BSOD when gaming - Windows 7
Hello, I keep getting BSOD about 5 minutes after opening a game. I tried many things to stop this, but it just keep crashing, with different causes. I tried Memtest86 and it says everything's OK. I downloaded the Drivers Pack Solution and same thing. I made it crash many times and after fixing a thing it crashes by another cause (first IRQL not less or equal, then Page fault in nonpaged area and now it says NTFS file system). This is a new computer, I only could play once, and then the second time it crashed. It happened with Devil May Cry 4, but I installed Assassins Creed II and it does the same thing. Specs are: Windows 7 Ultimate AMD A8-3780 APU with integrated Radeon HD 6550 D Motherboard AS-ROCK AA55M-HVS RAM 8192mb DDR3 Power Supplies: 230V 50/60hz 500W By now the dump says it's caused by AVG (I think) but I guess it won't fix by uninstalling it. I've got many dumps with different causes of crash, but here's the last one: Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\080412-41605-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.17017.amd64fre.win7_gdr.120503-2030 Machine Name: Kernel base = 0xfffff800`02c4a000 PsLoadedModuleList = 0xfffff800`02e86e70 Debug session time: Sat Aug 4 22:43:47.871 2012 (UTC - 3:00) System Uptime: 0 days 0:21:46.009 Loading Kernel Symbols ............................................................... ................................................................ ................................... Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff880088ab008, fffff880088aa870, fffff80002cec237} Unable to load image \SystemRoot\system32\DRIVERS\avgidsfiltera.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for avgidsfiltera.sys *** ERROR: Module load completed but symbols could not be loaded for avgidsfiltera.sys *** WARNING: Unable to verify timestamp for win32k.sys *** ERROR: Module load completed but symbols could not be loaded for win32k.sys Probably caused by : memory_corruption Followup: memory_corruption --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff880088ab008 Arg3: fffff880088aa870 Arg4: fffff80002cec237 Debugging Details: ------------------ EXCEPTION_RECORD: fffff880088ab008 -- (.exr 0xfffff880088ab008) ExceptionAddress: fffff80002cec237 (nt!MiMakeSystemCacheRangeValid+0x0000000000000097) ExceptionCode: c000001d (Illegal instruction) ExceptionFlags: 00000000 NumberParameters: 0 CONTEXT: fffff880088aa870 -- (.cxr 0xfffff880088aa870) rax=0000000000062f28 rbx=0000000000000001 rcx=0000000000000000 rdx=0000058000000000 rsi=0000000000000000 rdi=0000000000000001 rip=fffff80002cec237 rsp=fffff880088ab240 rbp=fffff6fcc00dd000 r8=0000000000000110 r9=00000000001609da r10=00000000000078b9 r11=0000000000000000 r12=fffff880088ab480 r13=0000000000000000 r14=0000000dffffffff r15=fffffa8009e1eb60 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!MiMakeSystemCacheRangeValid+0x97: fffff800`02cec237 62 ??? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x24 PROCESS_NAME: avgrsa.exe CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPCI N} Instrucci n ilegal Se ha intentado ejecutar una instrucci n ilegal. EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPCI N} Instrucci n ilegal Se ha intentado ejecutar una instrucci n ilegal. LAST_CONTROL_TRANSFER: from fffff80002cd6ea6 to fffff80002cec237 STACK_TEXT: fffff880`088ab240 fffff800`02cd6ea6 : fffff6fc`c00dd000 00000000`00000001 fffff880`00000001 ffffffff`ffff0001 : nt!MiMakeSystemCacheRangeValid+0x97 fffff880`088ab3b0 fffff800`02cfe0ae : fffff980`1ba00000 00000000`00001000 00000000`00000000 fffff880`088ab700 : nt!MmCheckCachedPageStates+0x4d6 fffff880`088ab560 fffff800`02fd155b : 00000000`00000000 00000000`00000000 fffffa80`06a9bf20 00000000`050fe390 : nt!CcFetchDataForRead+0x10e fffff880`088ab5c0 fffff880`0122cfc0 : fffff8a0`00000000 fffff880`00000005 fffffa80`00040000 fffff880`01280001 : nt!CcCopyRead+0x16b fffff880`088ab680 fffff880`01231303 : 00000000`00000000 fffff8a0`01746140 fffff880`088ab8b0 fffff880`088ab7a8 : Ntfs!NtfsCachedRead+0x180 fffff880`088ab6e0 fffff880`01233f78 : fffffa80`074b1d00 fffffa80`0828da10 fffff880`088ab801 fffffa80`0725ad00 : Ntfs!NtfsCommonRead+0x583 fffff880`088ab880 fffff880`010f823f : fffffa80`0828ddf8 fffffa80`0828da10 fffffa80`0725ad30 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8 fffff880`088ab930 fffff880`010f66df : fffffa80`07955de0 00000000`00000001 fffffa80`07955d00 fffffa80`0828da10 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`088ab9c0 fffff880`06e72b88 : 00000000`00000000 00000000`050fe390 00000000`00000001 fffffa80`0a000060 : fltmgr!FltpDispatch+0xcf fffff880`088aba20 00000000`00000000 : 00000000`050fe390 00000000`00000001 fffffa80`0a000060 fffffa80`06a9bf20 : avgidsfiltera+0x1b88 CHKIMG_EXTENSION: !chkimg -lo 50 -db !nt 5 errors : !nt (fffff80002cec217-fffff80002cec23f) fffff80002cec210 bc 24 78 01 00 00 45 *31 ed 49 be ff ff ff ff *0d .$x...E1.I...... fffff80002cec220 00 00 00 85 db 0f 84 *41 02 00 00 48 ba 00 00 00 .......A...H.... fffff80002cec230 00 80 05 00 00 33 f6 *62 0f 1f 04 00 49 8b 1c *20 .....3.b....I.. MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: STRIDE STACK_COMMAND: .cxr 0xfffff880088aa870 ; kb FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE Followup: memory_corruption ---------
August 5th, 2012 10:36pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics