New
#61
Sorry to hear that. It was a good try. :) I think that a new card will go a long way toward solving the problem. Keep us posted.
Sorry to hear that. It was a good try. :) I think that a new card will go a long way toward solving the problem. Keep us posted.
fresh re-format. again :)
i do NOT have new card, everything is still the same, one bsod. please take a look at files
Since you reformatted and did a clean install, this more than ever points to hardware. You have tested your RAM and your hard drive. I looked at all four dumps. All pointed to memory or memory corruption. Add to this your uptimes were not very long before your system crashed.
Error code 1A, MEMORY_MANAGEMENT - usually caused by a device driver, memory, kernel.
Error code 7E, SYSTEM_THREAD_EXCEPTION_NOT_HANDLED - Insufficient disk space, Device driver, Video card, BIOS, Breakpoint with no debugger attached, Hardware incompatibility, Faulty system service, Memory, 3rd party remote control.
Error code 3B, SYSTEM_SERVICE_EXCEPTION - System service, Device driver, graphics driver, ?memory.
Start with uninstalling in CD/DVD program such as Deamon Tools or Alcohol.. I found the driver sptd.sys on your system. This driver is an almost guaranteed cause of crashes. When you have finished uninstalling the software, download and run this tool: DuplexSecure - DownloadsCode:Kernel base = 0xfffff800`02a0e000 PsLoadedModuleList = 0xfffff800`02c4be50 Debug session time: Mon Sep 6 12:46:58.341 2010 (GMT-4) System Uptime: 0 days 3:27:39.713 Loading Kernel Symbols ............................................................... ................................................................ .................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1A, {5003, fffff70001080000, b43b, bf6100016872} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+29fd7 ) Followup: MachineOwner --------- 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined. Arguments: Arg1: 0000000000005003, The subtype of the bugcheck. Arg2: fffff70001080000 Arg3: 000000000000b43b Arg4: 0000bf6100016872 Debugging Details: ------------------ BUGCHECK_STR: 0x1a_5003 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: firefox.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002aefa08 to fffff80002a7ff00 STACK_TEXT: fffff880`094d99c8 fffff800`02aefa08 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0000b43b : nt!KeBugCheckEx fffff880`094d99d0 fffff800`02a9a1a6 : 00000000`00000001 00000000`0d28a000 fffff880`094d9c20 fffff680`00069450 : nt! ?? ::FNODOBFM::`string'+0x29fd7 fffff880`094d9ac0 fffff800`02a7dfee : 00000000`00000001 00000000`0d289ffc 00000000`0f340d01 00000000`0014b568 : nt!MmAccessFault+0x5c6 fffff880`094d9c20 00000000`705f872e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e 00000000`0014b420 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x705f872e STACK_COMMAND: kb FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+29fd7 fffff800`02aefa08 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+29fd7 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 FAILURE_BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29fd7 BUCKET_ID: X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+29fd7 Followup: MachineOwner --------- System Uptime: 0 days 0:19:49.556 Unable to load image Unknown_Module_c66878db`85fff86d, Win32 error 0n2 *** WARNING: Unable to verify timestamp for Unknown_Module_c66878db`85fff86d *** ERROR: Module load completed but symbols could not be loaded for Unknown_Module_c66878db`85fff86d Debugger can not determine kernel base address Loading Kernel Symbols . Loading User Symbols ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 7E, {ffffffffc0000005, fffff80002a84b5c, fffff8800338dfd8, fffff8800338d830} ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002a84b5c, The address that the exception occurred at Arg3: fffff8800338dfd8, Exception Record Address Arg4: fffff8800338d830, Context Record Address Debugging Details: ------------------ ***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057. EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: +5dfa952f01ecdf90 fffff800`02a84b5c 0fb742c0 movzx eax,word ptr [rdx-40h] EXCEPTION_RECORD: fffff8800338dfd8 -- (.exr 0xfffff8800338dfd8) Cannot read Exception record @ fffff8800338dfd8 CONTEXT: fffff8800338d830 -- (.cxr 0xfffff8800338d830) Unable to read context, Win32 error 0n30 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x7E CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002ae5a3a to fffff880045859c2 STACK_TEXT: fffff800`041e6c98 fffff800`02ae5a3a : 00000000`0023c380 fffffa80`043558a8 fffff800`02c5ec40 00000000`00000001 : 0xfffff880`045859c2 fffff800`041e6ca0 00000000`0023c380 : fffffa80`043558a8 fffff800`02c5ec40 00000000`00000001 fffff800`02c50e80 : 0xfffff800`02ae5a3a fffff800`041e6ca8 fffffa80`043558a8 : fffff800`02c5ec40 00000000`00000001 fffff800`02c50e80 fffff800`02ae3697 : 0x23c380 fffff800`041e6cb0 fffff800`02c5ec40 : 00000000`00000001 fffff800`02c50e80 fffff800`02ae3697 00000000`a6381606 : 0xfffffa80`043558a8 fffff800`041e6cb8 00000000`00000001 : fffff800`02c50e80 fffff800`02ae3697 00000000`a6381606 00000000`a63815fa : 0xfffff800`02c5ec40 fffff800`041e6cc0 fffff800`02c50e80 : fffff800`02ae3697 00000000`a6381606 00000000`a63815fa 00000000`a6381606 : 0x1 fffff800`041e6cc8 fffff800`02ae3697 : 00000000`a6381606 00000000`a63815fa 00000000`a6381606 00000000`000000dd : 0xfffff800`02c50e80 fffff800`041e6cd0 00000000`a6381606 : 00000000`a63815fa 00000000`a6381606 00000000`000000dd fffffa80`04355810 : 0xfffff800`02ae3697 fffff800`041e6cd8 00000000`a63815fa : 00000000`a6381606 00000000`000000dd fffffa80`04355810 400000c2`400000c1 : 0xa6381606 fffff800`041e6ce0 00000000`a6381606 : 00000000`000000dd fffffa80`04355810 400000c2`400000c1 00000009`400000c3 : 0xa63815fa fffff800`041e6ce8 00000000`000000dd : fffffa80`04355810 400000c2`400000c1 00000009`400000c3 00000000`a0d3b1bf : 0xa6381606 fffff800`041e6cf0 fffffa80`04355810 : 400000c2`400000c1 00000009`400000c3 00000000`a0d3b1bf fffff800`041e0080 : 0xdd fffff800`041e6cf8 400000c2`400000c1 : 00000009`400000c3 00000000`a0d3b1bf fffff800`041e0080 fffffa80`024b89e0 : 0xfffffa80`04355810 fffff800`041e6d00 00000009`400000c3 : 00000000`a0d3b1bf fffff800`041e0080 fffffa80`024b89e0 00000000`00000000 : 0x400000c2`400000c1 fffff800`041e6d08 00000000`a0d3b1bf : fffff800`041e0080 fffffa80`024b89e0 00000000`00000000 00000298`89153075 : 0x9`400000c3 fffff800`041e6d10 fffff800`041e0080 : fffffa80`024b89e0 00000000`00000000 00000298`89153075 00000298`891538af : 0xa0d3b1bf fffff800`041e6d18 fffffa80`024b89e0 : 00000000`00000000 00000298`89153075 00000298`891538af fffff800`02c5ec40 : 0xfffff800`041e0080 fffff800`041e6d20 00000000`00000000 : 00000298`89153075 00000298`891538af fffff800`02c5ec40 fffff800`041e0080 : 0xfffffa80`024b89e0 STACK_COMMAND: kb SYMBOL_NAME: ANALYSIS_INCONCLUSIVE FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: CORRUPT_MODULELIST Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\090710-21996-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02a5c000 PsLoadedModuleList = 0xfffff800`02c99e50 Debug session time: Tue Sep 7 00:06:35.906 2010 (GMT-4) System Uptime: 0 days 0:06:59.841 Loading Kernel Symbols ............................................................... ................................................................ ................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff80002dc6ac1, fffff8800622bab0, 0} Probably caused by : ntkrnlmp.exe ( nt!ObpWaitForMultipleObjects+186 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80002dc6ac1, Address of the exception record for the exception that caused the bugcheck Arg3: fffff8800622bab0, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!ObpWaitForMultipleObjects+186 fffff800`02dc6ac1 488b4a20 mov rcx,qword ptr [rdx+20h] CONTEXT: fffff8800622bab0 -- (.cxr 0xfffff8800622bab0) rax=0000000000000000 rbx=fffff8a000fefb00 rcx=fffff80002a5c000 rdx=0000000000000000 rsi=000000000000003a rdi=fffffa800597f010 rip=fffff80002dc6ac1 rsp=fffff8800622c490 rbp=fffff8800622cca0 r8=0000000000000008 r9=fffff8a001010000 r10=fffffa800565c6d0 r11=fffffffffffffd80 r12=fffff8800622cb68 r13=fffff8a000e43400 r14=0000000000000039 r15=0000000000000040 iopl=0 nv up ei pl nz na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206 nt!ObpWaitForMultipleObjects+0x186: fffff800`02dc6ac1 488b4a20 mov rcx,qword ptr [rdx+20h] ds:002b:00000000`00000020=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002dc6ac1 STACK_TEXT: fffff880`0622c490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpWaitForMultipleObjects+0x186 FOLLOWUP_IP: nt!ObpWaitForMultipleObjects+186 fffff800`02dc6ac1 488b4a20 mov rcx,qword ptr [rdx+20h] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!ObpWaitForMultipleObjects+186 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 STACK_COMMAND: .cxr 0xfffff8800622bab0 ; kb FAILURE_BUCKET_ID: X64_0x3B_nt!ObpWaitForMultipleObjects+186 BUCKET_ID: X64_0x3B_nt!ObpWaitForMultipleObjects+186 Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Owner\Downloads\A-Rar\090710-22323-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*Symbol information Executable search path is: Windows 7 Kernel Version 7600 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c97e50 Debug session time: Mon Sep 6 23:09:26.537 2010 (GMT-4) System Uptime: 0 days 0:18:00.472 Loading Kernel Symbols ............................................................... ................................................................ ................. Loading User Symbols Loading unloaded module list ...... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 1000007E, {ffffffffc0000005, fffff80002b132d4, fffff880009a99d8, fffff880009a9230} Probably caused by : memory_corruption ( nt!MmZeroPageThread+823 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Some common problems are exception code 0x80000003. This means a hard coded breakpoint or assertion was hit, but this system was booted /NODEBUG. This is not supposed to happen as developers should never have hardcoded breakpoints in retail code, but ... If this happens, make sure a debugger gets connected, and the system is booted /DEBUG. This will let us see why this breakpoint is happening. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff80002b132d4, The address that the exception occurred at Arg3: fffff880009a99d8, Exception Record Address Arg4: fffff880009a9230, Context Record Address Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MmZeroPageThread+823 fffff800`02b132d4 4d8b3f mov r15,qword ptr [r15] EXCEPTION_RECORD: fffff880009a99d8 -- (.exr 0xfffff880009a99d8) ExceptionAddress: fffff80002b132d4 (nt!MmZeroPageThread+0x0000000000000823) ExceptionCode: c0000005 (Access violation) ExceptionFlags: 00000000 NumberParameters: 2 Parameter[0]: 0000000000000000 Parameter[1]: ffffffffffffffff Attempt to read from address ffffffffffffffff CONTEXT: fffff880009a9230 -- (.cxr 0xfffff880009a9230) rax=0000000000000000 rbx=fa80044b716004c0 rcx=fffff880009a9ba8 rdx=0000000000000001 rsi=000000000009340d rdi=0000000000000002 rip=fffff80002b132d4 rsp=fffff880009a9c10 rbp=0000000000000000 r8=fffffa8000e06670 r9=0000000000000000 r10=fffff80002d04400 r11=fffff880009a9be0 r12=0000000000000000 r13=0000000000000000 r14=0000058000000000 r15=fa80044b716004c0 iopl=0 nv up ei ng nz ac pe cy cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293 nt!MmZeroPageThread+0x823: fffff800`02b132d4 4d8b3f mov r15,qword ptr [r15] ds:002b:fa80044b`716004c0=???????????????? Resetting default scope CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: System CURRENT_IRQL: 0 ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. EXCEPTION_PARAMETER1: 0000000000000000 EXCEPTION_PARAMETER2: ffffffffffffffff READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d020e0 ffffffffffffffff FOLLOWUP_IP: nt!MmZeroPageThread+823 fffff800`02b132d4 4d8b3f mov r15,qword ptr [r15] BUGCHECK_STR: 0x7E LAST_CONTROL_TRANSFER: from fffff80002d6f166 to fffff80002b132d4 STACK_TEXT: fffff880`009a9c10 fffff800`02d6f166 : fffffa80`024b93b0 00000000`00000080 fffffa80`024b9890 fffff800`02aaa479 : nt!MmZeroPageThread+0x823 fffff880`009a9d40 fffff800`02aaa486 : fffff800`02c44e80 fffffa80`024b93b0 fffff800`02c52c40 00060b01`30025003 : nt!PspSystemThreadStartup+0x5a fffff880`009a9d80 00000000`00000000 : fffff880`009aa000 fffff880`009a4000 fffff880`009a99b0 00000000`00000000 : nt!KxStartSystemThread+0x16 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MmZeroPageThread+823 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 STACK_COMMAND: .cxr 0xfffff880009a9230 ; kb IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x7E_nt!MmZeroPageThread+823 BUCKET_ID: X64_0x7E_nt!MmZeroPageThread+823 Followup: MachineOwner ---------
Do not choose the reinstall option, choose delete to remove all traces of sptd.
One of the dumps indicated this driver was involved in the crash and it is way out of date.
nvm62x64.sys Fri Oct 17 17:01:06 2008 - nVidia Ethernet Networking Driver (nForce chipset driver) Drivers - Download NVIDIA Drivers. See if you can update this driver. I really suggest you upgrade your network adapter card.
I also find you still have other obsolete drivers. Win 7 does not like out of date drivers. They can and do cause conflicts, memory corruption and crashes. All of your dumps pointed to memory corruption.
nvstor.sys Wed May 20 02:45:37 2009 - this is a chipset driver and there may not be an update. nVidia Storage Drivers Drivers - Download NVIDIA Drivers
SI3132.sys Wed Oct 03 14:39:29 2007 - Silicon Image driver Silicon Image - Support. This software is obsolete. If you cannot update the drivers, uninstall it.
SiWinAcc.sys Thu Jun 14 20:02:02 2007 - Silicon Image driver - comes with package for the SIxxxx drivers Silicon Image - Support. The process Windows Accelerator Driver belongs to the software SATALink Accelerator Driver or SiWinAcc or SATALink Windows Accelerator by Silicon Image, Inc. See above.
Follow the suggestions above and get your system cleaned up and reboot. Post back when you have done this and lets see how your system runs.
thanks for response
1. i didn't install any cd virtualization programs. i didn't even install it last time i was reformatting windows one month ago, so i don't know how did this driver came in! even so, i followed your advice and installed that duplexsecure, but when i run it, it says "no SPTD version was detected. select action to be performed" and i have "install" only, "uninstall" button is gray...
2. i don't get it, which device is that nvidia ethernet that you mentioned? cause i have realtek (integrated) network card, fully upgraded to june 2010. which device is that nvm62x64.sys? google says it is 64bit driver (my OS is win7 32bit)! but i don't know which device is that.
sry for bad english! :)
Kuleee, I am so sorry; I discovered that I clicked on another dump from someone else by accident. I apologize. Your English is fine; my eyesight must be bad.
OK, here is your dump.
Error code 4E, PFN_LIST_CORRUPT - usual causes are Device driver, ?memory.
This a hardware/hardware related problem. eamon.sys is shown in the dump stack and mentioned in the text. eamon.sys is a driver for Eset NOD 32. This indicates that Eset was involved in the crash; it does not say that Eset caused the crash. Based on the dump and that Eset is known to cause problems on some Win 7 systems, I suggest that you uninstall it using this tool: Info > Tool. Install Microsoft Security Essentials and make sure Windows Firewall is enabled.Code:Kernel base = 0x82840000 PsLoadedModuleList = 0x8297f570 Debug session time: Wed Sep 8 05:55:19.139 2010 (GMT-4) System Uptime: 0 days 0:27:16.139 Loading Kernel Symbols ............................................................... ................................................................ ............. Loading User Symbols Loading unloaded module list ..... 0: kd> !Analyze ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 4E, {7, 165b0, 1, 0} *** WARNING: Unable to verify timestamp for eamon.sys *** ERROR: Module load completed but symbols could not be loaded for eamon.sys Probably caused by : memory_corruption ( nt!MiPfnReferenceCountIsZero+1e ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PFN_LIST_CORRUPT (4e) Typically caused by drivers passing bad memory descriptor lists (ie: calling MmUnlockPages twice with the same list, etc). If a kernel debugger is available get the stack trace. Arguments: Arg1: 00000007, A driver has unlocked a page more times than it locked it Arg2: 000165b0, page frame number Arg3: 00000001, current share count Arg4: 00000000, 0 Debugging Details: ------------------ BUGCHECK_STR: 0x4E_7 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT PROCESS_NAME: WinSAT.exe CURRENT_IRQL: 2 LAST_CONTROL_TRANSFER: from 828e6a52 to 82911574 STACK_TEXT: 9f3908b4 828e6a52 0000004e 00000007 000165b0 nt!KeBugCheckEx+0x1e 9f3908d4 828bff98 000165b0 86a205b0 83e18888 nt!MiPfnReferenceCountIsZero+0x1e 9f3908f0 828db1fe 00000000 00040000 8597560a nt!MiRemoveLockedPageChargeAndDecRef+0x153 9f390944 828ea425 00000000 00000000 02390960 nt!MiWaitForInPageComplete+0x731 9f390964 828ee457 860778e4 00000000 00000000 nt!MiPfCompletePrefetchIos+0x6b 9f390980 828e19b0 8551dee0 00100000 85a3e600 nt!MmWaitForCacheManagerPrefetch+0x1b 9f3909ac 82aa2763 85a3e600 00000001 9f390a24 nt!CcFetchDataForRead+0xa4 9f3909ec 82a98872 85a3e600 00500000 00000000 nt!CcMapAndCopyFromCache+0x71 9f390a2c 8c836c8b 85a3e600 9f390a70 00100000 nt!CcCopyRead+0x107 9f390a58 8c834541 8592f628 85a3e600 85905bb8 Ntfs!NtfsCachedRead+0x13e 9f390b34 8c837bae 8592f628 85905bb8 13bcd04c Ntfs!NtfsCommonRead+0x11a1 9f390ba4 8286ef44 85fe0020 85905bb8 85905bb8 Ntfs!NtfsFsdRead+0x279 9f390bbc 8c77320c 85fd4578 85905bb8 00000000 nt!IofCallDriver+0x63 9f390be0 8c7733cb 9f390c00 85fd4578 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2aa 9f390c18 8286ef44 85fd4578 85905bb8 85905dd8 fltmgr!FltpDispatch+0xc5 9f390c30 ab443253 85a3e600 8567ab50 00000000 nt!IofCallDriver+0x63 WARNING: Stack unwind information not available. Following frames may be wrong. 9f390c44 8286ef44 8567ab50 85905bb8 85905bb8 eamon+0x5253 9f390c5c 82a44307 85905bb8 85905db4 85a3e600 nt!IofCallDriver+0x63 9f390c7c 82a451ee 8567ab50 85a3e600 00000001 nt!IopSynchronousServiceTail+0x1f8 9f390d08 8287579a 8567ab50 85905bb8 00000000 nt!NtReadFile+0x644 9f390d08 772b64f4 8567ab50 85905bb8 00000000 nt!KiFastCallEntry+0x12a 036af138 00000000 00000000 00000000 00000000 0x772b64f4 STACK_COMMAND: kb FOLLOWUP_IP: nt!MiPfnReferenceCountIsZero+1e 828e6a52 cc int 3 SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt!MiPfnReferenceCountIsZero+1e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c3f9b IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: 0x4E_7_nt!MiPfnReferenceCountIsZero+1e BUCKET_ID: 0x4E_7_nt!MiPfnReferenceCountIsZero+1e Followup: MachineOwner --------- 0: kd> lmtsmn start end module name 8c613000 8c65b000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 8cf86000 8cfe0000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62) 93a9d000 93aaf000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954) 8c764000 8c76d000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 8c738000 8c741000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8c741000 8c764000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 93430000 93884000 atikmdag atikmdag.sys Fri Apr 24 06:50:20 2009 (49F1996C) 8cef2000 8cef9000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 92ca9000 92cb7000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8c49f000 8c4a7000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 9cc98000 9ccb1000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD) 97fd0000 97fee000 cdd cdd.dll Mon Jul 13 21:04:18 2009 (4A5BD992) 8cecc000 8ceeb000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C) 8c4e9000 8c594000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 8ce75000 8ce9a000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 8c4a7000 8c4e9000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 8c98c000 8c9e9000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 93a90000 93a9d000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716) 92c0b000 92c18000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 92c2d000 92c91000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC) 92c91000 92ca9000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8) 8cbd4000 8cbe0000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214) 8ce64000 8ce75000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 93bdd000 93bf6000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5) 92c23000 92c2c000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 92c18000 92c23000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 8ce9a000 8ceab000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 8ceab000 8ceb5000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 93884000 9393b000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1) 9393b000 93974000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265) ab43e000 ab50a000 eamon eamon.sys Fri Sep 11 01:12:15 2009 (4AA9DC2F) 9cf1c000 9cf39000 ehdrv ehdrv.sys Fri Sep 11 01:12:49 2009 (4AA9DC51) 9cf39000 9cf53000 epfwwfpr epfwwfpr.sys Fri Sep 11 01:07:03 2009 (4AA9DAF7) 8c7a1000 8c7b2000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 8c76d000 8c7a1000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 8c9f7000 8ca00000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 8ce32000 8ce64000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D) 8cd6c000 8cd9d000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 82809000 82840000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 93974000 93993000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F) 92cea000 92d3a000 HdAudio HdAudio.sys Mon Jul 13 19:51:46 2009 (4A5BC892) 92fe6000 92ff9000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865) 93bf6000 93bfc480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863) 92fdb000 92fe6000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868) 9cc13000 9cc98000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75) 8ce2a000 8ce32000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 93a54000 93a6c000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B) 92cd8000 92cea000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07) 93a6c000 93a79000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 80bb9000 80bc1000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 93b46000 93b7a000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709) 8c979000 8c98c000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 8caf5000 8cb1a000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6) 8c800000 8c810000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE) 8cbe0000 8cbfb000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020) 8c416000 8c48e000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21) 8ceb5000 8cec0000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286) 93a79000 93a86000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 92c00000 92c0b000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 8c722000 8c738000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 9ccb1000 9ccc3000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4) 9ccc3000 9cce6000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72) 9cce6000 9cd21000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85) 9cd21000 9cd3c000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B) 8cf4b000 8cf56000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 8c664000 8c66c000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 8c94e000 8c979000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F) 8cbca000 8cbd4000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 8ce1a000 8ce2a000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 8ca00000 8cab7000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 93ac7000 93ad2000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930) 93ad2000 93af4000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A) 93bcc000 93bdd000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933) 8cfe7000 8cff5000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912) 8cb1a000 8cb4c000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52) 8cab7000 8caf5000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 8cf56000 8cf64000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 8cff5000 8cfff000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48) 82840000 82c40000 nt ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B) 8c81f000 8c94e000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 8ceeb000 8cef2000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10) 8cc00000 8cc1f000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916) 93a3c000 93a54000 parport parport.sys Mon Jul 13 19:45:34 2009 (4A5BC71E) 8c6a1000 8c6b2000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 9cd3c000 9cd43000 parvdm parvdm.sys Mon Jul 13 19:45:29 2009 (4A5BC719) 8c66c000 8c696000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 8c70d000 8c714000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 8c714000 8c722000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 8c9e9000 8c9f7000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 9cd43000 9cdda000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0) 93400000 9342f000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864) 8c48e000 8c49f000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 93aaf000 93ac7000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939) 93af4000 93b0c000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D) 93b0c000 93b23000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947) 93b23000 93b3a000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951) 8cb89000 8cbca000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2) 93b3a000 93b44000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20) 8cf33000 8cf3b000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4) 8cf3b000 8cf43000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3) 8cf43000 8cf4b000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5) 8cded000 8ce1a000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 8c7b2000 8c7c5000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0) 93993000 939d8000 Rt86win7 Rt86win7.sys Wed Jun 23 05:10:23 2010 (4C21CF7F) 92d3a000 92fda400 RTKVHDA RTKVHDA.sys Mon Aug 31 06:18:44 2009 (4A9BA384) 9cdda000 9cde4000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528) 93a86000 93a90000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717) 8cb4c000 8cb66000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D) 8cde5000 8cded000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB) ab50a000 ab574000 spsys spsys.sys Mon May 11 12:37:10 2009 (4A085436) 9cecb000 9cf1c000 srv srv.sys Mon Jun 21 22:47:32 2010 (4C202444) 9ce7c000 9cecb000 srv2 srv2.sys Mon Jun 21 22:47:19 2010 (4C202437) 9ce4e000 9ce6f000 srvnet srvnet.sys Mon Jun 21 22:47:09 2010 (4C20242D) 93b44000 93b45380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 8cc23000 8cd6c000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB) 9ce6f000 9ce7c000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926) 8cf7b000 8cf86000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C) 8cf64000 8cf7b000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A) 8cb79000 8cb89000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 97fa0000 97fa9000 TSDDD TSDDD.dll unavailable (00000000) 92cb7000 92cd8000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B) 93b7a000 93b88000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A) 93bfd000 93bfe700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869) 93a2d000 93a3c000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 93b88000 93bcc000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6) 939d8000 939e2000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 939e2000 93a2d000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871) 8c696000 8c6a1000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 8cef9000 8cf05000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 8cf05000 8cf26000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 8cd9d000 8cda5380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C) 8c6b2000 8c6c2000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8c6c2000 8c70d000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 8cda6000 8cde5000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 8cb66000 8cb79000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956) 8cf26000 8cf33000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 8c594000 8c605000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 8c605000 8c613000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8cfe0000 8cfe7000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 97d40000 97f8a000 win32k win32k.sys Sat Jun 19 00:06:50 2010 (4C1C425A) 8c65b000 8c664000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A) Unloaded modules: 9cde4000 9ce4e000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 8ce9a000 8cea7000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 8cea7000 8ceb2000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 8ceb2000 8cebb000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 8cebb000 8cecc000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000
Troubleshooting is often a process of elimination. We want to eliminate all potential causes of crashes. Once your system is running smoothly, you can try Eset again if you wish. If you start getting BSOD's after reinstalling, you will know it is a cause of crashes.
I also find an outdated driver:
atikmdag.sys Fri Apr 24 06:50:20 2009 - ATI Video driver (remove the Catalyst Control Center and only install the Display Driver)Global Provider of Innovative Graphics, Processors and Media Solutions | AMD. Update this driver.
After you uninstall Eset and update this driver, reboot, post back and let's see what your systems does.
Again, I apologize for my mistake.
i have uninstalled eset and followed your advice. i do have "driver only" for my graphic card, but its definitely not that old! i downloaded august drivers from ATI site. maybe its integrated graphic card that have so old drivers? i tried and downloaded latest drivers for my integrated ATI x1250, they are from february 2010. btw these are not for win7, only for vista. when i try to install them, installation process says that my drivers are up to date, even if i want to update that integrated card. i hope you understand what i was trying to say... anyway, important part is, that i uninstalled NOD 17 hours ago, and still didn't have BSOD. i will let computer work as long as needs to crash (i hope he wont anymore)
:)
Good job and thanks for reporting what you have done. If the drivers are dated July 13, 2009 or later, they are more than likely fine. And I suspect it was the onboard graphics drivers that were out of date.
I sure glad to hear you have not had a BSOD! That is great news. Post back in a couple of days and update us. If you have not had a BSOD, we will ask the moderators to mark this thread as solved. If you have another crash, upload the dump and we will take a look at it. I have my fingers crossed. :)
ok, unfortunately i had 2 bsod's this morning, so take a look in files. these bsod's happen after 28 hours of continuous work
That is not what we wanted to hear. Both dumps are stop error code A.
Error code A, IRQL_NOT_LESS_OR_EQUAL - usually cased by Kernel mode driver, System Service, BIOS, Windows, Virus scanner, Backup tool, compatibility.
The first dump blames ataport.sys and the second blames hardware. Both mention memory. ataport.sys is very likely not the cause; it was affected by something else. I looked through your drivers and found this very obsolete driver:
pcouffin.sys Tue Dec 05 09:39:53 2006 - Patin-Couffin low level access layer for CD devices or low level access layer for CD/DVD/BD devices or VSO Software pcouffin belongs to the software Low level access layer for CD devices or Patin couffin engine or VSO Software pcouffin by VSO Software (www.vso-software.fr). This is an XP driver. The software is obsolete and not compatible with Win 7. Uninstall this software. If there is an updated version of the software compatible with Win 7 available, you may install that.
I can't guarantee this driver is involved in the crash; but I can definitely say it is not helping your system any. After you uninstall the VSO software, reboot and lets see what your system does.
Code:Kernel base = 0x82c08000 PsLoadedModuleList = 0x82d47570 Debug session time: Fri Sep 10 22:24:08.297 2010 (GMT-4) System Uptime: 1 days 5:01:24.297 Loading Kernel Symbols ............................................................... ................................................................ ................... Loading User Symbols Loading unloaded module list ......... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {1, 2, 1, 8300b839} Probably caused by : ataport.SYS ( ataport!DeviceUpdateRequestTimeoutCounter+1e ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000001, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 8300b839, address which referenced memory Debugging Details: ------------------ WORKER_ROUTINE: +5650952f01a7dd54 00000001 ?? ??? WORK_ITEM: 8300b839 CURRENT_IRQL: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: 82d26a84 -- (.trap 0xffffffff82d26a84) ErrCode = 00000002 eax=82d26b04 ebx=8cb6fa01 ecx=85eef4c4 edx=00000001 esi=85eef3f0 edi=85eef3f0 eip=8300b839 esp=82d26af8 ebp=82d26b10 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29: 8300b839 8902 mov dword ptr [edx],eax ds:0023:00000001=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 8300b839 to 82c40b7b STACK_TEXT: 82d26a84 8300b839 badb0d00 00000001 855ec138 nt!KiTrap0E+0x2cf 82d26af4 8cb71d8a 855ec0e0 8cb6fa60 00000000 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29 82d26b10 8cb6facd 85eef3f0 82d26ba0 00000000 ataport!DeviceUpdateRequestTimeoutCounter+0x1e 82d26b38 82c5f497 855ed2b0 015ec028 69ba46d3 ataport!IdePortTickHandler+0x6d 82d26b7c 82c5f43b 82d29d20 82d26ca8 00000004 nt!KiProcessTimerDpcTable+0x50 82d26c68 82c5f2f8 82d29d20 82d26ca8 00000000 nt!KiProcessExpiredTimerList+0x101 82d26cdc 82c5d68e 00660913 85722270 82d33240 nt!KiTimerExpiration+0x25c 82d26d20 82c5d4b8 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb 82d26d24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38 STACK_COMMAND: kb FOLLOWUP_IP: ataport!DeviceUpdateRequestTimeoutCounter+1e 8cb71d8a 8d86d8000000 lea eax,[esi+0D8h] SYMBOL_STACK_INDEX: 2 SYMBOL_NAME: ataport!DeviceUpdateRequestTimeoutCounter+1e FOLLOWUP_NAME: MachineOwner MODULE_NAME: ataport IMAGE_NAME: ataport.SYS DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bbf16 FAILURE_BUCKET_ID: 0xA_ataport!DeviceUpdateRequestTimeoutCounter+1e BUCKET_ID: 0xA_ataport!DeviceUpdateRequestTimeoutCounter+1e Followup: MachineOwner --------- 0: kd> lmtsmn start end module name 8ca38000 8ca80000 ACPI ACPI.sys Mon Jul 13 19:11:11 2009 (4A5BBF0F) 8d372000 8d3cc000 afd afd.sys Mon Jul 13 19:12:34 2009 (4A5BBF62) 93155000 93167000 AgileVpn AgileVpn.sys Mon Jul 13 19:55:00 2009 (4A5BC954) 8cb89000 8cb92000 amdxata amdxata.sys Tue May 19 13:57:35 2009 (4A12F30F) 8cb5d000 8cb66000 atapi atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 8cb66000 8cb89000 ataport ataport.SYS Mon Jul 13 19:11:18 2009 (4A5BBF16) 9381a000 93e3a000 atikmdag atikmdag.sys Tue Aug 03 21:35:57 2010 (4C58C3FD) 930e0000 93119000 atikmpag atikmpag.sys Tue Aug 03 21:15:28 2010 (4C58BF30) 8d2de000 8d2e5000 Beep Beep.SYS Mon Jul 13 19:45:00 2009 (4A5BC6FC) 9309f000 930ad000 blbdrive blbdrive.sys Mon Jul 13 19:23:04 2009 (4A5BC1D8) 8c8c4000 8c8cc000 BOOTVID BOOTVID.dll Mon Jul 13 21:04:34 2009 (4A5BD9A2) 98fa9000 98fc2000 bowser bowser.sys Mon Jul 13 19:14:21 2009 (4A5BBFCD) 9a3c0000 9a3de000 cdd cdd.dll unavailable (00000000) 98ec2000 98ed8000 cdfs cdfs.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 8d2b8000 8d2d7000 cdrom cdrom.sys Mon Jul 13 19:11:24 2009 (4A5BBF1C) 8c90e000 8c9b9000 CI CI.dll Mon Jul 13 21:09:28 2009 (4A5BDAC8) 8d261000 8d286000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:11:20 2009 (4A5BBF18) 8c8cc000 8c90e000 CLFS CLFS.SYS Mon Jul 13 19:11:10 2009 (4A5BBF0E) 8cda2000 8cdff000 cng cng.sys Mon Jul 13 19:32:55 2009 (4A5BC427) 93148000 93155000 CompositeBus CompositeBus.sys Mon Jul 13 19:45:26 2009 (4A5BC716) 98ed8000 98ee5000 crashdmp crashdmp.sys Mon Jul 13 19:45:50 2009 (4A5BC72E) 93023000 93087000 csc csc.sys Mon Jul 13 19:15:08 2009 (4A5BBFFC) 93087000 9309f000 dfsc dfsc.sys Mon Jul 13 19:14:16 2009 (4A5BBFC8) 8cfef000 8cffb000 discache discache.sys Mon Jul 13 19:24:04 2009 (4A5BC214) 8d250000 8d261000 disk disk.sys Mon Jul 13 19:11:28 2009 (4A5BBF20) 93312000 9332b000 drmk drmk.sys Mon Jul 13 20:36:05 2009 (4A5BD2F5) 98ef0000 98ef9000 dump_atapi dump_atapi.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 98ee5000 98ef0000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 98ef9000 98f0a000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:12:47 2009 (4A5BBF6F) 98f0a000 98f14000 Dxapi Dxapi.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 93e3a000 93ef1000 dxgkrnl dxgkrnl.sys Thu Oct 01 20:48:33 2009 (4AC54DE1) 93ef1000 93f2a000 dxgmms1 dxgmms1.sys Mon Jul 13 19:25:25 2009 (4A5BC265) 9eae9000 9eb13000 fastfat fastfat.SYS Mon Jul 13 19:14:01 2009 (4A5BBFB9) 8cbc6000 8cbd7000 fileinfo fileinfo.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) 8cb92000 8cbc6000 fltmgr fltmgr.sys Mon Jul 13 19:11:13 2009 (4A5BBF11) 8ce0d000 8ce16000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:11:14 2009 (4A5BBF12) 8d21e000 8d250000 fvevol fvevol.sys Mon Jul 13 19:13:01 2009 (4A5BBF7D) 8d158000 8d189000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:12:03 2009 (4A5BBF43) 83008000 8303f000 hal halmacpi.dll Mon Jul 13 19:11:03 2009 (4A5BBF07) 93f2a000 93f49000 HDAudBus HDAudBus.sys Mon Jul 13 19:50:55 2009 (4A5BC85F) 93293000 932e3000 HdAudio HdAudio.sys Mon Jul 13 19:51:46 2009 (4A5BC892) 98f1f000 98f32000 HIDCLASS HIDCLASS.SYS Mon Jul 13 19:51:01 2009 (4A5BC865) 98f32000 98f38480 HIDPARSE HIDPARSE.SYS Mon Jul 13 19:50:59 2009 (4A5BC863) 98f14000 98f1f000 hidusb hidusb.sys Mon Jul 13 19:51:04 2009 (4A5BC868) 9332b000 933b0000 HTTP HTTP.sys Mon Jul 13 19:12:53 2009 (4A5BBF75) 8d216000 8d21e000 hwpolicy hwpolicy.sys Mon Jul 13 19:11:01 2009 (4A5BBF05) 93119000 93131000 i8042prt i8042prt.sys Mon Jul 13 19:11:23 2009 (4A5BBF1B) 9ea3f000 9ea47700 ImmunetProtect ImmunetProtect.sys Fri Aug 13 14:23:53 2010 (4C658DB9) 9ea48000 9ea4df80 ImmunetSelfProtect ImmunetSelfProtect.sys Fri Aug 13 14:23:47 2010 (4C658DB3) 930ce000 930e0000 intelppm intelppm.sys Mon Jul 13 19:11:03 2009 (4A5BBF07) 93ff2000 93fff000 kbdclass kbdclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 80bb9000 80bc1000 kdcom kdcom.dll Mon Jul 13 21:08:58 2009 (4A5BDAAA) 931fc000 93230000 ks ks.sys Mon Jul 13 19:45:13 2009 (4A5BC709) 8cd8f000 8cda2000 ksecdd ksecdd.sys Mon Jul 13 19:11:56 2009 (4A5BBF3C) 8cf0b000 8cf30000 ksecpkg ksecpkg.sys Thu Dec 10 23:04:22 2009 (4B21C4C6) 98f86000 98f96000 lltdio lltdio.sys Mon Jul 13 19:53:18 2009 (4A5BC8EE) 98f51000 98f6c000 luafv luafv.sys Mon Jul 13 19:15:44 2009 (4A5BC020) 8c83b000 8c8b3000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:06:41 2009 (4A5BDA21) 98f46000 98f51000 monitor monitor.sys Mon Jul 13 19:25:58 2009 (4A5BC286) 93131000 9313e000 mouclass mouclass.sys Mon Jul 13 19:11:15 2009 (4A5BBF13) 98f3b000 98f46000 mouhid mouhid.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 8cb47000 8cb5d000 mountmgr mountmgr.sys Mon Jul 13 19:11:27 2009 (4A5BBF1F) 9ea13000 9ea36000 MpFilter MpFilter.sys Sat Mar 20 00:03:26 2010 (4BA4490E) 9ea36000 9ea3ee00 MpNWMon MpNWMon.sys Sat Mar 20 00:03:24 2010 (4BA4490C) 98fc2000 98fd4000 mpsdrv mpsdrv.sys Mon Jul 13 19:52:52 2009 (4A5BC8D4) 98fd4000 98ff7000 mrxsmb mrxsmb.sys Sat Feb 27 02:32:02 2010 (4B88CA72) 933b0000 933eb000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:32:21 2010 (4B88CA85) 98c00000 98c1b000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:32:11 2010 (4B88CA7B) 8d337000 8d342000 Msfs Msfs.SYS Mon Jul 13 19:11:26 2009 (4A5BBF1E) 8ca89000 8ca91000 msisadrv msisadrv.sys Mon Jul 13 19:11:09 2009 (4A5BBF0D) 8cd64000 8cd8f000 msrpc msrpc.sys Mon Jul 13 19:11:59 2009 (4A5BBF3F) 8cfe5000 8cfef000 mssmbios mssmbios.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) 8d206000 8d216000 mup mup.sys Mon Jul 13 19:14:14 2009 (4A5BBFC6) 8ce16000 8cecd000 ndis ndis.sys Mon Jul 13 19:12:24 2009 (4A5BBF58) 9317f000 9318a000 ndistapi ndistapi.sys Mon Jul 13 19:54:24 2009 (4A5BC930) 9318a000 931ac000 ndiswan ndiswan.sys Mon Jul 13 19:54:34 2009 (4A5BC93A) 93282000 93293000 NDProxy NDProxy.SYS Mon Jul 13 19:54:27 2009 (4A5BC933) 8cf4f000 8cf5d000 netbios netbios.sys Mon Jul 13 19:53:54 2009 (4A5BC912) 8d3cc000 8d3fe000 netbt netbt.sys Mon Jul 13 19:12:18 2009 (4A5BBF52) 8cecd000 8cf0b000 NETIO NETIO.SYS Mon Jul 13 19:12:35 2009 (4A5BBF63) 8d342000 8d350000 Npfs Npfs.SYS Mon Jul 13 19:11:31 2009 (4A5BBF23) 8cfdb000 8cfe5000 nsiproxy nsiproxy.sys Mon Jul 13 19:12:08 2009 (4A5BBF48) 82c08000 83008000 nt ntkrnlmp.exe Fri Jun 18 23:55:07 2010 (4C1C3F9B) 8cc35000 8cd64000 Ntfs Ntfs.sys Mon Jul 13 19:12:05 2009 (4A5BBF45) 8d2d7000 8d2de000 Null Null.SYS Mon Jul 13 19:11:12 2009 (4A5BBF10) 8cf30000 8cf4f000 pacer pacer.sys Mon Jul 13 19:53:58 2009 (4A5BC916) 93800000 93818000 parport parport.sys Mon Jul 13 19:45:34 2009 (4A5BC71E) 8cac6000 8cad7000 partmgr partmgr.sys Mon Jul 13 19:11:35 2009 (4A5BBF27) 98ff7000 98ffe000 parvdm parvdm.sys Mon Jul 13 19:45:29 2009 (4A5BC719) 8ca91000 8cabb000 pci pci.sys Mon Jul 13 19:11:16 2009 (4A5BBF14) 8cb32000 8cb39000 pciide pciide.sys Mon Jul 13 19:11:19 2009 (4A5BBF17) 8cb39000 8cb47000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:11:15 2009 (4A5BBF13) 9eac6000 9ead1900 pcouffin pcouffin.sys Tue Dec 05 09:39:53 2006 (457584B9) 8cdff000 8ce0d000 pcw pcw.sys Mon Jul 13 19:11:10 2009 (4A5BBF0E) 9e83a000 9e8d1000 peauth peauth.sys Mon Jul 13 20:35:44 2009 (4A5BD2E0) 932e3000 93312000 portcls portcls.sys Mon Jul 13 19:51:00 2009 (4A5BC864) 8c8b3000 8c8c4000 PSHED PSHED.dll Mon Jul 13 21:09:36 2009 (4A5BDAD0) 93167000 9317f000 rasl2tp rasl2tp.sys Mon Jul 13 19:54:33 2009 (4A5BC939) 931ac000 931c4000 raspppoe raspppoe.sys Mon Jul 13 19:54:53 2009 (4A5BC94D) 931c4000 931db000 raspptp raspptp.sys Mon Jul 13 19:54:47 2009 (4A5BC947) 931db000 931f2000 rassstp rassstp.sys Mon Jul 13 19:54:57 2009 (4A5BC951) 8cf9a000 8cfdb000 rdbss rdbss.sys Mon Jul 13 19:14:26 2009 (4A5BBFD2) 931f2000 931fc000 rdpbus rdpbus.sys Mon Jul 13 20:02:40 2009 (4A5BCB20) 8d31f000 8d327000 RDPCDD RDPCDD.sys Mon Jul 13 20:01:40 2009 (4A5BCAE4) 8d327000 8d32f000 rdpencdd rdpencdd.sys Mon Jul 13 20:01:39 2009 (4A5BCAE3) 8d32f000 8d337000 rdprefmp rdprefmp.sys Mon Jul 13 20:01:41 2009 (4A5BCAE5) 8d1d9000 8d206000 rdyboost rdyboost.sys Mon Jul 13 19:22:02 2009 (4A5BC19A) 98f96000 98fa9000 rspndr rspndr.sys Mon Jul 13 19:53:20 2009 (4A5BC8F0) 93f49000 93f8e000 Rt86win7 Rt86win7.sys Wed Jun 23 05:10:23 2010 (4C21CF7F) 98c21000 98ec1400 RTKVHDA RTKVHDA.sys Mon Aug 31 06:18:44 2009 (4A9BA384) 9ea4e000 9ea57000 safedrv safedrv.sys Fri Aug 06 10:02:03 2010 (4C5C15DB) 9e8d1000 9e8db000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528) 9313e000 93148000 serenum serenum.sys Mon Jul 13 19:45:27 2009 (4A5BC717) 8cf5d000 8cf77000 serial serial.sys Mon Jul 13 19:45:33 2009 (4A5BC71D) 8d1d1000 8d1d9000 spldr spldr.sys Mon May 11 12:13:47 2009 (4A084EBB) 9e9c2000 9ea13000 srv srv.sys Mon Jun 21 22:47:32 2010 (4C202444) 9e973000 9e9c2000 srv2 srv2.sys Mon Jun 21 22:47:19 2010 (4C202437) 9e8db000 9e8fc000 srvnet srvnet.sys Mon Jun 21 22:47:09 2010 (4C20242D) 93818000 93819380 swenum swenum.sys Mon Jul 13 19:45:08 2009 (4A5BC704) 8d00f000 8d158000 tcpip tcpip.sys Sun Jun 13 23:36:59 2010 (4C15A3DB) 9e8fc000 9e909000 tcpipreg tcpipreg.sys Mon Jul 13 19:54:14 2009 (4A5BC926) 8d367000 8d372000 TDI TDI.SYS Mon Jul 13 19:12:12 2009 (4A5BBF4C) 8d350000 8d367000 tdx tdx.sys Mon Jul 13 19:12:10 2009 (4A5BBF4A) 8cf8a000 8cf9a000 termdd termdd.sys Mon Jul 13 20:01:35 2009 (4A5BCADF) 9a390000 9a399000 TSDDD TSDDD.dll unavailable (00000000) 930ad000 930ce000 tunnel tunnel.sys Mon Jul 13 19:54:03 2009 (4A5BC91B) 93230000 9323e000 umbus umbus.sys Mon Jul 13 19:51:38 2009 (4A5BC88A) 98f39000 98f3a700 USBD USBD.SYS Mon Jul 13 19:51:05 2009 (4A5BC869) 93fe3000 93ff2000 usbehci usbehci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 9323e000 93282000 usbhub usbhub.sys Mon Jul 13 19:52:06 2009 (4A5BC8A6) 93f8e000 93f98000 usbohci usbohci.sys Mon Jul 13 19:51:14 2009 (4A5BC872) 93f98000 93fe3000 USBPORT USBPORT.SYS Mon Jul 13 19:51:13 2009 (4A5BC871) 8cabb000 8cac6000 vdrvroot vdrvroot.sys Mon Jul 13 19:46:19 2009 (4A5BC74B) 8d2e5000 8d2f1000 vga vga.sys Mon Jul 13 19:25:50 2009 (4A5BC27E) 8d2f1000 8d312000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:25:49 2009 (4A5BC27D) 8d189000 8d191380 vmstorfl vmstorfl.sys Mon Jul 13 19:28:44 2009 (4A5BC32C) 8cad7000 8cae7000 volmgr volmgr.sys Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8cae7000 8cb32000 volmgrx volmgrx.sys Mon Jul 13 19:11:41 2009 (4A5BBF2D) 8d192000 8d1d1000 volsnap volsnap.sys Mon Jul 13 19:11:34 2009 (4A5BBF26) 8cf77000 8cf8a000 wanarp wanarp.sys Mon Jul 13 19:55:02 2009 (4A5BC956) 8d312000 8d31f000 watchdog watchdog.sys Mon Jul 13 19:24:10 2009 (4A5BC21A) 8c9b9000 8ca2a000 Wdf01000 Wdf01000.sys Mon Jul 13 19:11:36 2009 (4A5BBF28) 8ca2a000 8ca38000 WDFLDR WDFLDR.SYS Mon Jul 13 19:11:25 2009 (4A5BBF1D) 8d000000 8d007000 wfplwf wfplwf.sys Mon Jul 13 19:53:51 2009 (4A5BC90F) 9a130000 9a37a000 win32k win32k.sys unavailable (00000000) 8ca80000 8ca89000 WMILIB WMILIB.SYS Mon Jul 13 19:11:22 2009 (4A5BBF1A) 98f6c000 98f86000 WudfPf WudfPf.sys Mon Jul 13 19:50:13 2009 (4A5BC835) Unloaded modules: 9eb13000 9eb34000 WUDFRd.sys Timestamp: unavailable (00000000) Checksum: 00000000 9ead2000 9eae9000 USBSTOR.SYS Timestamp: unavailable (00000000) Checksum: 00000000 9ea57000 9eac1000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 9eac1000 9eac6000 atidcmxx.sys Timestamp: unavailable (00000000) Checksum: 00000000 9e909000 9e973000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 8d286000 8d293000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 8d293000 8d29e000 dump_ataport Timestamp: unavailable (00000000) Checksum: 00000000 8d29e000 8d2a7000 dump_atapi.s Timestamp: unavailable (00000000) Checksum: 00000000 8d2a7000 8d2b8000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 Kernel base = 0x82c1c000 PsLoadedModuleList = 0x82d5b570 Debug session time: Sat Sep 11 02:49:45.006 2010 (GMT-4) System Uptime: 0 days 4:24:37.006 Loading Kernel Symbols ............................................................... ................................................................ ................ Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {1, 2, 1, 82c71aa0} Probably caused by : hardware Followup: MachineOwner --------- *** Possible invalid call from 82cbe961 ( nt!MiInsertPageInFreeOrZeroedList+0x1c4 ) *** Expected target 82c71a70 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 ) 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00000001, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 82c71aa0, address which referenced memory Debugging Details: ------------------ WORKER_ROUTINE: +5650952f01b8dc8c 00000001 ?? ??? WORK_ITEM: 82c71aa0 CURRENT_IRQL: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: sidebar.exe TRAP_FRAME: a00078b0 -- (.trap 0xffffffffa00078b0) ErrCode = 00000002 eax=00000001 ebx=00000ab4 ecx=a0007944 edx=85501745 esi=84df14d8 edi=85501734 eip=82c71aa0 esp=a0007924 ebp=a0007954 iopl=0 nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010282 nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20: 82c71aa0 8908 mov dword ptr [eax],ecx ds:0023:00000001=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 82cbe966 to 82c71aa0 POSSIBLE_INVALID_CONTROL_TRANSFER: from 82cbe961 to 82c71a70 STACK_TEXT: a0007920 82cbe966 8496c648 84df14d8 84df14e0 nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20 a0007954 82c88c5f 8496c648 84df14d8 84df14e0 nt!MiInsertPageInFreeOrZeroedList+0x1c9 a0007984 82ca431e c0008144 a0007a6c 02040000 nt!MiPfnShareCountIsZero+0x15f a0007a48 82ca3e76 c0008110 c0008140 85a0a750 nt!MiDeletePteRun+0x303 a0007b2c 82c992fc 85a0a750 02050fff 903acb98 nt!MiDeleteVirtualAddresses+0x33b a0007bc4 82c5179a ffffffff a0007ce8 a0007cf4 nt!NtFreeVirtualMemory+0x60b a0007bc4 82c4f74d ffffffff a0007ce8 a0007cf4 nt!KiFastCallEntry+0x12a a0007c4c 990ed3d8 ffffffff a0007ce8 a0007cf4 nt!ZwFreeVirtualMemory+0x11 a0007cec 990ee790 00000000 00000000 00000000 win32k!SURFACE::bDeleteSurface+0x291 a0007d00 990ce2a3 00000000 00000000 ff9f1a08 win32k!SURFREF::bDeleteSurface+0x14 a0007d14 990cfa88 3f050c5b 01d0ba4c 3f050c5b win32k!bDeleteSurface+0x20 a0007d28 82c5179a 3f050c5b 01d0ba60 77a664f4 win32k!NtGdiDeleteObjectApp+0x7f a0007d28 77a664f4 3f050c5b 01d0ba60 77a664f4 nt!KiFastCallEntry+0x12a WARNING: Frame IP not in any known module. Following frames may be wrong. 01d0ba60 00000000 00000000 00000000 00000000 0x77a664f4 STACK_COMMAND: .trap 0xffffffffa00078b0 ; kb FOLLOWUP_NAME: MachineOwner MODULE_NAME: hardware IMAGE_NAME: hardware DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: CPU_CALL_ERROR Followup: MachineOwner --------- *** Possible invalid call from 82cbe961 ( nt!MiInsertPageInFreeOrZeroedList+0x1c4 ) *** Expected target 82c71a70 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )
i uninstalled and had new bsod 2 hours ago. here is minidump file only...