BSOD

Page 1 of 2 12 LastLast

  1. Posts : 18
    Windows 7 Ultimate x86
       #1

    BSOD


    I have installed Windows 7 Ultimate x86 on my laptop yesterday and its been getting the infamous BSOD. The laptop can idel on dekstop for a random period of time before getting BSOD. It happens very frequently, and the system will BSOD upon restarting.


    - Win 7 Ultimate 32 bit
    - Original installed Window Vista x64
    - OEM

    -Hardware is around a year old since this laptop released last year now.
    -New OS is about a day old, i have reinstalled the OS

    Documents.rar (use this!)
    Attachment 103744

    Thanks!
    Last edited by up69; 11 Oct 2010 at 04:39.
      My Computer


  2. Posts : 2,493
    Windows 7 64Bit
       #2

    please folow this posting instructions:

    https://www.sevenforums.com/crashes-d...tructions.html
      My Computer


  3. Posts : 18
    Windows 7 Ultimate x86
    Thread Starter
       #3

    lorddenis said:
    please folow this posting instructions:

    https://www.sevenforums.com/crashes-d...tructions.html
    Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
      My Computer


  4. Posts : 670
    Windows 7 x64
       #4

    up69 said:
    lorddenis said:
    please folow this posting instructions:

    https://www.sevenforums.com/crashes-d...tructions.html
    Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
    Attachment 103744

    This is what I get when I click it:

    404 - File or directory not found.

    The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.
      My Computer


  5. Posts : 18
    Windows 7 Ultimate x86
    Thread Starter
       #5

    cybercore said:
    up69 said:
    lorddenis said:
    please folow this posting instructions:

    https://www.sevenforums.com/crashes-d...tructions.html
    Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
    Attachment 103744

    This is what I get when I click it:

    404 - File or directory not found.

    The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.
    Strange, it works for me; anyways, reuploaded onto Mediafire.

    Thanks!
      My Computer


  6. Posts : 2,493
    Windows 7 64Bit
       #6

    up69 said:
    cybercore said:
    up69 said:

    Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
    Attachment 103744

    This is what I get when I click it:

    404 - File or directory not found.

    The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.
    Strange, it works for me; anyways, reuploaded onto Mediafire.

    Thanks!
    that is strange because i ger the same error.

    cant test if the link works..my internet is very slow today...
      My Computer


  7. Posts : 18
    Windows 7 Ultimate x86
    Thread Starter
       #7

    unlucky me then
      My Computer


  8. Posts : 11,840
    64-bit Windows 8.1 Pro
       #8

    Just navigate to c:/windows/minidump and zip up the .dmp files, then attach it to your next post..
      My Computer


  9. Posts : 670
    Windows 7 x64
       #9

    Check your notebook support for updates:

    yk62x86.sys Mon Feb 23 16:44:18 2009
    Marvell Yukon Ethernet Controller

    iaStor.sys Fri Jun 05 04:42:33 2009
    Intel Matrix Storage Manager

    netw5v32.sys Thu May 14 18:40:33 2009
    Intel® Wireless WiFi Link Adapter

    nvlddmkm.sys Tue Jul 28 17:21:09 2009
    NVIDIA

    o2sd.sys Thu May 07 04:54:54 2009
    O2Micro SD Reader

    SynTP.sys Fri Jun 19 05:33:00 2009
    Synaptics Touchpad

    RTKVHDA.sys Wed Aug 05 12:41:49 2009
    Realtek HD Audio

    HSXHWAZL.sys Fri Feb 13 22:58:15 2009
    Conexant SoftK56 Modem




    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101110-17035-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82a53000 PsLoadedModuleList = 0x82b9b810
    Debug session time: Mon Oct 11 12:09:23.371 2010 (GMT-5)
    System Uptime: 0 days 0:31:34.322
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    MEMORY_MANAGEMENT (1a)
        # Any other values for parameter 1 must be individually examined.
    Arguments:
    Arg1: 00041284, A PTE or the working set list is corrupt.
    Arg2: 01364001
    Arg3: 0000391e
    Arg4: c0802000
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x1a_41284
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 82ac9806 to 82b2fd10
    
    STACK_TEXT:  
    821bda84 82ac9806 0000001a 00041284 01364001 nt!KeBugCheckEx+0x1e
    821bdaac 82b0c8b8 c0c05d90 013cffff 01350002 nt!MiLocateWsle+0xc1
    821bdba8 82b063fe 01350002 013cffff 89713690 nt!MiDeleteVirtualAddresses+0x1b5
    821bdc78 82afa708 89713690 859c1600 851a2b80 nt!MiRemoveMappedView+0x325
    821bdca0 82ccd4c8 851a2b80 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
    821bdd04 82cced31 89713690 01350000 00000000 nt!MiUnmapViewOfSection+0x265
    821bdd24 82a9642a ffffffff 01350000 001af6dc nt!NtUnmapViewOfSection+0x55
    821bdd24 77a264f4 ffffffff 01350000 001af6dc nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    001af6dc 00000000 00000000 00000000 00000000 0x77a264f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiLocateWsle+c1
    82ac9806 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiLocateWsle+c1
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0x1a_41284_nt!MiLocateWsle+c1
    
    BUCKET_ID:  0x1a_41284_nt!MiLocateWsle+c1
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101110-21980-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82a0d000 PsLoadedModuleList = 0x82b55810
    Debug session time: Mon Oct 11 10:20:06.704 2010 (GMT-5)
    System Uptime: 0 days 0:02:13.280
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1000007E, {c0000005, 82aac873, 8d38f9bc, 8d38f5a0}
    
    Probably caused by : memory_corruption ( nt!MiGetNextNode+b )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003.  This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG.  This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG.  This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c0000005, The exception code that was not handled
    Arg2: 82aac873, The address that the exception occurred at
    Arg3: 8d38f9bc, Exception Record Address
    Arg4: 8d38f5a0, Context Record Address
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    FAULTING_IP: 
    nt!MiGetNextNode+b
    82aac873 394804          cmp     dword ptr [eax+4],ecx
    
    EXCEPTION_RECORD:  8d38f9bc -- (.exr 0xffffffff8d38f9bc)
    ExceptionAddress: 82aac873 (nt!MiGetNextNode+0x0000000b)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 00000000
       Parameter[1]: 00000004
    Attempt to read from address 00000004
    
    CONTEXT:  8d38f5a0 -- (.cxr 0xffffffff8d38f5a0)
    eax=00000000 ebx=891f7f38 ecx=891f7f38 edx=00000025 esi=851c7a70 edi=976e2008
    eip=82aac873 esp=8d38fa84 ebp=8d38fabc iopl=0         nv up ei pl nz ac po cy
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010213
    nt!MiGetNextNode+0xb:
    82aac873 394804          cmp     dword ptr [eax+4],ecx ds:0023:00000004=????????
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  PdtWzd.exe
    
    CURRENT_IRQL:  0
    
    ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
    
    EXCEPTION_PARAMETER1:  00000000
    
    EXCEPTION_PARAMETER2:  00000004
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82b75718
    Unable to read MiSystemVaType memory at 82b55160
     00000004 
    
    FOLLOWUP_IP: 
    nt!MiGetNextNode+b
    82aac873 394804          cmp     dword ptr [eax+4],ecx
    
    BUGCHECK_STR:  0x7E
    
    DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE
    
    LAST_CONTROL_TRANSFER:  from 82c8b22c to 82aac873
    
    STACK_TEXT:  
    8d38fa80 82c8b22c 00002000 8d38fb50 00000002 nt!MiGetNextNode+0xb
    8d38fabc 82bce720 976e2008 891e9920 8d38fb50 nt!MmEnumerateAndReferenceImages+0x11c
    8d38fae4 82bcf07a 891e9920 00000000 891e9920 nt!EtwpEnumerateImages+0x41
    8d38fb28 82bce531 891e9920 8d38fb50 00000000 nt!EtwpProcessEnumCallback+0x1c1
    8d38fb40 82bceeac 82bceeb7 8d38fb50 8d38fbb4 nt!PsEnumProcesses+0x12
    8d38fb64 82bcedbd 8d38fbb4 00000000 82b46b18 nt!EtwpProcessThreadImageRundown+0x43
    8d38fb78 82bced3d 00000002 00000001 82b4c320 nt!EtwpKernelTraceRundown+0x28
    8d38fc34 82bf65c1 00000000 00000000 00000002 nt!EtwpUpdateLoggerGroupMasks+0x1a4
    8d38fc48 82bf6322 000000b4 00000000 000000b4 nt!EtwpStopLoggerInstance+0x39
    8d38fc78 82c5f462 9c954848 00000000 a99c0903 nt!EtwpStopTrace+0xf8
    8d38fcd0 82bcea6d 00000002 82b4cac0 000000b4 nt!NtTraceControl+0x219
    8d38fd00 82a7af2b 897dc048 00000000 851c7a70 nt!PerfDiagpProxyWorker+0x15a
    8d38fd50 82c1b66d 00000001 a99c0843 00000000 nt!ExpWorkerThread+0x10d
    8d38fd90 82acd0d9 82a7ae1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  nt!MiGetNextNode+b
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
    
    STACK_COMMAND:  .cxr 0xffffffff8d38f5a0 ; kb
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0x7E_nt!MiGetNextNode+b
    
    BUCKET_ID:  0x7E_nt!MiGetNextNode+b
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101110-22510-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82a37000 PsLoadedModuleList = 0x82b7f810
    Debug session time: Mon Oct 11 10:15:21.659 2010 (GMT-5)
    System Uptime: 0 days 0:06:55.235
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: e991210c, memory referenced.
    Arg2: 00000000, value 0 = read operation, 1 = write operation.
    Arg3: 82acb5e3, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 00000002, (reserved)
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82b9f718
    Unable to read MiSystemVaType memory at 82b7f160
     e991210c 
    
    FAULTING_IP: 
    nt!MiFindNodeOrParent+17
    82acb5e3 3b510c          cmp     edx,dword ptr [ecx+0Ch]
    
    MM_INTERNAL_CODE:  2
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  explorer.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  97da1bac -- (.trap 0xffffffff97da1bac)
    ErrCode = 00000000
    eax=e9912100 ebx=0358c000 ecx=e9912100 edx=0000358c esi=891c27f0 edi=0358dfff
    eip=82acb5e3 esp=97da1c20 ebp=97da1c20 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    nt!MiFindNodeOrParent+0x17:
    82acb5e3 3b510c          cmp     edx,dword ptr [ecx+0Ch] ds:0023:e991210c=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82a7d5f8 to 82abc8e3
    
    STACK_TEXT:  
    97da1b94 82a7d5f8 00000000 e991210c 00000000 nt!MmAccessFault+0x106
    97da1b94 82acb5e3 00000000 e991210c 00000000 nt!KiTrap0E+0xdc
    97da1c20 82ade91e 97da1c30 88393438 88f9b248 nt!MiFindNodeOrParent+0x17
    97da1c34 82ca51e9 b36ecbc5 0358cfb8 fe763160 nt!MiLocateAddress+0x41
    97da1c74 82cbab64 0358cfe8 00000100 00000004 nt!MiSecureVirtualMemory+0x85
    97da1c94 96030a9a 0358cfe8 00000100 00000004 nt!MmSecureVirtualMemory+0x1a
    97da1d08 82a7a42a 070101a3 be050d29 00000000 win32k!NtGdiGetDIBitsInternal+0x109
    97da1d08 77d964f4 070101a3 be050d29 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0224e850 00000000 00000000 00000000 00000000 0x77d964f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!NtGdiGetDIBitsInternal+109
    96030a9a 8945dc          mov     dword ptr [ebp-24h],eax
    
    SYMBOL_STACK_INDEX:  6
    
    SYMBOL_NAME:  win32k!NtGdiGetDIBitsInternal+109
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc2a2
    
    FAILURE_BUCKET_ID:  0x50_win32k!NtGdiGetDIBitsInternal+109
    
    BUCKET_ID:  0x50_win32k!NtGdiGetDIBitsInternal+109
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101110-18954-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82a43000 PsLoadedModuleList = 0x82b8b810
    Debug session time: Mon Oct 11 13:56:41.627 2010 (GMT-5)
    System Uptime: 0 days 0:04:31.578
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    .....
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PAGE_FAULT_IN_NONPAGED_AREA (50)
    Invalid system memory was referenced.  This cannot be protected by try-except,
    it must be protected by a Probe.  Typically the address is just plain bad or it
    is pointing at freed memory.
    Arguments:
    Arg1: 98d5c000, memory referenced.
    Arg2: 00000001, value 0 = read operation, 1 = write operation.
    Arg3: 96b58db3, If non-zero, the instruction address which referenced the bad memory
        address.
    Arg4: 00000000, (reserved)
    
    Debugging Details:
    ------------------
    
    
    Could not read faulting driver name
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bab718
    Unable to read MiSystemVaType memory at 82b8b160
     98d5c000 
    
    FAULTING_IP: 
    win32k!memcpy+33
    96b58db3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
    
    MM_INTERNAL_CODE:  0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x50
    
    PROCESS_NAME:  SynTPEnh.exe
    
    CURRENT_IRQL:  0
    
    TRAP_FRAME:  98d5b940 -- (.trap 0xffffffff98d5b940)
    ErrCode = 00000002
    eax=fe5f2f96 ebx=98d5ba70 ecx=00000124 edx=00000002 esi=fe5f2b04 edi=98d5c000
    eip=96b58db3 esp=98d5b9b4 ebp=98d5b9bc iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    win32k!memcpy+0x33:
    96b58db3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82a895f8 to 82ac88e3
    
    STACK_TEXT:  
    98d5b928 82a895f8 00000001 98d5c000 00000000 nt!MmAccessFault+0x106
    98d5b928 96b58db3 00000001 98d5c000 00000000 nt!KiTrap0E+0xdc
    98d5b9bc 96b66606 98d5ba70 fe5f2574 00000a22 win32k!memcpy+0x33
    98d5b9e0 96b62eaf fe5f2574 98d5ba70 98d5ba0c win32k!GreGetCannonicalName+0x51
    98d5ba04 96b619d0 98d5bc98 98d5bc64 98d5bc3c win32k!MAPPER::MAPPER+0x40
    98d5bb64 00595e6d 0009101a 001a1f27 0042464d win32k!ppfeGetAMatch+0x4e
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    98d5bb8c 00b4b7b9 00c6c8ca 00c4c5c7 00a7a9ac 0x595e6d
    98d5bb90 00c6c8ca 00c4c5c7 00a7a9ac 007a7a7c 0xb4b7b9
    98d5bb94 00c4c5c7 00a7a9ac 007a7a7c 006c7176 0xc6c8ca
    98d5bb98 00a7a9ac 007a7a7c 006c7176 009599a3 0xc4c5c7
    98d5bb9c 007a7a7c 006c7176 009599a3 00b6bac2 0xa7a9ac
    98d5bba0 006c7176 009599a3 00b6bac2 00ccd0d8 0x7a7a7c
    98d5bba4 009599a3 00b6bac2 00ccd0d8 00f5f5f5 0x6c7176
    98d5bba8 00b6bac2 00ccd0d8 00f5f5f5 00838486 0x9599a3
    98d5bbac 00ccd0d8 00f5f5f5 00838486 00ff00ff 0xb6bac2
    98d5bbb0 00f5f5f5 00838486 00ff00ff 00ff00ff 0xccd0d8
    98d5bbb4 00838486 00ff00ff 00ff00ff 00ff00ff 0xf5f5f5
    98d5bbb8 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0x838486
    98d5bbbc 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bbc0 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bbc4 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bbc8 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bbcc 00ff00ff 00ff00ff 00ff00ff 00838486 0xff00ff
    98d5bbd0 00ff00ff 00ff00ff 00838486 007a828f 0xff00ff
    98d5bbd4 00ff00ff 00838486 007a828f 00313b45 0xff00ff
    98d5bbd8 00838486 007a828f 00313b45 002a343d 0xff00ff
    98d5bbdc 007a828f 00313b45 002a343d 00222b36 0x838486
    98d5bbe0 00313b45 002a343d 00222b36 001e242d 0x7a828f
    98d5bbe4 002a343d 00222b36 001e242d 00161c23 0x313b45
    98d5bbe8 00222b36 001e242d 00161c23 002d333b 0x2a343d
    98d5bbec 001e242d 00161c23 002d333b 007e838b 0x222b36
    98d5bbf0 00161c23 002d333b 007e838b 00919aa6 0x1e242d
    98d5bbf4 002d333b 007e838b 00919aa6 0084909e 0x161c23
    98d5bbf8 007e838b 00919aa6 0084909e 006e7b8c 0x2d333b
    98d5bbfc 00919aa6 0084909e 006e7b8c 00536376 0x7e838b
    98d5bc00 0084909e 006e7b8c 00536376 00404e64 0x919aa6
    98d5bc04 006e7b8c 00536376 00404e64 002e3d52 0x84909e
    98d5bc08 00536376 00404e64 002e3d52 00243142 0x6e7b8c
    98d5bc0c 00404e64 002e3d52 00243142 001e2a3a 0x536376
    98d5bc10 002e3d52 00243142 001e2a3a 00182331 0x404e64
    98d5bc14 00243142 001e2a3a 00182331 0027303a 0x2e3d52
    98d5bc18 001e2a3a 00182331 0027303a 00989fb4 0x243142
    98d5bc1c 00182331 0027303a 00989fb4 00a0a7bd 0x1e2a3a
    98d5bc20 0027303a 00989fb4 00a0a7bd 00969db3 0x182331
    98d5bc24 00989fb4 00a0a7bd 00969db3 001f2732 0x27303a
    98d5bc28 00a0a7bd 00969db3 001f2732 0009101a 0x989fb4
    98d5bc2c 00969db3 001f2732 0009101a 0010171f 0xa0a7bd
    98d5bc30 001f2732 0009101a 0010171f 00343c42 0x969db3
    98d5bc34 0009101a 0010171f 00343c42 00595e65 0x1f2732
    98d5bc38 0010171f 00343c42 00595e65 0061676c 0x9101a
    98d5bc3c 00343c42 00595e65 0061676c 006f7379 0x10171f
    98d5bc40 00595e65 0061676c 006f7379 007c8186 0x343c42
    98d5bc44 0061676c 006f7379 007c8186 008e9196 0x595e65
    98d5bc48 006f7379 007c8186 008e9196 00a0a2a5 0x61676c
    98d5bc4c 007c8186 008e9196 00a0a2a5 00b4b7b9 0x6f7379
    98d5bc50 008e9196 00a0a2a5 00b4b7b9 00bfc0c1 0x7c8186
    98d5bc54 00a0a2a5 00b4b7b9 00bfc0c1 00a7a9ac 0x8e9196
    98d5bc58 00b4b7b9 00bfc0c1 00a7a9ac 008b8b8d 0xa0a2a5
    98d5bc5c 00bfc0c1 00a7a9ac 008b8b8d 00626367 0xb4b7b9
    98d5bc60 00a7a9ac 008b8b8d 00626367 007e8189 0xbfc0c1
    98d5bc64 008b8b8d 00626367 007e8189 00a1a6af 0xa7a9ac
    98d5bc68 00626367 007e8189 00a1a6af 00b9bec6 0x8b8b8d
    98d5bc6c 007e8189 00a1a6af 00b9bec6 00ccd0d8 0x626367
    98d5bc70 00a1a6af 00b9bec6 00ccd0d8 00f5f5f5 0x7e8189
    98d5bc74 00b9bec6 00ccd0d8 00f5f5f5 00838486 0xa1a6af
    98d5bc78 00ccd0d8 00f5f5f5 00838486 00ff00ff 0xb9bec6
    98d5bc7c 00f5f5f5 00838486 00ff00ff 00ff00ff 0xccd0d8
    98d5bc80 00838486 00ff00ff 00ff00ff 00ff00ff 0xf5f5f5
    98d5bc84 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0x838486
    98d5bc88 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bc8c 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bc90 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bc94 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
    98d5bc98 00ff00ff 00ff00ff 00ff00ff 00838486 0xff00ff
    98d5bc9c 00ff00ff 00ff00ff 00838486 007a828f 0xff00ff
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    win32k!memcpy+33
    96b58db3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
    
    SYMBOL_STACK_INDEX:  2
    
    SYMBOL_NAME:  win32k!memcpy+33
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: win32k
    
    IMAGE_NAME:  win32k.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc2a2
    
    FAILURE_BUCKET_ID:  0x50_win32k!memcpy+33
    
    BUCKET_ID:  0x50_win32k!memcpy+33
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101110-22900-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82a4b000 PsLoadedModuleList = 0x82b93810
    Debug session time: Mon Oct 11 10:17:28.682 2010 (GMT-5)
    System Uptime: 0 days 0:01:41.259
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {0, 2, 1, 82abd3ca}
    
    *** WARNING: Unable to verify timestamp for yk62x86.sys
    *** ERROR: Module load completed but symbols could not be loaded for yk62x86.sys
    *** WARNING: Unable to verify timestamp for iaStor.sys
    *** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
    *** WARNING: Unable to verify timestamp for amdxata.sys
    *** ERROR: Module load completed but symbols could not be loaded for amdxata.sys
    *** WARNING: Unable to verify timestamp for spldr.sys
    *** ERROR: Module load completed but symbols could not be loaded for spldr.sys
    *** WARNING: Unable to verify timestamp for dump_iaStor.sys
    *** ERROR: Module load completed but symbols could not be loaded for dump_iaStor.sys
    *** WARNING: Unable to verify timestamp for nvlddmkm.sys
    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    *** WARNING: Unable to verify timestamp for nvBridge.kmd
    *** ERROR: Module load completed but symbols could not be loaded for nvBridge.kmd
    *** WARNING: Unable to verify timestamp for netw5v32.sys
    *** ERROR: Module load completed but symbols could not be loaded for netw5v32.sys
    *** WARNING: Unable to verify timestamp for o2sd.sys
    *** ERROR: Module load completed but symbols could not be loaded for o2sd.sys
    *** WARNING: Unable to verify timestamp for o2media.sys
    *** ERROR: Module load completed but symbols could not be loaded for o2media.sys
    *** WARNING: Unable to verify timestamp for SynTP.sys
    *** ERROR: Module load completed but symbols could not be loaded for SynTP.sys
    *** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
    *** WARNING: Unable to verify timestamp for mdmxsdk.sys
    *** ERROR: Module load completed but symbols could not be loaded for mdmxsdk.sys
    *** WARNING: Unable to verify timestamp for RTKVHDA.sys
    *** ERROR: Module load completed but symbols could not be loaded for RTKVHDA.sys
    *** WARNING: Unable to verify timestamp for drmk.sys
    *** ERROR: Module load completed but symbols could not be loaded for drmk.sys
    *** WARNING: Unable to verify timestamp for HSXHWAZL.sys
    *** ERROR: Module load completed but symbols could not be loaded for HSXHWAZL.sys
    *** WARNING: Unable to verify timestamp for HSX_DPV.sys
    *** ERROR: Module load completed but symbols could not be loaded for HSX_DPV.sys
    *** WARNING: Unable to verify timestamp for HSX_CNXT.sys
    *** ERROR: Module load completed but symbols could not be loaded for HSX_CNXT.sys
    *** WARNING: Unable to verify timestamp for cdd.dll
    *** ERROR: Module load completed but symbols could not be loaded for cdd.dll
    *** WARNING: Unable to verify timestamp for peauth.sys
    *** ERROR: Module load completed but symbols could not be loaded for peauth.sys
    *** WARNING: Unable to verify timestamp for secdrv.SYS
    *** ERROR: Module load completed but symbols could not be loaded for secdrv.SYS
    *** WARNING: Unable to verify timestamp for XAudio32.sys
    *** ERROR: Module load completed but symbols could not be loaded for XAudio32.sys
    *** WARNING: Unable to verify timestamp for spsys.sys
    *** ERROR: Module load completed but symbols could not be loaded for spsys.sys
    Probably caused by : ntkrpamp.exe ( nt!KiActivateWaiterQueue+3c )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 82abd3ca, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bb3718
    Unable to read MiSystemVaType memory at 82b93160
     00000000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KiActivateWaiterQueue+3c
    82abd3ca 890a            mov     dword ptr [edx],ecx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  8d3fda2c -- (.trap 0xffffffff8d3fda2c)
    ErrCode = 00000002
    eax=88f7a030 ebx=807c2120 ecx=00000000 edx=00000000 esi=8800a040 edi=88f7cd48
    eip=82abd3ca esp=8d3fdaa0 ebp=8d3fdab4 iopl=0         nv up ei pl nz na po nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
    nt!KiActivateWaiterQueue+0x3c:
    82abd3ca 890a            mov     dword ptr [edx],ecx  ds:0023:00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82abd3ca to 82a917eb
    
    STACK_TEXT:  
    8d3fda2c 82abd3ca badb0d00 00000000 00000000 nt!KiTrap0E+0x2cf
    8d3fdab4 82ab8360 88f7a030 88f7ce08 88f7cd48 nt!KiActivateWaiterQueue+0x3c
    8d3fdae0 82b019d2 88f7cd48 88f7ce08 00000000 nt!KiCommitThreadWait+0x13c
    8d3fdb24 82a803f3 00000000 8513d144 8513d298 nt!KeWaitForGate+0x158
    8d3fdb40 82b6af6c 00120010 8d3fdc80 00000010 nt!KiAcquireGuardedMutex+0x5e
    8d3fdb94 82c9ebc4 00000001 00000018 73556553 nt!ExAllocatePoolWithTag+0x3bc
    8d3fdbe0 82c9bd09 00ccf164 8d3fdc80 a9837902 nt!SepProbeAndCaptureString_U+0x7b
    8d3fdcb4 82c56e7f 00ccf15c 00000000 00000000 nt!SepAccessCheckAndAuditAlarm+0x2d2
    8d3fdd00 82a8e42a 00ccf15c 00000000 00ccf164 nt!NtAccessCheckAndAuditAlarm+0x31
    8d3fdd00 771c64f4 00ccf15c 00000000 00ccf164 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    00ccf178 00000000 00000000 00000000 00000000 0x771c64f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiActivateWaiterQueue+3c
    82abd3ca 890a            mov     dword ptr [edx],ecx
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiActivateWaiterQueue+3c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrpamp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007
    
    FAILURE_BUCKET_ID:  0xA_nt!KiActivateWaiterQueue+3c
    
    BUCKET_ID:  0xA_nt!KiActivateWaiterQueue+3c
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmtn
    start    end        module name
    80bc6000 80bce000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
    82a14000 82a4b000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
    82a4b000 82e5b000   nt       ntkrpamp.exe Tue Jul 14 02:15:19 2009 (4A5BC007)
    8ac2a000 8aca2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
    8aca2000 8acb3000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
    8acb3000 8acbb000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
    8acbb000 8acfd000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    8acfd000 8ada8000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
    8ada8000 8adf8000   yk62x86  yk62x86.sys  Mon Feb 23 16:44:18 2009 (49A2B642)
    8ae0e000 8ae7f000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
    8ae7f000 8ae8d000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    8ae8d000 8aed5000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
    8aed5000 8aede000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
    8aede000 8aee6000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
    8aee6000 8af10000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
    8af10000 8af1b000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
    8af1b000 8af2c000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
    8af2c000 8af34000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    8af34000 8af3f000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
    8af3f000 8af4f000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
    8af4f000 8af9a000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
    8af9a000 8afb0000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
    8afb0000 8aff1000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
    8b030000 8b10a000   iaStor   iaStor.sys   Fri Jun 05 04:42:33 2009 (4A287809)
    8b10a000 8b113000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
    8b113000 8b136000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
    8b136000 8b140000   msahci   msahci.sys   Tue Jul 14 02:45:50 2009 (4A5BC72E)
    8b140000 8b14e000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
    8b14e000 8b157000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
    8b157000 8b18b000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
    8b18b000 8b19c000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
    8b19c000 8b1f6000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
    8b200000 8b20e000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
    8b20e000 8b217000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
    8b217000 8b223000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
    8b229000 8b358000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
    8b358000 8b383000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
    8b383000 8b396000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
    8b396000 8b3f3000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
    8b400000 8b40a000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
    8b412000 8b4c9000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
    8b4c9000 8b507000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
    8b507000 8b52c000   ksecpkg  ksecpkg.sys  Tue Jul 14 02:34:00 2009 (4A5BC468)
    8b52c000 8b559000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
    8b559000 8b58b000   fvevol   fvevol.sys   Tue Jul 14 02:13:01 2009 (4A5BBF7D)
    8b58b000 8b5b0000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
    8b5bd000 8b5cb000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
    8b5cb000 8b5de000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
    8b5de000 8b5ee000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
    8b5ee000 8b5f8000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
    8b600000 8b611000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
    8b618000 8b761000   tcpip    tcpip.sys    Tue Jul 14 02:13:18 2009 (4A5BBF8E)
    8b761000 8b792000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
    8b792000 8b79a380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
    8b79b000 8b7da000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
    8b7da000 8b7e2000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
    8b7e2000 8b7f2000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
    8b7f2000 8b7fa000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
    8fc00000 8fc32000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
    8fc32000 8fc39000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
    8fc39000 8fd13000   dump_iaStor dump_iaStor.sys Fri Jun 05 04:42:33 2009 (4A287809)
    8fd27000 8fd46000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
    8fd46000 8fd4d000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
    8fd4d000 8fd54000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
    8fd54000 8fd60000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
    8fd60000 8fd81000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
    8fd81000 8fd8e000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
    8fd8e000 8fd96000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    8fd96000 8fd9e000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
    8fd9e000 8fda6000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
    8fda6000 8fdb1000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
    8fdb1000 8fdbf000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
    8fdbf000 8fdd6000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
    8fdd6000 8fde1000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
    8fde1000 8fe00000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
    9000c000 90070000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
    90070000 90088000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
    90088000 90096000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
    90096000 900b7000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
    900b7000 9016e000   dxgkrnl  dxgkrnl.sys  Tue Jul 14 02:26:15 2009 (4A5BC297)
    9016e000 901b9000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
    901b9000 901fd000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
    90823000 91179840   nvlddmkm nvlddmkm.sys Tue Jul 28 17:21:09 2009 (4A6F0955)
    9117a000 9117b080   nvBridge nvBridge.kmd Tue Jul 28 17:05:43 2009 (4A6F05B7)
    9117c000 911b5000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
    911b5000 911c0000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
    911c0000 911cf000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
    911cf000 911ee000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
    911ee000 911ff000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
    91600000 91634000   ks       ks.sys       Tue Jul 14 02:45:13 2009 (4A5BC709)
    91639000 91a4c000   netw5v32 netw5v32.sys Thu May 14 18:40:33 2009 (4A0C3B71)
    91a4c000 91a78000   1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
    91a78000 91a80a80   o2sd     o2sd.sys     Thu May 07 04:54:54 2009 (4A023F6E)
    91a81000 91aa7000   SCSIPORT SCSIPORT.SYS Tue Jul 14 02:45:55 2009 (4A5BC733)
    91aa7000 91ab2180   o2media  o2media.sys  Thu May 07 04:22:32 2009 (4A0237D8)
    91ab3000 91ab6700   CmBatt   CmBatt.sys   Tue Jul 14 02:19:18 2009 (4A5BC0F6)
    91ab7000 91acf000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
    91acf000 91adc000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    91adc000 91b0e380   SynTP    SynTP.sys    Fri Jun 19 05:33:00 2009 (4A3AF8DC)
    91b0f000 91b10700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
    91b11000 91b1e000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
    91b1e000 91b27000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
    91b27000 91b39000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
    91b39000 91b46000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
    91b46000 91b58000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
    91b58000 91b70000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
    91b70000 91b7b000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
    91b7b000 91b9d000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
    91b9d000 91bb5000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
    91bb5000 91bcc000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
    91bcc000 91be3000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
    91be3000 91bed000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
    91bed000 91bee380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
    91bef000 91bfd000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
    9222e000 92274000   nwifi    nwifi.sys    Tue Jul 14 02:51:59 2009 (4A5BC89F)
    92274000 92284000   ndisuio  ndisuio.sys  Tue Jul 14 02:53:51 2009 (4A5BC90F)
    92284000 92297000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
    92297000 9231c000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
    9231c000 92335000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
    92335000 92347000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
    92347000 9236a000   mrxsmb   mrxsmb.sys   Tue Jul 14 02:14:24 2009 (4A5BBFD0)
    9236a000 923a5000   mrxsmb10 mrxsmb10.sys Tue Jul 14 02:14:34 2009 (4A5BBFDA)
    923a5000 923c0000   mrxsmb20 mrxsmb20.sys Tue Jul 14 02:14:29 2009 (4A5BBFD5)
    923d8000 923db180   mdmxsdk  mdmxsdk.sys  Tue Jun 20 00:26:59 2006 (449716A3)
    93a2c000 93cc8b80   RTKVHDA  RTKVHDA.sys  Wed Aug 05 12:41:49 2009 (4A7953DD)
    93cc9000 93cf8000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
    93cf8000 93d11000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
    93d11000 93d4e000   HSXHWAZL HSXHWAZL.sys Fri Feb 13 22:58:15 2009 (4995DEE7)
    93d4e000 93d65000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
    93d65000 93d88b00   usbvideo usbvideo.sys Tue Jul 14 02:51:51 2009 (4A5BC897)
    93d89000 93da4000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
    93da4000 93dbe000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)
    93dbe000 93dce000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
    94003000 94105000   HSX_DPV  HSX_DPV.sys  Fri Feb 13 23:00:17 2009 (4995DF61)
    94105000 941ba000   HSX_CNXT HSX_CNXT.sys Fri Feb 13 22:57:25 2009 (4995DEB5)
    941ba000 941c7000   modem    modem.sys    Tue Jul 14 02:55:24 2009 (4A5BC96C)
    941c7000 941d1000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
    941d1000 941de000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
    941de000 941ef000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
    941ef000 941fa000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
    96300000 9654a000   win32k   win32k.sys   Tue Jul 14 02:26:26 2009 (4A5BC2A2)
    96560000 96569000   TSDDD    TSDDD.dll    Tue Jul 14 03:01:40 2009 (4A5BCAE4)
    96590000 965ae000   cdd      cdd.dll      unavailable (00000000)
    9880f000 988a6000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
    988a6000 988b0000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
    988b0000 988d1000   srvnet   srvnet.sys   Tue Jul 14 02:14:45 2009 (4A5BBFE5)
    988d1000 988de000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
    988de000 988e6000   XAudio32 XAudio32.sys Wed Apr 29 21:20:55 2009 (49F89A87)
    988e6000 98935000   srv2     srv2.sys     Tue Jul 14 02:14:52 2009 (4A5BBFEC)
    98935000 98986000   srv      srv.sys      Tue Jul 14 02:15:10 2009 (4A5BBFFE)
    98986000 989f0000   spsys    spsys.sys    Mon May 11 19:37:10 2009 (4A085436)
    989f0000 989f1580   MSPQM    MSPQM.sys    Tue Jul 14 02:45:07 2009 (4A5BC703)
    
    Unloaded modules:
    923c0000 923d8000   parport.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8b5b0000 8b5bd000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8fc3c000 8fd16000   dump_iaStor.
        Timestamp: unavailable (00000000)
        Checksum:  00000000
    8fd16000 8fd27000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
      My Computer


  10. Posts : 670
    Windows 7 x64
       #10

    In addition, do the memory tests:

    101110-16567-01.dmp
    BugCheck A, {40000, 2, 1, 82abd620}
    Probably caused by : hardware
    BUCKET_ID: CPU_CALL_ERROR
    Possible invalid call from 82ae8b7d ( nt!MiInsertPageInFreeOrZeroedList+0x1e7 )
    *** Expected target 82abd5f0 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )


    MemTest: RAM reliability tester for Windows can run this one under windows

    RAM - Test with Memtest86+ bootable CD, run overnight for better accuracy



    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\101110-16567-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16385.x86fre.win7_rtm.090713-1255
    Machine Name:
    Kernel base = 0x82a55000 PsLoadedModuleList = 0x82b9d810
    Debug session time: Mon Oct 11 13:03:27.072 2010 (GMT-5)
    System Uptime: 0 days 0:11:18.038
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .......................
    Loading User Symbols
    Loading unloaded module list
    .....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {40000, 2, 1, 82abd620}
    
    Probably caused by : hardware
    
    Followup: MachineOwner
    ---------
     *** Possible invalid call from 82ae8b7d ( nt!MiInsertPageInFreeOrZeroedList+0x1e7 )
     *** Expected target 82abd5f0 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )
    
    2: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00040000, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 82abd620, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bbd718
    Unable to read MiSystemVaType memory at 82b9d160
     00040000 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeAcquireQueuedSpinLockAtDpcLevel+20
    82abd620 8908            mov     dword ptr [eax],ecx
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  80786c18 -- (.trap 0xffffffff80786c18)
    ErrCode = 00000002
    eax=00040000 ebx=00000370 ecx=80786cac edx=850fcb81 esi=8432c0d0 edi=850fcb70
    eip=82abd620 esp=80786c8c ebp=80786cb8 iopl=0         nv up ei ng nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
    nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20:
    82abd620 8908            mov     dword ptr [eax],ecx  ds:0023:00040000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 82ae8b82 to 82abd620
    
    POSSIBLE_INVALID_CONTROL_TRANSFER:  from 82ae8b7d to 82abd5f0
    
    STACK_TEXT:  
    80786c88 82ae8b82 00000000 843368b4 8432c0d8 nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20
    80786cb8 82ab8d9a 85143560 851ca020 00000000 nt!MiInsertPageInFreeOrZeroedList+0x1ec
    80786d44 82be0483 00000000 80786d90 82c6366d nt!MmZeroPageThread+0x4c6
    80786d50 82c6366d 8080a948 a40faa19 00000000 nt!Phase1Initialization+0x14
    80786d90 82b150d9 82be046f 8080a948 00000000 nt!PspSystemThreadStartup+0x9e
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
    
    
    STACK_COMMAND:  .trap 0xffffffff80786c18 ; kb
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: hardware
    
    IMAGE_NAME:  hardware
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    BUCKET_ID:  CPU_CALL_ERROR
    
    Followup: MachineOwner
    ---------
     *** Possible invalid call from 82ae8b7d ( nt!MiInsertPageInFreeOrZeroedList+0x1e7 )
     *** Expected target 82abd5f0 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )
      My Computer


 
Page 1 of 2 12 LastLast

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:24.
Find Us