Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Multiple DSOD ntoskrnl.exe + Stop error code 0x0000000A (IRQL_NOT_LES

16 Apr 2015   #1
chimak3d

Windows 7 64 bits
 
 
Multiple DSOD ntoskrnl.exe + Stop error code 0x0000000A (IRQL_NOT_LES

Hello,
I'm new to my office, since I started working here I'm getting this constants BSODs, but checking the windows logs it seems like it started happening long ago.
A week ago I unnistalled several drivers and software (including avastt and daemon tools) and it stopped crashing, but it was almost imposible to boot, it kept getting bsod after the windows logo screen, but I had no problem when booting in safe mode. Sometimes it'll just boot normally and wont crash anytime and next day it won't boot .
I'd tried cleaning the registry using CCLEANER, SmartPCFixer, updated drivers with Driver Booster 2 and manually, run Spyware Terminator ETC. Nothing worked, i keep getting the "Stop error code 0x0000000A (IRQL_NOT_LESS_OR_EQUAL)" BS.

And It's impossible to run a memcheck or reinstall the SO since it's the only PC available, but I'll try to clean the RAM slots when I can..

- Dump files and screen shots -

Attachment 356452

Attachment 356453

Attachment 356454

Attachment 356456

(Sorry about my english)


My System SpecsSystem Spec
.
16 Apr 2015   #2
chimak3d

Windows 7 64 bits
 
 

Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [Z:\3D Print\Grafica\makers parts\041615-32136-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred symsrv*symsrv.dll*f:\localsymbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: symsrv*symsrv.dll*f:\localsymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
Machine Name:
Kernel base = 0xfffff800`0381a000 PsLoadedModuleList = 0xfffff800`03a5f890
Debug session time: Thu Apr 16 09:23:33.323 2015 (UTC - 3:00)
System Uptime: 0 days 1:32:06.462
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {800005998a, 2, 0, fffff800038c2c4b}

Probably caused by : memory_corruption ( nt!MiMapPageInHyperSpaceWorker+1b )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000800005998a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800038c2c4b, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ac9100
GetUlongFromAddress: unable to read from fffff80003ac91c0
000000800005998a Nonpaged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!MiMapPageInHyperSpaceWorker+1b
fffff800`038c2c4b 458a481a mov r9b,byte ptr [r8+1Ah]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: chrome.exe

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

TRAP_FRAME: fffff88008d007d0 -- (.trap 0xfffff88008d007d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000058000000000 rbx=0000000000000000 rcx=0000002000001ddd
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800038c2c4b rsp=fffff88008d00968 rbp=0000000000000001
r8=0000008000059970 r9=0000000000000055 r10=0000000000000002
r11=fffff88008d00a50 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiMapPageInHyperSpaceWorker+0x1b:
fffff800`038c2c4b 458a481a mov r9b,byte ptr [r8+1Ah] ds:00000080`0005998a=??
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8000388bfe9 to fffff8000388ca40

STACK_TEXT:
fffff880`08d00688 fffff800`0388bfe9 : 00000000`0000000a 00000080`0005998a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08d00690 fffff800`0388ac60 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0008b770 : nt!KiBugCheckDispatch+0x69
fffff880`08d007d0 fffff800`038c2c4b : fffff800`038753cb fffffa80`0008b6b0 00000000`00000001 00000000`00000000 : nt!KiPageFault+0x260
fffff880`08d00968 fffff800`038753cb : fffffa80`0008b6b0 00000000`00000001 00000000`00000000 00000000`00000080 : nt!MiMapPageInHyperSpaceWorker+0x1b
fffff880`08d00970 fffff800`0394f95e : 00000000`00000be6 fffff880`00000001 fffffa80`0008b770 fffff800`03acccf0 : nt!MiRestoreTransitionPte+0x7b
fffff880`08d00a00 fffff800`0389b364 : 00000000`00000000 fffff880`08d00b00 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveLowestPriorityStandbyPage+0x21e
fffff880`08d00a80 fffff800`0388ab6e : 00000000`00000001 00000000`13adb000 00000000`05b8e101 00000000`13adaca8 : nt!MmAccessFault+0x19e4
fffff880`08d00be0 00000000`60f3cf8d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`063cdca8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x60f3cf8d


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiMapPageInHyperSpaceWorker+1b
fffff800`038c2c4b 458a481a mov r9b,byte ptr [r8+1Ah]

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!MiMapPageInHyperSpaceWorker+1b

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 5507a73c

IMAGE_VERSION: 6.1.7601.18798

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b

BUCKET_ID: X64_0xA_nt!MiMapPageInHyperSpaceWorker+1b

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_nt!mimappageinhyperspaceworker+1b

FAILURE_ID_HASH: {37e40d47-2d58-63bf-0149-9743e09c5a54}

Followup: MachineOwner
---------
My System SpecsSystem Spec
16 Apr 2015   #3
chimak3d

Windows 7 64 bits
 
 

Loading Dump File [Z:\3D Print\Grafica\makers parts\este.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol Path validation summary
Response Time (ms) Location
Deferred SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Deferred symsrv*symsrv.dll*f:\localsymbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*c:\symbols*404 - File or directory not found.
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18798.amd64fre.win7sp1_gdr.150316-1654
Machine Name:
Kernel base = 0xfffff800`03804000 PsLoadedModuleList = 0xfffff800`03a49890
Debug session time: Thu Apr 16 10:16:15.496 2015 (UTC - 3:00)
System Uptime: 0 days 0:21:01.636
Loading Kernel Symbols
.

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

..............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.......

* Bugcheck Analysis *
* *
**

Use !analyze -v to get detailed debugging information.

BugCheck A, {ffffffffffffffd0, 2, 1, fffff80003885f62}

*** WARNING: Unable to verify timestamp for dtsoftbus01.sys
*** ERROR: Module load completed but symbols could not be loaded for dtsoftbus01.sys
Probably caused by : dtsoftbus01.sys ( dtsoftbus01+5390 )

Followup: MachineOwner
---------

0: kd> !analyze -v
***
* *
* Bugcheck Analysis *
* *
***

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003885f62, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ab3100
GetUlongFromAddress: unable to read from fffff80003ab31c0
ffffffffffffffd0

CURRENT_IRQL: 2

FAULTING_IP:
nt!IoQueueWorkItem+3a
fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

TRAP_FRAME: fffff88002ffd3d0 -- (.trap 0xfffff88002ffd3d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002ffd588 rbx=0000000000000000 rcx=fffffa80084d0380
rdx=fffff880019993a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003885f62 rsp=fffff88002ffd560 rbp=0000000000000001
r8=0000000000000001 r9=fffffa80084d0380 r10=fffff800039f7880
r11=fffff800039f6e80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!IoQueueWorkItem+0x3a:
fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1 ds:ffffffff`ffffffd0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003875fe9 to fffff80003876a40

STACK_TEXT:
fffff880`02ffd288 fffff800`03875fe9 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02ffd290 fffff800`03874c60 : fffff8a0`03c0eeb0 fffff800`03b6d196 fffff8a0`1119cb00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ffd3d0 fffff800`03885f62 : 20080936`100b1b09 00000000`00000000 1c052c19`0a00011e 00000000`000007ff : nt!KiPageFault+0x260
fffff880`02ffd560 fffff880`01999390 : fffffa80`07c65110 fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 : nt!IoQueueWorkItem+0x3a
fffff880`02ffd590 fffffa80`07c65110 : fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 : dtsoftbus01+0x5390
fffff880`02ffd598 fffff880`01998dc4 : fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 : 0xfffffa80`07c65110
fffff880`02ffd5a0 fffff880`02ffd650 : 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 : dtsoftbus01+0x4dc4
fffff880`02ffd5a8 00000000`00000001 : fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 : 0xfffff880`02ffd650
fffff880`02ffd5b0 fffffa80`07cba000 : fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 : 0x1
fffff880`02ffd5b8 fffff880`019afd43 : fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 : 0xfffffa80`07cba000
fffff880`02ffd5c0 fffff880`02ffd650 : 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 00000000`00000001 : dtsoftbus01+0x1bd43
fffff880`02ffd5c8 3d312533`311e0e14 : 00000000`00000001 fffffa80`07cba000 00000000`00000001 fffff880`019aa44c : 0xfffff880`02ffd650
fffff880`02ffd5d0 00000000`00000001 : fffffa80`07cba000 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 : 0x3d312533`311e0e14
fffff880`02ffd5d8 fffffa80`07cba000 : 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 : 0x1
fffff880`02ffd5e0 00000000`00000001 : fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 : 0xfffffa80`07cba000
fffff880`02ffd5e8 fffff880`019aa44c : fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 : 0x1
fffff880`02ffd5f0 fffffa80`07cba000 : 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 : dtsoftbus01+0x1644c
fffff880`02ffd5f8 2e1c0525`3f351f12 : 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e : 0xfffffa80`07cba000
fffff880`02ffd600 2e0f262f`00000000 : 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 : 0x2e1c0525`3f351f12
fffff880`02ffd608 393f2f19`1a342926 : 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 : 0x2e0f262f`00000000
fffff880`02ffd610 00000000`00000001 : fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 00000000`00000000 : 0x393f2f19`1a342926
fffff880`02ffd618 fffff880`019d2b4e : fffffa80`07c65110 00000000`00000015 00000000`00000000 fffff880`019c8230 : 0x1
fffff880`02ffd620 fffffa80`07c65110 : 00000000`00000015 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 : dtsoftbus01+0x3eb4e
fffff880`02ffd628 00000000`00000015 : 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 : 0xfffffa80`07c65110
fffff880`02ffd630 00000000`00000000 : fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 00000000`00060000 : 0x15


STACK_COMMAND: kb

FOLLOWUP_IP:
dtsoftbus01+5390
fffff880`01999390 ?? ???

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: dtsoftbus01+5390

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dtsoftbus01

IMAGE_NAME: dtsoftbus01.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 53072130

FAILURE_BUCKET_ID: X64_0xA_dtsoftbus01+5390

BUCKET_ID: X64_0xA_dtsoftbus01+5390

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_dtsoftbus01+5390

FAILURE_ID_HASH: {cae10d5c-bfc5-ef63-a270-f19f70cbcaee}

Followup: MachineOwner
---------

0: kd> !analyze -v

* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003885f62, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: ffffffffffffffd0

CURRENT_IRQL: 2

FAULTING_IP:
nt!IoQueueWorkItem+3a
fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

TRAP_FRAME: fffff88002ffd3d0 -- (.trap 0xfffff88002ffd3d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002ffd588 rbx=0000000000000000 rcx=fffffa80084d0380
rdx=fffff880019993a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003885f62 rsp=fffff88002ffd560 rbp=0000000000000001
r8=0000000000000001 r9=fffffa80084d0380 r10=fffff800039f7880
r11=fffff800039f6e80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!IoQueueWorkItem+0x3a:
fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1 ds:ffffffff`ffffffd0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003875fe9 to fffff80003876a40

STACK_TEXT:
fffff880`02ffd288 fffff800`03875fe9 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02ffd290 fffff800`03874c60 : fffff8a0`03c0eeb0 fffff800`03b6d196 fffff8a0`1119cb00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ffd3d0 fffff800`03885f62 : 20080936`100b1b09 00000000`00000000 1c052c19`0a00011e 00000000`000007ff : nt!KiPageFault+0x260
fffff880`02ffd560 fffff880`01999390 : fffffa80`07c65110 fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 : nt!IoQueueWorkItem+0x3a
fffff880`02ffd590 fffffa80`07c65110 : fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 : dtsoftbus01+0x5390
fffff880`02ffd598 fffff880`01998dc4 : fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 : 0xfffffa80`07c65110
fffff880`02ffd5a0 fffff880`02ffd650 : 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 : dtsoftbus01+0x4dc4
fffff880`02ffd5a8 00000000`00000001 : fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 : 0xfffff880`02ffd650
fffff880`02ffd5b0 fffffa80`07cba000 : fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 : 0x1
fffff880`02ffd5b8 fffff880`019afd43 : fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 : 0xfffffa80`07cba000
fffff880`02ffd5c0 fffff880`02ffd650 : 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 00000000`00000001 : dtsoftbus01+0x1bd43
fffff880`02ffd5c8 3d312533`311e0e14 : 00000000`00000001 fffffa80`07cba000 00000000`00000001 fffff880`019aa44c : 0xfffff880`02ffd650
fffff880`02ffd5d0 00000000`00000001 : fffffa80`07cba000 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 : 0x3d312533`311e0e14
fffff880`02ffd5d8 fffffa80`07cba000 : 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 : 0x1
fffff880`02ffd5e0 00000000`00000001 : fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 : 0xfffffa80`07cba000
fffff880`02ffd5e8 fffff880`019aa44c : fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 : 0x1
fffff880`02ffd5f0 fffffa80`07cba000 : 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 : dtsoftbus01+0x1644c
fffff880`02ffd5f8 2e1c0525`3f351f12 : 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e : 0xfffffa80`07cba000
fffff880`02ffd600 2e0f262f`00000000 : 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 : 0x2e1c0525`3f351f12
fffff880`02ffd608 393f2f19`1a342926 : 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 : 0x2e0f262f`00000000
fffff880`02ffd610 00000000`00000001 : fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 00000000`00000000 : 0x393f2f19`1a342926
fffff880`02ffd618 fffff880`019d2b4e : fffffa80`07c65110 00000000`00000015 00000000`00000000 fffff880`019c8230 : 0x1
fffff880`02ffd620 fffffa80`07c65110 : 00000000`00000015 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 : dtsoftbus01+0x3eb4e
fffff880`02ffd628 00000000`00000015 : 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 : 0xfffffa80`07c65110
fffff880`02ffd630 00000000`00000000 : fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 00000000`00060000 : 0x15


STACK_COMMAND: kb

FOLLOWUP_IP:
dtsoftbus01+5390
fffff880`01999390 ?? ???

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: dtsoftbus01+5390

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dtsoftbus01

IMAGE_NAME: dtsoftbus01.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 53072130

FAILURE_BUCKET_ID: X64_0xA_dtsoftbus01+5390

BUCKET_ID: X64_0xA_dtsoftbus01+5390

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_dtsoftbus01+5390

FAILURE_ID_HASH: {cae10d5c-bfc5-ef63-a270-f19f70cbcaee}

Followup: MachineOwner
---------

0: kd> !analyze -v
*****
* *
* Bugcheck Analysis *
* *
*****

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffffffffffffd0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80003885f62, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: ffffffffffffffd0

CURRENT_IRQL: 2

FAULTING_IP:
nt!IoQueueWorkItem+3a
fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

TRAP_FRAME: fffff88002ffd3d0 -- (.trap 0xfffff88002ffd3d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88002ffd588 rbx=0000000000000000 rcx=fffffa80084d0380
rdx=fffff880019993a8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80003885f62 rsp=fffff88002ffd560 rbp=0000000000000001
r8=0000000000000001 r9=fffffa80084d0380 r10=fffff800039f7880
r11=fffff800039f6e80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!IoQueueWorkItem+0x3a:
fffff800`03885f62 f0488343d001 lock add qword ptr [rbx-30h],1 ds:ffffffff`ffffffd0=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80003875fe9 to fffff80003876a40

STACK_TEXT:
fffff880`02ffd288 fffff800`03875fe9 : 00000000`0000000a ffffffff`ffffffd0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`02ffd290 fffff800`03874c60 : fffff8a0`03c0eeb0 fffff800`03b6d196 fffff8a0`1119cb00 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02ffd3d0 fffff800`03885f62 : 20080936`100b1b09 00000000`00000000 1c052c19`0a00011e 00000000`000007ff : nt!KiPageFault+0x260
fffff880`02ffd560 fffff880`01999390 : fffffa80`07c65110 fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 : nt!IoQueueWorkItem+0x3a
fffff880`02ffd590 fffffa80`07c65110 : fffff880`01998dc4 fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 : dtsoftbus01+0x5390
fffff880`02ffd598 fffff880`01998dc4 : fffff880`02ffd650 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 : 0xfffffa80`07c65110
fffff880`02ffd5a0 fffff880`02ffd650 : 00000000`00000001 fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 : dtsoftbus01+0x4dc4
fffff880`02ffd5a8 00000000`00000001 : fffffa80`07cba000 fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 : 0xfffff880`02ffd650
fffff880`02ffd5b0 fffffa80`07cba000 : fffff880`019afd43 fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 : 0x1
fffff880`02ffd5b8 fffff880`019afd43 : fffff880`02ffd650 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 : 0xfffffa80`07cba000
fffff880`02ffd5c0 fffff880`02ffd650 : 3d312533`311e0e14 00000000`00000001 fffffa80`07cba000 00000000`00000001 : dtsoftbus01+0x1bd43
fffff880`02ffd5c8 3d312533`311e0e14 : 00000000`00000001 fffffa80`07cba000 00000000`00000001 fffff880`019aa44c : 0xfffff880`02ffd650
fffff880`02ffd5d0 00000000`00000001 : fffffa80`07cba000 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 : 0x3d312533`311e0e14
fffff880`02ffd5d8 fffffa80`07cba000 : 00000000`00000001 fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 : 0x1
fffff880`02ffd5e0 00000000`00000001 : fffff880`019aa44c fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 : 0xfffffa80`07cba000
fffff880`02ffd5e8 fffff880`019aa44c : fffffa80`07cba000 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 : 0x1
fffff880`02ffd5f0 fffffa80`07cba000 : 2e1c0525`3f351f12 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 : dtsoftbus01+0x1644c
fffff880`02ffd5f8 2e1c0525`3f351f12 : 2e0f262f`00000000 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e : 0xfffffa80`07cba000
fffff880`02ffd600 2e0f262f`00000000 : 393f2f19`1a342926 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 : 0x2e1c0525`3f351f12
fffff880`02ffd608 393f2f19`1a342926 : 00000000`00000001 fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 : 0x2e0f262f`00000000
fffff880`02ffd610 00000000`00000001 : fffff880`019d2b4e fffffa80`07c65110 00000000`00000015 00000000`00000000 : 0x393f2f19`1a342926
fffff880`02ffd618 fffff880`019d2b4e : fffffa80`07c65110 00000000`00000015 00000000`00000000 fffff880`019c8230 : 0x1
fffff880`02ffd620 fffffa80`07c65110 : 00000000`00000015 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 : dtsoftbus01+0x3eb4e
fffff880`02ffd628 00000000`00000015 : 00000000`00000000 fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 : 0xfffffa80`07c65110
fffff880`02ffd630 00000000`00000000 : fffff880`019c8230 fffff8a0`1119cb01 00000000`00050000 00000000`00060000 : 0x15


STACK_COMMAND: kb

FOLLOWUP_IP:
dtsoftbus01+5390
fffff880`01999390 ?? ???

SYMBOL_STACK_INDEX: 4

SYMBOL_NAME: dtsoftbus01+5390

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: dtsoftbus01

IMAGE_NAME: dtsoftbus01.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 53072130

FAILURE_BUCKET_ID: X64_0xA_dtsoftbus01+5390

BUCKET_ID: X64_0xA_dtsoftbus01+5390

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:x64_0xa_dtsoftbus01+5390

FAILURE_ID_HASH: {cae10d5c-bfc5-ef63-a270-f19f70cbcaee}

Followup: MachineOwner
My System SpecsSystem Spec
.

Reply

 Multiple DSOD ntoskrnl.exe + Stop error code 0x0000000A (IRQL_NOT_LES




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
multiple bsod by ntoskrnl.exe, 0x0000000a, 0x0000001e, 0x00000050
I had more bsd, but I think the 0x3b and 0xd1 are fixed. Any help would be appreciated. This is so frustrating. If its hardware related, I need help figuring out what. All my parts are new from newegg except for gpu and processor. I don't think its my ram because I swapped out different ram from my...
BSOD Help and Support
DSOD browsing firefox, Bugcheck 0x0000000a (WinDbg analysis available)
Hi I just got out from a faulty GPU nightmare one week ago. Now I recently got this BSOD while browsing on firefox and I would like to know I i should worry or if there's anyway to keep it from happening again.
BSOD Help and Support
BSOD cause by ntoskrnl.exe error 0x0000000a
Here's what I got: Crash dump directory: C:\Windows\Minidump Crash dumps are enabled on your computer. On Thu 7/17/2014 1:49:32 PM GMT your computer crashed crash dump file: C:\Windows\Minidump\071714-23462-01.dmp This was probably caused by the following module: ntoskrnl.exe...
BSOD Help and Support
BSOD when hibernating or shutting down, error: STOP 0X0000000A
I've been getting the BSOD many times the past couple days, usually when my computer enters hibernation mode or it's happened when I've selected shut down. I've had this computer for two and a half years and never had problems with it before, I would really appreciate some help because I'm not very...
BSOD Help and Support
Error 0x0000000a caused by ntoskrnl.exe
this is probably going to be difficult for both myself and whoever tries to help me, but thanks in advance. i read the instructions on making a bsod posting however every time i try to run the sf program it comes up with an error and hangs. if it worked i would be giving you all the requested...
BSOD Help and Support
BSOD error 0x0000000a - ntoskrnl.exe+f20c4
Hi, BSOD more or less once a day. the error is BSOD error 0x0000000a - ntoskrnl.exe+f20c4 Attached here all the error information. What can cause it / how to find the bad driver of hardware? Thanks a lot in advance, Satlos
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 07:50.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App