Hey guys,
Well I've been getting BSODs while playing BF2. Randomly they will pop up, and its getting really annoying. BCcode 50. This is what windbg says about it. Any help is greatly appreciated!
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\\Windows\\Minidump\\120609-16660-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\\websymbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02853000 PsLoadedModuleList = 0xfffff800`02a90e50
Debug session time: Sun Dec 6 11:40:50.361 2009 (GMT-5)
System Uptime: 0 days 11:23:53.890
Loading Kernel Symbols
.................................................. .............
.................................................. ..............
......................
Loading User Symbols
Loading unloaded module list
........
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff89f8951bd38, 1, fffff800029d3193, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!EmpEvaluateUpdateRuleEvalState+3 )
Followup: MachineOwner
---------
3: kd> !analyze -v
************************************************** *****************************
* *
* Bugcheck Analysis *
* *
************************************************** *****************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff89f8951bd38, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff800029d3193, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002afb0e0
fffff89f8951bd38
FAULTING_IP:
nt!EmpEvaluateUpdateRuleEvalState+3
fffff800`029d3193 48895808 mov qword ptr [rax+8],rbx
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: explorer.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003fdc130 -- (.trap 0xfffff88003fdc130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88003fdc2c8 rbx=0000000000000000 rcx=fffff8a00009b4e0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800029d3193 rsp=fffff88003fdc2c8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffa8005c4cad0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!EmpEvaluateUpdateRuleEvalState+0x3:
fffff800`029d3193 48895808 mov qword ptr [rax+8],rbx ds:c300:fffff880`03fdc2d0=fffff88003fdc3b8
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002942b91 to fffff800028c4f00
STACK_TEXT:
fffff880`03fdbfc8 fffff800`02942b91 : 00000000`00000050 fffff89f`8951bd38 00000000`00000001 fffff880`03fdc130 : nt!KeBugCheckEx
fffff880`03fdbfd0 fffff800`028c2fee : 00000000`00000001 fffff8a0`00097890 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`03fdc130 fffff800`029d3193 : fffff800`029d33f5 fffff880`03fdc3b8 fffff880`03fddd00 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`03fdc2c8 fffff800`029d33f5 : fffff880`03fdc3b8 fffff880`03fddd00 00000000`00000000 fffff880`03fdc3a0 : nt!EmpEvaluateUpdateRuleEvalState+0x3
fffff880`03fdc2d0 fffff800`02cd242e : ffffffff`ffffffff 00000000`00000000 fffff8a0`00097890 fffff880`03fdc3a8 : nt!EmpUpdateRuleState+0xe5
fffff880`03fdc300 fffff800`02cfd0d0 : fffff880`03fdc420 fffff880`03fddd00 00000000`00000001 00000000`00000000 : nt!EmClientQueryRuleState+0x8e
fffff880`03fdc330 fffff800`02b82efa : 00000000`00000000 00000000`00000001 fffff880`03fddd60 00000000`00000000 : nt!PopFilterCapabilities+0x1b0
fffff880`03fdc3a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtPowerInformation+0x6ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!EmpEvaluateUpdateRuleEvalState+3
fffff800`029d3193 48895808 mov qword ptr [rax+8],rbx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!EmpEvaluateUpdateRuleEvalState+3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x50_nt!EmpEvaluateUpdateRuleEvalState+3
BUCKET_ID: X64_0x50_nt!EmpEvaluateUpdateRuleEvalState+3
Followup: MachineOwner
---------