Quantcast
Viewing all articles
Browse latest Browse all 11372

BSOD BugCheck 3B, {c0000005, fffff880070a1c54, fffff8800870d600, 0}

Hi,

I just got the BSOD and was wondering if anyone know what can cause this issue. 

Thanks,

Victor

*******************************************************************************

*                                                                             *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff880070a1c54, fffff8800870d600, 0}

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for nvlddmkm.sys -

Page 7f0cfe not present in the dump file. Type ".hh dbgerr004" for details

Probably caused by : dxgkrnl.sys ( dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+4e4 )

Followup: MachineOwner

---------

0: kd> !analyze -v

*******************************************************************************

*                                                                            *

*                        Bugcheck Analysis                                    *

*                                                                             *

*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)

An exception happened while executing a system service routine.

Arguments:

Arg1: 00000000c0000005, Exception code that caused the bugcheck

Arg2: fffff880070a1c54, Address of the instruction which caused the bugcheck

Arg3: fffff8800870d600, Address of the context record for the exception that caused the bugcheck

Arg4: 0000000000000000, zero.

Debugging Details:

------------------

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:

dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+4e4

fffff880`070a1c54 44397d48        cmp     dword ptr [rbp+48h],r15d

CONTEXT:  fffff8800870d600 -- (.cxr 0xfffff8800870d600)

rax=0000000000000003 rbx=fffff8a003f0e4e0 rcx=0000000000000001

rdx=fffffa8308bd7800 rsi=0000000000000000 rdi=fffff8a01b0b9010

rip=fffff880070a1c54 rsp=fffff8800870dfe0 rbp=0000000000000000

r8=00000000001b7700  r9=0000000000000003 r10=0000000000000000

r11=fffff88000f1f120 r12=fffff8800870e320 r13=fffff8800870e490

r14=0000000000000000 r15=0000000000000001

iopl=0         nv up ei ng nz na po nc

cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286

dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+0x4e4:

fffff880`070a1c54 44397d48        cmp     dword ptr [rbp+48h],r15d ss:0018:00000000`00000048=????????

Resetting default scope

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff880070a10f5 to fffff880070a1c54

STACK_TEXT: 

fffff880`0870dfe0 fffff880`070a10f5 : fffffa83`09bea830 fffff8a0`08400114 fffff8a0`0fd704e0 ffffffff`ffffe04c : dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+0x4e4

fffff880`0870e070 fffff880`0709e1a2 : fffffa83`09bb5380 00000000`00000000 00000000`00000000 fffff880`070909d0 : dxgkrnl!VIDPN_MGR::RestorePresentPathToActiveVidPn+0x45d

fffff880`0870e560 fffff880`070de13c : fffffa83`09beab70 fffffa83`3d673a01 00000000`00000001 fffff880`070316b9 : dxgkrnl!VIDPN_MGR::_MonitorEventHandler+0x542

fffff880`0870e5c0 fffff880`070ddc89 : 00000000`ffffffff 00000000`00000000 fffffa83`09beab38 fffffa83`09beab10 : dxgkrnl!MONITOR_MGR::_IssueMonitorEvent+0x130

fffff880`0870e620 fffff880`070d9793 : fffffa83`09bb7000 00000000`00000001 00000000`00000001 00000000`00000000 : dxgkrnl!MONITOR_MGR::_EnableDisableMonitor+0x1f1

fffff880`0870e680 fffff880`0709136c : 00000000`00000000 00000000`00000000 00000000`fffffb12 00000000`00000000 : dxgkrnl!MonitorEnableDisableMonitor+0x173

fffff880`0870e6c0 fffff880`07081da9 : fffffa83`09bea310 fffffa83`3e8c4010 fffffa83`09bea310 fffffa83`09bea460 : dxgkrnl!DpiGdoDispatchInternalIoctl+0x99c

fffff880`0870e7c0 fffff880`0722bc4a : fffffa83`3e8c4010 fffffa83`3e8c4010 fffff880`0870e840 00000000`00000000 : dxgkrnl!DpiDispatchInternalIoctl+0xb9

fffff880`0870e810 fffff960`00064a36 : 00000000`c0000002 00000000`00000000 00000000`00000004 00000000`00000000 : nvlddmkm+0x130c4a

fffff880`0870e850 fffff960`00127614 : fffff900`c00b4350 00000000`00000003 fffff900`c0083a50 fffff900`c0083a50 : win32k!GreDeviceIoControlEx+0xd6

fffff880`0870e8f0 fffff960`001ad819 : 00000000`00000000 fffff880`00000001 00000000`ffffdc0e fffffa83`00000000 : win32k!DrvSetMonitorPowerState+0x144

fffff880`0870e960 fffff960`000d2a08 : 00000000`00000001 00000000`00000000 fffffa83`3daa8980 00000001`00000000 : win32k!PowerOnMonitor+0x59

fffff880`0870e990 fffff960`000d2c11 : 00000000`00000000 00000000`0000001e 00000000`00000000 fffff800`02cd5a53 : win32k!xxxUserPowerEventCalloutWorker+0x5d4

fffff880`0870ea60 fffff960`0012619a : 00000000`00000000 00000000`00000000 00000000`000005ec 00000000`00000000 : win32k!xxxUserPowerCalloutWorker+0x49

fffff880`0870eab0 fffff800`02ccbe53 : fffffa83`3da54b50 00000000`00000000 00000000`00000020 00000000`00000000 : win32k!NtUserCallNoParam+0x36

fffff880`0870eae0 000007fe`fccd1eea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13

00000000`01a2f868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`fccd1eea

FOLLOWUP_IP:

dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+4e4

fffff880`070a1c54 44397d48        cmp     dword ptr [rbp+48h],r15d

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+4e4

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  51fa153d

STACK_COMMAND:  .cxr 0xfffff8800870d600 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+4e4

BUCKET_ID:  X64_0x3B_dxgkrnl!VIDPN_MGR::AddFunctionalPathToVidPnTopology+4e4

Followup: MachineOwner

---------

0: kd> lmvm dxgkrnl

start             end                 module name

fffff880`07000000 fffff880`070f4000   dxgkrnl    (pdb symbols)          c:\symbol\dxgkrnl.pdb\EDB191B27E0A4AF39174371A540483B11\dxgkrnl.pdb

    Loaded symbol image file: dxgkrnl.sys

    Image path: \SystemRoot\System32\drivers\dxgkrnl.sys

    Image name: dxgkrnl.sys

    Timestamp:        Thu Aug 01 00:58:53 2013 (51FA153D)

    CheckSum:         000F87F1

    ImageSize:        000F4000

    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4


Viewing all articles
Browse latest Browse all 11372

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>