The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    2014 Asus N550JK -DS71T Two Laptops : Two Locations : Same Problem - Unexpected Reboot due to Bugcheck

    Discussion in 'Asus' started by intellinexus, Jun 13, 2014.

  1. intellinexus

    intellinexus Newbie

    Reputations:
    0
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    5
    Last week, I purchased one of these laptops. I loved everything about this laptop except for the nightmares it has been putting me through. Within 48 hours of switching on the laptop, the laptop automatically restarts whenever I leave it idle i.e., it restarts *after* the display is automatically turned off for about 1 hour.

    I thought it was a one off case (and that this was a faulty piece) so I exchanged this for another laptop (same make). Within 24 hours of switching on this laptop, the same problem recurs. I tried reinstalling the OS, uninstalling the antivirus, removing the NVIDIA graphics drivers but in vain - the same problem repeats itself. Everytime the machine crashes, there is some other dll that is named in the crash.

    I connected an external monitor using an HDMI cable.

    Graphics Driver Information:
    Code:
    Detected GPU :  NVIDIA GeForce GTX 850M
    Detected GPU :  Intel(R) HD Graphics 4600
    Detected Driver(s) Version(s) : 10.18.10.3355
    Detected Driver(s) Version(s) : 9.18.13.3788
    
    Its a shame that such a brilliant laptop is giving me such stupid problems. I'll probably return this laptop and buy some other brand if I cannot fix this by this weekend. This laptop has wasted almost 8 days so far. Any ideas on what might be happening?

    Here's what I see in the Events Viewer:

    [​IMG]


    Here's what I see when I look at the minidump ( before removing the graphics driver):

    Code:
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*c:\cache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: srv*c:\cache*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 8 Kernel Version 9600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9600.16422.amd64fre.winblue_gdr.131006-1505
    Machine Name:
    Kernel base = 0xfffff802`3e075000 PsLoadedModuleList = 0xfffff802`3e339990
    Debug session time: Thu Jun 12 21:32:57.605 2014 (UTC - 6:00)
    System Uptime: 0 days 4:26:57.339
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................................
    Loading User Symbols
    Loading unloaded module list
    ..................
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, 0, ffffd000263980d0, 0}
    
    Probably caused by : cdd.dll ( cdd!BitBltBitmap+121 )
    
    Followup: MachineOwner
    ---------
    
    5: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: 0000000000000000, Address of the instruction which caused the bugcheck
    Arg3: ffffd000263980d0, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    DUMP_FILE_ATTRIBUTES: 0xc
      Insufficient Dumpfile Size
      Kernel Generated Triage Dump
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP:
    +3ce75c962396
    00000000`00000000 ??              ???
    
    CONTEXT:  ffffd000263980d0 -- (.cxr 0xffffd000263980d0;r)
    rax=000000000000cccc rbx=0000000000000000 rcx=0000000000000000
    rdx=fffff9016d82b018 rsi=0000000000000000 rdi=00000000000000cf
    rip=0000000000000000 rsp=ffffd00026398b08 rbp=ffffd00026398c10
     r8=fffff9016b24c028  r9=0000000000000000 r10=0000000000000003
    r11=ffffd00026399588 r12=0000000000000001 r13=ffffd000263995f0
    r14=0000000000000019 r15=fffff9016cdf7030
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    00000000`00000000 ??              ???
    Last set context:
    rax=000000000000cccc rbx=0000000000000000 rcx=0000000000000000
    rdx=fffff9016d82b018 rsi=0000000000000000 rdi=00000000000000cf
    rip=0000000000000000 rsp=ffffd00026398b08 rbp=ffffd00026398c10
     r8=fffff9016b24c028  r9=0000000000000000 r10=0000000000000003
    r11=ffffd00026399588 r12=0000000000000001 r13=ffffd000263995f0
    r14=0000000000000019 r15=fffff9016cdf7030
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    00000000`00000000 ??              ???
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  csrss.exe
    
    CURRENT_IRQL:  0
    
    ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
    
    LAST_CONTROL_TRANSFER:  from fffff960009b4a01 to 0000000000000000
    
    STACK_TEXT: 
    ffffd000`26398b08 fffff960`009b4a01 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x0
    ffffd000`26398b10 fffff960`009b7245 : 00000000`00000001 00000904`82600000 fffff6fc`80b6c180 fffff802`3e0a5449 : cdd!BitBltBitmap+0x121
    ffffd000`26399170 fffff960`009b48cf : fffff6fc`80b6c178 fffff901`6d82f000 ffffd000`37632c00 ffffd000`26399648 : cdd!DrvBitBltInternal+0x175
    ffffd000`26399440 fffff960`00162ab8 : fffff901`400f6010 fffff6fc`80b6c180 00000000`00000000 00000000`00000000 : cdd!DrvCopyBits+0x4f
    ffffd000`263994b0 fffff960`0014b1ac : 00000000`00000000 fffff901`6b24c118 fffff901`6b24c028 fffff901`6d1c4ef0 : win32k!SpBitBlt+0x3d7
    ffffd000`26399a00 fffff960`00154b64 : ffffd000`26399b00 00000000`00000001 fffff901`6b24c010 fffff901`6d1c4e00 : win32k!SpCopyBits+0x44
    ffffd000`26399a70 fffff960`00359786 : fffff901`6d1c4d10 ffffd000`26399c20 00000000`00000001 fffff901`4a7c0030 : win32k!OffCopyBits+0xe8
    ffffd000`26399b20 fffff960`00207a2a : fffff901`6d1c4cb0 fffff680`7a001880 fffffa80`00000000 fffff901`6cd8c700 : win32k!bSpCreateShape+0x3f6
    ffffd000`26399ca0 fffff960`0035ae2d : fffff901`4a7c0030 00000000`00000000 fffff901`6d1c4ef0 fffff901`6d707347 : win32k!bSpTransferShape+0x122
    ffffd000`26399d10 fffff960`002a9cea : fffff901`5c6e7ce0 00000000`00000000 ffffd000`26399e50 fffff901`6d83e220 : win32k!pSpConvertSpriteFromMeta+0xa1
    ffffd000`26399d50 fffff960`0037ddfd : fffff901`400f6010 fffff901`6d83e220 fffff901`6d83e280 fffff901`400f6070 : win32k!vSpDynamicModeChange+0xaecc2
    ffffd000`2639a320 fffff960`0014fa1c : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : win32k!bDynamicModeChange+0x129d
    ffffd000`2639a400 fffff960`001b8e3b : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`2639a861 : win32k!DrvInternalChangeDisplaySettings+0xbc8
    ffffd000`2639a660 fffff960`003660ba : ffffe000`055fb090 ffffd000`2639a861 00000000`400000c0 00000000`400000c0 : win32k!xxxInternalUserChangeDisplaySettings+0x217
    ffffd000`2639a710 fffff960`0036a197 : 00000000`00000000 ffffd000`2639a861 00000000`0000088f 00000000`00000002 : win32k!ApplyPathsModality+0x4e
    ffffd000`2639a770 fffff960`00369438 : ffffc000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!DrvSetDisplayConfig+0x84f
    ffffd000`2639a8b0 fffff960`0032ed79 : 00000000`00000000 ffffd000`2639aa20 ffffc000`0a86b100 ffffc000`0a86b170 : win32k!DrvProcessMonitorEventCallback+0x15c
    ffffd000`2639a920 fffff960`0017daab : ffffd000`2639ab80 ffffe000`0c60e380 00000000`00000000 00000000`00000004 : win32k!VideoPortCalloutThread+0x1b1
    ffffd000`2639aaa0 fffff960`000d3856 : 00000000`0000000e ffffe000`00000004 ffffd000`237e97b8 00000000`00000000 : win32k!xxxCreateSystemThreads+0x4b
    ffffd000`2639aad0 fffff802`3e1ce4b3 : ffffe000`0c60e380 00000000`00000004 000000f4`281c2420 00000000`00003154 : win32k!NtUserCallNoParam+0x2e
    ffffd000`2639ab00 00007fff`2d4917ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    000000f4`0397fc98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2d4917ea
    
    
    FOLLOWUP_IP:
    cdd!BitBltBitmap+121
    fffff960`009b4a01 85c0            test    eax,eax
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  cdd!BitBltBitmap+121
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: cdd
    
    IMAGE_NAME:  cdd.dll
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  521605d0
    
    IMAGE_VERSION:  6.3.9600.16384
    
    STACK_COMMAND:  .cxr 0xffffd000263980d0 ; kb
    
    BUCKET_ID_FUNC_OFFSET:  121
    
    FAILURE_BUCKET_ID:  0x3B_cdd!BitBltBitmap
    
    BUCKET_ID:  0x3B_cdd!BitBltBitmap
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:0x3b_cdd!bitbltbitmap
    
    FAILURE_ID_HASH:  {68814b94-7286-bd72-d712-4c9d151d7aa1}
    
    Here's what I see in the memory dump ( after I remove the graphics driver):

    Code:
    Loading Dump File [C:\Windows\MEMORY.DMP]
    Kernel Bitmap Dump File: Only kernel address space is available
    
    
    ************* Symbol Path validation summary **************
    Response                         Time (ms)     Location
    Deferred                                       srv*c:\cache*http://msdl.microsoft.com/download/symbols
    Symbol search path is: srv*c:\cache*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows 8 Kernel Version 9600 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 9600.16422.amd64fre.winblue_gdr.131006-1505
    Machine Name:
    Kernel base = 0xfffff803`5fe77000 PsLoadedModuleList = 0xfffff803`6013b990
    Debug session time: Fri Jun 13 02:44:54.377 2014 (UTC - 6:00)
    System Uptime: 0 days 2:06:22.095
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .........................................
    Loading User Symbols
    PEB is paged out (Peb.Ldr = 00007ff6`ba57f018).  Type ".hh dbgerr001" for details
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {d0b66, 2, 1, fffff8035feb28b7}
    
    Page 12c0b6 not present in the dump file. Type ".hh dbgerr004" for details
    Page 115b36 not present in the dump file. Type ".hh dbgerr004" for details
    Page 219e75 not present in the dump file. Type ".hh dbgerr004" for details
    Probably caused by : win32k.sys ( win32k!W32PIDLOCK::vLockSingleThread+22 )
    
    Followup: MachineOwner
    ---------
    
    6: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000000d0b66, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff8035feb28b7, address which referenced memory
    
    Debugging Details:
    ------------------
    
    Page 219e75 not present in the dump file. Type ".hh dbgerr004" for details
    
    WRITE_ADDRESS:  00000000000d0b66
    
    CURRENT_IRQL:  2
    
    FAULTING_IP:
    nt!KeWaitForSingleObject+157
    fffff803`5feb28b7 f00fba2f07      lock bts dword ptr [rdi],7
    
    DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT
    
    BUGCHECK_STR:  AV
    
    PROCESS_NAME:  dwm.exe
    
    ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
    
    TRAP_FRAME:  ffffd00041ad9460 -- (.trap 0xffffd00041ad9460)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000076786 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8035feb28b7 rsp=ffffd00041ad95f0 rbp=0000000000000000
     r8=0000000000000002  r9=ffffd000207dc180 r10=fffff780000003b0
    r11=fffff78000000008 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!KeWaitForSingleObject+0x157:
    fffff803`5feb28b7 f00fba2f07      lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8035ffd07e9 to fffff8035ffc4ca0
    
    STACK_TEXT: 
    ffffd000`41ad9318 fffff803`5ffd07e9 : 00000000`0000000a 00000000`000d0b66 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    ffffd000`41ad9320 fffff803`5ffcf03a : 00000000`00000001 ffffe000`0eebd640 00000000`00000300 ffffd000`41ad9460 : nt!KiBugCheckDispatch+0x69
    ffffd000`41ad9460 fffff803`5feb28b7 : 00000000`00000020 fffff960`000d46d3 00000000`00000000 fffff901`5b887c90 : nt!KiPageFault+0x23a
    ffffd000`41ad95f0 fffff960`0024f742 : 00000000`000d0b66 fffff901`00000006 fffff901`48b5e000 fffff960`0014f400 : nt!KeWaitForSingleObject+0x157
    ffffd000`41ad9690 fffff960`0039c35b : 00000000`00000050 fffff803`5ff5fb28 00000000`00000000 ffffe000`08abbeb0 : win32k!W32PIDLOCK::vLockSingleThread+0x22
    ffffd000`41ad96d0 fffff960`00397602 : fffff901`57da7b60 00000000`00000000 ffffd000`41ad9840 fffff901`57da7b60 : win32k!pSpHintSpriteShape+0x5f
    ffffd000`41ad97d0 fffff960`0031c6bd : fffff901`57da7b60 fffff901`57da7b60 00000000`00000000 fffff901`00000000 : win32k!GdiHintSpriteShape+0xa2
    ffffd000`41ad9880 fffff960`00299271 : ffffe000`037ab500 ffffe000`05116740 ffffe000`037ab500 fffff960`001c8fbc : win32k!GreTransferSpriteStateToDwmState+0x8315d
    ffffd000`41ad99d0 fffff960`0029912a : ffffe000`05116740 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!zzzComposeDesktop+0xa1
    ffffd000`41ad9a60 fffff960`00298fa2 : 00000000`00000000 ffffffff`8f05f31c ffffd000`41ad9b80 00000000`00000000 : win32k!zzzDwmStartRedirection+0x142
    ffffd000`41ad9ad0 fffff803`5ffd04b3 : ffffe000`0eebd640 00000000`00000000 ffffe000`0e490a70 00000000`00000000 : win32k!NtUserDwmStartRedirection+0x62
    ffffd000`41ad9b00 00007ff8`a7ef167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000019`adeef508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`a7ef167a
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP:
    win32k!W32PIDLOCK::vLockSingleThread+22
    fffff960`0024f742 4883c438        add     rsp,38h
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  win32k!W32PIDLOCK::vLockSingleThread+22
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5262255d
    
    IMAGE_VERSION:  6.3.9600.16438
    
    BUCKET_ID_FUNC_OFFSET:  22
    
    FAILURE_BUCKET_ID:  AV_win32k!W32PIDLOCK::vLockSingleThread
    
    BUCKET_ID:  AV_win32k!W32PIDLOCK::vLockSingleThread
    
    ANALYSIS_SOURCE:  KM
    
    FAILURE_ID_HASH_STRING:  km:av_win32k!w32pidlock::vlocksinglethread
    
    FAILURE_ID_HASH:  {58ee55a7-c5d9-eb82-fc84-8f7b6656afd3}