New
#21
Here's another dmp file... and here's a picture of his blue screen...
http://i50.photobucket.com/albums/f3...bluescreen.jpg
Here's another dmp file... and here's a picture of his blue screen...
http://i50.photobucket.com/albums/f3...bluescreen.jpg
The persistence of this and the ever broader nature of the bug checks is really pushing me to blame hardware.
How long is it lasting before crashing right now?
Code:CRITICAL_STRUCTURE_CORRUPTION (109) This bugcheck is generated when the kernel detects that critical kernel code or data have been corrupted. There are generally three causes for a corruption: 1) A driver has inadvertently or deliberately modified critical kernel code or data. See http://www.microsoft.com/whdc/driver/kernel/64bitPatching.mspx 2) A developer attempted to set a normal kernel breakpoint using a kernel debugger that was not attached when the system was booted. Normal breakpoints, "bp", can only be set if the debugger is attached at boot time. Hardware breakpoints, "ba", can be set at any time. 3) A hardware corruption occurred, e.g. failing RAM holding kernel code or data. Arguments: Arg1: a3a039d89cfc74ff, Reserved Arg2: b3b7465eef794705, Reserved Arg3: fffff80002d8be30, Failure type dependent information Arg4: 0000000000000001, Type of corrupted region, can be 0 : A generic data region 1 : Modification of a function or .pdata 2 : A processor IDT 3 : A processor GDT 4 : Type 1 process list corruption 5 : Type 2 process list corruption 6 : Debug routine modification 7 : Critical MSR modification
It seem to crash often but he didn't tell me when and why he crash the last time. He didn't tell me how long before a crash too. I'lll ask him today.
If it's a hardware problem, which part could be defect ? I ordered all his pieces on directcanada and I have 12-13 days left before the limit for a RMA...
Here's two news dump files... Can you read it please ? I think i'll return the Radeon HD 5770 if it's still this one causing the crash...
Have him run Memtest from a cold boot after his computer has been off for at least an hour. Here are the instructions form Memtest: RAM - Test with Memtest86+. Post back with the Memtest results.
If he gets no errors with Memtest, have him enable Driver Verifier exactly following the instructions in this tutorial: Driver Verifier - Enable and Disable. Be sure he understands that Driver Verifier will trigger BSOD's if it finds faulty drivers. We will need all Verifier enabled dumps uploaded.
The latest two dumps are both Bugcheck 50 and both blame memory corruption.
Code:Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02a68000 PsLoadedModuleList = 0xfffff800`02ca5e50 Debug session time: Sat Feb 5 11:00:06.584 2011 (GMT-5) System Uptime: 0 days 0:08:49.926 Loading Kernel Symbols ............................................................... ................................................................ ................. Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff910c015af10, 1, fffff80002c0c05c, 5} Could not read faulting driver name Probably caused by : memory_corruption Followup: memory_corruption --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff910c015af10, memory referenced. Arg2: 0000000000000001, value 0 = read operation, 1 = write operation. Arg3: fffff80002c0c05c, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000005, (reserved) Debugging Details: ------------------ Could not read faulting driver name WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d100e0 fffff910c015af10 FAULTING_IP: nt!ExDeferredFreePool+1d0 fffff800`02c0c05c 8801 mov byte ptr [rcx],al MM_INTERNAL_CODE: 5 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: CODE_CORRUPTION BUGCHECK_STR: 0x50 PROCESS_NAME: PSFree.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff880097857b0 -- (.trap 0xfffff880097857b0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000fffffff1 rbx=0000000000000000 rcx=fffff910c015af10 rdx=fffff900c015b000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002c0c05c rsp=fffff88009785940 rbp=0000000000000013 r8=fffff900c0a8c010 r9=fffff900c015bc30 r10=fffff900c015bc40 r11=0000000000000001 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!ExDeferredFreePool+0x1d0: fffff800`02c0c05c 8801 mov byte ptr [rcx],al ds:db60:fffff910`c015af10=?? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002b578c1 to fffff80002ad8740 STACK_TEXT: fffff880`09785648 fffff800`02b578c1 : 00000000`00000050 fffff910`c015af10 00000000`00000001 fffff880`097857b0 : nt!KeBugCheckEx fffff880`09785650 fffff800`02ad682e : 00000000`00000001 00000000`00000000 00000000`6c777300 00000000`00000002 : nt! ?? ::FNODOBFM::`string'+0x40e8b fffff880`097857b0 fffff800`02c0c05c : 00000000`00000000 fffffa80`0b20db60 fffffa80`0a8241c0 fffff880`021f4cc0 : nt!KiPageFault+0x16e fffff880`09785940 fffff800`02c0d4c1 : 00000000`00000000 fffff900`c0a95000 00000000`00000021 ffffe7b8`6c777355 : nt!ExDeferredFreePool+0x1d0 fffff880`097859d0 fffff960`000a4a5d : fffff900`c3e31010 fffff900`c0a95180 00000000`6c777355 00000000`00000012 : nt!ExFreePoolWithTag+0x411 fffff880`09785a80 fffff960`000bd962 : fffff900`c3e31010 fffff900`00000000 fffff900`c3e31938 fffff900`c3e31aa8 : win32k!InternalRebuildHwndListForIMEClass+0x1bd fffff880`09785af0 fffff960`000a45ed : 00000000`00000000 fffff880`09785ca0 00000000`00000000 00000000`00000000 : win32k!BuildHwndList+0xb2 fffff880`09785b20 fffff800`02ad7993 : fffffa80`0b20db60 00000000`00000000 00000000`0008e2d8 fffff880`09785bc8 : win32k!NtUserBuildHwndList+0x19d fffff880`09785bb0 00000000`7523fd8a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`0008e2b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7523fd8a STACK_COMMAND: kb CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt fffff80002c0c03a - nt!ExDeferredFreePool+1ae [ b6:be ] 1 error : !nt (fffff80002c0c03a) MODULE_NAME: memory_corruption IMAGE_NAME: memory_corruption FOLLOWUP_NAME: memory_corruption DEBUG_FLR_IMAGE_TIMESTAMP: 0 MEMORY_CORRUPTOR: ONE_BIT FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT Followup: memory_corruption --------- 3: kd> lmtsmn start end module name fffff880`04500000 fffff880`0453e000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00edd000 fffff880`00f34000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`03ece000 fffff880`03f58000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`0458c000 fffff880`045a2000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`011dc000 fffff880`011e7000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`0453e000 fffff880`04546000 ASACPI ASACPI.sys Wed Jul 15 23:31:29 2009 (4A5E9F11) fffff880`010e6000 fffff880`010ef000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`010ef000 fffff880`01119000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`060c0000 fffff880`060e0000 AtihdW76 AtihdW76.sys Fri Sep 24 01:44:48 2010 (4C9C3AD0) fffff880`0560a000 fffff880`05dff000 atikmdag atikmdag.sys Tue Oct 26 22:29:53 2010 (4CC78EA1) fffff880`0411f000 fffff880`0416a000 atikmpag atikmpag.sys Tue Oct 26 22:14:23 2010 (4CC78AFF) fffff960`00950000 fffff960`009b1000 ATMFD ATMFD.DLL Tue Oct 19 23:05:45 2010 (4CBE5C89) fffff880`02d14000 fffff880`02d1b000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`040d2000 fffff880`040e3000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`03ae0000 fffff880`03afe000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00620000 fffff960`00647000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A) fffff880`02ce1000 fffff880`02d0b000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`01200000 fffff880`01230000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00d4d000 fffff880`00dab000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`01538000 fffff880`015ab000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`0457c000 fffff880`0458c000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`06dc6000 fffff880`06dd4000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`04031000 fffff880`040b4000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`00fb1000 fffff880`00fe6b80 DeepFrz DeepFrz.sys Mon Sep 28 20:01:47 2009 (4AC14E6B) fffff880`040b4000 fffff880`040d2000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`03e7c000 fffff880`03e8b000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`01496000 fffff880`014ac000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`0611d000 fffff880`0613f000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`06dd4000 fffff880`06dde000 dump_diskdump dump_diskdump.sys Mon Jul 12 23:32:05 2010 (4C3BDE35) fffff880`06dde000 fffff880`06df1000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`06145000 fffff880`061d1000 dump_mv91xx dump_mv91xx.sys Wed Jun 30 21:55:14 2010 (4C2BF582) fffff880`02cc6000 fffff880`02cce000 dump_mvxxmm dump_mvxxmm.sys Wed Jun 30 21:54:57 2010 (4C2BF571) fffff880`06df1000 fffff880`06dfd000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`04242000 fffff880`04336000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`04336000 fffff880`0437c000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`011e7000 fffff880`011fb000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`01000000 fffff880`0104c000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`015bc000 fffff880`015c6000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`015c6000 fffff880`01600000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`01400000 fffff880`0144a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`02a1f000 fffff800`02a68000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`0437c000 fffff880`043a0000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`061df000 fffff880`061f8000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`06000000 fffff880`06008080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`061d1000 fffff880`061df000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`03a18000 fffff880`03ae0000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`017ea000 fffff880`017f3000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`04546000 fffff880`04564000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`04109000 fffff880`0411f000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`04564000 fffff880`04573000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff800`00bc5000 fffff800`00bcf000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`03e8b000 fffff880`03ece000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`0151e000 fffff880`01538000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01795000 fffff880`017c0000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`0613f000 fffff880`06144200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`045e4000 fffff880`045f9000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`04200000 fffff880`04223000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00cf5000 fffff880`00d39000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`06026000 fffff880`06034000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`04490000 fffff880`0449f000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`06009000 fffff880`06016000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`010cc000 fffff880`010e6000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`03afe000 fffff880`03b16000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`03b16000 fffff880`03b43000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`03b43000 fffff880`03b91000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`03b91000 fffff880`03bb4000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`02d79000 fffff880`02d84000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f3d000 fffff880`00f47000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`014c0000 fffff880`0151e000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`03e71000 fffff880`03e7c000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`017d8000 fffff880`017ea000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`01119000 fffff880`011a5000 mv91xx mv91xx.sys Wed Jun 30 21:55:14 2010 (4C2BF582) fffff880`011d4000 fffff880`011dc000 mvxxmm mvxxmm.sys Wed Jun 30 21:54:57 2010 (4C2BF571) fffff880`01643000 fffff880`01735000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`045c6000 fffff880`045d2000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`04400000 fffff880`0442f000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`060ab000 fffff880`060c0000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`03fcc000 fffff880`03fdb000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`03f58000 fffff880`03f9d000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01735000 fffff880`01795000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`02d84000 fffff880`02d95000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`03e65000 fffff880`03e71000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02a68000 fffff800`03044000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`0123f000 fffff880`013e2000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`02d0b000 fffff880`02d14000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`06093000 fffff880`060ab000 nusb3hub nusb3hub.sys Thu Jan 21 22:22:18 2010 (4B5919EA) fffff880`043b1000 fffff880`043e1000 nusb3xhc nusb3xhc.sys Thu Jan 21 22:22:21 2010 (4B5919ED) fffff880`03fa6000 fffff880`03fcc000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00f87000 fffff880`00f9c000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f47000 fffff880`00f7a000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`010b5000 fffff880`010bc000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`010bc000 fffff880`010cc000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`015ab000 fffff880`015bc000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`02c00000 fffff880`02ca6000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`06016000 fffff880`06026000 point64 point64.sys Tue Jun 29 04:54:31 2010 (4C29B4C7) fffff880`060e0000 fffff880`0611d000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00d39000 fffff880`00d4d000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`045a2000 fffff880`045c6000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`0442f000 fffff880`0444a000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`0444a000 fffff880`0446b000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`0446b000 fffff880`04485000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`03e14000 fffff880`03e65000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`04485000 fffff880`04490000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`02d5e000 fffff880`02d67000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02d67000 fffff880`02d70000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`02d70000 fffff880`02d79000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`01600000 fffff880`0163a000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`04223000 fffff880`0423b000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`044aa000 fffff880`04500000 Rt64win7 Rt64win7.sys Wed Jun 23 05:10:45 2010 (4C21CF95) fffff880`011a5000 fffff880`011d4000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0) fffff880`03bb4000 fffff880`03bbf000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E) fffff880`017d0000 fffff880`017d8000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`054bc000 fffff880`05552000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318) fffff880`05455000 fffff880`054bc000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`03bbf000 fffff880`03bec000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`0449f000 fffff880`044a0480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`01803000 fffff880`01a00000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`03bec000 fffff880`03bfe000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`02db3000 fffff880`02dc0000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`02d95000 fffff880`02db3000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`03e00000 fffff880`03e14000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`004a0000 fffff960`004aa000 TSDDD TSDDD.dll unavailable (00000000) fffff880`040e3000 fffff880`04109000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`045d2000 fffff880`045e4000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`043e1000 fffff880`043e2f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`043a0000 fffff880`043b1000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`06039000 fffff880`06093000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D) fffff880`0416a000 fffff880`041c0000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`00f7a000 fffff880`00f87000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`02d1b000 fffff880`02d29000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`06c05000 fffff880`06dc6000 viahduaa viahduaa.sys Wed Aug 04 03:51:53 2010 (4C591C19) fffff880`02d29000 fffff880`02d4e000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`017c0000 fffff880`017d0000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00f9c000 fffff880`00fb1000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`01059000 fffff880`010b5000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`0144a000 fffff880`01496000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`03fdb000 fffff880`03ff6000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`02d4e000 fffff880`02d5e000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e2a000 fffff880`00ece000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00ece000 fffff880`00edd000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`03f9d000 fffff880`03fa6000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00030000 fffff960`00340000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E) fffff880`04573000 fffff880`0457c000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00f34000 fffff880`00f3d000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) Unloaded modules: fffff880`05552000 fffff880`055c3000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`014ac000 fffff880`014ba000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`017f3000 fffff880`017fd000 dump_scsipor Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`02c3a000 fffff880`02cc6000 dump_mv91xx. Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`02cce000 fffff880`02ce1000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000
I had his computer since last night. I ran Memtest86+ for 3 passes on a cold boot and later, I ran it all the night on a cold boot too for another 8 passes without any error.
Today, I update his graphic driver to AMD Catalyst 11.1a. I didn't get any crash since. I played a game of Starcraft 2 without any issues.
I ran Verifier.exe all the day and I didn't get any error.
Again memory corruption... Memtest86+ was run 3 times on cold boot without error... Could it be the motherboard ? The Asus P7P55D-E Pro have a memory checker on boot and the BSOD is really randoms... I got 2 days to return something... What should I do ?Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\020811-15475-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c97e50
Debug session time: Tue Feb 8 19:10:54.557 2011 (UTC - 5:00)
System Uptime: 0 days 0:09:54.899
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa800eda89ac, 1, fffff80002dac034, 2}
Could not read faulting driver name
Probably caused by : memory_corruption
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800eda89ac, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002dac034, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d020e0
fffffa800eda89ac
FAULTING_IP:
nt!AlpcpAcceptConnectPort+8e0
fffff800`02dac034 0fbaa96c0100080d bts dword ptr [rcx+800016Ch],0Dh
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003b7b790 -- (.trap 0xfffff88003b7b790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000340d rbx=0000000000000000 rcx=fffffa8006da8840
rdx=fffffdfffcdd2fb0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dac034 rsp=fffff88003b7b920 rbp=fffff88003b7bca0
r8=0000000000000000 r9=0000000000000000 r10=0676010100000000
r11=fffffa8006da8910 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!AlpcpAcceptConnectPort+0x8e0:
fffff800`02dac034 0fbaa96c0100080d bts dword ptr [rcx+800016Ch],0Dh ds:1000:fffffa80`0eda89ac=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b498f2 to fffff80002aca740
STACK_TEXT:
fffff880`03b7b628 fffff800`02b498f2 : 00000000`00000050 fffffa80`0eda89ac 00000000`00000001 fffff880`03b7b790 : nt!KeBugCheckEx
fffff880`03b7b630 fffff800`02ac882e : 00000000`00000001 fffffa80`06da8840 fffff880`00000000 00000000`00000801 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`03b7b790 fffff800`02dac034 : fffffa80`06da8840 fffff880`03b7bca0 fffff8a0`031b49d0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`03b7b920 fffff800`02d7e710 : fffffa80`0aaf7720 00000000`00000000 00000000`0171f6e8 00000000`00000000 : nt!AlpcpAcceptConnectPort+0x8e0
fffff880`03b7bb40 fffff800`02ac9993 : fffffa80`0aaf7720 fffffa80`0aa8a310 00000000`00000000 00000000`00000000 : nt!NtAcceptConnectPort+0x5c
fffff880`03b7bbb0 00000000`77bc038a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0171f6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bc038a
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002dac03a - nt!AlpcpAcceptConnectPort+8e6
[ 00:08 ]
1 error : !nt (fffff80002dac03a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa800eda89ac, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002dac034, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: fffffa800eda89ac
FAULTING_IP:
nt!AlpcpAcceptConnectPort+8e0
fffff800`02dac034 0fbaa96c0100080d bts dword ptr [rcx+800016Ch],0Dh
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88003b7b790 -- (.trap 0xfffff88003b7b790)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000340d rbx=0000000000000000 rcx=fffffa8006da8840
rdx=fffffdfffcdd2fb0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dac034 rsp=fffff88003b7b920 rbp=fffff88003b7bca0
r8=0000000000000000 r9=0000000000000000 r10=0676010100000000
r11=fffffa8006da8910 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!AlpcpAcceptConnectPort+0x8e0:
fffff800`02dac034 0fbaa96c0100080d bts dword ptr [rcx+800016Ch],0Dh ds:1000:fffffa80`0eda89ac=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b498f2 to fffff80002aca740
STACK_TEXT:
fffff880`03b7b628 fffff800`02b498f2 : 00000000`00000050 fffffa80`0eda89ac 00000000`00000001 fffff880`03b7b790 : nt!KeBugCheckEx
fffff880`03b7b630 fffff800`02ac882e : 00000000`00000001 fffffa80`06da8840 fffff880`00000000 00000000`00000801 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`03b7b790 fffff800`02dac034 : fffffa80`06da8840 fffff880`03b7bca0 fffff8a0`031b49d0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`03b7b920 fffff800`02d7e710 : fffffa80`0aaf7720 00000000`00000000 00000000`0171f6e8 00000000`00000000 : nt!AlpcpAcceptConnectPort+0x8e0
fffff880`03b7bb40 fffff800`02ac9993 : fffffa80`0aaf7720 fffffa80`0aa8a310 00000000`00000000 00000000`00000000 : nt!NtAcceptConnectPort+0x5c
fffff880`03b7bbb0 00000000`77bc038a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0171f6c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bc038a
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff80002dac03a - nt!AlpcpAcceptConnectPort+8e6
[ 00:08 ]
1 error : !nt (fffff80002dac03a)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: X64_MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
This crash happened when my brother transfer something on his usb stick...
We need help please...
He got a BSOD with verifier... Any ideas ? :
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_POWER_STATE_FAILURE (9f)
A driver is causing an inconsistent power state.
Arguments:
Arg1: 0000000000000004, The power transition timed out waiting to synchronize with the Pnp
subsystem.
Arg2: 0000000000000258, Timeout in seconds.
Arg3: fffffa800674db60, The thread currently holding on to the Pnp lock.
Arg4: fffff80000b9c510
Debugging Details:
------------------
DRVPOWERSTATE_SUBCODE: 4
IMAGE_NAME: pci.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc117
MODULE_NAME: pci
FAULTING_MODULE: fffff88000e13000 pci
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0x9F
PROCESS_NAME: System
CURRENT_IRQL: 2
STACK_TEXT:
fffff880`031af0e0 fffff800`02a80992 : fffffa80`0674db60 fffffa80`0674db60 00000000`00000000 00000000`0000000d : nt!KiSwapContext+0x7a
fffff880`031af220 fffff800`02a82cff : 00000000`00000000 fffff800`02f13ecc fffff980`00000000 fffff980`08896fc0 : nt!KiCommitThreadWait+0x1d2
fffff880`031af2b0 fffff800`02f16711 : fffffa80`083e4600 fffff800`00000000 00000000`00000000 fffffa80`0adf5100 : nt!KeWaitForSingleObject+0x19f
fffff880`031af350 fffff880`01577693 : fffff980`08894bf8 00000000`00000000 fffffa80`0ae98000 fffff880`056034b9 : nt!VerifierKeWaitForSingleObject+0x151
fffff880`031af3d0 fffff880`056022ec : fffffa80`0ae98000 00000000`00000000 fffffa80`0adf51a0 00000000`00000002 : ndis!NdisMDeregisterInterruptEx+0xe3
fffff880`031af420 fffffa80`0ae98000 : 00000000`00000000 fffffa80`0adf51a0 00000000`00000002 00000000`00000000 : Rt64win7+0x22ec
fffff880`031af428 00000000`00000000 : fffffa80`0adf51a0 00000000`00000002 00000000`00000000 fffffa80`0adf51a0 : 0xfffffa80`0ae98000
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
FAILURE_BUCKET_ID: X64_0x9F_VRF_4_Rt64win7_IMAGE_pci.sys
BUCKET_ID: X64_0x9F_VRF_4_Rt64win7_IMAGE_pci.sys
Followup: MachineOwner
---------