New
#1
a few BSOD lately
Hi I built this system dec 2009, was running smoothly for a long time, lately 2-3 bsod.
I have attached the zip file as instructions say
Many thanks for your help!
ERic
Hi I built this system dec 2009, was running smoothly for a long time, lately 2-3 bsod.
I have attached the zip file as instructions say
Many thanks for your help!
ERic
Steam is faulting application uninstall it, you can try reinstalling it if the problem is still here then run Memtest86 to check your RAM: Memtest86.com - Memory DiagnosticCode:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002acd0a2, The address that the exception occurred at Arg3: 0000000000000000, Parameter 0 of the exception Arg4: ffffffffffffffff, Parameter 1 of the exception Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!KxWaitForLockOwnerShip+12 fffff800`02acd0a2 48890a mov qword ptr [rdx],rcx EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc40e0 ffffffffffffffff ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. BUGCHECK_STR: 0x1E_c0000005 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: Steam.exe CURRENT_IRQL: 2 EXCEPTION_RECORD: fffff8800b544988 -- (.exr 0xfffff8800b544988) ExceptionAddress: fffff80002acd0a2 (nt!KxWaitForLockOwnerShip+0x0000000000000012) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff TRAP_FRAME: fffff8800b544a30 -- (.trap 0xfffff8800b544a30) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=fffff8800b544c68 rdx=9800000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002acd0a2 rsp=fffff8800b544bc0 rbp=fffff8800b544c40 r8=fffff80002c06e80 r9=0000000000000000 r10=fffff80002cc6840 r11=0000058000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KxWaitForLockOwnerShip+0x12: fffff800`02acd0a2 48890a mov qword ptr [rdx],rcx ds:0202:98000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002ac6a39 to fffff80002a8c740 STACK_TEXT: fffff880`0b5441b8 fffff800`02ac6a39 : 00000000`0000001e ffffffff`c0000005 fffff800`02acd0a2 00000000`00000000 : nt!KeBugCheckEx fffff880`0b5441c0 fffff800`02a8bd82 : fffff880`0b544988 fffffa80`00363f30 fffff880`0b544a30 00000000`00000001 : nt!KiDispatchException+0x1b9 fffff880`0b544850 fffff800`02a8a68a : fffff880`0b544c90 fffff6fc`806100c8 fffffa80`0990cb60 00000000`00000000 : nt!KiExceptionDispatch+0xc2 fffff880`0b544a30 fffff800`02acd0a2 : 00000000`00000000 00000000`00000001 fffffa80`048d8148 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a fffff880`0b544bc0 fffff800`02aa5314 : fffffa80`00363f30 00000000`00000000 fffff880`0b544c40 fffffa80`048d8040 : nt!KxWaitForLockOwnerShip+0x12 fffff880`0b544bf0 fffff800`02abe0bf : 00000000`00000000 fffff680`00074a08 00000000`00000000 ff008c00`6d004d00 : nt!MiInsertPageInFreeOrZeroedList+0x4e4 fffff880`0b544cf0 fffff800`02abd381 : 00000000`00000000 fffff680`00074ff8 fffffa80`0995f9e0 fffffa80`0990cb60 : nt!MiDeletePteRun+0x49f fffff880`0b544ea0 fffff800`02ace0da : 00000000`00000000 00000000`0ebf9fff fffffa80`00000000 fffffa80`0995f9e0 : nt!MiDeleteVirtualAddresses+0x408 fffff880`0b545060 fffff800`02a8b993 : ffffffff`ffffffff fffff880`0b545320 fffff880`0b545388 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca fffff880`0b545150 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 STACK_COMMAND: kb FOLLOWUP_IP: nt!KxWaitForLockOwnerShip+12 fffff800`02acd0a2 48890a mov qword ptr [rdx],rcx SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: nt!KxWaitForLockOwnerShip+12 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!KxWaitForLockOwnerShip+12 BUCKET_ID: X64_0x1E_c0000005_nt!KxWaitForLockOwnerShip+12 Followup: MachineOwner ---------
Same thing "SteamService.e" is the faulting application, just follow the instructions above and see how you go.Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: fffff8800837f9d0, Virtual address for the attempted execute. Arg2: 8000000145796963, PTE contents. Arg3: fffff8800837f650, (reserved) Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xFC PROCESS_NAME: SteamService.e CURRENT_IRQL: 0 TRAP_FRAME: fffff8800837f650 -- (.trap 0xfffff8800837f650) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa8005a26970 rbx=0000000000000000 rcx=fffffa8005a26920 rdx=fffffa8009b23b80 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8800837f9d0 rsp=fffff8800837f7e8 rbp=fffffa8009b23b80 r8=fffffa80048f1570 r9=0000000000000001 r10=fffffa8006c84a70 r11=fffff8800837f798 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc fffff880`0837f9d0 1f ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002b01bcf to fffff80002a81740 STACK_TEXT: fffff880`0837f4e8 fffff800`02b01bcf : 00000000`000000fc fffff880`0837f9d0 80000001`45796963 fffff880`0837f650 : nt!KeBugCheckEx fffff880`0837f4f0 fffff800`02a7f82e : 00000000`00000008 fffff8a0`03222cc0 00000000`00000000 fffff8a0`06d529c0 : nt! ?? ::FNODOBFM::`string'+0x42497 fffff880`0837f650 fffff880`0837f9d0 : fffff880`0837f808 fffff880`0837f868 fffff880`060800df fffff8a0`03222cc0 : nt!KiPageFault+0x16e fffff880`0837f7e8 fffff880`0837f808 : fffff880`0837f868 fffff880`060800df fffff8a0`03222cc0 fffff8a0`06d529c0 : 0xfffff880`0837f9d0 fffff880`0837f7f0 fffff880`0837f868 : fffff880`060800df fffff8a0`03222cc0 fffff8a0`06d529c0 fffffa80`06c84a70 : 0xfffff880`0837f808 fffff880`0837f7f8 fffff880`060800df : fffff8a0`03222cc0 fffff8a0`06d529c0 fffffa80`06c84a70 0101000e`48bbaecd : 0xfffff880`0837f868 fffff880`0837f800 fffff8a0`03222cc0 : fffff8a0`06d529c0 fffffa80`06c84a70 0101000e`48bbaecd 00000000`eeee1234 : nvlddmkm+0x1bb0df fffff880`0837f808 fffff8a0`06d529c0 : fffffa80`06c84a70 0101000e`48bbaecd 00000000`eeee1234 00000000`00000000 : 0xfffff8a0`03222cc0 fffff880`0837f810 fffffa80`06c84a70 : 0101000e`48bbaecd 00000000`eeee1234 00000000`00000000 fffff800`02c33300 : 0xfffff8a0`06d529c0 fffff880`0837f818 0101000e`48bbaecd : 00000000`eeee1234 00000000`00000000 fffff800`02c33300 00000000`00000001 : 0xfffffa80`06c84a70 fffff880`0837f820 00000000`eeee1234 : 00000000`00000000 fffff800`02c33300 00000000`00000001 00000000`00000000 : 0x101000e`48bbaecd fffff880`0837f828 00000000`00000000 : fffff800`02c33300 00000000`00000001 00000000`00000000 00000000`00000000 : 0xeeee1234 STACK_COMMAND: kb FOLLOWUP_IP: nvlddmkm+1bb0df fffff880`060800df ?? ??? SYMBOL_STACK_INDEX: 6 SYMBOL_NAME: nvlddmkm+1bb0df FOLLOWUP_NAME: MachineOwner MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4bb7d7fd FAILURE_BUCKET_ID: X64_0xFC_nvlddmkm+1bb0df BUCKET_ID: X64_0xFC_nvlddmkm+1bb0df Followup: MachineOwner ---------