Jump to content

Eating BSODs (Memory Management)

Ekcol

So, I RMA'd my previous GPU (Zotac GTX 780) because it was super loud at idle and started giving me blue screens line nobody's business, like every blue screen error under the sun. Naturally I tried various methods, switching OS's, using different versions of the drivers that I knew were stable in the past. etc. In the interim when I was using my good ol' 560ti I had literally 0 issues. Got a GTX 780ti back from RMA and ate another bluescreen (MEMEORY_MANAGEMENT)

 

Relevant System Specs:

4790k 

Asus z97-E

16gb Kingston BluBlack Ram
Zotac GTX 780ti 

ANNNNNNNND here's the dump. Any suggestions?

 

Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64Copyright (c) Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\Minidump\100815-9781-01.dmp]Mini Kernel Dump File: Only registers and stack trace are available************* Symbol Path validation summary **************Response                         Time (ms)     LocationDeferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbolsSymbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64Product: WinNt, suite: TerminalServer SingleUserTSBuilt by: 9600.18007.amd64fre.winblue_ltsb.150807-0612Machine Name:Kernel base = 0xfffff802`5ee15000 PsLoadedModuleList = 0xfffff802`5f0ea7b0Debug session time: Thu Oct  8 19:02:49.152 2015 (UTC - 4:00)System Uptime: 0 days 3:29:33.775Loading Kernel Symbols.......................................................................................................................................................................Loading User SymbolsLoading unloaded module list.......********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 1A, {41284, ffffb00066b45000, 1e7f7, fffff79940000000}Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+116d9 )Followup: MachineOwner---------5: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************MEMORY_MANAGEMENT (1a)    # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041284, A PTE or the working set list is corrupt.Arg2: ffffb00066b45000Arg3: 000000000001e7f7Arg4: fffff79940000000Debugging Details:------------------BUGCHECK_STR:  0x1a_41284CUSTOMER_CRASH_COUNT:  1DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULTPROCESS_NAME:  dota2.exeCURRENT_IRQL:  0ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64freLAST_CONTROL_TRANSFER:  from fffff8025ef86599 to fffff8025ef649a0STACK_TEXT:  ffffd000`220f4008 fffff802`5ef86599 : 00000000`0000001a 00000000`00041284 ffffb000`66b45000 00000000`0001e7f7 : nt!KeBugCheckExffffd000`220f4010 fffff802`5ee600ce : 00000000`0001e7f7 00000000`00000005 00000000`00000005 fffff6d8`00335a28 : nt! ?? ::FNODOBFM::`string'+0x116d9ffffd000`220f4060 fffff802`5f1b27f0 : 00000000`00000000 00000000`06500000 ffffe000`72b5b558 ffffe000`77cd1728 : nt!MmUnmapViewInSystemCache+0x4ceffffd000`220f4370 fffff802`5ee4082f : 00000000`00900000 ffffe000`72b5b4f0 ffffe000`72b5b558 00000000`00f00000 : nt!CcUnmapVacb+0x5cffffd000`220f43b0 fffff802`5ee4dd4b : 00000000`00f00001 00000000`00700000 ffffe000`72b5b4f0 ffffe000`77ccba58 : nt!CcUnmapVacbArray+0x23fffffd000`220f4420 fffff802`5f1b4123 : 00000000`00000000 00000000`00f00000 ffffd000`220f4500 ffffd000`220f4560 : nt!CcGetVirtualAddress+0x44bffffd000`220f44c0 fffff802`5ee4ca52 : ffffe000`72e32df0 00000000`00f00000 fffffa80`00018b2e ffffe000`72e32df0 : nt!CcMapAndCopyFromCache+0x73ffffd000`220f4550 fffff801`f238e7bf : 00000000`00f196a6 ffffe000`7439e920 ffffe000`00000000 ffffe000`72e32df0 : nt!CcCopyReadEx+0x106ffffd000`220f45c0 fffff801`f2004f62 : 00000000`000002a0 00000000`00000001 ffffd000`220f4a01 00000000`000321d4 : Ntfs!NtfsCopyReadA+0x1efffffd000`220f4830 fffff801`f20057d6 : ffffd000`220f4920 ffffe000`72e32d00 ffffe000`79457100 ffffe000`79457010 : fltmgr!FltpPerformFastIoCall+0xc2ffffd000`220f4890 fffff801`f202c3af : e00072e3`2dc0fbdd ffffe000`72437430 ffffd000`220f4a28 0000008b`46495e58 : fltmgr!FltpPassThroughFastIo+0x165ffffd000`220f48f0 fffff802`5f1cb507 : ffffe000`72e32df0 ffffe000`72e32df0 00000000`79517350 ffffd000`220f49d0 : fltmgr!FltpFastIoRead+0x14fffffd000`220f49a0 fffff802`5ef701b3 : ffffffff`fffffffe 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x3f7ffffd000`220f4a90 00007fff`decf123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x130000008b`5d80f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`decf123aSTACK_COMMAND:  kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+116d9fffff802`5ef86599 cc              int     3SYMBOL_STACK_INDEX:  1SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+116d9FOLLOWUP_NAME:  MachineOwnerMODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP:  55c4bd2eIMAGE_VERSION:  6.3.9600.18007BUCKET_ID_FUNC_OFFSET:  116d9FAILURE_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_ANALYSIS_SOURCE:  KMFAILURE_ID_HASH_STRING:  km:0x1a_41284_nt!_??_::fnodobfm::_string_FAILURE_ID_HASH:  {c39d115f-eaa3-aeb6-09bd-1a63e83e1077}Followup: MachineOwner---------5: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************MEMORY_MANAGEMENT (1a)    # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041284, A PTE or the working set list is corrupt.Arg2: ffffb00066b45000Arg3: 000000000001e7f7Arg4: fffff79940000000Debugging Details:------------------BUGCHECK_STR:  0x1a_41284CUSTOMER_CRASH_COUNT:  1DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULTPROCESS_NAME:  dota2.exeCURRENT_IRQL:  0ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64freLAST_CONTROL_TRANSFER:  from fffff8025ef86599 to fffff8025ef649a0STACK_TEXT:  ffffd000`220f4008 fffff802`5ef86599 : 00000000`0000001a 00000000`00041284 ffffb000`66b45000 00000000`0001e7f7 : nt!KeBugCheckExffffd000`220f4010 fffff802`5ee600ce : 00000000`0001e7f7 00000000`00000005 00000000`00000005 fffff6d8`00335a28 : nt! ?? ::FNODOBFM::`string'+0x116d9ffffd000`220f4060 fffff802`5f1b27f0 : 00000000`00000000 00000000`06500000 ffffe000`72b5b558 ffffe000`77cd1728 : nt!MmUnmapViewInSystemCache+0x4ceffffd000`220f4370 fffff802`5ee4082f : 00000000`00900000 ffffe000`72b5b4f0 ffffe000`72b5b558 00000000`00f00000 : nt!CcUnmapVacb+0x5cffffd000`220f43b0 fffff802`5ee4dd4b : 00000000`00f00001 00000000`00700000 ffffe000`72b5b4f0 ffffe000`77ccba58 : nt!CcUnmapVacbArray+0x23fffffd000`220f4420 fffff802`5f1b4123 : 00000000`00000000 00000000`00f00000 ffffd000`220f4500 ffffd000`220f4560 : nt!CcGetVirtualAddress+0x44bffffd000`220f44c0 fffff802`5ee4ca52 : ffffe000`72e32df0 00000000`00f00000 fffffa80`00018b2e ffffe000`72e32df0 : nt!CcMapAndCopyFromCache+0x73ffffd000`220f4550 fffff801`f238e7bf : 00000000`00f196a6 ffffe000`7439e920 ffffe000`00000000 ffffe000`72e32df0 : nt!CcCopyReadEx+0x106ffffd000`220f45c0 fffff801`f2004f62 : 00000000`000002a0 00000000`00000001 ffffd000`220f4a01 00000000`000321d4 : Ntfs!NtfsCopyReadA+0x1efffffd000`220f4830 fffff801`f20057d6 : ffffd000`220f4920 ffffe000`72e32d00 ffffe000`79457100 ffffe000`79457010 : fltmgr!FltpPerformFastIoCall+0xc2ffffd000`220f4890 fffff801`f202c3af : e00072e3`2dc0fbdd ffffe000`72437430 ffffd000`220f4a28 0000008b`46495e58 : fltmgr!FltpPassThroughFastIo+0x165ffffd000`220f48f0 fffff802`5f1cb507 : ffffe000`72e32df0 ffffe000`72e32df0 00000000`79517350 ffffd000`220f49d0 : fltmgr!FltpFastIoRead+0x14fffffd000`220f49a0 fffff802`5ef701b3 : ffffffff`fffffffe 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x3f7ffffd000`220f4a90 00007fff`decf123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x130000008b`5d80f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`decf123aSTACK_COMMAND:  kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+116d9fffff802`5ef86599 cc              int     3SYMBOL_STACK_INDEX:  1SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+116d9FOLLOWUP_NAME:  MachineOwnerMODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP:  55c4bd2eIMAGE_VERSION:  6.3.9600.18007BUCKET_ID_FUNC_OFFSET:  116d9FAILURE_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_ANALYSIS_SOURCE:  KMFAILURE_ID_HASH_STRING:  km:0x1a_41284_nt!_??_::fnodobfm::_string_FAILURE_ID_HASH:  {c39d115f-eaa3-aeb6-09bd-1a63e83e1077}Followup: MachineOwner---------5: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************MEMORY_MANAGEMENT (1a)    # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041284, A PTE or the working set list is corrupt.Arg2: ffffb00066b45000Arg3: 000000000001e7f7Arg4: fffff79940000000Debugging Details:------------------BUGCHECK_STR:  0x1a_41284CUSTOMER_CRASH_COUNT:  1DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULTPROCESS_NAME:  dota2.exeCURRENT_IRQL:  0ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64freLAST_CONTROL_TRANSFER:  from fffff8025ef86599 to fffff8025ef649a0STACK_TEXT:  ffffd000`220f4008 fffff802`5ef86599 : 00000000`0000001a 00000000`00041284 ffffb000`66b45000 00000000`0001e7f7 : nt!KeBugCheckExffffd000`220f4010 fffff802`5ee600ce : 00000000`0001e7f7 00000000`00000005 00000000`00000005 fffff6d8`00335a28 : nt! ?? ::FNODOBFM::`string'+0x116d9ffffd000`220f4060 fffff802`5f1b27f0 : 00000000`00000000 00000000`06500000 ffffe000`72b5b558 ffffe000`77cd1728 : nt!MmUnmapViewInSystemCache+0x4ceffffd000`220f4370 fffff802`5ee4082f : 00000000`00900000 ffffe000`72b5b4f0 ffffe000`72b5b558 00000000`00f00000 : nt!CcUnmapVacb+0x5cffffd000`220f43b0 fffff802`5ee4dd4b : 00000000`00f00001 00000000`00700000 ffffe000`72b5b4f0 ffffe000`77ccba58 : nt!CcUnmapVacbArray+0x23fffffd000`220f4420 fffff802`5f1b4123 : 00000000`00000000 00000000`00f00000 ffffd000`220f4500 ffffd000`220f4560 : nt!CcGetVirtualAddress+0x44bffffd000`220f44c0 fffff802`5ee4ca52 : ffffe000`72e32df0 00000000`00f00000 fffffa80`00018b2e ffffe000`72e32df0 : nt!CcMapAndCopyFromCache+0x73ffffd000`220f4550 fffff801`f238e7bf : 00000000`00f196a6 ffffe000`7439e920 ffffe000`00000000 ffffe000`72e32df0 : nt!CcCopyReadEx+0x106ffffd000`220f45c0 fffff801`f2004f62 : 00000000`000002a0 00000000`00000001 ffffd000`220f4a01 00000000`000321d4 : Ntfs!NtfsCopyReadA+0x1efffffd000`220f4830 fffff801`f20057d6 : ffffd000`220f4920 ffffe000`72e32d00 ffffe000`79457100 ffffe000`79457010 : fltmgr!FltpPerformFastIoCall+0xc2ffffd000`220f4890 fffff801`f202c3af : e00072e3`2dc0fbdd ffffe000`72437430 ffffd000`220f4a28 0000008b`46495e58 : fltmgr!FltpPassThroughFastIo+0x165ffffd000`220f48f0 fffff802`5f1cb507 : ffffe000`72e32df0 ffffe000`72e32df0 00000000`79517350 ffffd000`220f49d0 : fltmgr!FltpFastIoRead+0x14fffffd000`220f49a0 fffff802`5ef701b3 : ffffffff`fffffffe 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x3f7ffffd000`220f4a90 00007fff`decf123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x130000008b`5d80f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`decf123aSTACK_COMMAND:  kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+116d9fffff802`5ef86599 cc              int     3SYMBOL_STACK_INDEX:  1SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+116d9FOLLOWUP_NAME:  MachineOwnerMODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP:  55c4bd2eIMAGE_VERSION:  6.3.9600.18007BUCKET_ID_FUNC_OFFSET:  116d9FAILURE_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_ANALYSIS_SOURCE:  KMFAILURE_ID_HASH_STRING:  km:0x1a_41284_nt!_??_::fnodobfm::_string_FAILURE_ID_HASH:  {c39d115f-eaa3-aeb6-09bd-1a63e83e1077}Followup: MachineOwner---------5: kd> !analyze -v********************************************************************************                                                                             **                        Bugcheck Analysis                                    **                                                                             ********************************************************************************MEMORY_MANAGEMENT (1a)    # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041284, A PTE or the working set list is corrupt.Arg2: ffffb00066b45000Arg3: 000000000001e7f7Arg4: fffff79940000000Debugging Details:------------------BUGCHECK_STR:  0x1a_41284CUSTOMER_CRASH_COUNT:  1DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULTPROCESS_NAME:  dota2.exeCURRENT_IRQL:  0ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64freLAST_CONTROL_TRANSFER:  from fffff8025ef86599 to fffff8025ef649a0STACK_TEXT:  ffffd000`220f4008 fffff802`5ef86599 : 00000000`0000001a 00000000`00041284 ffffb000`66b45000 00000000`0001e7f7 : nt!KeBugCheckExffffd000`220f4010 fffff802`5ee600ce : 00000000`0001e7f7 00000000`00000005 00000000`00000005 fffff6d8`00335a28 : nt! ?? ::FNODOBFM::`string'+0x116d9ffffd000`220f4060 fffff802`5f1b27f0 : 00000000`00000000 00000000`06500000 ffffe000`72b5b558 ffffe000`77cd1728 : nt!MmUnmapViewInSystemCache+0x4ceffffd000`220f4370 fffff802`5ee4082f : 00000000`00900000 ffffe000`72b5b4f0 ffffe000`72b5b558 00000000`00f00000 : nt!CcUnmapVacb+0x5cffffd000`220f43b0 fffff802`5ee4dd4b : 00000000`00f00001 00000000`00700000 ffffe000`72b5b4f0 ffffe000`77ccba58 : nt!CcUnmapVacbArray+0x23fffffd000`220f4420 fffff802`5f1b4123 : 00000000`00000000 00000000`00f00000 ffffd000`220f4500 ffffd000`220f4560 : nt!CcGetVirtualAddress+0x44bffffd000`220f44c0 fffff802`5ee4ca52 : ffffe000`72e32df0 00000000`00f00000 fffffa80`00018b2e ffffe000`72e32df0 : nt!CcMapAndCopyFromCache+0x73ffffd000`220f4550 fffff801`f238e7bf : 00000000`00f196a6 ffffe000`7439e920 ffffe000`00000000 ffffe000`72e32df0 : nt!CcCopyReadEx+0x106ffffd000`220f45c0 fffff801`f2004f62 : 00000000`000002a0 00000000`00000001 ffffd000`220f4a01 00000000`000321d4 : Ntfs!NtfsCopyReadA+0x1efffffd000`220f4830 fffff801`f20057d6 : ffffd000`220f4920 ffffe000`72e32d00 ffffe000`79457100 ffffe000`79457010 : fltmgr!FltpPerformFastIoCall+0xc2ffffd000`220f4890 fffff801`f202c3af : e00072e3`2dc0fbdd ffffe000`72437430 ffffd000`220f4a28 0000008b`46495e58 : fltmgr!FltpPassThroughFastIo+0x165ffffd000`220f48f0 fffff802`5f1cb507 : ffffe000`72e32df0 ffffe000`72e32df0 00000000`79517350 ffffd000`220f49d0 : fltmgr!FltpFastIoRead+0x14fffffd000`220f49a0 fffff802`5ef701b3 : ffffffff`fffffffe 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x3f7ffffd000`220f4a90 00007fff`decf123a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x130000008b`5d80f668 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`decf123aSTACK_COMMAND:  kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+116d9fffff802`5ef86599 cc              int     3SYMBOL_STACK_INDEX:  1SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+116d9FOLLOWUP_NAME:  MachineOwnerMODULE_NAME: ntIMAGE_NAME:  ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP:  55c4bd2eIMAGE_VERSION:  6.3.9600.18007BUCKET_ID_FUNC_OFFSET:  116d9FAILURE_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_BUCKET_ID:  0x1a_41284_nt!_??_::FNODOBFM::_string_ANALYSIS_SOURCE:  KMFAILURE_ID_HASH_STRING:  km:0x1a_41284_nt!_??_::fnodobfm::_string_FAILURE_ID_HASH:  {c39d115f-eaa3-aeb6-09bd-1a63e83e1077}Followup: MachineOwner---------
Link to comment
Share on other sites

Link to post
Share on other sites

few things:

first:

sfc /scannow

in an admin cmd screen to make sure its not just errors in windows

 

second: what power supply? could be your power supply craps out when you have a high end card connected

 

third: run a memtest overnight to make sure your ram isnt derpy.

Link to comment
Share on other sites

Link to post
Share on other sites

few things:

first:

sfc /scannow
in an admin cmd screen to make sure its not just errors in windows

 

second: what power supply? could be your power supply craps out when you have a high end card connected

 

third: run a memtest overnight to make sure your ram isnt derpy.

This ^^^^

I am throwing about every BSOD under the sun, swapped my BRAND NEW 4x8gb kit for the old 4x2gb kit ram in my mediaserver, and not a single crash in a couple days.

Link to comment
Share on other sites

Link to post
Share on other sites

few things:

first:

sfc /scannow

in an admin cmd screen to make sure its not just errors in windows

 

second: what power supply? could be your power supply craps out when you have a high end card connected

 

third: run a memtest overnight to make sure your ram isnt derpy.

 

I've tried both of these solutions and nothing has turned up.

My PSU is a SeaSonic G-Series 550W 80plus Gold.  I never get anywhere near the top levels of power draw.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×