BSOD while gaming

Processor: AMD FX 8320 eight-core

RAM: 2X8GB DDR3 Vengeance by Corsair

OS: Windows 8.1 pro

Graphics: Geforce GTX 760

Motherboard: Asus M5A97

Power supply: Corsair CX750

The problem is that while playing video games, mainly League of Legends, I get a BSOD every once in a while.

It's not very consistent, sometimes I can go hours without seeing it, other times I play for a few minutes and it crashes.

I've had a few different errors. One example: irql_not_less_or_equal

It happens during some games, League of Legends, but not others (Hearthstone, Assassin's Creed IV)

At this point, I'm wondering if I shouldn't just switch to windows 7. 

EDIT 2014/6/21: Here is a link to a few of the dmp files: https://onedrive.live.com/redir?resid=648411D4D93B69FF!459&authkey=!AAeI7lH3eNHE4JY&ithint=file%2c.zip If it doesn't work, please let me know.
  • Edited by Remmorik Saturday, June 21, 2014 8:00 PM
June 21st, 2014 9:50pm

In order to assist you, we will need the .DMP files to analyze what exactly occurred at the time of the crash, etc. 

If you don't know where .DMP files are located, here's how to get to them:

1. Navigate to the %systemroot%\Minidump folder.

2. Copy any and all DMP files in the Minidump folder to your Desktop and then zip up these files.

3. Upload the zip containing the .DMP files to Onedrive or a hosting site of your choice and paste in your reply. Prefered sites: Onedrive, Mediafire, Dropbox, etc. Nothing with wait-timers.

4 (optional): The type of .DMP files located in the Minidump folder are known as Small Memory Dumps. In %systemroot% there will be what is known as a Kernel-Dump (if your system is set to generate). It is labeled MEMORY.DMP. The difference between Small Memory Dumps and Kernel-Dumps in the simplest definition is a Kernel-Dump contains much more information at the time of the crash, therefore allowing further debugging of your issue. If your upload speed permits it, and you aren't going against any strict bandwidth and/or usage caps, etc, the Kernel-Dump is the best choice. Do note that Kernel-Dumps are much larger in size due to containing much more info, which is why I mentioned upload speed, etc.

If you are going to use Onedrive but don't know how to upload to it, please visit the following:

Upload photos and files to Onedrive.

Please note that any "cleaner" programs such as TuneUp Utilities, CCleaner, etc, by default will delete .DMP files upon use.

If your computer is not generating .DMP files, please do the following:

1. Start > type %systemroot% which should show the Windows folder, click on it. Once inside that folder, ensure there is a Minidump folder created. If not, CTRL-SHIFT-N to make a New Folder and name it Minidump.

2. Windows key + Pause key. This should bring up System. Click Advanced System Settings on the left > Advanced > Performance > Settings > Advanced > Ensure there's a check-mark for 'Automatically manage paging file size for all drives'.

3. Windows key + Pause key. This should bring up System. Click Advanced System Settings on the left > Advanced > Startup and Recovery > Settings > System Failure > ensure there is a check mark next to 'Write an event to the system log'. 

Ensure Small Memory Dump is selected and ensure the path is %systemroot%\Minidump.

4. Double check that the WERS is ENABLED:

Start > Search > type services.msc > Under the name tab, find Windows Error Reporting Service > If the status of the service is not Started then right click it and select Start. Also ensure that under Startup Type it is set to Automatic rather than Manual. You can do this by right clicking it, selecting properties, and under General selecting startup type to 'Automatic', and then click Apply. 

 

Free Windows Admin Tool Kit Click here and download it now
June 21st, 2014 9:52pm

We do need the actual DMP file as they contain the only record of the sequence of events leading up to the crash, what drivers were loaded, and what was responsible.   We prefer at least 2 DMP files to spot trends and confirm the cause.
Please follow our instructions for finding and uploading the files we need to help you fix your computer. They can be found here If you have any questions about the procedure please ask
If you are using Blue screen view, who crashed, or a similar application, don't.  They are wrong at least as often as they are correct
June 21st, 2014 9:59pm

Anybody?
Free Windows Admin Tool Kit Click here and download it now
June 23rd, 2014 12:32am

your getting misaligned statements, I suspect this may be your mouse causing the misaligned. You can search for the answer and test some out. IP_MISALIGNED

I believe I think I know what the proposed answer will be.

  • Edited by colakid Sunday, June 22, 2014 10:24 PM
June 23rd, 2014 1:19am

Anybody?

Renmorrik

These are Related to avgmfx64.sys AVI Loader Driver from AVG Technologies CZ, s.r.o.  I would remove it and use the built in defender at least to test

Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Ken\Desktop\dmpfiles\061614-40375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
OK                                             C:\Users\Ken\Desktop

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*H:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*H:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\Users\Ken\Desktop
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17085.amd64fre.winblue_gdr.140330-1035
Machine Name:
Kernel base = 0xfffff802`a7a8f000 PsLoadedModuleList = 0xfffff802`a7d592d0
Debug session time: Mon Jun 16 22:24:32.354 2014 (UTC - 4:00)
System Uptime: 3 days 3:51:51.109
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff802a7be9c6c, 1, 0}

*** WARNING: Unable to verify timestamp for avgmfx64.sys
*** ERROR: Module load completed but symbols could not be loaded for avgmfx64.sys
Probably caused by : luafv.sys ( luafv!LuafvGenerateFileName+55 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802a7be9c6c, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff802a7de3138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000000000 

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpInterlockedPushEntrySList+1c
fffff802`a7be9c6c 4d8903          mov     qword ptr [r11],r8

EXCEPTION_PARAMETER1:  0000000000000001

BUGCHECK_STR:  0x1E_c0000005_W

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  League of Lege

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre

TRAP_FRAME:  ffffd00021002360 -- (.trap 0xffffd00021002360)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000005fee6c0002 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe00076bda010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802a7be9c6c rsp=ffffd000210024f0 rbp=ffffd00021002540
 r8=ffffe00076bda010  r9=00000000000002f8 r10=ffffe00072730b80
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!ExpInterlockedPushEntrySList+0x1c:
fffff802`a7be9c6c 4d8903          mov     qword ptr [r11],r8 ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802a7c2dd47 to fffff802a7be2fa0

STACK_TEXT:  
ffffd000`21001a88 fffff802`a7c2dd47 : 00000000`0000001e ffffffff`c0000005 fffff802`a7be9c6c 00000000`00000001 : nt!KeBugCheckEx
ffffd000`21001a90 fffff802`a7beebc2 : 00000000`00000002 00000000`00000003 ffffe000`76878280 fffff800`113885f5 : nt! ?? ::FNODOBFM::`string'+0x3a897
ffffd000`21002180 fffff802`a7bed314 : 00000000`00000001 ffffe000`76878280 00000000`00000000 ffffd000`21002360 : nt!KiExceptionDispatch+0xc2
ffffd000`21002360 fffff802`a7be9c6c : ffffe000`76878280 fffff800`11386ce3 ffffe000`7110b330 00000000`00000000 : nt!KiPageFault+0x214
ffffd000`210024f0 fffff800`11386ce3 : ffffe000`7110b330 00000000`00000000 ffffe000`732f36c0 00000000`0000000c : nt!ExpInterlockedPushEntrySList+0x1c
ffffd000`21002500 fffff800`113850b6 : ffffe000`73a1e7b0 00000000`00000000 ffffe000`712d0560 ffffe000`7110b330 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x243
ffffd000`210025a0 fffff802`a7e53d28 : 00000000`00000002 ffffd000`210026f9 00000000`00000000 00000000`00000000 : fltmgr!FltpDispatch+0xb6
ffffd000`21002600 fffff802`a7bee7b3 : 00000000`00000000 00000000`00000000 ffffe000`7465a080 00000000`00000000 : nt!NtQueryDirectoryFile+0x1c0
ffffd000`21002740 fffff802`a7be6c00 : fffff800`113b44fd ffffe000`73a1e7b0 ffffe000`73a1e7b0 ffffe000`00000102 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`21002948 fffff800`113b44fd : ffffe000`73a1e7b0 ffffe000`73a1e7b0 ffffe000`00000102 00000000`00000000 : nt!KiServiceLinkage
ffffd000`21002950 fffff800`113b4b37 : 00000000`00000000 ffffe000`70b704d0 00000000`00000069 00000000`00000000 : fltmgr!FltpNormalizeNameComponent+0x91
ffffd000`21002a60 fffff800`113b1b8a : ffffe000`70b70001 ffffe000`00000017 00000000`0000006a ffffe000`70b704d0 : fltmgr!FltpExpandShortNames+0x1bf
ffffd000`21002af0 fffff800`113b1bea : ffffe000`70b704d0 ffffd000`20ff0000 00000000`00000000 fffff800`113a8010 : fltmgr!FltpGetNormalizedFileNameWorker+0x14a
ffffd000`21002b30 fffff800`113b1765 : 00000000`00000010 fffff800`1138530d ffffd000`21002ba8 ffffd000`21002ce0 : fltmgr!FltpGetNormalizedFileName+0x1a
ffffd000`21002b80 fffff800`1138dc82 : c00000bb`00000000 ffffe000`70b704d0 ffffe000`76fb90b0 ffffe000`73a1d670 : fltmgr!FltpCreateFileNameInformation+0x334
ffffd000`21002bc0 fffff800`1138ac7f : ffffe000`73a1d010 ffffe000`70b704d0 00000000`00000000 fffff800`113a8010 : fltmgr!HandleStreamListNotSupported+0x112
ffffd000`21002c00 fffff800`1138ce10 : ffffe000`73a1e7b0 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!FltpGetFileNameInformation+0x6db
ffffd000`21002ca0 fffff800`13b05eb5 : ffffe000`70a68040 ffffe000`76bda510 ffffd001`17080180 fffff800`113b3f2a : fltmgr!FltGetFileNameInformation+0x1b0
ffffd000`21002d20 fffff800`113b1cd7 : ffffe000`76bda510 ffffe000`70fddad8 ffffd000`21002dd8 fffff802`a7b77cf5 : luafv!LuafvGenerateFileName+0x55
ffffd000`21002d50 fffff800`113b1a6f : ffffe000`76bda500 ffffe000`76bda510 00000000`00000000 00000000`00000000 : fltmgr!FltpCallOpenedFileNameHandler+0x73
ffffd000`21002d90 fffff800`113b1bea : ffffe000`76bda510 ffffd000`20ffd000 00000000`00000000 fffff800`113a8010 : fltmgr!FltpGetNormalizedFileNameWorker+0x2f
ffffd000`21002dd0 fffff800`113b1765 : ffffe000`76fb90b0 fffff800`113b4685 00000000`00000000 00000000`00000001 : fltmgr!FltpGetNormalizedFileName+0x1a
ffffd000`21002e20 fffff800`1138dc82 : c00000bb`74769b00 ffffe000`76bda510 ffffe000`76fb90b0 ffffe000`73a1d670 : fltmgr!FltpCreateFileNameInformation+0x334
ffffd000`21002e60 fffff800`1138ac7f : ffffe000`73a1d010 ffffe000`76bda510 00000000`00000000 fffff800`113a8010 : fltmgr!HandleStreamListNotSupported+0x112
ffffd000`21002ea0 fffff800`1138ce10 : 00000000`00000000 00000000`00000000 ffffe000`74769010 fffff802`a7a2569a : fltmgr!FltpGetFileNameInformation+0x6db
ffffd000`21002f40 fffff800`118555c1 : ffffe000`70a68001 00000000`00000001 ffffd000`21003140 fffff802`a7d32200 : fltmgr!FltGetFileNameInformation+0x1b0
ffffd000`21002fc0 ffffe000`70a68001 : 00000000`00000001 ffffd000`21003140 fffff802`a7d32200 ffffe000`7465a080 : avgmfx64+0x45c1
ffffd000`21002fc8 00000000`00000001 : ffffd000`21003140 fffff802`a7d32200 ffffe000`7465a080 ffffd000`210030e0 : 0xffffe000`70a68001
ffffd000`21002fd0 ffffd000`21003140 : fffff802`a7d32200 ffffe000`7465a080 ffffd000`210030e0 ffffd000`21003008 : 0x1
ffffd000`21002fd8 fffff802`a7d32200 : ffffe000`7465a080 ffffd000`210030e0 ffffd000`21003008 ffffe000`7465a080 : 0xffffd000`21003140
ffffd000`21002fe0 ffffe000`7465a080 : ffffd000`210030e0 ffffd000`21003008 ffffe000`7465a080 fffffff6`00000009 : nt!ExNode0
ffffd000`21002fe8 ffffd000`210030e0 : ffffd000`21003008 ffffe000`7465a080 fffffff6`00000009 00000001`ffffffff : 0xffffe000`7465a080
ffffd000`21002ff0 ffffd000`21003008 : ffffe000`7465a080 fffffff6`00000009 00000001`ffffffff 00000001`00000005 : 0xffffd000`210030e0
ffffd000`21002ff8 ffffe000`7465a080 : fffffff6`00000009 00000001`ffffffff 00000001`00000005 ffffe000`000000fe : 0xffffd000`21003008
ffffd000`21003000 fffffff6`00000009 : 00000001`ffffffff 00000001`00000005 ffffe000`000000fe ffff291e`18251465 : 0xffffe000`7465a080
ffffd000`21003008 00000001`ffffffff : 00000001`00000005 ffffe000`000000fe ffff291e`18251465 fffff580`10804000 : 0xfffffff6`00000009
ffffd000`21003010 00000001`00000005 : ffffe000`000000fe ffff291e`18251465 fffff580`10804000 00000000`00200202 : 0x00000001`ffffffff
ffffd000`21003018 ffffe000`000000fe : ffff291e`18251465 fffff580`10804000 00000000`00200202 fffff802`a7b306ef : 0x00000001`00000005
ffffd000`21003020 ffff291e`18251465 : fffff580`10804000 00000000`00200202 fffff802`a7b306ef 00000000`00000200 : 0xffffe000`000000fe
ffffd000`21003028 fffff580`10804000 : 00000000`00200202 fffff802`a7b306ef 00000000`00000200 ffffe000`70a68040 : 0xffff291e`18251465
ffffd000`21003030 00000000`00200202 : fffff802`a7b306ef 00000000`00000200 ffffe000`70a68040 00000000`00000200 : 0xfffff580`10804000
ffffd000`21003038 fffff802`a7b306ef : 00000000`00000200 ffffe000`70a68040 00000000`00000200 ffffe000`7465a080 : 0x200202
ffffd000`21003040 00000000`00000003 : 00000000`00000000 00000000`00000016 ffffe000`73a1d010 00000000`00000000 : nt!KiDeferredReadyThread+0x2ef
ffffd000`21003190 00000000`00000000 : 00000000`00000016 ffffe000`73a1d010 00000000`00000000 ffffe000`76fb9188 : 0x3


STACK_COMMAND:  kb

FOLLOWUP_IP: 
luafv!LuafvGenerateFileName+55
fffff800`13b05eb5 8bd8            mov     ebx,eax

SYMBOL_STACK_INDEX:  12

SYMBOL_NAME:  luafv!LuafvGenerateFileName+55

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  530894a1

IMAGE_VERSION:  6.3.9600.17031

BUCKET_ID_FUNC_OFFSET:  55

FAILURE_BUCKET_ID:  0x1E_c0000005_W_luafv!LuafvGenerateFileName

BUCKET_ID:  0x1E_c0000005_W_luafv!LuafvGenerateFileName

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_w_luafv!luafvgeneratefilename

FAILURE_ID_HASH:  {b91c3d85-859c-7de8-f9ad-b12f36f529b2}

Followup: MachineOwner
---------


Free Windows Admin Tool Kit Click here and download it now
June 23rd, 2014 6:45pm

Didn't fix it.

June 24th, 2014 7:02am

Hi,

Please post back the latest Dump file here after you tried Zig's suggestions.

Free Windows Admin Tool Kit Click here and download it now
June 24th, 2014 12:32pm

Hi,

Please post back the latest Dump file here after you tried Zig's sugges

June 24th, 2014 12:41pm

https://onedrive.live.com/redir?resid=648411D4D93B69FF!460&authkey=!AL4u244u6T2Y3zQ&ithint=file%2c.dmp
Free Windows Admin Tool Kit Click here and download it now
June 24th, 2014 7:51pm

https://onedrive.live.com/redir?resid=648411D4D93B69FF!460&authkey=!AL4u244u6T2Y3zQ&ithint=file%2c.dmp

bcmwlhigh63a.sys, Broadcom 802.11 Network Adapter 4u This means the system is not working well with the current drivers, this is mostly why your getting, ID IP_mismatch

Can I suggest you to disable your lan card in bios and try a different card. IF not search for causes your Broadcom is crashing, update your drivers, possible your registry keys are corrupted.

http://www.broadcom.com/support/ethernet_nic/downloaddrivers.php

Edit: that system is lots like my second computer, we had to upgrade to a 1000 watt PSU, the 750 was being stressed, he did get bsod with that PSU. SLI system.
  • Edited by colakid Tuesday, June 24, 2014 11:36 PM
June 25th, 2014 2:05am

Anybody?

Renmorrik

These are Related to avgmfx64.sys AVI Loader Driver from AVG Technologies CZ, s.r.o.  I would remove it and use the built in defender at least to test

Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Ken\Desktop\dmpfiles\061614-40375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
OK                                             C:\Users\Ken\Desktop

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*H:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*H:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\Users\Ken\Desktop
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17085.amd64fre.winblue_gdr.140330-1035
Machine Name:
Kernel base = 0xfffff802`a7a8f000 PsLoadedModuleList = 0xfffff802`a7d592d0
Debug session time: Mon Jun 16 22:24:32.354 2014 (UTC - 4:00)
System Uptime: 3 days 3:51:51.109
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff802a7be9c6c, 1, 0}

*** WARNING: Unable to verify timestamp for avgmfx64.sys
*** ERROR: Module load completed but symbols could not be loaded for avgmfx64.sys
Probably caused by : luafv.sys ( luafv!LuafvGenerateFileName+55 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff802a7be9c6c, The address that the exception occurred at
Arg3: 0000000000000001, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff802a7de3138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
 0000000000000000 

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpInterlockedPushEntrySList+1c
fffff802`a7be9c6c 4d8903          mov     qword ptr [r11],r8

EXCEPTION_PARAMETER1:  0000000000000001

BUGCHECK_STR:  0x1E_c0000005_W

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

PROCESS_NAME:  League of Lege

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre

TRAP_FRAME:  ffffd00021002360 -- (.trap 0xffffd00021002360)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000005fee6c0002 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffe00076bda010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802a7be9c6c rsp=ffffd000210024f0 rbp=ffffd00021002540
 r8=ffffe00076bda010  r9=00000000000002f8 r10=ffffe00072730b80
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!ExpInterlockedPushEntrySList+0x1c:
fffff802`a7be9c6c 4d8903          mov     qword ptr [r11],r8 ds:00000000`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff802a7c2dd47 to fffff802a7be2fa0

STACK_TEXT:  
ffffd000`21001a88 fffff802`a7c2dd47 : 00000000`0000001e ffffffff`c0000005 fffff802`a7be9c6c 00000000`00000001 : nt!KeBugCheckEx
ffffd000`21001a90 fffff802`a7beebc2 : 00000000`00000002 00000000`00000003 ffffe000`76878280 fffff800`113885f5 : nt! ?? ::FNODOBFM::`string'+0x3a897
ffffd000`21002180 fffff802`a7bed314 : 00000000`00000001 ffffe000`76878280 00000000`00000000 ffffd000`21002360 : nt!KiExceptionDispatch+0xc2
ffffd000`21002360 fffff802`a7be9c6c : ffffe000`76878280 fffff800`11386ce3 ffffe000`7110b330 00000000`00000000 : nt!KiPageFault+0x214
ffffd000`210024f0 fffff800`11386ce3 : ffffe000`7110b330 00000000`00000000 ffffe000`732f36c0 00000000`0000000c : nt!ExpInterlockedPushEntrySList+0x1c
ffffd000`21002500 fffff800`113850b6 : ffffe000`73a1e7b0 00000000`00000000 ffffe000`712d0560 ffffe000`7110b330 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x243
ffffd000`210025a0 fffff802`a7e53d28 : 00000000`00000002 ffffd000`210026f9 00000000`00000000 00000000`00000000 : fltmgr!FltpDispatch+0xb6
ffffd000`21002600 fffff802`a7bee7b3 : 00000000`00000000 00000000`00000000 ffffe000`7465a080 00000000`00000000 : nt!NtQueryDirectoryFile+0x1c0
ffffd000`21002740 fffff802`a7be6c00 : fffff800`113b44fd ffffe000`73a1e7b0 ffffe000`73a1e7b0 ffffe000`00000102 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`21002948 fffff800`113b44fd : ffffe000`73a1e7b0 ffffe000`73a1e7b0 ffffe000`00000102 00000000`00000000 : nt!KiServiceLinkage
ffffd000`21002950 fffff800`113b4b37 : 00000000`00000000 ffffe000`70b704d0 00000000`00000069 00000000`00000000 : fltmgr!FltpNormalizeNameComponent+0x91
ffffd000`21002a60 fffff800`113b1b8a : ffffe000`70b70001 ffffe000`00000017 00000000`0000006a ffffe000`70b704d0 : fltmgr!FltpExpandShortNames+0x1bf
ffffd000`21002af0 fffff800`113b1bea : ffffe000`70b704d0 ffffd000`20ff0000 00000000`00000000 fffff800`113a8010 : fltmgr!FltpGetNormalizedFileNameWorker+0x14a
ffffd000`21002b30 fffff800`113b1765 : 00000000`00000010 fffff800`1138530d ffffd000`21002ba8 ffffd000`21002ce0 : fltmgr!FltpGetNormalizedFileName+0x1a
ffffd000`21002b80 fffff800`1138dc82 : c00000bb`00000000 ffffe000`70b704d0 ffffe000`76fb90b0 ffffe000`73a1d670 : fltmgr!FltpCreateFileNameInformation+0x334
ffffd000`21002bc0 fffff800`1138ac7f : ffffe000`73a1d010 ffffe000`70b704d0 00000000`00000000 fffff800`113a8010 : fltmgr!HandleStreamListNotSupported+0x112
ffffd000`21002c00 fffff800`1138ce10 : ffffe000`73a1e7b0 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!FltpGetFileNameInformation+0x6db
ffffd000`21002ca0 fffff800`13b05eb5 : ffffe000`70a68040 ffffe000`76bda510 ffffd001`17080180 fffff800`113b3f2a : fltmgr!FltGetFileNameInformation+0x1b0
ffffd000`21002d20 fffff800`113b1cd7 : ffffe000`76bda510 ffffe000`70fddad8 ffffd000`21002dd8 fffff802`a7b77cf5 : luafv!LuafvGenerateFileName+0x55
ffffd000`21002d50 fffff800`113b1a6f : ffffe000`76bda500 ffffe000`76bda510 00000000`00000000 00000000`00000000 : fltmgr!FltpCallOpenedFileNameHandler+0x73
ffffd000`21002d90 fffff800`113b1bea : ffffe000`76bda510 ffffd000`20ffd000 00000000`00000000 fffff800`113a8010 : fltmgr!FltpGetNormalizedFileNameWorker+0x2f
ffffd000`21002dd0 fffff800`113b1765 : ffffe000`76fb90b0 fffff800`113b4685 00000000`00000000 00000000`00000001 : fltmgr!FltpGetNormalizedFileName+0x1a
ffffd000`21002e20 fffff800`1138dc82 : c00000bb`74769b00 ffffe000`76bda510 ffffe000`76fb90b0 ffffe000`73a1d670 : fltmgr!FltpCreateFileNameInformation+0x334
ffffd000`21002e60 fffff800`1138ac7f : ffffe000`73a1d010 ffffe000`76bda510 00000000`00000000 fffff800`113a8010 : fltmgr!HandleStreamListNotSupported+0x112
ffffd000`21002ea0 fffff800`1138ce10 : 00000000`00000000 00000000`00000000 ffffe000`74769010 fffff802`a7a2569a : fltmgr!FltpGetFileNameInformation+0x6db
ffffd000`21002f40 fffff800`118555c1 : ffffe000`70a68001 00000000`00000001 ffffd000`21003140 fffff802`a7d32200 : fltmgr!FltGetFileNameInformation+0x1b0
ffffd000`21002fc0 ffffe000`70a68001 : 00000000`00000001 ffffd000`21003140 fffff802`a7d32200 ffffe000`7465a080 : avgmfx64+0x45c1
ffffd000`21002fc8 00000000`00000001 : ffffd000`21003140 fffff802`a7d32200 ffffe000`7465a080 ffffd000`210030e0 : 0xffffe000`70a68001
ffffd000`21002fd0 ffffd000`21003140 : fffff802`a7d32200 ffffe000`7465a080 ffffd000`210030e0 ffffd000`21003008 : 0x1
ffffd000`21002fd8 fffff802`a7d32200 : ffffe000`7465a080 ffffd000`210030e0 ffffd000`21003008 ffffe000`7465a080 : 0xffffd000`21003140
ffffd000`21002fe0 ffffe000`7465a080 : ffffd000`210030e0 ffffd000`21003008 ffffe000`7465a080 fffffff6`00000009 : nt!ExNode0
ffffd000`21002fe8 ffffd000`210030e0 : ffffd000`21003008 ffffe000`7465a080 fffffff6`00000009 00000001`ffffffff : 0xffffe000`7465a080
ffffd000`21002ff0 ffffd000`21003008 : ffffe000`7465a080 fffffff6`00000009 00000001`ffffffff 00000001`00000005 : 0xffffd000`210030e0
ffffd000`21002ff8 ffffe000`7465a080 : fffffff6`00000009 00000001`ffffffff 00000001`00000005 ffffe000`000000fe : 0xffffd000`21003008
ffffd000`21003000 fffffff6`00000009 : 00000001`ffffffff 00000001`00000005 ffffe000`000000fe ffff291e`18251465 : 0xffffe000`7465a080
ffffd000`21003008 00000001`ffffffff : 00000001`00000005 ffffe000`000000fe ffff291e`18251465 fffff580`10804000 : 0xfffffff6`00000009
ffffd000`21003010 00000001`00000005 : ffffe000`000000fe ffff291e`18251465 fffff580`10804000 00000000`00200202 : 0x00000001`ffffffff
ffffd000`21003018 ffffe000`000000fe : ffff291e`18251465 fffff580`10804000 00000000`00200202 fffff802`a7b306ef : 0x00000001`00000005
ffffd000`21003020 ffff291e`18251465 : fffff580`10804000 00000000`00200202 fffff802`a7b306ef 00000000`00000200 : 0xffffe000`000000fe
ffffd000`21003028 fffff580`10804000 : 00000000`00200202 fffff802`a7b306ef 00000000`00000200 ffffe000`70a68040 : 0xffff291e`18251465
ffffd000`21003030 00000000`00200202 : fffff802`a7b306ef 00000000`00000200 ffffe000`70a68040 00000000`00000200 : 0xfffff580`10804000
ffffd000`21003038 fffff802`a7b306ef : 00000000`00000200 ffffe000`70a68040 00000000`00000200 ffffe000`7465a080 : 0x200202
ffffd000`21003040 00000000`00000003 : 00000000`00000000 00000000`00000016 ffffe000`73a1d010 00000000`00000000 : nt!KiDeferredReadyThread+0x2ef
ffffd000`21003190 00000000`00000000 : 00000000`00000016 ffffe000`73a1d010 00000000`00000000 ffffe000`76fb9188 : 0x3


STACK_COMMAND:  kb

FOLLOWUP_IP: 
luafv!LuafvGenerateFileName+55
fffff800`13b05eb5 8bd8            mov     ebx,eax

SYMBOL_STACK_INDEX:  12

SYMBOL_NAME:  luafv!LuafvGenerateFileName+55

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: luafv

IMAGE_NAME:  luafv.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  530894a1

IMAGE_VERSION:  6.3.9600.17031

BUCKET_ID_FUNC_OFFSET:  55

FAILURE_BUCKET_ID:  0x1E_c0000005_W_luafv!LuafvGenerateFileName

BUCKET_ID:  0x1E_c0000005_W_luafv!LuafvGenerateFileName

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x1e_c0000005_w_luafv!luafvgeneratefilename

FAILURE_ID_HASH:  {b91c3d85-859c-7de8-f9ad-b12f36f529b2}

Followup: MachineOwner
---------
Free Windows Admin Tool Kit Click here and download it now
June 25th, 2014 3:27am

https://onedrive.live.com/redir?resid=648411D4D93B69FF!460&authkey=!AL4u244u6T2Y3zQ&ithint=file%2c.dmp

Remmorik

The current DMP was corrupt and I suggest you run driver verifier to find the underlying driver

These crashes were related to memory corruption (probably caused by a driver). 

Please run these tests to verify your memory and find which driver is causing the problem.  

If you are overclocking (pushing the components beyond their design) you should revert to default at least until the crashing is solved. If you don't know what it is you probably are not overclocking.
Since it is more likely to be a driver please run verifier first. 1-Driver verifier (for complete directions see our wiki here)
If verifier does not find the issue we can move on to this. 2-Memtest. (You can read more about running memtest here)
If you cannot boot after enabling verifier reboot into safe mode In Vista & win & (F8) In win 8 http://www.howtogeek.com/107511/how-to-boot-into-safe-mode-on-windows-8-the-easy-way/
Co-Authored by  JMH3143 .

June 25th, 2014 8:40pm

I did the driver verifier and this is the resultant .dmp file. https://onedrive.live.com/redir?resid=648411D4D93B69FF!461&authkey=!AErSl5dn2FqpUaw&ithint=file%2c.dmp
Free Windows Admin Tool Kit Click here and download it now
June 29th, 2014 4:18am

Remmorik Driver verified and related to bcmwlhigh63a.sys. Description, Broadcom 802.11 Network Adapter wireless driver. Version, 6.30. I would install the newest driver available as drivers do become corrupt

Microsoft (R) Windows Debugger Version 6.3.9600.17029 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Ken\Desktop\062814-17531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
OK                                             C:\Users\Ken\Desktop

************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*H:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*H:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: C:\Users\Ken\Desktop
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17085.amd64fre.winblue_gdr.140330-1035
Machine Name:
Kernel base = 0xfffff803`9b616000 PsLoadedModuleList = 0xfffff803`9b8e02d0
Debug session time: Sat Jun 28 20:18:48.960 2014 (UTC - 4:00)
System Uptime: 0 days 1:03:41.799
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck C4, {91001, fffff80132aad1d0, ffffe00005f09250, ffffe00005f092d8}

*** WARNING: Unable to verify timestamp for bcmwlhigh63a.sys
*** ERROR: Module load completed but symbols could not be loaded for bcmwlhigh63a.sys
Probably caused by : bcmwlhigh63a.sys ( bcmwlhigh63a+ef5de )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught.  This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000091001, ID of the 'NdisOidComplete' rule that was violated.
Arg2: fffff80132aad1d0, A pointer to the string describing the violated rule condition.
Arg3: ffffe00005f09250, Address of internal rule state (second argument to !ruleinfo).
Arg4: ffffe00005f092d8, Address of supplemental states (third argument to !ruleinfo).

Debugging Details:
------------------


DV_VIOLATED_CONDITION:  This OID should only be completed with NDIS_STATUS_NOT_ACCEPTED or NDIS_STATUS_SUCCESS.

DV_MSDN_LINK: http://go.microsoft.com/fwlink/?LinkId=278802

DV_RULE_INFO: 0x91001

BUGCHECK_STR:  0xc4_NdisOidComplete_XDV

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  System

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80132aa7487 to fffff8039b769fa0

STACK_TEXT:  
ffffd000`2697c808 fffff801`32aa7487 : 00000000`000000c4 00000000`00091001 fffff801`32aad1d0 ffffe000`05f09250 : nt!KeBugCheckEx
ffffd000`2697c810 fffff801`32a9730c : 00000000`00000002 fffff803`9b8b9300 00000000`00000003 00000000`00000008 : VerifierExt!SLIC_StatefulAbort+0x22b
ffffd000`2697c900 fffff801`32a973f7 : ffffe000`05f09250 ffffcf80`f1b96f00 fffff803`9b8b9200 ffffe000`02411360 : VerifierExt!SLIC_XdvNdisMOidRequestComplete_entry_NdisOidComplete+0x188
ffffd000`2697c940 fffff801`334acde1 : ffffcf80`f1a3ef10 ffffd000`2697ca00 ffffcf80`f1b96f00 ffffe000`02411000 : VerifierExt!XdvNdisMOidRequestComplete_wrapper+0xe3
ffffd000`2697c9a0 fffff801`3550c5de : ffffe000`02411000 ffffcf80`f1a3ef10 ffffe000`02411000 ffffe000`02411360 : ndis!ndisVerifierNdisMOidRequestComplete+0x21
ffffd000`2697c9e0 ffffe000`02411000 : ffffcf80`f1a3ef10 ffffe000`02411000 ffffe000`02411360 ffffd000`2697ca30 : bcmwlhigh63a+0xef5de
ffffd000`2697c9e8 ffffcf80`f1a3ef10 : ffffe000`02411000 ffffe000`02411360 ffffd000`2697ca30 fffff801`3550c0bf : 0xffffe000`02411000
ffffd000`2697c9f0 ffffe000`02411000 : ffffe000`02411360 ffffd000`2697ca30 fffff801`3550c0bf ffffe000`02411000 : 0xffffcf80`f1a3ef10
ffffd000`2697c9f8 ffffe000`02411360 : ffffd000`2697ca30 fffff801`3550c0bf ffffe000`02411000 ffffcf80`f1b96fd0 : 0xffffe000`02411000
ffffd000`2697ca00 ffffd000`2697ca30 : fffff801`3550c0bf ffffe000`02411000 ffffcf80`f1b96fd0 00000000`00000001 : 0xffffe000`02411360
ffffd000`2697ca08 fffff801`3550c0bf : ffffe000`02411000 ffffcf80`f1b96fd0 00000000`00000001 fffff803`9b8b9300 : 0xffffd000`2697ca30
ffffd000`2697ca10 ffffe000`02411000 : ffffcf80`f1b96fd0 00000000`00000001 fffff803`9b8b9300 ffffd000`2697ca60 : bcmwlhigh63a+0xef0bf
ffffd000`2697ca18 ffffcf80`f1b96fd0 : 00000000`00000001 fffff803`9b8b9300 ffffd000`2697ca60 fffff801`3550c808 : 0xffffe000`02411000
ffffd000`2697ca20 00000000`00000001 : fffff803`9b8b9300 ffffd000`2697ca60 fffff801`3550c808 ffffe000`02411000 : 0xffffcf80`f1b96fd0
ffffd000`2697ca28 fffff803`9b8b9300 : ffffd000`2697ca60 fffff801`3550c808 ffffe000`02411000 ffffcf80`f1b96fd0 : 0x1
ffffd000`2697ca30 ffffd000`2697ca60 : fffff801`3550c808 ffffe000`02411000 ffffcf80`f1b96fd0 fffff801`334dc05c : nt!ExNode0+0x100
ffffd000`2697ca38 fffff801`3550c808 : ffffe000`02411000 ffffcf80`f1b96fd0 fffff801`334dc05c ffffcf80`edcb4fb0 : 0xffffd000`2697ca60
ffffd000`2697ca40 ffffe000`02411000 : ffffcf80`f1b96fd0 fffff801`334dc05c ffffcf80`edcb4fb0 00000000`00000000 : bcmwlhigh63a+0xef808
ffffd000`2697ca48 ffffcf80`f1b96fd0 : fffff801`334dc05c ffffcf80`edcb4fb0 00000000`00000000 fffff803`9b668ffa : 0xffffe000`02411000
ffffd000`2697ca50 fffff801`334dc05b : ffffcf80`edcb4fb0 00000000`00000000 fffff803`9b668ffa ffffcf80`edcb4fb0 : 0xffffcf80`f1b96fd0
ffffd000`2697ca58 fffff801`334dc05b : ffffe000`05a4b7a0 ffffe000`070239c0 00000000`00000002 fffff803`9b8b9300 : ndis!ndisMInvokeCheckForHang+0x4b
ffffd000`2697ca88 00000000`00000001 : ffff62fd`8a09a8c0 ffffe000`07023880 fffff803`9b669adb ffffe000`07023880 : ndis!ndisMInvokeCheckForHang+0x4b
ffffd000`2697cab8 ffff62fd`8a09a8c0 : ffffe000`07023880 fffff803`9b669adb ffffe000`07023880 fffff803`9b668f84 : 0x1
ffffd000`2697cac0 ffffe000`07023880 : fffff803`9b669adb ffffe000`07023880 fffff803`9b668f84 ffffd000`2697cb50 : 0xffff62fd`8a09a8c0
ffffd000`2697cac8 fffff803`9b669adb : ffffe000`07023880 fffff803`9b668f84 ffffd000`2697cb50 ffffcf80`edcb4fb0 : 0xffffe000`07023880
ffffd000`2697cad0 fffff803`9b6e5794 : 00000000`00000000 ffffe000`07023880 ffffe000`07023880 ffffe000`01c27900 : nt!ExpWorkerThread+0x293
ffffd000`2697cb80 fffff803`9b7705c6 : ffffd000`3efd0180 ffffe000`07023880 ffffe000`06ad0880 ffffe000`03f66180 : nt!PspSystemThreadStartup+0x58
ffffd000`2697cbe0 00000000`00000000 : ffffd000`2697d000 ffffd000`26976000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
bcmwlhigh63a+ef5de
fffff801`3550c5de ??              ???

SYMBOL_STACK_INDEX:  5

SYMBOL_NAME:  bcmwlhigh63a+ef5de

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: bcmwlhigh63a

IMAGE_NAME:  bcmwlhigh63a.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  512f78dd

FAILURE_BUCKET_ID:  0xc4_NdisOidComplete_XDV_VRF_bcmwlhigh63a+ef5de

BUCKET_ID:  0xc4_NdisOidComplete_XDV_VRF_bcmwlhigh63a+ef5de

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xc4_ndisoidcomplete_xdv_vrf_bcmwlhigh63a+ef5de

FAILURE_ID_HASH:  {6998874c-a375-de42-10f8-ce7224630c71}

Followup: MachineOwner
---------


June 29th, 2014 4:24am

I went to the control panel -> system and security -> system -> device manager and I couldn't find a BroadCom anything.
Free Windows Admin Tool Kit Click here and download it now
June 29th, 2014 6:08am

Remmorik

Did you do a search for it?

June 29th, 2014 6:19am

I didn't find anything useful about it. A tutorial saying to go to the device manager to update drivers, but like I said it doesn't show up anywhere.
Free Windows Admin Tool Kit Click here and download it now
June 29th, 2014 3:11pm

Hi,

what do you have listed under Network Adapters in Device Manager?

Try to update drivers for the Network card listed

June 29th, 2014 3:15pm

I didn't find anything useful about it. A tutorial saying to go to the device manager to update drivers, but like I said it doesn't show up anywhere.

Remmorik

Do you have any network adapters with a yellow exclamation point "!" on it that says "unknown"?  That is probably it.

Free Windows Admin Tool Kit Click here and download it now
June 29th, 2014 3:18pm

Under network adapters I have:

NETGEAR A6200 WiFi Adapter and

Realtek PCIe GBE Family Controller

Both of which say they are up to date with their drivers. I have some others listed when I change the view to include hidden devices:

Microsoft ISATAP Adapter (and #2)

Microsoft Kernel Debug Network Adapter

Microsoft Wi-Fi Direct Virtual Adapter (#2, #3, #4)

NETGEAR A6200 WiFi Adapter #2

And Teredo Tunneling Pseudo-Interface

All of which are also up to date.

June 29th, 2014 5:57pm

None that say unknown..
Free Windows Admin Tool Kit Click here and download it now
June 29th, 2014 5:58pm

Remmorik

Search for it.  Any instance of it you find rename from bcmwlhigh63a.sys to bcmwlhigh63a. BAK so it cant load .  If something complains you will know what uses it

June 29th, 2014 6:24pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics