 : fffff900`c63f1cd0 00000000`00000000 00000000`00000001 fffff900`c63f1cd0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`0c0676b0 fffff960`000f7db4 : 00000000`00001290 fffff900`c63f1cd0 00000000`00000000 fffff900`c63f1cd0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`0c067740 fffff960`000f74a7 : 00000000`00000000 fffff880`0c067ae0 fffffa80`11436060 00000000`00000000 : win32k!GdiProcessCallout+0x244
fffff880`0c0677c0 fffff800`033aea97 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`11436000 : win32k!W32pProcessCallout+0x6b
fffff880`0c0677f0 fffff800`03393b5d : 00000000`c000001d 00000000`c0000001 fffffa80`78457300 fffffa80`0f77e060 : nt!PspExitThread+0x4cb
fffff880`0c0678f0 fffff800`030cbf1a : 00000000`00000100 fffffa80`11436120 00000000`00000001 fffff800`030ddcad : nt!PsExitSpecialApc+0x1d
fffff880`0c067920 fffff800`030cc260 : 00000000`00000246 fffff880`0c0679a0 fffff800`03393ad0 00000000`00000001 : nt!KiDeliverApc+0x2ca
fffff880`0c0679a0 fffff800`030d7f77 : fffffa80`11436060 00000000`00000304 00000000`00000000 fffffa80`10858d90 : nt!KiInitiateUserApc+0x70
fffff880`0c067ae0 00000000`74752e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`063ff028 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f
fffff880`05591327 eb22            jmp     dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+0x53 (fffff880`0559134b)

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  5164dc13

IMAGE_VERSION:  6.1.7601.18126

FAILURE_BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

BUCKET_ID:  X64_0xA_dxgmms1!VIDMM_PROCESS_HEAP::FreeBlock+2f

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_dxgmms1!vidmm_process_heap::freeblock+2f

FAILURE_ID_HASH:  {74216d2d-b1af-0739-0f35-d93dfb479770}

Followup: MachineOwner
---------

ANYONE CAN TELL ME WHAT IS WITH MY COMPUTER???? PSU OR DDR4 ??? OR DRIVERS?? PLEASE
My System SpecsSystem Spec
.

27 Nov 2015   #4
Omfgorz

Windows 7 Professional x64
 
 

Please someone
My System SpecsSystem Spec
28 Nov 2015   #5
Omfgorz

Windows 7 Professional x64
 
 

Please someon tell me, Completely reinstalled graphic card drivers , restored default bios, all drivers up to dave. What's the problem... Tell me someon who's PRO at this issues....
My System SpecsSystem Spec
28 Nov 2015   #6
axe0

Windows 10 Pro
 
 

Put the output of Windbg in code tags for better readability
Attachment 376950
Please read BSOD Posting Instructions
My System SpecsSystem Spec
28 Nov 2015   #7
Omfgorz

Windows 7 Professional x64
 
 

I got new BSOD... Please someon tell me any options..



MEMTEST PASSED 2 HOUR EASY.

[/url]
My System SpecsSystem Spec
28 Nov 2015   #8
axe0

Windows 10 Pro
 
 

My System SpecsSystem Spec
28 Nov 2015   #9
Omfgorz

Windows 7 Professional x64
 
 

Ooh I get it, thank you very much. I don't have experience in this forum sorry !.
My System SpecsSystem Spec
29 Nov 2015   #10
Omfgorz

Windows 7 Professional x64
 
 

Axe0 ????????? PLEASE HELP lol 4 days no one ... wth is this forum FOR ?
My System SpecsSystem Spec
Reply

 BSOD playing World Of Tanks/Sims 4




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
BSOD When playing World Of Tanks
Hi, I'm having issues with different BSODs but seems to only happen when playing World Of Tanks and some web browsing. Graphics driver has been updated and that's about it. Any help would be greatly appreciated.
BSOD Help and Support
BSOD Playing World of Tanks.
So far I have had a total of 5 BSODs since I formatted. I was getting them before too, just to clarify. The BCCodes are 0x00000001, 0x0000007f, 0x000000fc, 0x00000001 and 0x00000050. They were caused by two things, ntoskrnl.exe and nvlddmkm.sys. I have only gotten them when World of Tanks is open,...
BSOD Help and Support
BSOD when playing World of tanks
Hi I need some help , my desktop is crashing randomly when playing games on it I attached the minidump file as instucted and also I tried using bluescreen viewer but I dont know how to fix it. Any help would be highly appreciated . thanks in Advance!
BSOD Help and Support
BSOD playing world of tanks
BSOD playing world of tanks
BSOD Help and Support
BSOD playing World of Tanks
Hi, i had a BSOD while playing WoT, well, i didnt see a BSOD cause my system freezed...i dont see a bluescreen ever, the only thing that happens is that my machine freezes, only with bluescreenviewer i see that it has been a BSOD, or not. so here are some infos: - x86 (32-bit) or x64 ? x64 -...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 14:18.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App