Hi guys,
Could you have a look at my dump files please.
New PC arrived on Saturday morning, installed W7 and drivers. I had a couple of BSOD yesterday so reinstalled last night. Loaded motherboard drivers first then graphics. Seemed ok for the remainder of last night and today but I've just had another.
64 bit W7
System came without operating system. Full retail copy installed.
Thanks in advance
This crash was fairly straight forward. Its cause, your video driver.
When upgrading your graphic driver you MUST remove all traces of the current driver. In order to do that we recommend using Guru3D - Driver Sweeper
When it is removed then download and install the fresh copy.
Let us know if you need further assistance with this
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Windows7_BSOD_jcgriff2\080110-13884-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02e50000 PsLoadedModuleList = 0xfffff800`0308de50
Debug session time: Sun Aug 1 15:46:33.098 2010 (GMT-4)
System Uptime: 0 days 11:03:35.622
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : atikmdag.sys ( atikmdag+4a179 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'WUDFRd' and 'spsys.sys' overlap
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+5ba2952f03b3dd40
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: b
EXCEPTION_RECORD: fffff88002d1acd8 -- (.exr 0xfffff88002d1acd8)
ExceptionAddress: fffff88003b0c179 (atikmdag+0x000000000004a179)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002d1ad80 -- (.trap 0xfffff88002d1ad80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88003e12f10 rbx=0000000000000000 rcx=fffffa8005d12720
rdx=fffffa8004fd01c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003b0c179 rsp=fffff88002d1af10 rbp=fffff88002d1afb0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff88002d1afb0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
atikmdag+0x4a179:
fffff880`03b0c179 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002eb832e to fffff80002ec05d0
STACK_TEXT:
fffff880`02d19dc8 fffff800`02eb832e : 00000000`00000008 fffffa80`0563e680 fffff880`02d1a540 fffff800`02eed524 : nt!KeBugCheck
fffff880`02d19dd0 fffff800`02ee62ed : fffff800`030ceb88 fffff800`03007a40 fffff800`02e50000 fffff880`02d1acd8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02d19e00 fffff800`02eed950 : fffff800`0300fb24 fffff880`02d19e78 fffff880`02d1acd8 fffff800`02e50000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02d19e30 fffff800`02efa8df : fffff880`02d1acd8 fffff880`02d1a540 fffff880`00000000 fffffa80`00000004 : nt!RtlDispatchException+0x410
fffff880`02d1a510 fffff800`02ebfc42 : fffff880`02d1acd8 00000000`00000000 fffff880`02d1ad80 fffff880`02d1b388 : nt!KiDispatchException+0x16f
fffff880`02d1aba0 fffff800`02ebe54a : fffffa80`0509d000 fffff880`03b45241 fffffa80`0509d000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02d1ad80 fffff880`03b0c179 : fffffa80`05346730 0000000f`008e8000 00000000`00000000 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`02d1af10 fffffa80`05346730 : 0000000f`008e8000 00000000`00000000 00000000`00000001 00000000`00000000 : atikmdag+0x4a179
fffff880`02d1af18 0000000f`008e8000 : 00000000`00000000 00000000`00000001 00000000`00000000 fffffa80`04ff0740 : 0xfffffa80`05346730
fffff880`02d1af20 00000000`00000000 : 00000000`00000001 00000000`00000000 fffffa80`04ff0740 00000000`c0000001 : 0xf`008e8000
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmdag+4a179
fffff880`03b0c179 ?? ???
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: atikmdag+4a179
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c33da58
FAILURE_BUCKET_ID: X64_0x1E_atikmdag+4a179
BUCKET_ID: X64_0x1E_atikmdag+4a179
Followup: MachineOwner
---------
Old drivers
Code:
speedfan.sys fffff880`014dd000 fffff880`014e4000 0x00007000 0x45168798 9/24/2006 09:26:48
usbfilter.sys fffff880`04262000 fffff880`0426e000 0x0000c000 0x49d5f587 4/3/2009 07:39:51
AtiPcie.sys fffff880`015f2000 fffff880`015fa000 0x00008000 0x4a005486 5/5/2009 11:00:22
spldr.sys fffff880`014d5000 fffff880`014dd000 0x00008000 0x4a0858bb 5/11/2009 12:56:27
amdxata.sys fffff880`00c2a000 fffff880`00c35000 0x0000b000 0x4a12f2eb 5/19/2009 13:56:59