New
#11
Woke up to a BSOD this morning, but it failed to create a minidump. I took a photo of it, I hope that's helpful until I can try to reproduce it with verifier.exe.
Thanks.
Woke up to a BSOD this morning, but it failed to create a minidump. I took a photo of it, I hope that's helpful until I can try to reproduce it with verifier.exe.
Thanks.
Seems Hard Drive related, run an HDD test
| Seagate
Run a RAM Test too
RAM - Test with Memtest86+
Ran memtest86 for 9 hours ~5 tests, w/ 0 zero. Ran HD basic tests with seagate tools, w/ 0 errors. Another BSOD . Attached dump. plz help. thx.
Latest BSOD were caused Citrix Deterministic Network Enhancer Miniport or Cisco Systems VPN Client.
Remove this software and turn off Driver Verifier
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_VERIFIER_DETECTED_VIOLATION (c4) A device driver attempting to corrupt the system has been caught. This is because the driver was specified in the registry as being suspect (by the administrator) and the kernel has enabled substantial checking of this driver. If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will be among the most commonly seen crashes. Arguments: Arg1: 00000000000000f6, Referencing user handle as KernelMode. Arg2: 0000000000000310, Handle value being referenced. Arg3: fffffa800a5d8b30, Address of the current process. Arg4: fffff880046a9f50, Address inside the driver that is performing the incorrect reference. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'rspndr' and 'bthport.sys' overlap BUGCHECK_STR: 0xc4_f6 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: sppsvc.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff8000371c3dc to fffff80003292c40 STACK_TEXT: fffff880`0aa7fc78 fffff800`0371c3dc : 00000000`000000c4 00000000`000000f6 00000000`00000310 fffffa80`0a5d8b30 : nt!KeBugCheckEx fffff880`0aa7fc80 fffff800`03731ae4 : 00000000`00000310 fffffa80`0a5d8b30 00000000`00000005 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c fffff880`0aa7fcc0 fffff800`034ea210 : 00000000`00f80064 fffff880`0aa7feb0 fffff880`0aa80000 00000000`00000001 : nt!VfCheckUserHandle+0x1b4 fffff880`0aa7fda0 fffff800`03546b7d : fffff880`0aa80100 fffff880`00000002 fffffa80`0972b390 fffff880`0aa80000 : nt! ?? ::NNGAKEGL::`string'+0x212ce fffff880`0aa7fe70 fffff800`03510a2c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmObReferenceObjectByHandle+0x31 fffff880`0aa7fed0 fffff800`03291ed3 : 00000000`00000310 fffff800`0354cfd0 fffffa80`0fa11000 fffff880`00000000 : nt!NtDeleteValueKey+0xcc fffff880`0aa7ffd0 fffff800`0328e470 : fffff800`0363fa3c 00000000`00000010 fffff800`0363fa00 00000000`00000010 : nt!KiSystemServiceCopyEnd+0x13 fffff880`0aa80168 fffff800`0363fa3c : 00000000`00000010 fffff800`0363fa00 00000000`00000010 00000000`00010246 : nt!KiServiceLinkage fffff880`0aa80170 fffff880`046a9f50 : fffff980`1e678e10 00000000`00000002 fffffa80`0dabd050 00000000`00000310 : nt!RtlDeleteRegistryValue+0x3c fffff880`0aa801b0 fffff980`1e678e10 : 00000000`00000002 fffffa80`0dabd050 00000000`00000310 fffffa80`0f9c52e0 : dne64x+0xff50 fffff880`0aa801b8 00000000`00000002 : fffffa80`0dabd050 00000000`00000310 fffffa80`0f9c52e0 00000000`00000001 : 0xfffff980`1e678e10 fffff880`0aa801c0 fffffa80`0dabd050 : 00000000`00000310 fffffa80`0f9c52e0 00000000`00000001 00000000`00000310 : 0x2 fffff880`0aa801c8 00000000`00000310 : fffffa80`0f9c52e0 00000000`00000001 00000000`00000310 fffff880`0aa80280 : 0xfffffa80`0dabd050 fffff880`0aa801d0 fffffa80`0f9c52e0 : 00000000`00000001 00000000`00000310 fffff880`0aa80280 00000000`00000000 : 0x310 fffff880`0aa801d8 00000000`00000001 : 00000000`00000310 fffff880`0aa80280 00000000`00000000 fffff800`0329ff98 : 0xfffffa80`0f9c52e0 fffff880`0aa801e0 00000000`00000310 : fffff880`0aa80280 00000000`00000000 fffff800`0329ff98 00000000`00000000 : 0x1 fffff880`0aa801e8 fffff880`0aa80280 : 00000000`00000000 fffff800`0329ff98 00000000`00000000 00000000`00000000 : 0x310 fffff880`0aa801f0 00000000`00000000 : fffff800`0329ff98 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`0aa80280 STACK_COMMAND: kb FOLLOWUP_IP: dne64x+ff50 fffff880`046a9f50 488b4c2430 mov rcx,qword ptr [rsp+30h] SYMBOL_STACK_INDEX: 9 SYMBOL_NAME: dne64x+ff50 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dne64x IMAGE_NAME: dne64x.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4918d964 FAILURE_BUCKET_ID: X64_0xc4_f6_dne64x+ff50 BUCKET_ID: X64_0xc4_f6_dne64x+ff50 Followup: MachineOwner ---------
I wasn't using either of those programs. But I am using SonicWall VPN client. I need this because of my work. For now I uninstalled SonicWall and updated my realtek drivers. I also submitted an email to citrix (producer of dnex64.sys), with my dump. I'll have to reinstall sonicwall very soon .
I updated my Vertex 3 SSD firmware a few days ago and have not suffered a BSOD since. Keeping my fingers crossed.