Win 7 64 BSOD


  1. Posts : 1
    Windows 7 Pro 64
       #1

    Win 7 64 BSOD


    Hi! I've got a BSOD problem with my pc. After changing the CPU and graphic card, i have sometimes a BSOD with a reboot. Need help.

    My windows 7:
    - x64
    - full pro version
    - Age of system - 2 year
    - Age of OS installation - 5 months
      My Computer


  2. Posts : 8,383
    Windows 10 Pro x64, Arch Linux
       #2

    Remove any Lavasoft product and use MSE
    Code:
    *** WARNING: Unable to verify timestamp for Lbd.sys
    *** ERROR: Module load completed but symbols could not be loaded for Lbd.sys
    If you still get BSDOs run a RAM test RAM - Test with Memtest86+


    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff800030c19e6, fffff88008ca8f60, 0}
    
    Probably caused by : memory_corruption
    
    Followup: memory_corruption
      My Computer


  3. Posts : 28,845
    Win 8 Release candidate 8400
       #3

    Garkzz said:
    Hi! I've got a BSOD problem with my pc. After changing the CPU and graphic card, i have sometimes a BSOD with a reboot. Need help.

    My windows 7:
    - x64
    - full pro version
    - Age of system - 2 year
    - Age of OS installation - 5 months

    You have several problems



    1-ASACPI.SYS (5 years old +) is a huge BSOD cause.

    ASACPI.sys Sun Mar 27 22:30:36 2005
    The 2005 version of this driver is a known BSOD cause.
    Please visit this link: ASUSTeK Computer Inc.-Support- download_item_mkt
    Scroll down to the Utilities category, then scroll down to the "ATK0110 driver for WindowsXP/Vista/Windows 7 32&64-bit " (it's about the 8th item down).
    Download and install it.
    Go to C:\Windows\System32\drivers to check and make sure that the ASACPI.sys file is date stamped from 2009 or 2010 (NOT 2005).
    2-Old drivers

    Code:
    ASACPI.sys        fffff880`049fe000    0x00008000    3/27/2005 21:30:36            0x42476c4c    fffff880`049f6000                
    IntcHdmi.sys        fffff880`04f20000    0x00024000    6/6/2007 18:23:23            0x466741eb    fffff880`04efc000                
    yk60x64.sys        fffff880`02dec000    0x00065000    12/6/2007 08:50:34            0x4757fe2a    fffff880`02d87000                
    tap0901.sys        fffff880`02c93000    0x0000d000    10/8/2008 00:15:10            0x48ec41de    fffff880`02c86000                
    dump_iaStorV.sys        fffff880`03bda000    0x0011e000    4/8/2009 11:57:17            0x49dcd76d    fffff880`03abc000                
    iaStorV.sys        fffff880`011f1000    0x0011e000    4/8/2009 11:57:17            0x49dcd76d    fffff880`010d3000
    How To Find Drivers:
    - search Google for the name of the driver
    - compare the Google results with what's installed on your system to figure out which device/program it belongs to
    - visit the web site of the manufacturer of the hardware/program to get the latest drivers (DON'T use Windows Update or the Update driver function of Device Manager).
    - if there are difficulties in locating them, post back with questions and someone will try and help you locate the appropriate program.
    - - The most common drivers are listed on this page: Driver Reference
    - - Driver manufacturer links are on this page: Drivers and Downloads

    3-Lavasoft ADaware the cause of these was Lbd.sys part of adaware. Iwould remove it

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\112110-21372-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
    *http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a16000 PsLoadedModuleList = 0xfffff800`02c53e50
    Debug session time: Sun Nov 21 04:54:50.486 2010 (GMT-5)
    System Uptime: 20 days 15:05:20.172
    Loading Kernel Symbols
    .
    
    Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
    Run !sym noisy before .reload to track down problems loading symbols.
    
    ..............................................................
    ................................................................
    ..........................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {20, 2, 1, fffff80002a8d203}
    
    *** WARNING: Unable to verify timestamp for Lbd.sys
    *** ERROR: Module load completed but symbols could not be loaded for Lbd.sys
    Probably caused by : tdx.sys ( tdx!TdxSendConnection+255 )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000020, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002a8d203, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cbe0e0
     0000000000000020 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeAcquireSpinLockAtDpcLevel+43
    fffff800`02a8d203 f0480fba2900    lock bts qword ptr [rcx],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  emule.exe
    
    TRAP_FRAME:  fffff880046a0ec0 -- (.trap 0xfffff880046a0ec0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000020
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002a8d203 rsp=fffff880046a1050 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=fffffa800600e020
    r11=fffff88001945db0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!KeAcquireSpinLockAtDpcLevel+0x43:
    fffff800`02a8d203 f0480fba2900    lock bts qword ptr [rcx],0 ds:00000000`00000020=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a85ca9 to fffff80002a86740
    
    STACK_TEXT:  
    fffff880`046a0d78 fffff800`02a85ca9 : 00000000`0000000a 00000000`00000020 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`046a0d80 fffff800`02a84920 : 00000000`000f01ff fffff800`02c00e80 fffffa80`02440840 fffffa80`02f1c260 : nt!KiBugCheckDispatch+0x69
    fffff880`046a0ec0 fffff800`02a8d203 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`046a1050 fffff880`0190e54d : fffffa80`076ad010 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireSpinLockAtDpcLevel+0x43
    fffff880`046a10a0 fffff880`0193332c : fffffa80`076ad010 00000000`00000000 fffffa80`076ad2f8 00000000`00000000 : tcpip!NeedToOffloadConnection+0x2d
    fffff880`046a10e0 fffff880`0187f313 : fffffa80`076ad010 00000000`00000024 00000000`00000000 fffff800`02d9c196 : tcpip!DoStateBasedProcessing+0x8c
    fffff880`046a1110 fffff880`0187f347 : fffffa80`076ad010 00000000`00000000 fffff880`046a11c0 fffff800`02bba4d3 : tcpip!OlmNotifyRequest+0xd3
    fffff880`046a1140 fffff880`01875de7 : fffff880`046a1420 fffffa80`076ad010 00000000`00000000 00000000`00000000 : tcpip!OlmNotifySend+0x17
    fffff880`046a1180 fffff880`01875e7b : 00000000`000000e8 fffffa80`05e02f20 fffffa80`04b3cb60 fffff880`010ac090 : tcpip!TcpEnqueueTcbSend+0x3f7
    fffff880`046a1220 fffff800`02a95e5a : fffffa80`09953920 00000000`00000011 00000000`00000000 fffffa80`09953a38 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
    fffff880`046a1250 fffff880`0187bdaa : fffff880`01875e60 fffff880`046a1360 fffffa80`04d59300 fffff880`010b0f9f : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`046a1330 fffff880`010badf5 : fffffa80`04d59360 fffffa80`095ffad0 00000000`00000024 00000000`00000000 : tcpip!TcpTlConnectionSend+0x7a
    fffff880`046a13a0 fffff880`010ad77f : fffffa80`095ffad0 fffff880`046a1ca0 00000000`00000024 fffffa80`095ffad0 : tdx!TdxSendConnection+0x255
    fffff880`046a1480 fffff880`01097ebd : fffffa80`04b6b490 00000000`11aba4e8 fffff880`046a18b0 fffffa80`0c23a8c0 : tdx! ?? ::FNODOBFM::`string'+0x8a5
    fffff880`046a14b0 fffffa80`04b6b490 : 00000000`11aba4e8 fffff880`046a18b0 fffffa80`0c23a8c0 fffffa80`095ffd40 : Lbd+0x2ebd
    fffff880`046a14b8 00000000`11aba4e8 : fffff880`046a18b0 fffffa80`0c23a8c0 fffffa80`095ffd40 fffff880`03d28d55 : 0xfffffa80`04b6b490
    fffff880`046a14c0 fffff880`046a18b0 : fffffa80`0c23a8c0 fffffa80`095ffd40 fffff880`03d28d55 fffffa80`08066360 : 0x11aba4e8
    fffff880`046a14c8 fffffa80`0c23a8c0 : fffffa80`095ffd40 fffff880`03d28d55 fffffa80`08066360 fffff880`046a1ca0 : 0xfffff880`046a18b0
    fffff880`046a14d0 fffffa80`095ffd40 : fffff880`03d28d55 fffffa80`08066360 fffff880`046a1ca0 00000000`00000024 : 0xfffffa80`0c23a8c0
    fffff880`046a14d8 fffff880`03d28d55 : fffffa80`08066360 fffff880`046a1ca0 00000000`00000024 00000000`00000000 : 0xfffffa80`095ffd40
    fffff880`046a14e0 fffff880`03cfc423 : fffff880`046a1a88 fffffa80`02b4df20 fffffa80`0612c9a0 fffffa80`086ba010 : afd! ?? ::GFJBLGFE::`string'+0x708e
    fffff880`046a16a0 fffff800`02da1473 : 00000000`00000024 fffffa80`02b4df20 00000000`0039d370 fffff800`02ff9b01 : afd!AfdFastIoDeviceControl+0x413
    fffff880`046a1a10 fffff800`02da1f66 : 00000000`00000000 00000000`00000240 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x373
    fffff880`046a1b40 fffff800`02a85993 : fffffa80`04b3cb60 fffff880`046a1ca0 00000000`000be218 00000000`72da2450 : nt!NtDeviceIoControlFile+0x56
    fffff880`046a1bb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tdx!TdxSendConnection+255
    fffff880`010badf5 bf03010000      mov     edi,103h
    
    SYMBOL_STACK_INDEX:  c
    
    SYMBOL_NAME:  tdx!TdxSendConnection+255
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tdx
    
    IMAGE_NAME:  tdx.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc16b
    
    FAILURE_BUCKET_ID:  X64_0xA_tdx!TdxSendConnection+255
    
    BUCKET_ID:  X64_0xA_tdx!TdxSendConnection+255
    
    Followup: MachineOwner
    ---------
      My Computer


 

Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 16:01.
Find Us