PoE Causing Creative Driver to Crash

This appears to be while zoning back into town and results in a BSOD of the system. Please see below crash dump analysis (minor) for details. I can provide this full kernel dump to developers if needed. If so please PM me an FTP location to upload to. Great game so far guys. Going to bed, will check in the morning.

"
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffff80fc0000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800032b4b38, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)

Debugging Details:


"
MODULE_NAME: ctoss2k

FAULTING_MODULE: fffff8000321a000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4c348350

READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
ffffffff80fc0000

FAULTING_IP:
nt!MmProbeAndLockPages+118
fffff800`032b4b38 410fb601 movzx eax,byte ptr [r9]

MM_INTERNAL_CODE: 5

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x50

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff8000323f8af to fffff80003298fc0

STACK_TEXT:
fffff880`0deb5318 fffff800`0323f8af : 00000000`00000050 ffffffff`80fc0000 00000000`00000000 fffff880`0deb5480 : nt!KeBugCheckEx
fffff880`0deb5320 fffff800`032970ee : 00000000`00000000 ffffffff`80fc0000 00000000`00000000 ffffffff`ffffffff : nt!KeFlushQueuedDpcs+0x246b
fffff880`0deb5480 fffff800`032b4b38 : 2aaaaaaa`aaaaaaab fffffa80`019dea70 fffffa80`0a60ee90 00000000`00000020 : nt!KeSynchronizeExecution+0x28be
fffff880`0deb5610 fffff880`08bc3d36 : fffffa80`0b263000 fffff880`0b31e100 00000000`00000002 ffffffff`80fc0000 : nt!MmProbeAndLockPages+0x118
fffff880`0deb5720 fffff880`08a9fb5a : 00000000`00000001 fffffa80`0a3d7980 fffffa80`00000039 fffffa80`0abd5310 : ctoss2k+0x5d36
fffff880`0deb5760 fffff880`08a8c3e6 : 00000000`0000000f fffffa80`0a2c9980 fffffa80`0ad6d880 00000000`00000000 : ctaud2k+0x2cb5a
fffff880`0deb5890 fffff880`08a80ce6 : 00000014`00000001 00000000`47853010 fffff880`0deb59e8 fffff800`035ad87b : ctaud2k+0x193e6
fffff880`0deb58f0 fffff880`08aaed46 : 00000000`000002b8 fffffa80`01996f50 00000000`20206f49 00000000`0000000f : ctaud2k+0xdce6
fffff880`0deb5970 fffff880`08bf477c : fffffa80`0b252610 fffffa80`07de4b20 fffffa80`0b2526e0 00000000`00000001 : ctaud2k+0x3bd46
fffff880`0deb59d0 fffff800`035af687 : fffffa80`0abbdd00 fffff880`00000000 fffff880`0deb5ca0 fffffa80`0abbdd00 : ctprxy2k+0x577c
fffff880`0deb5a10 fffff800`035afee6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtMapViewOfSection+0x15a7
fffff880`0deb5b40 fffff800`03298253 : 00000000`74d42450 00000000`0012e590 00000000`fffdb000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
fffff880`0deb5bb0 00000000`74d42e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeSynchronizeExecution+0x3a23
00000000`0012e518 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74d42e09


STACK_COMMAND: kb

FOLLOWUP_IP:
ctoss2k+5d36
fffff880`08bc3d36 488b4b28 mov rcx,qword ptr [rbx+28h]

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: ctoss2k+5d36

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: ctoss2k.sys
Last edited by peebee on Jan 29, 2013, 1:10:58 AM

Report Forum Post

Report Account:

Report Type

Additional Info