New
#1
BSOD + random crash
I'm having problem with random program crashes and sometimes even BSOD.
Somedays my PC feels like an old 286....
Is there anybody out there who can help me find out whats causing it?
Tnx for any tips.
I'm having problem with random program crashes and sometimes even BSOD.
Somedays my PC feels like an old 286....
Is there anybody out there who can help me find out whats causing it?
Tnx for any tips.
I looked at your four most recent dumps. Each has a different bugcheck code. That usually indicates a hardware or hardware related problem. The dumps blame various Windows system files, which are very unlikely to be the real causes.
1. I recommend that you uninstall Daemon Tools. It is notorious for causing BSOD's on Win 7 systems.
2. After you uninstall Daemon Tools, please enable Driver Verifier carefully following the instructions in this tutotial: Driver Verifier - Enable and Disable. If Driver Verifier encounters a faulty driver, it will trigger a BSOD. Upload any and all Driver Verifier enabled dumps.
Code:Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02a5f000 PsLoadedModuleList = 0xfffff800`02c9ce50 Debug session time: Wed Jan 26 19:34:10.351 2011 (GMT-5) System Uptime: 0 days 0:00:16.444 Loading Kernel Symbols ............................................................... ....................................... Loading User Symbols Loading unloaded module list . ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000007E, {ffffffffc0000096, fffff880053e2e00, fffff8800335adf8, fffff8800335a660} Probably caused by : rasl2tp.sys ( rasl2tp!GetRegistrySettings+2d0 ) Followup: MachineOwner --------- 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000096, The exception code that was not handled Arg2: fffff880053e2e00, The address that the exception occurred at Arg3: fffff8800335adf8, Exception Record Address Arg4: fffff8800335a660, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction. FAULTING_IP: rasl2tp!GetRegistrySettings+2d0 fffff880`053e2e00 4c8d4c2448 lea r9,[rsp+48h] EXCEPTION_RECORD: fffff8800335adf8 -- (.exr 0xfffff8800335adf8) ExceptionAddress: fffff880053e2e00 (rasl2tp!GetRegistrySettings+0x00000000000002d0) ExceptionCode: c0000096 ExceptionFlags: 00000000 NumberParameters: 0 CONTEXT: fffff8800335a660 -- (.cxr 0xfffff8800335a660) rax=fffff880053e3550 rbx=000000000000001c rcx=f8800147b0d30000 rdx=fffff88003174000 rsi=fffff8800335b17c rdi=0000000000000022 rip=fffff880053e2e00 rsp=fffff8800335b030 rbp=0000000000000000 r8=fffffa800688a070 r9=0000000000000030 r10=fffff80002a5f000 r11=000000000000072d r12=0000000000000010 r13=000000000000001a r14=000000000000001e r15=0000000000000018 iopl=0 nv up ei ng nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282 rasl2tp!GetRegistrySettings+0x2d0: fffff880`053e2e00 4c8d4c2448 lea r9,[rsp+48h] Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction. BUGCHECK_STR: 0x7E DEFAULT_BUCKET_ID: STATUS_PRIVILEGED_INSTRUCTION LOCK_ADDRESS: fffff80002cd3400 -- (!locks fffff80002cd3400) Resource @ nt!PiEngineLock (0xfffff80002cd3400) Available WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted. WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted. 1 total locks PNP_TRIAGE: Lock address : 0xfffff80002cd3400 Thread Count : 0 Thread address: 0x0000000000000000 Thread wait : 0x0 LAST_CONTROL_TRANSFER: from fffff880053e26ee to fffff880053e2e00 STACK_TEXT: fffff880`0335b030 fffff880`053e26ee : fffffa80`06bb8a5c fffffa80`06bb8a58 fffffa80`06bb8a40 fffff800`02dd82c0 : rasl2tp!GetRegistrySettings+0x2d0 fffff880`0335b0c0 fffff880`014c0f61 : ffffffff`00000000 00000000`00000005 fffffa80`0672ef70 00000000`000007ff : rasl2tp!LmpInitialize+0x1ee fffff880`0335b270 fffff880`014bb793 : fffffa80`05ea19d0 fffffa80`066c4020 00000000`00000000 01cbbdb9`ea0d04c4 : ndis! ?? ::LNCPHCLB::`string'+0x2f0d fffff880`0335b630 fffff880`014bd86c : fffffa80`05ea19d0 fffffa80`066c2050 00000000`00000000 fffffa80`04f56700 : ndis!ndisInitializeAdapter+0x113 fffff880`0335b690 fffff880`014bb466 : fffffa80`066c21a0 fffffa80`05ea19d0 00000000`00000000 fffffa80`05ea19d0 : ndis!ndisPnPStartDevice+0xac fffff880`0335b6f0 fffff800`02e8e06e : 00000000`00000000 fffffa80`05ea19d0 fffffa80`066c2050 fffff880`0335b820 : ndis!ndisPnPDispatch+0x246 fffff880`0335b790 fffff800`02bc914d : fffffa80`04f56700 fffffa80`06bafbf0 fffff800`02bced30 00000000`00000000 : nt!PnpAsynchronousCall+0xce fffff880`0335b7d0 fffff800`02e98db6 : fffff800`02cd31c0 fffffa80`04f56430 fffffa80`06bafbf0 fffffa80`04f565d8 : nt!PnpStartDevice+0x11d fffff880`0335b890 fffff800`02e99054 : fffffa80`04f56430 fffffa80`04f30019 fffffa80`04f36350 00000000`00000001 : nt!PnpStartDeviceNode+0x156 fffff880`0335b920 fffff800`02ebc346 : fffffa80`04f56430 fffffa80`04f36350 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74 fffff880`0335b950 fffff800`02ebc7fc : fffffa80`063bd050 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x296 fffff880`0335bbc0 fffff800`02bd1382 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c fffff880`0335bc10 fffff800`02adc961 : fffff800`02bd1080 fffff800`02f26e01 fffffa80`04f06b00 00000000`00000000 : nt!PnpDeviceActionWorker+0x302 fffff880`0335bcb0 fffff800`02d73c06 : 00000000`00000000 fffffa80`04f06b60 00000000`00000080 fffffa80`04e899e0 : nt!ExpWorkerThread+0x111 fffff880`0335bd40 fffff800`02aadc26 : fffff880`03167180 fffffa80`04f06b60 fffff880`031720c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a fffff880`0335bd80 00000000`00000000 : fffff880`0335c000 fffff880`03356000 fffff880`033596d0 00000000`00000000 : nt!KxStartSystemThread+0x16 FOLLOWUP_IP: rasl2tp!GetRegistrySettings+2d0 fffff880`053e2e00 4c8d4c2448 lea r9,[rsp+48h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: rasl2tp!GetRegistrySettings+2d0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: rasl2tp IMAGE_NAME: rasl2tp.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcce3 STACK_COMMAND: .cxr 0xfffff8800335a660 ; kb FAILURE_BUCKET_ID: X64_0x7E_rasl2tp!GetRegistrySettings+2d0 BUCKET_ID: X64_0x7E_rasl2tp!GetRegistrySettings+2d0 Followup: MachineOwner --------- Debug session time: Fri Jan 28 02:26:44.532 2011 (GMT-5) System Uptime: 0 days 1:27:13.625 Loading Kernel Symbols ............................................................... ................................................................ ................ Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff880096c1668, fffff880096c0ed0, fffff80002a954b4} Probably caused by : Ntfs.sys ( Ntfs!NtfsAcquireFcbWithPaging+13b ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff880096c1668 Arg3: fffff880096c0ed0 Arg4: fffff80002a954b4 Debugging Details: ------------------ EXCEPTION_RECORD: fffff880096c1668 -- (.exr 0xfffff880096c1668) ExceptionAddress: fffff80002a954b4 (nt!ExAcquireResourceExclusiveLite+0x0000000000000054) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000001 Parameter[1]: 00000000000000a0 Attempt to write to address 00000000000000a0 CONTEXT: fffff880096c0ed0 -- (.cxr 0xfffff880096c0ed0) rax=fffffa8005b60401 rbx=0000000000000040 rcx=0000000000000040 rdx=0000000000000001 rsi=0000000000000000 rdi=fffff880009b1180 rip=fffff80002a954b4 rsp=fffff880096c18a0 rbp=0000000000000001 r8=0000000000000702 r9=0000000000000008 r10=0000000000020000 r11=fffff880096c1968 r12=0000000000000000 r13=00000000c00000d8 r14=fffffa8005b60440 r15=0000000000010001 iopl=0 nv up di pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010046 nt!ExAcquireResourceExclusiveLite+0x54: fffff800`02a954b4 f0480fba696000 lock bts qword ptr [rcx+60h],0 ds:002b:00000000`000000a0=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: Dropbox.exe CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 00000000000000a0 WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0 00000000000000a0 FOLLOWUP_IP: Ntfs!NtfsAcquireFcbWithPaging+13b fffff880`0123810b 84c0 test al,al FAULTING_IP: nt!ExAcquireResourceExclusiveLite+54 fffff800`02a954b4 f0480fba696000 lock bts qword ptr [rcx+60h],0 BUGCHECK_STR: 0x24 DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE LAST_CONTROL_TRANSFER: from fffff8800123810b to fffff80002a954b4 STACK_TEXT: fffff880`096c18a0 fffff880`0123810b : 00000000`c00000d8 00000000`00000009 00000000`00000000 00000000`00000090 : nt!ExAcquireResourceExclusiveLite+0x54 fffff880`096c1910 fffff880`012ac61d : 00000000`00000000 fffffa80`05b7e820 fffffa80`05b8cd80 00010000`00031401 : Ntfs!NtfsAcquireFcbWithPaging+0x13b fffff880`096c1970 fffff880`012cfb04 : fffff880`09fc54b0 fffffa80`05b7e820 fffffa80`05b8cd80 00000000`00000000 : Ntfs!NtfsOpenFile+0xaf1 fffff880`096c1b50 fffff880`01238c0d : fffffa80`05b8cd80 fffffa80`05b7e820 fffff880`09fc54b0 fffffa80`05b60400 : Ntfs!NtfsCommonCreate+0xc54 fffff880`096c1d30 fffff800`02a855c7 : fffff880`09fc5420 00000000`00000000 00000000`00000000 00000000`00000000 : Ntfs!NtfsCommonCreateCallout+0x1d fffff880`096c1d60 fffff800`02a85581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KySwitchKernelStackCallout+0x27 fffff880`09fc52f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: Ntfs!NtfsAcquireFcbWithPaging+13b FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f STACK_COMMAND: .cxr 0xfffff880096c0ed0 ; kb FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsAcquireFcbWithPaging+13b BUCKET_ID: X64_0x24_Ntfs!NtfsAcquireFcbWithPaging+13b Followup: MachineOwner --------- Debug session time: Wed Feb 2 04:31:03.930 2011 (GMT-5) System Uptime: 0 days 0:12:28.022 Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols Loading unloaded module list ....... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7F, {8, 80050031, 6f8, fffff8800406212a} Probably caused by : csc.sys ( csc!CscCleanupFobx+2a ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* UNEXPECTED_KERNEL_MODE_TRAP (7f) This means a trap occurred in kernel mode, and it's a trap of a kind that the kernel isn't allowed to have/catch (bound trap) or that is always instant death (double fault). The first number in the bugcheck params is the number of the trap (8 = double fault, etc) Consult an Intel x86 family manual to learn more about what these traps are. Here is a *portion* of those codes: If kv shows a taskGate use .tss on the part before the colon, then kv. Else if kv shows a trapframe use .trap on that value Else .trap on the appropriate frame will show where the trap was taken (on x86, this will be the ebp that goes with the procedure KiTrap) Endif kb will then show the corrected stack. Arguments: Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT Arg2: 0000000080050031 Arg3: 00000000000006f8 Arg4: fffff8800406212a Debugging Details: ------------------ BUGCHECK_STR: 0x7f_8 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002a89ca9 to fffff80002a8a740 STACK_TEXT: fffff880`009b7de8 fffff800`02a89ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx fffff880`009b7df0 fffff800`02a88172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69 fffff880`009b7f30 fffff880`0406212a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2 fffff880`096a7fa0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : csc!CscCleanupFobx+0x2a STACK_COMMAND: kb FOLLOWUP_IP: csc!CscCleanupFobx+2a fffff880`0406212a 4889442450 mov qword ptr [rsp+50h],rax SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: csc!CscCleanupFobx+2a FOLLOWUP_NAME: MachineOwner MODULE_NAME: csc IMAGE_NAME: csc.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc22a FAILURE_BUCKET_ID: X64_0x7f_8_csc!CscCleanupFobx+2a BUCKET_ID: X64_0x7f_8_csc!CscCleanupFobx+2a Followup: MachineOwner --------- Debug session time: Wed Feb 2 17:20:19.385 2011 (GMT-5) System Uptime: 0 days 0:02:23.478 Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80002d5674d, fffff88008f36770, 0} Probably caused by : ntkrnlmp.exe ( nt!CmpKcbCacheLookup+1dd ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80002d5674d, Address of the exception record for the exception that caused the bugcheck Arg3: fffff88008f36770, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!CmpKcbCacheLookup+1dd fffff800`02d5674d 418b45f4 mov eax,dword ptr [r13-0Ch] CONTEXT: fffff88008f36770 -- (.cxr 0xfffff88008f36770) rax=0000000000000008 rbx=0000000000000000 rcx=0000000000000b04 rdx=0000000009e2c4b4 rsi=fffff8a000919a18 rdi=fffff88008f372c0 rip=fffff80002d5674d rsp=fffff88008f37140 rbp=fffff8a000919420 r8=0000000000000009 r9=0000000000000000 r10=0000000000000004 r11=fffff88008f372c0 r12=fffff8a0012ca4a8 r13=0000000000000020 r14=0000000000000000 r15=0000000000000001 iopl=0 nv up ei pl nz na pe nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202 nt!CmpKcbCacheLookup+0x1dd: fffff800`02d5674d 418b45f4 mov eax,dword ptr [r13-0Ch] ds:002b:00000000`00000014=???????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: csrss.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002d5674d STACK_TEXT: fffff880`08f37140 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpKcbCacheLookup+0x1dd FOLLOWUP_IP: nt!CmpKcbCacheLookup+1dd fffff800`02d5674d 418b45f4 mov eax,dword ptr [r13-0Ch] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!CmpKcbCacheLookup+1dd FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9 STACK_COMMAND: .cxr 0xfffff88008f36770 ; kb FAILURE_BUCKET_ID: X64_0x3B_nt!CmpKcbCacheLookup+1dd BUCKET_ID: X64_0x3B_nt!CmpKcbCacheLookup+1dd Followup: MachineOwner --------- 0: kd> lmtsmn start end module name fffff880`06c6e000 fffff880`06cac000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30) fffff880`00f9d000 fffff880`00ff4000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02c74000 fffff880`02cfe000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`06cc5000 fffff880`06cdb000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`00ddf000 fffff880`00dea000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`00cda000 fffff880`00ce3000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00db5000 fffff880`00ddf000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff960`00900000 fffff960`00961000 ATMFD ATMFD.DLL Tue Oct 19 23:05:45 2010 (4CBE5C89) fffff880`0191c000 fffff880`01923000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`03d81000 fffff880`03d92000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`074c8000 fffff880`074e6000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`006b0000 fffff960`006d7000 cdd cdd.dll Wed May 19 15:48:26 2010 (4BF4408A) fffff880`018b8000 fffff880`018e2000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`01852000 fffff880`01882000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00d57000 fffff880`00db5000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`0117f000 fffff880`011f2000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`06cb5000 fffff880`06cc5000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`070d1000 fffff880`070da000 cpuz135_x64 cpuz135_x64.sys Tue Nov 09 08:33:36 2010 (4CD94DB0) fffff880`089a9000 fffff880`089b7000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`03ce0000 fffff880`03d63000 csc csc.sys Mon Jul 13 19:24:26 2009 (4A5BC22A) fffff880`03d63000 fffff880`03d81000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`019c8000 fffff880`019d7000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`0120a000 fffff880`01220000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`08975000 fffff880`08997000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`02d81000 fffff880`02dc4000 dtsoftbus01 dtsoftbus01.sys Thu Jan 13 03:27:08 2011 (4D2EB75C) fffff880`0938f000 fffff880`09398000 DUMETR64 DUMETR64.SYS Thu Aug 19 15:13:29 2010 (4C6D8259) fffff880`089c3000 fffff880`089cc000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`089b7000 fffff880`089c3000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`089cc000 fffff880`089df000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`0899d000 fffff880`089a9000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`10acd000 fffff880`10bc1000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`03c02000 fffff880`03c48000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`0110d000 fffff880`01121000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`010c1000 fffff880`0110d000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`01200000 fffff880`0120a000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01086000 fffff880`010c0000 fvevol fvevol.sys Fri Sep 25 22:34:26 2009 (4ABD7DB2) fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff800`02fe6000 fffff800`0302f000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`0fe00000 fffff880`0fe24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`0860e000 fffff880`08627000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD) fffff880`08627000 fffff880`0862f080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9) fffff880`08600000 fffff880`0860e000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE) fffff880`07400000 fffff880`074c8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`015f5000 fffff880`015fe000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03db8000 fffff880`03dce000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`06d9b000 fffff880`06daa000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`08630000 fffff880`0863e000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff800`00bb1000 fffff800`00bbb000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB) fffff880`01800000 fffff880`01843000 ks ks.sys Wed Mar 03 23:32:25 2010 (4B8F37D9) fffff880`013cc000 fffff880`013e6000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`08997000 fffff880`0899c200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`06dec000 fffff880`06defd80 LGBusEnum LGBusEnum.sys Mon Nov 23 20:36:48 2009 (4B0B38B0) fffff880`09238000 fffff880`0923a480 LGVirHid LGVirHid.sys Mon Nov 23 20:36:48 2009 (4B0B38B0) fffff880`0756a000 fffff880`0757f000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`08659000 fffff880`0867c000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00cff000 fffff880`00d43000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66) fffff880`0863e000 fffff880`0864c000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`06daa000 fffff880`06db9000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`0864c000 fffff880`08659000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94) fffff880`00cc0000 fffff880`00cda000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`018e2000 fffff880`01913000 MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110) fffff880`070da000 fffff880`070ea000 MpNWMon MpNWMon.sys Tue Sep 14 20:19:30 2010 (4C901112) fffff880`07597000 fffff880`075af000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`075af000 fffff880`075dc000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`07060000 fffff880`070ae000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`070ae000 fffff880`070d1000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`01981000 fffff880`0198c000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00e00000 fffff880`00e0a000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`01121000 fffff880`0117f000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`02c5d000 fffff880`02c68000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`0148d000 fffff880`0149f000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`014a3000 fffff880`01595000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`06cff000 fffff880`06d0b000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`06d0b000 fffff880`06d3a000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`07555000 fffff880`0756a000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02d72000 fffff880`02d81000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02cfe000 fffff880`02d43000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01595000 fffff880`015f5000 NETIO NETIO.SYS Thu Apr 08 22:43:59 2010 (4BBE946F) fffff880`09398000 fffff880`093ad000 NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149) fffff880`0198c000 fffff880`0199d000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`02c51000 fffff880`02c5d000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`02a0a000 fffff800`02fe6000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`01229000 fffff880`013cc000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`01913000 fffff880`0191c000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`06dcb000 fffff880`06de4000 nusb3hub nusb3hub.sys Thu Nov 18 20:34:24 2010 (4CE5D420) fffff880`03dce000 fffff880`03dff000 nusb3xhc nusb3xhc.sys Thu Nov 18 20:34:25 2010 (4CE5D421) fffff880`10acb000 fffff880`10acc180 nvBridge nvBridge.kmd Fri Jul 09 17:07:54 2010 (4C378FAA) fffff880`0fe39000 fffff880`10acae00 nvlddmkm nvlddmkm.sys Fri Jul 09 17:15:58 2010 (4C37918E) fffff880`02d4c000 fffff880`02d72000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00e4a000 fffff880`00e5f000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00e0a000 fffff880`00e3d000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00ed0000 fffff880`00ed7000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`00ed7000 fffff880`00ee7000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`013e6000 fffff880`013f7000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`070ea000 fffff880`07190000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`08938000 fffff880`08975000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00d43000 fffff880`00d57000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`06cdb000 fffff880`06cff000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`06d3a000 fffff880`06d55000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`06d55000 fffff880`06d76000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`06d76000 fffff880`06d90000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02c00000 fffff880`02c51000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`06d90000 fffff880`06d9b000 rdpbus rdpbus.sys Mon Jul 13 20:17:46 2009 (4A5BCEAA) fffff880`01966000 fffff880`0196f000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`093ad000 fffff880`093db000 rdpdr rdpdr.sys Mon Jul 13 20:18:02 2009 (4A5BCEBA) fffff880`0196f000 fffff880`01978000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`01978000 fffff880`01981000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`09200000 fffff880`09238000 RDPWD RDPWD.SYS Mon Jul 13 20:16:47 2009 (4A5BCE6F) fffff880`0104c000 fffff880`01086000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`0757f000 fffff880`07597000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`06c08000 fffff880`06c6e000 Rt64win7 Rt64win7.sys Fri Dec 24 02:30:25 2010 (4D144C11) fffff880`086dc000 fffff880`08937d80 RTKVHD64 RTKVHD64.sys Fri Sep 03 04:02:27 2010 (4C80AB93) fffff880`07190000 fffff880`0719b000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E) fffff880`01485000 fffff880`0148d000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`092f9000 fffff880`0938f000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318) fffff880`09292000 fffff880`092f9000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`0719b000 fffff880`071c8000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`06dea000 fffff880`06deb480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`01601000 fffff880`017fe000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`071c8000 fffff880`071da000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`019bb000 fffff880`019c8000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`093db000 fffff880`093e6000 tdtcp tdtcp.sys Mon Jul 13 20:16:32 2009 (4A5BCE60) fffff880`0199d000 fffff880`019bb000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02ddf000 fffff880`02df3000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff960`005e0000 fffff960`005ea000 TSDDD TSDDD.dll unavailable (00000000) fffff880`093e6000 fffff880`093f5000 tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69) fffff880`03d92000 fffff880`03db8000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`06db9000 fffff880`06dcb000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`089df000 fffff880`089fc000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`03c00000 fffff880`03c01f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`10bce000 fffff880`10bdf000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`074fb000 fffff880`07555000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D) fffff880`03c48000 fffff880`03c9e000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`10bc1000 fffff880`10bce000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00e3d000 fffff880`00e4a000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`01923000 fffff880`01931000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`01931000 fffff880`01956000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`01475000 fffff880`01485000 vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E) fffff880`00e5f000 fffff880`00e74000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00e74000 fffff880`00ed0000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`01000000 fffff880`0104c000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`02dc4000 fffff880`02ddf000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`01956000 fffff880`01966000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00eea000 fffff880`00f8e000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f8e000 fffff880`00f9d000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02d43000 fffff880`02d4c000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`000a0000 fffff960`003b0000 win32k win32k.sys Tue Oct 19 23:08:46 2010 (4CBE5D3E) fffff880`06cac000 fffff880`06cb5000 wmiacpi wmiacpi.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`00ff4000 fffff880`00ffd000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`0867c000 fffff880`0869d000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1) fffff880`0869d000 fffff880`086ce000 WUDFRd WUDFRd.sys Mon Jul 13 20:06:06 2009 (4A5BCBEE) Unloaded modules: fffff880`01882000 fffff880`01890000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`01890000 fffff880`0189c000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`0189c000 fffff880`018a5000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`018a5000 fffff880`018b8000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`06db9000 fffff880`06dea000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 fffff880`06db9000 fffff880`06dea000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000
Uninstalled DeamonTools and Enabled Driver Verifier, havent noticed anything yet.
Tnx for having a look, i think i will delete all logs and test it for a while. Perhaps i'll return with a new minidump :)
After you run Verifier for about 36 hours, you can turn it off. I hope you'll return WITHOUT a mini dump to say your system is running smoothly! :)
Oh no!
Booted up the computer, it gave me a BSOD for a few sec...
I made a new minidump, is there any useful information?
All help is much appriciated
(System Specs - See below)
Last edited by eim; 05 Feb 2011 at 06:22.
This is a Driver Verifier enabled dump and it blames ntfs.sys which is the Windows file system driver and unlikely to be the real cause. You can turn off Driver Verifier for now. Because ntfs.sys was blamed. I suggest you check your file system with CheckDisk -Run CHKDSK /R /F from an elevated (Run as adminstrator) Command Prompt. Please do this for each hard drive on your system.
When it tells you it can't do it right now - and asks you if you'd like to do it at the next reboot - answer Y (for Yes) and press Enter. Then reboot and let the test run. It may take a while for it to run, but keep an occasional eye on it to see if it generates any errors. See "CHKDSK LogFile" below in order to check the results of the test.
Elevated Command Prompt:
Go to Start and type in "cmd.exe" (without the quotes)
At the top of the Search Box, right click on Cmd.exe and select "Run as administrator"
CHKDSK LogFile:
Go to Start and type in "eventvwr.msc" (without the quotes) and press Enter
Expand the Windows logs heading, then select the Application log file entry.
Double click on the Source column header.
Scroll down the list until you find the Chkdsk entry (wininit for Windows 7) (winlogon for XP).
Copy/paste the results into your next post.
Code:Windows 7 Kernel Version 7600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`02a67000 PsLoadedModuleList = 0xfffff800`02ca4e50 Debug session time: Sat Feb 5 03:52:37.696 2011 (GMT-5) System Uptime: 0 days 0:00:15.788 Loading Kernel Symbols ............................................................... ...................... Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 24, {1904fb, fffff880033609a8, fffff88003360210, fffff80002af72b3} Probably caused by : Ntfs.sys ( Ntfs!NtfsNonCachedIo+23f ) Followup: MachineOwner --------- 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* NTFS_FILE_SYSTEM (24) If you see NtfsExceptionFilter on the stack then the 2nd and 3rd parameters are the exception record and context record. Do a .cxr on the 3rd parameter and then kb to obtain a more informative stack trace. Arguments: Arg1: 00000000001904fb Arg2: fffff880033609a8 Arg3: fffff88003360210 Arg4: fffff80002af72b3 Debugging Details: ------------------ EXCEPTION_RECORD: fffff880033609a8 -- (.exr 0xfffff880033609a8) ExceptionAddress: fffff80002af72b3 (nt!IopCompleteRequest+0x0000000000000ae3) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff88003360210 -- (.cxr 0xfffff88003360210) rax=fffff88003361f80 rbx=fffff980034b0ee0 rcx=0000bcfa00520050 rdx=0000bcfa00520050 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002af72b3 rsp=fffff88003360be0 rbp=0000000000000000 r8=fffff88003360ce8 r9=fffff88003360ce0 r10=0000000000000002 r11=fffff80002af67d0 r12=fffff88003361f78 r13=0000000000000000 r14=fffffa8004f26680 r15=fffff8800316a180 iopl=0 nv up ei pl nz na pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010203 nt!IopCompleteRequest+0xae3: fffff800`02af72b3 488b09 mov rcx,qword ptr [rcx] ds:002b:0000bcfa`00520050=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: System CURRENT_IRQL: 2 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0f0e0 ffffffffffffffff FOLLOWUP_IP: Ntfs!NtfsNonCachedIo+23f fffff880`0122405f 498b4d78 mov rcx,qword ptr [r13+78h] FAULTING_IP: nt!IopCompleteRequest+ae3 fffff800`02af72b3 488b09 mov rcx,qword ptr [rcx] BUGCHECK_STR: 0x24 IRP_ADDRESS: ffffffffffffff89 LAST_CONTROL_TRANSFER: from fffff80002ab40c7 to fffff80002af72b3 STACK_TEXT: fffff880`03360be0 fffff800`02ab40c7 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xae3 fffff880`03360cb0 fffff800`02adeb9d : fffffa80`04f26680 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7 fffff880`03360d30 fffff800`02ae0cff : fffff880`03361200 fffffa80`06ed0040 00000000`00000000 fffff880`03360f60 : nt!KiCommitThreadWait+0x3dd fffff880`03360dc0 fffff880`0122405f : fffffa80`06f61500 00000000`00000000 fffff8a0`04046500 fffff800`02af3d00 : nt!KeWaitForSingleObject+0x19f fffff880`03360e60 fffff880`01227526 : fffff880`03361200 fffff980`034d8c60 fffff8a0`040465a0 fffff8a0`04046470 : Ntfs!NtfsNonCachedIo+0x23f fffff880`03361030 fffff880`01229f78 : fffff880`03361200 fffff980`034d8c60 fffff880`03361301 fffffa80`06f62001 : Ntfs!NtfsCommonRead+0x7a6 fffff880`033611d0 fffff800`02f7dc16 : fffff980`034d8c60 fffff980`034d8c60 fffffa80`06f62030 fffffa80`0734d8f0 : Ntfs!NtfsFsdRead+0x1b8 fffff880`033613d0 fffff880`0104b23f : fffff980`034d8fb8 fffff880`03361480 fffffa80`07276870 fffffa80`0734d8f0 : nt!IovCallDriver+0x566 fffff880`03361430 fffff880`010496df : fffffa80`06d55de0 fffffa80`06d55de0 fffffa80`06d55d00 fffff980`034d8c60 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f fffff880`033614c0 fffff800`02f7dc16 : fffff980`034d8c60 00000000`00000002 fffffa80`074ab070 fffffa80`05148c98 : fltmgr!FltpDispatch+0xcf fffff880`03361520 fffff800`02ac91f2 : fffff980`034d8c80 00000000`00000043 fffff980`034d8c60 fffffa80`0734d9c0 : nt!IovCallDriver+0x566 fffff880`03361580 fffff800`02d9afb0 : fffffa80`074ab000 fffffa80`074ab000 00000000`00000001 00000000`00184be3 : nt!IoPageRead+0x252 fffff880`03361610 fffff800`02dd2c75 : fffffa80`074ab070 00000000`00000000 00000000`00000022 fffff880`033618c0 : nt!MiCreateImageFileMap+0x170 fffff880`03361840 fffff800`02dc8013 : fffff880`03361aa0 00000000`00000000 fffff880`03361d58 fffff880`03361a98 : nt!MmCreateSection+0x7a9 fffff880`03361a50 fffff800`02ad6993 : fffffa80`04f26680 fffff880`03361cf8 fffff880`03361ae8 00000000`00000000 : nt!NtCreateSection+0x162 fffff880`03361ad0 fffff800`02ad2f30 : fffff800`02eb08b6 fffffa80`04f26680 fffff880`03361d80 00000000`00000004 : nt!KiSystemServiceCopyEnd+0x13 fffff880`03361cd8 fffff800`02eb08b6 : fffffa80`04f26680 fffff880`03361d80 00000000`00000004 00000000`00000030 : nt!KiServiceLinkage fffff880`03361ce0 fffff800`02eb0c7c : ffffffff`80000210 00000000`00100000 fffff880`03361e00 fffff800`02ad593d : nt!MmCheckSystemImage+0x96 fffff880`03361e10 fffff800`02eb0e97 : ffffffff`80000210 00001f80`00000001 fffff8a0`04046cc0 00000000`00000000 : nt!MiCreateSectionForDriver+0xcc fffff880`03361ec0 fffff800`02ebc73a : 00000000`00000000 fffff880`03362080 fffffa80`04f26680 00000000`00000000 : nt!MiObtainSectionForDriver+0xd7 fffff880`03361f20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmLoadSystemImage+0x23a SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: Ntfs!NtfsNonCachedIo+23f FOLLOWUP_NAME: MachineOwner MODULE_NAME: Ntfs IMAGE_NAME: Ntfs.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f STACK_COMMAND: .cxr 0xfffff88003360210 ; kb FAILURE_BUCKET_ID: X64_0x24_VRF_Ntfs!NtfsNonCachedIo+23f BUCKET_ID: X64_0x24_VRF_Ntfs!NtfsNonCachedIo+23f Followup: MachineOwner ---------
Here is the CHKDSK LogFiles. In swedish... (was about to run it in google translate, but i gues that would mess it up even more)
Is there any usful information?
Code:Kontrollerar filsystemet på C: Filsystemet är av typen NTFS. En diskkontroll har schemalagts. Disken kommer nu att kontrolleras. CHKDSK verifierar filer (steg 1 av 5)... 119552 filposter har behandlats. Filverifieringen är klar. 183 stora filposter har behandlats. 0 skadade filposter har behandlats. 2 EA-poster har behandlats. 71 referensposter har behandlats. CHKDSK verifierar index (steg 2 av 5)... Det går inte att hitta filnamnsattributet för indexposten MINABI~ för indexet $I30 med den överordnade filen 0x207 i filen 0x242. Tar bort indexposten MINABI~ i indexet $I30 i filen 519. 164958 indexposter har behandlats. Indexverifieringen är klar. CHKDSK läser oindexerade filer för återanslutning till den ursprungliga katalogen. 1 oindexerade filer har genomsökts. Återställer den överblivna filen MINABI~1 (578) till katalogfilen 519. 0 oindexerade filer har återställts. CHKDSK verifierar säkerhetsbeskrivare (steg 3 av 5)... 119552 fil-SD/SID-poster har behandlats. Rensar upp 303 oanvända indexposter från indexet $SII i filen 0x9. Rensar upp 303 oanvända indexposter från indexet $SDH i filen 0x9. Rensar upp 303 oanvända säkerhetsbeskrivare. Verifieringen av säkerhetsbeskrivare är klar. 22704 datafiler har behandlats. CHKDSK verifierar USN-journalen... 37511560 USN-byte har behandlats. Verifieringen av USN-journalen är klar. CHKDSK verifierar fildata (steg 4 av 5)... 119536 filer har behandlats. Verifieringen av filinformationen är klar. CHKDSK verifierar ledigt diskutrymme (steg 5 av 5)... 49933708 lediga kluster har bearbetats. Verifieringen av ledigt diskutrymme är klar. Korrigeringar har gjorts i filsystemet. 244089855 kB diskutrymme totalt. 44068232 kB i 91878 filer. 56776 kB i 22705 index. 0 kB i skadade sektorer. 230011 kB används av operativsystemet. 65536 kB hårddisksutrymme används av loggfilen. 199734836 kB ledigt utrymme. 4096 byte i varje allokeringsenhet. 61022463 allokeringsenheter finns totalt på disken. 49933709 allokeringsenheter är tillgängliga på disken. Intern information: 00 d3 01 00 a2 bf 01 00 1d 62 03 00 00 00 00 00 .........b...... f7 00 00 00 47 00 00 00 00 00 00 00 00 00 00 00 ....G........... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Kontrollen av disken har slutförts. Vänta medan datorn startas om.
Code:Chkdsk kördes i läs- och skrivläge. Kontrollerar filsystemet på D: Filsystemet är av typen NTFS. Det går inte att låsa aktuell enhet. Det går inte att köra CHKDSK eftersom volymen används av en annan process. Kommandot CHKDSK kan köras om volymen demonteras först. ALLA ÖPPNA REFERENSER TILL VOLYMEN BLIR OGILTIGA. Vill du tvinga fram en demontering av den här volymen? (J/N) Volymen är demonterad. Alla öppna referenser till volymen är nu ogiltiga. Volymetiketten är Ny volym. CHKDSK verifierar filer (steg 1 av 5)... 246272 filposter har behandlats. Filverifieringen är klar. 2 stora filposter har behandlats. 0 skadade filposter har behandlats. 0 EA-poster har behandlats. 0 referensposter har behandlats. CHKDSK verifierar index (steg 2 av 5)... 251406 indexposter har behandlats. Indexverifieringen är klar. 0 oindexerade filer har genomsökts. 0 oindexerade filer har återställts. CHKDSK verifierar säkerhetsbeskrivare (steg 3 av 5)... 246272 fil-SD/SID-poster har behandlats. Rensar upp 23 oanvända indexposter från indexet $SII i filen 0x9. Rensar upp 23 oanvända indexposter från indexet $SDH i filen 0x9. Rensar upp 23 oanvända säkerhetsbeskrivare. Verifieringen av säkerhetsbeskrivare är klar. 2567 datafiler har behandlats. CHKDSK verifierar fildata (steg 4 av 5)... 246256 filer har behandlats. Verifieringen av filinformationen är klar. CHKDSK verifierar ledigt diskutrymme (steg 5 av 5)... 105503454 lediga kluster har bearbetats. Verifieringen av ledigt diskutrymme är klar. Filsystemet har kontrollerats. Inga problem påträffades. 488383487 kB diskutrymme totalt. 65970016 kB i 165016 filer. 72492 kB i 2569 index. 0 kB i skadade sektorer. 327159 kB används av operativsystemet. 65536 kB hårddisksutrymme används av loggfilen. 422013820 kB ledigt utrymme. 4096 byte i varje allokeringsenhet. 122095871 allokeringsenheter finns totalt på disken. 105503455 allokeringsenheter är tillgängliga på disken.
I believe it shows 0 bytes in bad clusters or sectors. That is what I was looking for. It looks like it did a little cleaning up of your file system. It looks like your file system is in good shape.
This aint fun... Today when i booted upp the computer, it didnt work out the way i hoped it to...
1. Aero theme didnt start - ok i can live with that.
2. Computer performance is really bad... slow like a 286 again - what is this now...
3. Explorer.exe crashes, constantly... i cant open anything, APPCRACH. - oh no...
4. System hangs, restart and... BSOD
5. Rebooted the computer, and now it looks allright again....
Latest Logfiles attached - Is there a chance to find the cause?
(i bought this hardware 4 months ago and have spent so much time trying to get it working, after 2 months the reseller gave me a new motherboard... but that did not change a thing. I reinstalled many times, changed harddrives, changed PSU, dont know what to do now... its annoying, for real )
Could it be win7 64-bit that is the problem? (is it worth a try with win7 -32bit?)
Last edited by eim; 07 Feb 2011 at 09:19.