New
#1
BSOD on multiple windows 7 installs
Hello everybody!
I just bought an HP probook 4530s notebook that came with Suse Linux. I installed Windows 7 Ultimate x64 and after I installed the drivers it started to crash with BSOD. I double checked to see if I had the latest version for the drivers and bios and everything was all right. Unfortunately I didn't write down all of the messages, but I did see that files ending in .sys were causing them: athrx.sys (wireless lan driver), igdkmd64.sys, dxgnms1.sys, ntfs.sys and another one (can't remember the name) that was a video driver file(for intel hd graphics 3000).
I installed a fresh copy of windows home premium x64 and the appropriate drivers and still the crashes went on.
I thought that there may be something wrong with driver support for 64bit windows 7 so I now have Windows 7 Professional 32bit installed. This time the crashes are less frequent, but still present. The drivers are definitely up to date, I even checked with various driver tools. I also updated windows with the latest updates. I tested the memory with memtest86, 9 passes and the memory seems to be fine.
Here is what WinDbg has to say about MEMORY.dmp:
And this is the report for the last minidump:Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Summary Dump File: Only kernel address space is available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17592.x86fre.win7sp1_gdr.110408-1631 Machine Name: Kernel base = 0x82c51000 PsLoadedModuleList = 0x82d9a4d0 Debug session time: Sun Jun 26 00:47:32.158 2011 (UTC + 3:00) System Uptime: 0 days 0:14:34.173 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols PEB is paged out (Peb.Ldr = 7ffd400c). Type ".hh dbgerr001" for details Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {514, 2, 1, 82cf3bdc} Probably caused by : NETIO.SYS ( NETIO!NsiEnumerateObjectsAllParametersEx+187 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000514, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 82cf3bdc, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: 00000514 CURRENT_IRQL: 2 FAULTING_IP: nt!RtlEnumerateEntryHashTable+76 82cf3bdc 897104 mov dword ptr [ecx+4],esi DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: LMS.exe TRAP_FRAME: adef5890 -- (.trap 0xffffffffadef5890) ErrCode = 00000002 eax=85dd28b8 ebx=00000018 ecx=00000510 edx=85c69670 esi=adef592c edi=85956a44 eip=82cf3bdc esp=adef5904 ebp=adef5910 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 nt!RtlEnumerateEntryHashTable+0x76: 82cf3bdc 897104 mov dword ptr [ecx+4],esi ds:0023:00000514=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82cf3bdc to 82c925cb STACK_TEXT: adef5890 82cf3bdc badb0d00 85c69670 adef5994 nt!KiTrap0E+0x2cf adef5910 88ec1b28 85c69670 adef592c 85372054 nt!RtlEnumerateEntryHashTable+0x76 adef5954 88ec2547 00000017 85372054 00000000 tcpip!TcpEnumerateConnections+0x22a adef5984 88ec25e8 00000041 0000001f adef5a4c tcpip!TcpEnumerateConnectionType+0xb7 adef5994 88d4efe2 adef59ac 00000041 85372000 tcpip!TcpEnumerateAllConnections+0xf adef5a4c 8ddc3ba1 85372000 20332b85 0000003c NETIO!NsiEnumerateObjectsAllParametersEx+0x187 adef5ac0 8ddc4efc 8537203c 00000000 85372054 nsiproxy!NsippEnumerateObjectsAllParameters+0xeb adef5ae4 8ddc4fe5 856c9101 00000000 85bb6dc8 nsiproxy!NsippDispatchDeviceControl+0x78 adef5afc 82c88593 85f586b8 856c91b0 856c91b0 nsiproxy!NsippDispatch+0x33 adef5b14 82e7b98f 85bb6dc8 856c91b0 856c9220 nt!IofCallDriver+0x63 adef5b34 82e7eb61 85f586b8 85bb6dc8 00000000 nt!IopSynchronousServiceTail+0x1f8 adef5bd0 82ec53fc 85f586b8 856c91b0 00000000 nt!IopXxxControlFile+0x6aa adef5c04 82c8f1ea 00000178 00000158 00000000 nt!NtDeviceIoControlFile+0x2a adef5c04 773070b4 00000178 00000158 00000000 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 00fdf768 00000000 00000000 00000000 00000000 0x773070b4 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!NsiEnumerateObjectsAllParametersEx+187 88d4efe2 8945fc mov dword ptr [ebp-4],eax SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+187 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78963 FAILURE_BUCKET_ID: 0xA_NETIO!NsiEnumerateObjectsAllParametersEx+187 BUCKET_ID: 0xA_NETIO!NsiEnumerateObjectsAllParametersEx+187 Followup: MachineOwner ---------
I would really appreciate your help. Thank you!Code:Loading Dump File [C:\Windows\Minidump\062611-23212-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7601.17592.x86fre.win7sp1_gdr.110408-1631 Machine Name: Kernel base = 0x82c51000 PsLoadedModuleList = 0x82d9a4d0 Debug session time: Sun Jun 26 00:47:32.158 2011 (UTC + 3:00) System Uptime: 0 days 0:14:34.173 Loading Kernel Symbols ............................................................... ................................................................ .............................. Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {514, 2, 1, 82cf3bdc} Probably caused by : NETIO.SYS ( NETIO!NsiEnumerateObjectsAllParametersEx+187 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000514, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 82cf3bdc, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82dba848 Unable to read MiSystemVaType memory at 82d99e20 00000514 CURRENT_IRQL: 2 FAULTING_IP: nt!RtlEnumerateEntryHashTable+76 82cf3bdc 897104 mov dword ptr [ecx+4],esi CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: LMS.exe TRAP_FRAME: adef5890 -- (.trap 0xffffffffadef5890) ErrCode = 00000002 eax=85dd28b8 ebx=00000018 ecx=00000510 edx=85c69670 esi=adef592c edi=85956a44 eip=82cf3bdc esp=adef5904 ebp=adef5910 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206 nt!RtlEnumerateEntryHashTable+0x76: 82cf3bdc 897104 mov dword ptr [ecx+4],esi ds:0023:00000514=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82cf3bdc to 82c925cb STACK_TEXT: adef5890 82cf3bdc badb0d00 85c69670 adef5994 nt!KiTrap0E+0x2cf adef5910 88ec1b28 85c69670 adef592c 85372054 nt!RtlEnumerateEntryHashTable+0x76 adef5954 88ec2547 00000017 85372054 00000000 tcpip!TcpEnumerateConnections+0x22a adef5984 88ec25e8 00000041 0000001f adef5a4c tcpip!TcpEnumerateConnectionType+0xb7 adef5994 88d4efe2 adef59ac 00000041 85372000 tcpip!TcpEnumerateAllConnections+0xf adef5a4c 8ddc3ba1 85372000 20332b85 0000003c NETIO!NsiEnumerateObjectsAllParametersEx+0x187 adef5ac0 8ddc4efc 8537203c 00000000 85372054 nsiproxy!NsippEnumerateObjectsAllParameters+0xeb adef5ae4 8ddc4fe5 856c9101 00000000 85bb6dc8 nsiproxy!NsippDispatchDeviceControl+0x78 adef5afc 82c88593 85f586b8 856c91b0 856c91b0 nsiproxy!NsippDispatch+0x33 adef5b14 82e7b98f 85bb6dc8 856c91b0 856c9220 nt!IofCallDriver+0x63 adef5b34 82e7eb61 85f586b8 85bb6dc8 00000000 nt!IopSynchronousServiceTail+0x1f8 adef5bd0 82ec53fc 85f586b8 856c91b0 00000000 nt!IopXxxControlFile+0x6aa adef5c04 82c8f1ea 00000178 00000158 00000000 nt!NtDeviceIoControlFile+0x2a adef5c04 773070b4 00000178 00000158 00000000 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 00fdf768 00000000 00000000 00000000 00000000 0x773070b4 STACK_COMMAND: kb FOLLOWUP_IP: NETIO!NsiEnumerateObjectsAllParametersEx+187 88d4efe2 8945fc mov dword ptr [ebp-4],eax SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+187 FOLLOWUP_NAME: MachineOwner MODULE_NAME: NETIO IMAGE_NAME: NETIO.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4ce78963 FAILURE_BUCKET_ID: 0xA_NETIO!NsiEnumerateObjectsAllParametersEx+187 BUCKET_ID: 0xA_NETIO!NsiEnumerateObjectsAllParametersEx+187 Followup: MachineOwner ---------
Last edited by floydian; 26 Jun 2011 at 15:49.