I recently had a BSOD while playing COD MW III. I was playing COD and then I hit windows key to tab out and use chrome to check my email.
I do have crashes when launching the game most of the time but, it's COD not properly optimized and other people have this issue also.
Here is the dump, what does this mean?
I do have crashes when launching the game most of the time but, it's COD not properly optimized and other people have this issue also.
Here is the dump, what does this mean?
- Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\*\Downloads\050924-7000-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 10 Kernel Version 22621 MP (32 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Machine Name:
- Kernel base = 0xfffff807`4d400000 PsLoadedModuleList = 0xfffff807`4e0134a0
- Debug session time: Thu May 9 18:02:27.564 2024 (UTC - 4:00)
- System Uptime: 0 days 4:06:40.217
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ................................................................
- .........
- Loading User Symbols
- Loading unloaded module list
- ..........
- For analysis of this file, run !analyze -v
- nt!KeBugCheckEx:
- fffff807`4d818040 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffef0a`165770c0=000000000000000a
- 4: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000000, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
- Arg4: 0000000000000000, address which referenced memory
- Debugging Details:
- ------------------
- KEY_VALUES_STRING: 1
- Key : Analysis.CPU.mSec
- Value: 2467
- Key : Analysis.DebugAnalysisManager
- Value: Create
- Key : Analysis.Elapsed.mSec
- Value: 3022
- Key : Analysis.Init.CPU.mSec
- Value: 1437
- Key : Analysis.Init.Elapsed.mSec
- Value: 16092
- Key : Analysis.Memory.CommitPeak.Mb
- Value: 81
- TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
- DUMP_FILE_ATTRIBUTES: 0x1808
- Kernel Generated Triage Dump
- BUGCHECK_CODE: d1
- BUGCHECK_P1: 0
- BUGCHECK_P2: 2
- BUGCHECK_P3: 8
- BUGCHECK_P4: 0
- READ_ADDRESS: fffff8074e11c4a8: Unable to get MiVisibleState
- Unable to get NonPagedPoolStart
- Unable to get NonPagedPoolEnd
- Unable to get PagedPoolStart
- Unable to get PagedPoolEnd
- unable to get nt!MmSpecialPagesInUse
- 0000000000000000
- PROCESS_NAME: chrome.exe
- BLACKBOXBSD: 1 (!blackboxbsd)
- BLACKBOXNTFS: 1 (!blackboxntfs)
- BLACKBOXPNP: 1 (!blackboxpnp)
- BLACKBOXWINLOGON: 1
- CUSTOMER_CRASH_COUNT: 1
- TRAP_FRAME: ffffef0a16577200 -- (.trap 0xffffef0a16577200)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=0000000000000083 rbx=0000000000000000 rcx=dc82dbaa4bfd0000
- rdx=ffffeb75badd67f8 rsi=0000000000000000 rdi=0000000000000000
- rip=0000000000000000 rsp=ffffef0a16577390 rbp=000000011f14b800
- r8=ffffeb7589300230 r9=ffffeb75badd6000 r10=ffffeb7580000000
- r11=fffff8074e069400 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei ng nz na pe nc
- 00000000`00000000 ?? ???
- Resetting default scope
- IP_IN_FREE_BLOCK: 0
- FAILED_INSTRUCTION_ADDRESS:
- +0
- STACK_TEXT:
- ffffef0a`165770b8 fffff807`4d82de69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
- ffffef0a`165770c0 fffff807`4d829305 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`000000ff : nt!KiBugCheckDispatch+0x69
- ffffef0a`16577200 00000000`00000000 : ffffc584`1f14b780 000024c0`08df7000 00000000`00000001 ffffeb12`00000000 : nt!KiPageFault+0x485
- SYMBOL_NAME: nt!KiPageFault+485
- MODULE_NAME: nt
- IMAGE_NAME: ntkrnlmp.exe
- IMAGE_VERSION: 10.0.22621.3527
- STACK_COMMAND: .thread ; .cxr ; kb
- BUCKET_ID_FUNC_OFFSET: 485
- FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_nt!KiPageFault
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 11
- FAILURE_ID_HASH: {4ce35ff9-c5cf-d66d-0323-0f05e33f6692}
- Followup: MachineOwner