Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Random BSOD "ntkrnlmp.exe ( nt!KiSwapContext+ba )"

17 Jul 2015   #1
JINXR

W7 x64 Pro
 
 
Random BSOD "ntkrnlmp.exe ( nt!KiSwapContext+ba )"

Ok, I'm trying to get some work done but I keep getting random BSOD and it's the busiest time of year for me so I can't spend a lot of time researching the problem and need to reach out to you guys. I really appreciate any and all help. Below is the dump file.

Does it have something to do with Foxit Reader? I usually have that program running 24x7 for work.

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\071715-7363-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`03653000 PsLoadedModuleList = 0xfffff800`0389a730
Debug session time: Fri Jul 17 02:46:25.624 2015 (UTC - 5:00)
System Uptime: 1 days 7:33:32.436
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {c000010a, 2, 0, fffff800036ca0ea}

Probably caused by : ntkrnlmp.exe ( nt!KiSwapContext+ba )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000c000010a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800036ca0ea, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003904100
GetUlongFromAddress: unable to read from fffff800039041c0
 00000000c000010a Nonpaged pool

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiSwapContext+ba
fffff800`036ca0ea 488b7908        mov     rdi,qword ptr [rcx+8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  FoxitReader.ex

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

TRAP_FRAME:  fffff8800d1f2670 -- (.trap 0xfffff8800d1f2670)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000007ef8c000 rbx=0000000000000000 rcx=00000000c0000102
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036ca0ea rsp=fffff8800d1f2800 rbp=fffffa800e026690
 r8=fffffa800fb28728  r9=0000000000000000 r10=ffffffffffffffbf
r11=fffffa800c8432c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KiSwapContext+0xba:
fffff800`036ca0ea 488b7908        mov     rdi,qword ptr [rcx+8] ds:00000000`c000010a=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff800036c6e69 to fffff800036c78c0

STACK_TEXT:  
fffff880`0d1f2528 fffff800`036c6e69 : 00000000`0000000a 00000000`c000010a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d1f2530 fffff800`036c5ae0 : fffff880`030fb180 fffffa80`0c826060 fffff800`00000006 fffff880`030fb180 : nt!KiBugCheckDispatch+0x69
fffff880`0d1f2670 fffff800`036ca0ea : 00000000`00000000 ffffffff`ffffffbf 00000000`00000000 fffff800`0371271c : nt!KiPageFault+0x260
fffff880`0d1f2800 fffff800`036cb602 : fffffa80`0e026690 fffffa80`0e026690 00000000`00000000 fffffa80`00000008 : nt!KiSwapContext+0xba
fffff880`0d1f2940 fffff800`036cf31f : 00000000`0000046c 64657473`65757165 6372756f`00000071 746f6e20`73692065 : nt!KiCommitThreadWait+0x1d2
fffff880`0d1f29d0 fffff800`039bc68e : 00000000`00000000 fffffa80`00000006 00000000`00000001 fffff880`0d1f2a00 : nt!KeWaitForSingleObject+0x19f
fffff880`0d1f2a70 fffff800`036c6b53 : fffffa80`0e026690 00000000`0000046c fffff880`0d1f2ab8 fffffa80`0b40c900 : nt!NtWaitForSingleObject+0xde
fffff880`0d1f2ae0 00000000`74b82e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0cc5f048 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74b82e09


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiSwapContext+ba
fffff800`036ca0ea 488b7908        mov     rdi,qword ptr [rcx+8]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!KiSwapContext+ba

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  556356e8

IMAGE_VERSION:  6.1.7601.18869

FAILURE_BUCKET_ID:  X64_0xA_nt!KiSwapContext+ba

BUCKET_ID:  X64_0xA_nt!KiSwapContext+ba

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0xa_nt!kiswapcontext+ba

FAILURE_ID_HASH:  {80d44a4c-7261-1088-9897-5b4fc14d55bf}

Followup: MachineOwner
---------



My System SpecsSystem Spec
.
17 Jul 2015   #2
JINXR

W7 x64 Pro
 
 

Ok I ran SFC and it didn't find any errors. Below are the other dumps if that helps. There have been other BSOD, but they haven't created any dumps.

Also, I only use MSE and Malwarebytes. Both came up clean.

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\070715-7160-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`03665000 PsLoadedModuleList = 0xfffff800`038ac730
Debug session time: Tue Jul  7 08:09:56.920 2015 (UTC - 5:00)
System Uptime: 9 days 21:12:01.732
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
........................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800039f0f20, fffff880221d9d50, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+20 )

Followup: MachineOwner
---------

7: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800039f0f20, Address of the instruction which caused the bugcheck
Arg3: fffff880221d9d50, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`039f0f20 8b4610          mov     eax,dword ptr [rsi+10h]

CONTEXT:  fffff880221d9d50 -- (.cxr 0xfffff880221d9d50;r)
rax=fffff880221da758 rbx=0000000000000000 rcx=fffdf8a003347190
rdx=000000000000000d rsi=fffdf8a003347170 rdi=0000000000000000
rip=fffff800039f0f20 rsp=fffff880221da730 rbp=fffffa800f3191f0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff880221da808 r12=000000000000000d r13=fffffa800f0f5870
r14=0000000000000000 r15=fffff8a02842b120
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`039f0f20 8b4610          mov     eax,dword ptr [rsi+10h] ds:002b:fffdf8a0`03347180=????????
Last set context:
rax=fffff880221da758 rbx=0000000000000000 rcx=fffdf8a003347190
rdx=000000000000000d rsi=fffdf8a003347170 rdi=0000000000000000
rip=fffff800039f0f20 rsp=fffff880221da730 rbp=fffffa800f3191f0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff880221da808 r12=000000000000000d r13=fffffa800f0f5870
r14=0000000000000000 r15=fffff8a02842b120
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`039f0f20 8b4610          mov     eax,dword ptr [rsi+10h] ds:002b:fffdf8a0`03347180=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  Skype.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800039f0f20

STACK_TEXT:  
fffff880`221da730 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20


FOLLOWUP_IP: 
nt!ObDereferenceSecurityDescriptor+20
fffff800`039f0f20 8b4610          mov     eax,dword ptr [rsi+10h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObDereferenceSecurityDescriptor+20

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  556356e8

IMAGE_VERSION:  6.1.7601.18869

STACK_COMMAND:  .cxr 0xfffff880221d9d50 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+20

BUCKET_ID:  X64_0x3B_nt!ObDereferenceSecurityDescriptor+20

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_nt!obdereferencesecuritydescriptor+20

FAILURE_ID_HASH:  {eb4acb34-78fd-2e9e-ceb7-7f8505c5059b}

Followup: MachineOwner
---------
Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\062715-7238-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`03614000 PsLoadedModuleList = 0xfffff800`0385b730
Debug session time: Sat Jun 27 10:56:57.026 2015 (UTC - 5:00)
System Uptime: 1 days 2:25:55.727
Loading Kernel Symbols
...............................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
......................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff800039941bf, fffff88007c63ee0, 0}

Probably caused by : ntkrnlmp.exe ( nt!AlpcpReceiveMessagePort+1ff )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800039941bf, Address of the instruction which caused the bugcheck
Arg3: fffff88007c63ee0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!AlpcpReceiveMessagePort+1ff
fffff800`039941bf 488b842480000000 mov     rax,qword ptr [rsp+80h]

CONTEXT:  fffff88007c63ee0 -- (.cxr 0xfffff88007c63ee0;r)
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa800c701260 rdi=fffff8a00fb2d680
rip=fffff800039941bf rsp=fffff88007c648c0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffffa800c701260
r11=00000000001f0001 r12=0000000000000001 r13=fffffa801025cad0
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!AlpcpReceiveMessagePort+0x1ff:
fffff800`039941bf 488b842480000000 mov     rax,qword ptr [rsp+80h] ss:0018:fffff880`07c64940=????????????????
Last set context:
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=fffffa800c701260 rdi=fffff8a00fb2d680
rip=fffff800039941bf rsp=fffff88007c648c0 rbp=0000000000000000
 r8=0000000000000000  r9=0000000000000000 r10=fffffa800c701260
r11=00000000001f0001 r12=0000000000000001 r13=fffffa801025cad0
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!AlpcpReceiveMessagePort+0x1ff:
fffff800`039941bf 488b842480000000 mov     rax,qword ptr [rsp+80h] ss:0018:fffff880`07c64940=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff800039941bf

STACK_TEXT:  
fffff880`07c648c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!AlpcpReceiveMessagePort+0x1ff


FOLLOWUP_IP: 
nt!AlpcpReceiveMessagePort+1ff
fffff800`039941bf 488b842480000000 mov     rax,qword ptr [rsp+80h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!AlpcpReceiveMessagePort+1ff

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  556356e8

IMAGE_VERSION:  6.1.7601.18869

STACK_COMMAND:  .cxr 0xfffff88007c63ee0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!AlpcpReceiveMessagePort+1ff

BUCKET_ID:  X64_0x3B_nt!AlpcpReceiveMessagePort+1ff

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_nt!alpcpreceivemessageport+1ff

FAILURE_ID_HASH:  {9ac890f0-c85b-e72a-8cd7-9b59030c30e7}

Followup: MachineOwner
---------

Code:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\062615-7768-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18869.amd64fre.win7sp1_gdr.150525-0603
Machine Name:
Kernel base = 0xfffff800`0360d000 PsLoadedModuleList = 0xfffff800`03854730
Debug session time: Fri Jun 26 08:30:18.918 2015 (UTC - 5:00)
System Uptime: 13 days 15:05:51.602
Loading Kernel Symbols
...............................................................
................................................................
................................................
Loading User Symbols
Loading unloaded module list
..................................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80003944e13, fffff8800a65cb90, 0}

Probably caused by : ntkrnlmp.exe ( nt!PspDereferenceQuotaBlock+17 )

Followup: MachineOwner
---------

6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80003944e13, Address of the instruction which caused the bugcheck
Arg3: fffff8800a65cb90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!PspDereferenceQuotaBlock+17
fffff800`03944e13 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh

CONTEXT:  fffff8800a65cb90 -- (.cxr 0xfffff8800a65cb90;r)
rax=000000000000001c rbx=0000000000000004 rcx=0000000000000004
rdx=0000000000000000 rsi=fffffa800f9d6ec0 rdi=0000000000000000
rip=fffff80003944e13 rsp=fffff8800a65d570 rbp=0000000000000180
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000189 r12=fffffa8009ac53f0 r13=0000000000000000
r14=fffffa800f9d6ee0 r15=fffffa800f9d6ec0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!PspDereferenceQuotaBlock+0x17:
fffff800`03944e13 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh ds:002b:00000000`0000020c=????????
Last set context:
rax=000000000000001c rbx=0000000000000004 rcx=0000000000000004
rdx=0000000000000000 rsi=fffffa800f9d6ec0 rdi=0000000000000000
rip=fffff80003944e13 rsp=fffff8800a65d570 rbp=0000000000000180
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000189 r12=fffffa8009ac53f0 r13=0000000000000000
r14=fffffa800f9d6ee0 r15=fffffa800f9d6ec0
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!PspDereferenceQuotaBlock+0x17:
fffff800`03944e13 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh ds:002b:00000000`0000020c=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  googledrivesyn

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80003944e13

STACK_TEXT:  
fffff880`0a65d570 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspDereferenceQuotaBlock+0x17


FOLLOWUP_IP: 
nt!PspDereferenceQuotaBlock+17
fffff800`03944e13 f0838108020000ff lock add dword ptr [rcx+208h],0FFFFFFFFh

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!PspDereferenceQuotaBlock+17

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  556356e8

IMAGE_VERSION:  6.1.7601.18869

STACK_COMMAND:  .cxr 0xfffff8800a65cb90 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!PspDereferenceQuotaBlock+17

BUCKET_ID:  X64_0x3B_nt!PspDereferenceQuotaBlock+17

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:x64_0x3b_nt!pspdereferencequotablock+17

FAILURE_ID_HASH:  {f87d917d-592a-e434-69cc-1d6fb39846c4}

Followup: MachineOwner
---------
My System SpecsSystem Spec
Reply

 Random BSOD "ntkrnlmp.exe ( nt!KiSwapContext+ba )"




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
"Random" BSODs. Sometimes ntkrnlmp.exe but mostly ntoskrnl.exe
Hello, all. I don't have much experience diagnosing these issues; fortunately all my machines current and past have been solid. Unfortunately the machine I put together for work is BSODing with no pattern I can recognize -- sometimes she'll run fine for a few weeks other times she'll crash a few...
BSOD Help and Support
BSOD "KMODE_EXCEPTION_NOT_HANDLED" ntkrnlmp.exe
Hi all, In June 2012 I built my first PC from scratch. The system details can be found in the attached "Cuahchic.zip" under "SystemInfo.txt" (I won't repeat them here). The components are stock except I did overclock the CPU to 4.2GHz for a while (I had a few unstable attempts but this...
BSOD Help and Support
BSOD - "ntkrnlmp.exe" and "ntoskrnl.exe" are the cause
Hello all, a friend was helping me to find out what this BSOD all of a sudden was from but he is out of the country now away on business. We got the point of him looking at the crash files and us using WhoCrashed, and we found that the last handful of crashes I have are all caused by...
BSOD Help and Support
"ntkrnlmp.exe" related BSOD
I bought recently this PC and it had this problem from the beginning. I tested the hardware (except power supply) and everything is working, yet i'm still getting BSOD from time to time. If you have any idea what's happening please tell me! sorry for my english
BSOD Help and Support
BSOD random "Probably caused by : ntkrnlmp.exe"
So I randomly get a BSOD, sometimes while sitting idle, other times just running firefox. Used to happen frequently trying to run SolidWorks and was a Nvidia graphics issue I though- Reformatted machine with new ATI card and now have this problem. Hopefully someone can decipher the below...
BSOD Help and Support
BSOD when gaming "ntkrnlmp.exe"?? HELP please
I'm running windows 7 x64 pro and during gaming, at random times a BSOD would appear and the only useful info i found on the blue screen is that is says "ntkrnlmp.exe" and IRQL_not less or equal. I updated my bios and drivers and I have tested my memory using the windows memory test overnight...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 18:51.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App