open All Channels
seplocked Issues, Workarounds & Localization
blankseplocked Playing Eve Resulting in BSODs
 
This thread is older than 90 days and has been locked due to inactivity.


 
Author Topic

Phanixis Ronuken
Posted - 2011.08.16 01:32:00 - [1]
 

Edited by: Phanixis Ronuken on 16/08/2011 01:34:54
Edited by: Phanixis Ronuken on 16/08/2011 01:33:32
I have been having some serious BSOD issues with Eve.

The first set was video driver related. I updated the video drivers and the BSODs seemed to go away, or so I thought.

I just got another BSOD when playing Eve online. I am not sure what is causing it so I will append the most recent minidump for the tech savy.

Note that outside playing Eve Online, I have had zero BSODs besides those directly associated with Eve. Two occurred before I updated by video drivers, plus this most recent one which occurred after the update.

Any help regarding this problems would be greatly appreciated.

Thanks.


Minidump details in following post.

Phanixis Ronuken
Posted - 2011.08.16 01:36:00 - [2]
 

Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\WINDOWS\Minidump\Mini081511-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*d:\windows\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Windows Server 2003 Kernel Version 3790 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 3790.srv03_sp2_gdr.101019-0340
Machine Name:
Kernel base = 0xfffff800`01000000 PsLoadedModuleList = 0xfffff800`011d4140
Debug session time: Mon Aug 15 00:21:45.765 2011 (UTC - 4:00)
System Uptime: 0 days 7:48:08.644
*** WARNING: Unable to verify checksum for ntkrnlmp.exe
Loading Kernel Symbols
...............................................................
............................................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800011a9ebd, fffffadfb4b1dcb0, 0}

Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+33f )

Followup: Pool_corruption
---------

Phanixis Ronuken
Posted - 2011.08.16 01:40:00 - [3]
 

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800011a9ebd, Address of the instruction which caused the bugcheck
Arg3: fffffadfb4b1dcb0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP:
nt!ExDeferredFreePool+33f
fffff800`011a9ebd 48894108 mov qword ptr [rcx+8],rax

CONTEXT: fffffadfb4b1dcb0 -- (.cxr 0xfffffadfb4b1dcb0)
rax=fffffadfcda6f010 rbx=0000000000000001 rcx=0010fadf03eecf00
rdx=fffffadfce258000 rsi=0000000000000000 rdi=fffff800011ce1c0
rip=fffff800011a9ebd rsp=fffffadfb4b1e4c0 rbp=fffff800011ce1c0
r8=fffffadfce258880 r9=0000000000000001 r10=fffffadfccb31c10
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=000000000000000d
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!ExDeferredFreePool+0x33f:
fffff800`011a9ebd 48894108 mov qword ptr [rcx+8],rax ds:002b:0010fadf`03eecf08=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: ExeFile.exe

CURRENT_IRQL: 2

IRP_ADDRESS: fffffadfccd344f8

LAST_CONTROL_TRANSFER: from fffff800011aa03d to fffff800011a9ebd

STACK_TEXT:
fffffadf`b4b1e4c0 fffff800`011aa03d : fffffadf`ccd2e6e0 fffffadf`cca2ac20 fffffadf`ccd2e6d0 fffff800`011ce1c0 : nt!ExDeferredFreePool+0x33f
fffffadf`b4b1e530 fffff800`01049e5c : fffffadf`b4b1e680 fffff800`01027abd fffffadf`cba2d040 fffffadf`b4b1e730 : nt!ExFreePoolWithTag+0x759
fffffadf`b4b1e5f0 fffff800`01027eb1 : fffffadf`ccd34570 00000000`00000000 00000000`00000000 fffffadf`cbb55ee0 : nt!IopCompleteRequest+0x121
fffffadf`b4b1e690 fffff800`01027abd : fffffadf`00000040 00000000`00000000 00000000`00000000 fffff800`011b0180 : nt!KiDeliverApc+0x215
fffffadf`b4b1e730 fffff800`010272ab : 00000000`ccd2e450 00000000`00000000 fffffadf`c208f7b6 fffffadf`ccd2e74c : nt!KiApcInterrupt+0xdd
fffffadf`b4b1e8c0 fffff800`01030d45 : 00000000`00000001 00000000`00000000 00000000`00000000 fffffadf`cbb55ee0 : nt!KiExitDispatcher+0x1d3
fffffadf`b4b1e8f0 fffff800`01025229 : fffffadf`cbb55ee0 00000000`00000000 00000000`a0000003 fffffadf`cbb55ee0 : nt!KeInsertQueueApc+0xd4
fffffadf`b4b1e940 fffffadf`c201479c : 00000000`00000000 00000000`00000002 00000000`00000000 fffffadf`b4b1ecf0 : nt!IopfCompleteRequest+0xa26
fffffadf`b4b1e9b0 fffffadf`c202a362 : 00000000`00000001 fffffadf`b4b1ecf0 00000000`00000000 fffffadf`cbb55ee0 : tcpip!IPDispatchDeviceControl+0x147
fffffadf`b4b1ea20 fffff800`0127f0f1 : 00000000`00000008 fffffadf`cbb55ee0 00000000`00000001 00000000`00000000 : tcpip!TCPDispatch+0x1df
fffffadf`b4b1ea70 fffff800`0127ebf6 : 00000000`00000000 00000000`00000afc 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0xa79
fffffadf`b4b1eb90 fffff800`0102e33d : fffffadf`cca2ac20 fffffadf`cba2d040 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
fffffadf`b4b1ec00 00000000`78b83e48 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x3
00000000`10f3f098 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x78b83e48


FOLLOWUP_IP:
nt!ExDeferredFreePool+33f
fffff800`011a9ebd 48894108 mov qword ptr [rcx+8],rax

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!ExDeferredFreePool+33f

FOLLOWUP_NAME: Pool_corruption

IMAGE_NAME: Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: Pool_Corruption

STACK_COMMAND: .cxr 0xfffffadfb4b1dcb0 ; kb

FAILURE_BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+33f

BUCKET_ID: X64_0x3B_nt!ExDeferredFreePool+33f

Followup: Pool_corruption
---------


 

This thread is older than 90 days and has been locked due to inactivity.


 


The new forums are live

Please adjust your bookmarks to https://forums.eveonline.com

These forums are archived and read-only