Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: ntoskrnl.exe causing BSOD Windows 7

27 Jul 2010   #21
Jonathan_King

Windows 7 Professional x64
 
 

That is actually a very good sign. It means you have a bad driver, as opposed to a hardware problem. Now the trick is finding out which driver is the cause...

Just for the heck of it, run a RAM test. Download a copy of Memtest86 and burn the ISO to a CD using ISO Recorder. Boot from the CD, and let it run for at least 5 passes.

Memtest86+ - Advanced Memory Diagnostic Tool

ISO Recorder v3

Now, for the bad driver. In Safe Mode, disable Verifier, as found in the instructions, and then reboot into Normal mode. Then enable verifier again, and see what happens.

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\DOCUME~1\JK\LOCALS~1\Temp\Temporary Directory 3 for minidump (1).zip\072710-17425-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
Debug session time: Tue Jul 27 12:14:30.368 2010 (GMT-4)
System Uptime: 0 days 0:00:15.428
Loading Kernel Symbols
...............................................................
......................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, 102e5930c, 8, 102e5930c}

Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000102e5930c, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000102e5930c, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
+325952f00e9dfdc
00000001`02e5930c ??              ???

EXCEPTION_PARAMETER1:  0000000000000008

EXCEPTION_PARAMETER2:  0000000102e5930c

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb70e0
 0000000102e5930c 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88002fd5bd8 -- (.exr 0xfffff88002fd5bd8)
ExceptionAddress: 0000000102e5930c
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000008
   Parameter[1]: 0000000102e5930c
Attempt to execute non-executable address 0000000102e5930c

TRAP_FRAME:  fffff88002fd5c80 -- (.trap 0xfffff88002fd5c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8000c2b5a0
rdx=fffff8a000c2b4e0 rsi=0000000000000000 rdi=0000000000000000
rip=0000000102e5930c rsp=fffff88002fd5e10 rbp=0000000000000000
 r8=0000000000000000  r9=fffff8a000c2b4e0 r10=fffff8a000c2b4e0
r11=fffff88002fd5c60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000001`02e5930c ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ab9929 to fffff80002a7f600

STACK_TEXT:  
fffff880`02fd5408 fffff800`02ab9929 : 00000000`0000001e ffffffff`c0000005 00000001`02e5930c 00000000`00000008 : nt!KeBugCheckEx
fffff880`02fd5410 fffff800`02a7ec42 : fffff880`02fd5bd8 00000000`00000008 fffff880`02fd5c80 fffff880`00000000 : nt!KiDispatchException+0x1b9
fffff880`02fd5aa0 fffff800`02a7d7ba : 00000000`00000008 00000000`00000008 00000000`00000000 fffffa80`00c9d040 : nt!KiExceptionDispatch+0xc2
fffff880`02fd5c80 00000001`02e5930c : ffffffff`8000015c 00000000`00100000 00000000`001d0000 ffffffff`8000004c : nt!KiPageFault+0x23a
fffff880`02fd5e10 ffffffff`8000015c : 00000000`00100000 00000000`001d0000 ffffffff`8000004c fffff880`00000005 : 0x1`02e5930c
fffff880`02fd5e18 00000000`00100000 : 00000000`001d0000 ffffffff`8000004c fffff880`00000005 00001f80`00000000 : 0xffffffff`8000015c
fffff880`02fd5e20 00000000`001d0000 : ffffffff`8000004c fffff880`00000005 00001f80`00000000 00000000`00000051 : 0x100000
fffff880`02fd5e28 ffffffff`8000004c : fffff880`00000005 00001f80`00000000 00000000`00000051 0000007f`ffffffff : 0x1d0000
fffff880`02fd5e30 fffff880`00000005 : 00001f80`00000000 00000000`00000051 0000007f`ffffffff 00000980`00000000 : 0xffffffff`8000004c
fffff880`02fd5e38 00001f80`00000000 : 00000000`00000051 0000007f`ffffffff 00000980`00000000 00000000`00000001 : 0xfffff880`00000005
fffff880`02fd5e40 00000000`00000051 : 0000007f`ffffffff 00000980`00000000 00000000`00000001 fffff880`00000030 : 0x1f80`00000000
fffff880`02fd5e48 0000007f`ffffffff : 00000980`00000000 00000000`00000001 fffff880`00000030 00000000`00000000 : 0x51
fffff880`02fd5e50 00000980`00000000 : 00000000`00000001 fffff880`00000030 00000000`00000000 fffff880`02fd6080 : 0x7f`ffffffff
fffff880`02fd5e58 00000000`00000001 : fffff880`00000030 00000000`00000000 fffff880`02fd6080 fffff880`00000240 : 0x980`00000000
fffff880`02fd5e60 fffff880`00000030 : 00000000`00000000 fffff880`02fd6080 fffff880`00000240 00000000`00000000 : 0x1
fffff880`02fd5e68 00000000`00000000 : fffff880`02fd6080 fffff880`00000240 00000000`00000000 00000000`00000000 : 0xfffff880`00000030


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDispatchException+1b9
fffff800`02ab9929 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9

BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9

Followup: MachineOwner
---------

1: kd> lmtsmn
start             end                 module name
fffff880`00f22000 fffff880`00f79000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a6d000 fffff880`03af7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01143000 fffff880`0114e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`01105000 fffff880`0110e000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0110e000 fffff880`01138000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`00fea000 fffff880`00ff6000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`03f8f000 fffff880`03fa0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfb000 fffff880`00dbb000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c9d000 fffff880`00cfb000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014d3000 fffff880`01546000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fe1000 fffff880`00fea000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`01480000 fffff880`0148e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03eee000 fffff880`03f71000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f71000 fffff880`03f8f000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03bbf000 fffff880`03bce000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0149a000 fffff880`014a3000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0148e000 fffff880`0149a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`014a3000 fffff880`014b6000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03c03000 fffff880`03cf7000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03cf7000 fffff880`03d3d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0119a000 fffff880`011ae000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0114e000 fffff880`0119a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01557000 fffff880`01561000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01781000 fffff880`017cb000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02feb000 fffff800`03034000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`017f5000 fffff880`017fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0400b000 fffff880`045effe0   igdkmd64 igdkmd64.sys Wed Sep 23 15:22:57 2009 (4ABA7591)
fffff880`010d3000 fffff880`010db000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03fc6000 fffff880`03fdc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff800`00ba2000 fffff800`00bac000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`013de000 fffff880`013f8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01756000 fffff880`01781000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c45000 fffff880`00c89000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`010eb000 fffff880`01105000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`011ae000 fffff880`011db000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`01138000 fffff880`01143000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01067000 fffff880`01072000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f82000 fffff880`00f8c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03a5d000 fffff880`03a68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017e3000 fffff880`017f5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01604000 fffff880`016f6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03b81000 fffff880`03b90000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03af7000 fffff880`03b3c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016f6000 fffff880`01756000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`00e15000 fffff880`00e26000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03a51000 fffff880`03a5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a0f000 fffff800`02feb000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
fffff880`0123b000 fffff880`013de000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`014b6000 fffff880`014bf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03b45000 fffff880`03b6b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fcc000 fffff880`00fe1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f8c000 fffff880`00fbf000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`010db000 fffff880`010eb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01546000 fffff880`01557000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c89000 fffff880`00c9d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03a00000 fffff880`03a51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`015f7000 fffff880`01600000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0122a000 fffff880`01233000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0105e000 fffff880`01067000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015ad000 fffff880`015e7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`017db000 fffff880`017e3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`00e44000 fffff880`00e51000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`00e26000 fffff880`00e44000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03bab000 fffff880`03bbf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03fa0000 fffff880`03fc6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03d3d000 fffff880`03d4a000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fbf000 fffff880`00fcc000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`014bf000 fffff880`014cd000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`011db000 fffff880`01200000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017cb000 fffff880`017db000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01077000 fffff880`010d3000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01561000 fffff880`015ad000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03b6b000 fffff880`03b81000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03b90000 fffff880`03bab000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015e7000 fffff880`015f7000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e6f000 fffff880`00f13000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f13000 fffff880`00f22000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b3c000 fffff880`03b45000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00f79000 fffff880`00f82000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
One last thing, I see no anti-virus installed. Make sure you are running the free Microsoft Security Essentials.

www.microsoft.com/Security_Essentials/


My System SpecsSystem Spec
.
27 Jul 2010   #22
CarlTR6

Windows 7 Ultimate 32 bit
 
 

The mini dump points to memory error, bugcheck code 1E. Unfortunately, it does not pinpoint the driver.

Quote:
STOP 0x0000001E: KMODE_EXCEPTION_NOT_HANDLED

Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidump(3).zip\072710-17425-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
Debug session time: Tue Jul 27 12:14:30.368 2010 (GMT-4)
System Uptime: 0 days 0:00:15.428
Loading Kernel Symbols
...............................................................
......................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, 102e5930c, 8, 102e5930c}

Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000102e5930c, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000102e5930c, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+5cfc952f01f0df14
00000001`02e5930c ??              ???

EXCEPTION_PARAMETER1:  0000000000000008

EXCEPTION_PARAMETER2:  0000000102e5930c

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb70e0
 0000000102e5930c 

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88002fd5bd8 -- (.exr 0xfffff88002fd5bd8)
ExceptionAddress: 0000000102e5930c
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000008
   Parameter[1]: 0000000102e5930c
Attempt to execute non-executable address 0000000102e5930c

TRAP_FRAME:  fffff88002fd5c80 -- (.trap 0xfffff88002fd5c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8000c2b5a0
rdx=fffff8a000c2b4e0 rsi=0000000000000000 rdi=0000000000000000
rip=0000000102e5930c rsp=fffff88002fd5e10 rbp=0000000000000000
 r8=0000000000000000  r9=fffff8a000c2b4e0 r10=fffff8a000c2b4e0
r11=fffff88002fd5c60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000001`02e5930c ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ab9929 to fffff80002a7f600

STACK_TEXT:  
fffff880`02fd5408 fffff800`02ab9929 : 00000000`0000001e ffffffff`c0000005 00000001`02e5930c 00000000`00000008 : nt!KeBugCheckEx
fffff880`02fd5410 fffff800`02a7ec42 : fffff880`02fd5bd8 00000000`00000008 fffff880`02fd5c80 fffff880`00000000 : nt!KiDispatchException+0x1b9
fffff880`02fd5aa0 fffff800`02a7d7ba : 00000000`00000008 00000000`00000008 00000000`00000000 fffffa80`00c9d040 : nt!KiExceptionDispatch+0xc2
fffff880`02fd5c80 00000001`02e5930c : ffffffff`8000015c 00000000`00100000 00000000`001d0000 ffffffff`8000004c : nt!KiPageFault+0x23a
fffff880`02fd5e10 ffffffff`8000015c : 00000000`00100000 00000000`001d0000 ffffffff`8000004c fffff880`00000005 : 0x1`02e5930c
fffff880`02fd5e18 00000000`00100000 : 00000000`001d0000 ffffffff`8000004c fffff880`00000005 00001f80`00000000 : 0xffffffff`8000015c
fffff880`02fd5e20 00000000`001d0000 : ffffffff`8000004c fffff880`00000005 00001f80`00000000 00000000`00000051 : 0x100000
fffff880`02fd5e28 ffffffff`8000004c : fffff880`00000005 00001f80`00000000 00000000`00000051 0000007f`ffffffff : 0x1d0000
fffff880`02fd5e30 fffff880`00000005 : 00001f80`00000000 00000000`00000051 0000007f`ffffffff 00000980`00000000 : 0xffffffff`8000004c
fffff880`02fd5e38 00001f80`00000000 : 00000000`00000051 0000007f`ffffffff 00000980`00000000 00000000`00000001 : 0xfffff880`00000005
fffff880`02fd5e40 00000000`00000051 : 0000007f`ffffffff 00000980`00000000 00000000`00000001 fffff880`00000030 : 0x1f80`00000000
fffff880`02fd5e48 0000007f`ffffffff : 00000980`00000000 00000000`00000001 fffff880`00000030 00000000`00000000 : 0x51
fffff880`02fd5e50 00000980`00000000 : 00000000`00000001 fffff880`00000030 00000000`00000000 fffff880`02fd6080 : 0x7f`ffffffff
fffff880`02fd5e58 00000000`00000001 : fffff880`00000030 00000000`00000000 fffff880`02fd6080 fffff880`00000240 : 0x980`00000000
fffff880`02fd5e60 fffff880`00000030 : 00000000`00000000 fffff880`02fd6080 fffff880`00000240 00000000`00000000 : 0x1
fffff880`02fd5e68 00000000`00000000 : fffff880`02fd6080 fffff880`00000240 00000000`00000000 00000000`00000000 : 0xfffff880`00000030


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDispatchException+1b9
fffff800`02ab9929 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9

BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9

Followup: MachineOwner
---------
To answer your question, yes, it sometimes happens that you have to operate in the safe mode. Read through the instructions in the link to Driver Verifier and you will see the explanation.

Edited to add: Jonathan and I were posting at the same time. Follow his suggestions.
My System SpecsSystem Spec
27 Jul 2010   #23
Elis

Windows 7 Pro
 
 

It now works in normal mode so i am happy with that, i have already eliminated bad ram, i am using a 1gb stick from a laptop that is working.

i do have microsoft security essentials but it was disabled due to me being in safe mode. i am back in normal mode nos wo it is enabled.

since the verifier tool didnt come up with a conclusive result, should i run it again and wait for another bsod?


on another note, the newer broadcom driver seems to be very elusive, i will post in the driver forums later.

thanks for all of your help. Elis
My System SpecsSystem Spec
.

27 Jul 2010   #24
Jonathan_King

Windows 7 Professional x64
 
 

Go ahead and enable it again.
My System SpecsSystem Spec
27 Jul 2010   #25
Elis

Windows 7 Pro
 
 

okay, it has bsoded again with the verifier tool running, here is the minidump.

Elis
My System SpecsSystem Spec
27 Jul 2010   #26
Jonathan_King

Windows 7 Professional x64
 
 

I wonder if your Intel graphics drivers are the cause, just from the date of it. It should be compatible with Windows 7 RTM, but it is 10 months old now.

Go to the computer manufacturer's site, or go to the Intel support page to find an updated version. If you need any help with that, please follow these directions: http://www.sevenforums.com/crashes-d...tructions.html
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\DOCUME~1\JK\LOCALS~1\Temp\Temporary Directory 4 for minidump.zip\072710-17425-01 - Copy.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
Debug session time: Tue Jul 27 12:14:30.368 2010 (GMT-4)
System Uptime: 0 days 0:00:15.428
Loading Kernel Symbols
...............................................................
......................
Loading User Symbols
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, 102e5930c, 8, 102e5930c}

Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: 0000000102e5930c, The address that the exception occurred at
Arg3: 0000000000000008, Parameter 0 of the exception
Arg4: 0000000102e5930c, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".

FAULTING_IP: 
+325952f00e8dfdc
00000001`02e5930c ??              ???

EXCEPTION_PARAMETER1:  0000000000000008

EXCEPTION_PARAMETER2:  0000000102e5930c

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb70e0
 0000000102e5930c 

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff88002fd5bd8 -- (.exr 0xfffff88002fd5bd8)
ExceptionAddress: 0000000102e5930c
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000008
   Parameter[1]: 0000000102e5930c
Attempt to execute non-executable address 0000000102e5930c

TRAP_FRAME:  fffff88002fd5c80 -- (.trap 0xfffff88002fd5c80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8000c2b5a0
rdx=fffff8a000c2b4e0 rsi=0000000000000000 rdi=0000000000000000
rip=0000000102e5930c rsp=fffff88002fd5e10 rbp=0000000000000000
 r8=0000000000000000  r9=fffff8a000c2b4e0 r10=fffff8a000c2b4e0
r11=fffff88002fd5c60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
00000001`02e5930c ??              ???
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ab9929 to fffff80002a7f600

STACK_TEXT:  
fffff880`02fd5408 fffff800`02ab9929 : 00000000`0000001e ffffffff`c0000005 00000001`02e5930c 00000000`00000008 : nt!KeBugCheckEx
fffff880`02fd5410 fffff800`02a7ec42 : fffff880`02fd5bd8 00000000`00000008 fffff880`02fd5c80 fffff880`00000000 : nt!KiDispatchException+0x1b9
fffff880`02fd5aa0 fffff800`02a7d7ba : 00000000`00000008 00000000`00000008 00000000`00000000 fffffa80`00c9d040 : nt!KiExceptionDispatch+0xc2
fffff880`02fd5c80 00000001`02e5930c : ffffffff`8000015c 00000000`00100000 00000000`001d0000 ffffffff`8000004c : nt!KiPageFault+0x23a
fffff880`02fd5e10 ffffffff`8000015c : 00000000`00100000 00000000`001d0000 ffffffff`8000004c fffff880`00000005 : 0x1`02e5930c
fffff880`02fd5e18 00000000`00100000 : 00000000`001d0000 ffffffff`8000004c fffff880`00000005 00001f80`00000000 : 0xffffffff`8000015c
fffff880`02fd5e20 00000000`001d0000 : ffffffff`8000004c fffff880`00000005 00001f80`00000000 00000000`00000051 : 0x100000
fffff880`02fd5e28 ffffffff`8000004c : fffff880`00000005 00001f80`00000000 00000000`00000051 0000007f`ffffffff : 0x1d0000
fffff880`02fd5e30 fffff880`00000005 : 00001f80`00000000 00000000`00000051 0000007f`ffffffff 00000980`00000000 : 0xffffffff`8000004c
fffff880`02fd5e38 00001f80`00000000 : 00000000`00000051 0000007f`ffffffff 00000980`00000000 00000000`00000001 : 0xfffff880`00000005
fffff880`02fd5e40 00000000`00000051 : 0000007f`ffffffff 00000980`00000000 00000000`00000001 fffff880`00000030 : 0x1f80`00000000
fffff880`02fd5e48 0000007f`ffffffff : 00000980`00000000 00000000`00000001 fffff880`00000030 00000000`00000000 : 0x51
fffff880`02fd5e50 00000980`00000000 : 00000000`00000001 fffff880`00000030 00000000`00000000 fffff880`02fd6080 : 0x7f`ffffffff
fffff880`02fd5e58 00000000`00000001 : fffff880`00000030 00000000`00000000 fffff880`02fd6080 fffff880`00000240 : 0x980`00000000
fffff880`02fd5e60 fffff880`00000030 : 00000000`00000000 fffff880`02fd6080 fffff880`00000240 00000000`00000000 : 0x1
fffff880`02fd5e68 00000000`00000000 : fffff880`02fd6080 fffff880`00000240 00000000`00000000 00000000`00000000 : 0xfffff880`00000030


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiDispatchException+1b9
fffff800`02ab9929 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiDispatchException+1b9

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb

FAILURE_BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9

BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9

Followup: MachineOwner
---------

1: kd> lmtsmn
start             end                 module name
fffff880`00f22000 fffff880`00f79000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03a6d000 fffff880`03af7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`01143000 fffff880`0114e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`01105000 fffff880`0110e000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0110e000 fffff880`01138000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`00fea000 fffff880`00ff6000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
fffff880`03f8f000 fffff880`03fa0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cfb000 fffff880`00dbb000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c9d000 fffff880`00cfb000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`014d3000 fffff880`01546000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`00fe1000 fffff880`00fea000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`01480000 fffff880`0148e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`03eee000 fffff880`03f71000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`03f71000 fffff880`03f8f000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03bbf000 fffff880`03bce000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0149a000 fffff880`014a3000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`0148e000 fffff880`0149a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`014a3000 fffff880`014b6000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`03c03000 fffff880`03cf7000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`03cf7000 fffff880`03d3d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0119a000 fffff880`011ae000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0114e000 fffff880`0119a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01557000 fffff880`01561000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`01781000 fffff880`017cb000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02feb000 fffff800`03034000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`017f5000 fffff880`017fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0400b000 fffff880`045effe0   igdkmd64 igdkmd64.sys Wed Sep 23 15:22:57 2009 (4ABA7591)
fffff880`010d3000 fffff880`010db000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03fc6000 fffff880`03fdc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff800`00ba2000 fffff800`00bac000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`013de000 fffff880`013f8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01756000 fffff880`01781000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`00c45000 fffff880`00c89000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`010eb000 fffff880`01105000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`011ae000 fffff880`011db000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
fffff880`01138000 fffff880`01143000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`01067000 fffff880`01072000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f82000 fffff880`00f8c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03a5d000 fffff880`03a68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`017e3000 fffff880`017f5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`01604000 fffff880`016f6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03b81000 fffff880`03b90000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03af7000 fffff880`03b3c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`016f6000 fffff880`01756000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`00e15000 fffff880`00e26000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03a51000 fffff880`03a5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a0f000 fffff800`02feb000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
fffff880`0123b000 fffff880`013de000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`014b6000 fffff880`014bf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03b45000 fffff880`03b6b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fcc000 fffff880`00fe1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f8c000 fffff880`00fbf000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`010db000 fffff880`010eb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01546000 fffff880`01557000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00c89000 fffff880`00c9d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03a00000 fffff880`03a51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`015f7000 fffff880`01600000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0122a000 fffff880`01233000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0105e000 fffff880`01067000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`015ad000 fffff880`015e7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`017db000 fffff880`017e3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`00e44000 fffff880`00e51000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`00e26000 fffff880`00e44000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03bab000 fffff880`03bbf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff880`03fa0000 fffff880`03fc6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03d3d000 fffff880`03d4a000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00fbf000 fffff880`00fcc000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`014bf000 fffff880`014cd000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`011db000 fffff880`01200000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`017cb000 fffff880`017db000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01077000 fffff880`010d3000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01561000 fffff880`015ad000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03b6b000 fffff880`03b81000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`03b90000 fffff880`03bab000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`015e7000 fffff880`015f7000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e6f000 fffff880`00f13000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f13000 fffff880`00f22000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03b3c000 fffff880`03b45000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`00f79000 fffff880`00f82000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
My System SpecsSystem Spec
27 Jul 2010   #27
Elis

Windows 7 Pro
 
 

okay, so what do i do next?
My System SpecsSystem Spec
27 Jul 2010   #28
Jonathan_King

Windows 7 Professional x64
 
 

If you have updated those drivers, just use your computer normally and hope the BSODs go away. If they don't, post the new dumps, but we will run some hardware tests most likely, because I don't see any more software causes.
My System SpecsSystem Spec
28 Jul 2010   #29
Elis

Windows 7 Pro
 
 

Hi, ran the verifier again with the following result.

If it is the broadcom ethernet driver that is causing the trouble, can i just disable it in the bios as i have no real need for it as my laptop has wifi?

Elis
My System SpecsSystem Spec
28 Jul 2010   #30
Jonathan_King

Windows 7 Professional x64
 
 

That dump wasn't too specific. All it say is that you have a bad driver somewhere.

Yes, go right ahead and disable the ethernet adapter in the BIOS.

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\DOCUME~1\JK\LOCALS~1\Temp\Temporary Directory 4 for minidump.zip\072810-19110-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a58000 PsLoadedModuleList = 0xfffff800`02c95e50
Debug session time: Wed Jul 28 06:09:34.505 2010 (GMT-4)
System Uptime: 0 days 0:07:20.565
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {3, fffffa8000c10da0, f060a060a060a06, 2d7502838402820}

Probably caused by : Pool_Corruption ( nt!ExFreePool+536 )

Followup: Pool_corruption
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8000c10da0, the pool entry being checked.
Arg3: 0f060a060a060a06, the read back flink freelist value (should be the same as 2).
Arg4: 02d7502838402820, the read back blink freelist value (should be the same as 2).

Debugging Details:
------------------


BUGCHECK_STR:  0x19_3

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002bfbd6f to fffff80002ac8600

STACK_TEXT:  
fffff880`02313038 fffff800`02bfbd6f : 00000000`00000019 00000000`00000003 fffffa80`00c10da0 0f060a06`0a060a06 : nt!KeBugCheckEx
fffff880`02313040 fffff800`02d8c5f5 : 00000000`00000002 00000000`03320000 00000000`00000001 00000000`00000000 : nt!ExFreePool+0x536
fffff880`02313130 fffff800`02dc48d1 : fffff8a0`02ca4e10 fffff880`02313340 00000000`00000115 00000000`00000001 : nt!MiRelocateImage+0x345
fffff880`023132a0 fffff800`02db9b83 : fffff880`02313500 00000000`00000000 fffff880`023135a8 00000000`00000001 : nt!MmCreateSection+0x825
fffff880`023134b0 fffff800`02f24d75 : fffff8a0`0304b7d8 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x162
fffff880`02313530 fffff800`02f25127 : 00000000`00000010 fffff8a0`030a7250 fffff880`023136c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
fffff880`02313620 fffff800`02f25557 : fffff880`02313740 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
fffff880`02313710 fffff800`02f2597f : 0000006d`e83b8119 fffffa80`0144bb30 fffff8a0`03187000 00000000`00000000 : nt!PfSnPrefetchScenario+0x187
fffff880`02313980 fffff800`02d1e11f : 00000000`00000000 00000000`18acfcff fffffa80`031c9910 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
fffff880`02313a50 fffff800`02d97130 : fffffa80`0368db60 fffffa80`031c9910 00000000`14050800 00000000`7efde000 : nt! ?? ::NNGAKEGL::`string'+0x503f0
fffff880`02313a80 fffff800`02aa6c35 : fffff800`02c42e80 00000000`00000000 fffff800`02d97034 fffffa80`0368db60 : nt!PspUserThreadStartup+0xfc
fffff880`02313ae0 fffff800`02aa6bb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
fffff880`02313c20 00000000`77b83000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`0008f948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b83000


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!ExFreePool+536
fffff800`02bfbd6f cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!ExFreePool+536

FOLLOWUP_NAME:  Pool_corruption

IMAGE_NAME:  Pool_Corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: Pool_Corruption

FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExFreePool+536

BUCKET_ID:  X64_0x19_3_nt!ExFreePool+536

Followup: Pool_corruption
---------
My System SpecsSystem Spec
Reply

 ntoskrnl.exe causing BSOD Windows 7




Thread Tools Search this Thread
Search this Thread:

Advanced Search




Similar help and support threads
Thread Forum
ntoskrnl.exe+75bc0 Causing multiple BSOD
This is a 4 month old build, that has been plagued by this kernel. 16BG of Kingston extreme ram, Intel I7 4790K processor, Gigabyte Motherboard and a later added EVGA 4GB video card. All inside of a corsair 750 case and 750W PS. I do have an Associates in Networking and computer tech but I have...
BSOD Help and Support
New GPU causing 'ntoskrnl' BSOD randomly
I recently purchased a Gigabyte R9 290X which i installed into my custom built computer to replace the R9 270X. The previous card ran fine and i had no problems with. Obviously before installing the new card i ran DDU (Display driver uninstaller) to remove the previous drivers. After installing and...
BSOD Help and Support
BSOD when playing BF3. ntoskrnl.exe seems to be causing it?
Hello all, Relative computer noob that somehow built his own computer a few years ago lol. Recently I have been getting the dreaded BSOD almost everytime I play BF3, and I am finally deciding to try to get some help on the matter. The causes seem to vary however I've noticed that ntoskrnl.exe...
BSOD Help and Support
ntoskrnl.exe causing BSOD
Hi, I've had 2 bsods and one of them was irql_not_less_or_equal and the second was system service exception. They have this common thing which is ntoskrnl.exe and i dont know what do to solve the problem i hope you can help. You can see all the info in the rar included.
BSOD Help and Support
ntoskrnl.exe causing BSOD
I keep getting a BSOD. I get a message that pops up when the computer restarts that says: Problem signature: Problem Event Name: BlueScreen OS Version: 6.1.7600.2.0.0.256.1 Locale ID: 1033 Additional information about the problem: BCCode: 124 BCP1: 00000000
BSOD Help and Support
ntoskrnl.exe causing a lot of BSOD
i'm getting a lot of BSOD causing by ntoskrnl.exe. i think it's not a hardware problem because when i use ubuntu i dont get any hardware problem causing system to restart or hang. here is all my BSOD details with minidumps hope someone help me. ...
BSOD Help and Support


Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 08:27.

Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App