Hey guys.
Looking at the latest dump points out something interesting. It was still caused by ASACPI.sys, but with the process AiNap.exe. This is an ASUS motherboard utility, and is possibly conflicting with ASACPI. Try removing the AI Nap utility (if installed).
Additionally, here are some out of date drivers that might be causing problems:
Code:
secdrv secdrv.SYS Wed Sep 13 06:18:38 2006
Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\David\AppData\Local\Temp\Temp1_062410-28345-01.zip\062410-28345-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Thu Jun 24 14:07:23.566 2010 (UTC - 7:00)
System Uptime: 0 days 0:00:41.642
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C4, {f6, 184, fffffa800804cb30, fffff88004420257}
Unable to load image ASACPI.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ASACPI.sys
*** ERROR: Module load completed but symbols could not be loaded for ASACPI.sys
Probably caused by : ASACPI.sys ( ASACPI+1257 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 00000000000000f6, Referencing user handle as KernelMode.
Arg2: 0000000000000184, Handle value being referenced.
Arg3: fffffa800804cb30, Address of the current process.
Arg4: fffff88004420257, Address inside the driver that is performing the incorrect reference.
Debugging Details:
------------------
BUGCHECK_STR: 0xc4_f6
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AiNap.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002efd3dc to fffff80002a73600
STACK_TEXT:
fffff880`087195b8 fffff800`02efd3dc : 00000000`000000c4 00000000`000000f6 00000000`00000184 fffffa80`0804cb30 : nt!KeBugCheckEx
fffff880`087195c0 fffff800`02f12ae4 : 00000000`00000184 fffffa80`0804cb30 00000000`00000002 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0x3c
fffff880`08719600 fffff800`02ccf580 : 00000000`00000000 fffff880`08719830 00000000`00000000 fffffa80`046d3900 : nt!VfCheckUserHandle+0x1b4
fffff880`087196e0 fffff800`02d4b425 : 00000000`00000000 fffff880`000f0001 00000000`00000000 fffffa80`00000000 : nt! ?? ::NNGAKEGL::`string'+0x20e1e
fffff880`087197b0 fffff800`02f12878 : fffffa80`06773968 fffff800`02f15bcc fffffa80`046d37b0 fffffa80`046d37b0 : nt!ObReferenceObjectByHandle+0x25
fffff880`08719800 fffff880`04420257 : fffff980`1058ccf0 00000000`00000002 fffffa80`046d3900 00000000`00000000 : nt!VerifierObReferenceObjectByHandle+0x48
fffff880`08719850 fffff980`1058ccf0 : 00000000`00000002 fffffa80`046d3900 00000000`00000000 fffffa80`046d3928 : ASACPI+0x1257
fffff880`08719858 00000000`00000002 : fffffa80`046d3900 00000000`00000000 fffffa80`046d3928 00000000`00000000 : 0xfffff980`1058ccf0
fffff880`08719860 fffffa80`046d3900 : 00000000`00000000 fffffa80`046d3928 00000000`00000000 00000000`00000001 : 0x2
fffff880`08719868 00000000`00000000 : fffffa80`046d3928 00000000`00000000 00000000`00000001 00000000`00000000 : 0xfffffa80`046d3900
STACK_COMMAND: kb
FOLLOWUP_IP:
ASACPI+1257
fffff880`04420257 83462001 add dword ptr [rsi+20h],1
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: ASACPI+1257
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ASACPI
IMAGE_NAME: ASACPI.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a0b72fd
FAILURE_BUCKET_ID: X64_0xc4_f6_ASACPI+1257
BUCKET_ID: X64_0xc4_f6_ASACPI+1257
Followup: MachineOwner
---------
~Lordbob