Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: BSOD

11 Oct 2010   #1
up69

Windows 7 Ultimate x86
 
 
BSOD

I have installed Windows 7 Ultimate x86 on my laptop yesterday and its been getting the infamous BSOD. The laptop can idel on dekstop for a random period of time before getting BSOD. It happens very frequently, and the system will BSOD upon restarting.


- Win 7 Ultimate 32 bit
- Original installed Window Vista x64
- OEM

-Hardware is around a year old since this laptop released last year now.
-New OS is about a day old, i have reinstalled the OS

Documents.rar (use this!)
Attachment 103744

Thanks!


My System SpecsSystem Spec
.
11 Oct 2010   #2
lorddenis

 

please folow this posting instructions:

https://www.sevenforums.com/crashes-d...tructions.html
My System SpecsSystem Spec
11 Oct 2010   #3
up69

Windows 7 Ultimate x86
 
 

Quote   Quote: Originally Posted by lorddenis View Post
please folow this posting instructions:

https://www.sevenforums.com/crashes-d...tructions.html
Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
My System SpecsSystem Spec
.

11 Oct 2010   #4
cybercore

Windows 7 x64
 
 

Quote   Quote: Originally Posted by up69 View Post
Quote   Quote: Originally Posted by lorddenis View Post
please folow this posting instructions:

https://www.sevenforums.com/crashes-d...tructions.html
Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
Attachment 103744

This is what I get when I click it:

404 - File or directory not found.

The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.
My System SpecsSystem Spec
11 Oct 2010   #5
up69

Windows 7 Ultimate x86
 
 

Quote   Quote: Originally Posted by cybercore View Post
Quote   Quote: Originally Posted by up69 View Post
Quote   Quote: Originally Posted by lorddenis View Post
please folow this posting instructions:

https://www.sevenforums.com/crashes-d...tructions.html
Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
Attachment 103744

This is what I get when I click it:

404 - File or directory not found.

The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.
Strange, it works for me; anyways, reuploaded onto Mediafire.

Thanks!
My System SpecsSystem Spec
11 Oct 2010   #6
lorddenis

 

Quote   Quote: Originally Posted by up69 View Post
Quote   Quote: Originally Posted by cybercore View Post
Quote   Quote: Originally Posted by up69 View Post

Sorry! I've read that thread before making this post, but kind of put it together in my own ways. sorry again.
Attachment 103744

This is what I get when I click it:

404 - File or directory not found.

The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.
Strange, it works for me; anyways, reuploaded onto Mediafire.

Thanks!
that is strange because i ger the same error.

cant test if the link works..my internet is very slow today...
My System SpecsSystem Spec
11 Oct 2010   #7
up69

Windows 7 Ultimate x86
 
 

unlucky me then
My System SpecsSystem Spec
11 Oct 2010   #8
Tews

64-bit Windows 8.1 Pro
 
 

Just navigate to c:/windows/minidump and zip up the .dmp files, then attach it to your next post..
My System SpecsSystem Spec
11 Oct 2010   #9
cybercore

Windows 7 x64
 
 

Check your notebook support for updates:

yk62x86.sys Mon Feb 23 16:44:18 2009
Marvell Yukon Ethernet Controller

iaStor.sys Fri Jun 05 04:42:33 2009
Intel Matrix Storage Manager

netw5v32.sys Thu May 14 18:40:33 2009
Intel® Wireless WiFi Link Adapter

nvlddmkm.sys Tue Jul 28 17:21:09 2009
NVIDIA

o2sd.sys Thu May 07 04:54:54 2009
O2Micro SD Reader

SynTP.sys Fri Jun 19 05:33:00 2009
Synaptics Touchpad

RTKVHDA.sys Wed Aug 05 12:41:49 2009
Realtek HD Audio

HSXHWAZL.sys Fri Feb 13 22:58:15 2009
Conexant SoftK56 Modem




Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101110-17035-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a53000 PsLoadedModuleList = 0x82b9b810
Debug session time: Mon Oct 11 12:09:23.371 2010 (GMT-5)
System Uptime: 0 days 0:31:34.322
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00041284, A PTE or the working set list is corrupt.
Arg2: 01364001
Arg3: 0000391e
Arg4: c0802000

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_41284

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 82ac9806 to 82b2fd10

STACK_TEXT:  
821bda84 82ac9806 0000001a 00041284 01364001 nt!KeBugCheckEx+0x1e
821bdaac 82b0c8b8 c0c05d90 013cffff 01350002 nt!MiLocateWsle+0xc1
821bdba8 82b063fe 01350002 013cffff 89713690 nt!MiDeleteVirtualAddresses+0x1b5
821bdc78 82afa708 89713690 859c1600 851a2b80 nt!MiRemoveMappedView+0x325
821bdca0 82ccd4c8 851a2b80 00000000 ffffffff nt!MiRemoveVadAndView+0xe5
821bdd04 82cced31 89713690 01350000 00000000 nt!MiUnmapViewOfSection+0x265
821bdd24 82a9642a ffffffff 01350000 001af6dc nt!NtUnmapViewOfSection+0x55
821bdd24 77a264f4 ffffffff 01350000 001af6dc nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
001af6dc 00000000 00000000 00000000 00000000 0x77a264f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!MiLocateWsle+c1
82ac9806 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!MiLocateWsle+c1

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0x1a_41284_nt!MiLocateWsle+c1

BUCKET_ID:  0x1a_41284_nt!MiLocateWsle+c1

Followup: MachineOwner
---------


















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101110-21980-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a0d000 PsLoadedModuleList = 0x82b55810
Debug session time: Mon Oct 11 10:20:06.704 2010 (GMT-5)
System Uptime: 0 days 0:02:13.280
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 82aac873, 8d38f9bc, 8d38f5a0}

Probably caused by : memory_corruption ( nt!MiGetNextNode+b )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 82aac873, The address that the exception occurred at
Arg3: 8d38f9bc, Exception Record Address
Arg4: 8d38f5a0, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

FAULTING_IP: 
nt!MiGetNextNode+b
82aac873 394804          cmp     dword ptr [eax+4],ecx

EXCEPTION_RECORD:  8d38f9bc -- (.exr 0xffffffff8d38f9bc)
ExceptionAddress: 82aac873 (nt!MiGetNextNode+0x0000000b)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 00000000
   Parameter[1]: 00000004
Attempt to read from address 00000004

CONTEXT:  8d38f5a0 -- (.cxr 0xffffffff8d38f5a0)
eax=00000000 ebx=891f7f38 ecx=891f7f38 edx=00000025 esi=851c7a70 edi=976e2008
eip=82aac873 esp=8d38fa84 ebp=8d38fabc iopl=0         nv up ei pl nz ac po cy
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010213
nt!MiGetNextNode+0xb:
82aac873 394804          cmp     dword ptr [eax+4],ecx ds:0023:00000004=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  PdtWzd.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>

EXCEPTION_PARAMETER1:  00000000

EXCEPTION_PARAMETER2:  00000004

READ_ADDRESS: GetPointerFromAddress: unable to read from 82b75718
Unable to read MiSystemVaType memory at 82b55160
 00000004 

FOLLOWUP_IP: 
nt!MiGetNextNode+b
82aac873 394804          cmp     dword ptr [eax+4],ecx

BUGCHECK_STR:  0x7E

DEFAULT_BUCKET_ID:  NULL_CLASS_PTR_DEREFERENCE

LAST_CONTROL_TRANSFER:  from 82c8b22c to 82aac873

STACK_TEXT:  
8d38fa80 82c8b22c 00002000 8d38fb50 00000002 nt!MiGetNextNode+0xb
8d38fabc 82bce720 976e2008 891e9920 8d38fb50 nt!MmEnumerateAndReferenceImages+0x11c
8d38fae4 82bcf07a 891e9920 00000000 891e9920 nt!EtwpEnumerateImages+0x41
8d38fb28 82bce531 891e9920 8d38fb50 00000000 nt!EtwpProcessEnumCallback+0x1c1
8d38fb40 82bceeac 82bceeb7 8d38fb50 8d38fbb4 nt!PsEnumProcesses+0x12
8d38fb64 82bcedbd 8d38fbb4 00000000 82b46b18 nt!EtwpProcessThreadImageRundown+0x43
8d38fb78 82bced3d 00000002 00000001 82b4c320 nt!EtwpKernelTraceRundown+0x28
8d38fc34 82bf65c1 00000000 00000000 00000002 nt!EtwpUpdateLoggerGroupMasks+0x1a4
8d38fc48 82bf6322 000000b4 00000000 000000b4 nt!EtwpStopLoggerInstance+0x39
8d38fc78 82c5f462 9c954848 00000000 a99c0903 nt!EtwpStopTrace+0xf8
8d38fcd0 82bcea6d 00000002 82b4cac0 000000b4 nt!NtTraceControl+0x219
8d38fd00 82a7af2b 897dc048 00000000 851c7a70 nt!PerfDiagpProxyWorker+0x15a
8d38fd50 82c1b66d 00000001 a99c0843 00000000 nt!ExpWorkerThread+0x10d
8d38fd90 82acd0d9 82a7ae1e 00000001 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiGetNextNode+b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007

STACK_COMMAND:  .cxr 0xffffffff8d38f5a0 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  0x7E_nt!MiGetNextNode+b

BUCKET_ID:  0x7E_nt!MiGetNextNode+b

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101110-22510-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a37000 PsLoadedModuleList = 0x82b7f810
Debug session time: Mon Oct 11 10:15:21.659 2010 (GMT-5)
System Uptime: 0 days 0:06:55.235
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: e991210c, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 82acb5e3, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 00000002, (reserved)

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from 82b9f718
Unable to read MiSystemVaType memory at 82b7f160
 e991210c 

FAULTING_IP: 
nt!MiFindNodeOrParent+17
82acb5e3 3b510c          cmp     edx,dword ptr [ecx+0Ch]

MM_INTERNAL_CODE:  2

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  0

TRAP_FRAME:  97da1bac -- (.trap 0xffffffff97da1bac)
ErrCode = 00000000
eax=e9912100 ebx=0358c000 ecx=e9912100 edx=0000358c esi=891c27f0 edi=0358dfff
eip=82acb5e3 esp=97da1c20 ebp=97da1c20 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt!MiFindNodeOrParent+0x17:
82acb5e3 3b510c          cmp     edx,dword ptr [ecx+0Ch] ds:0023:e991210c=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82a7d5f8 to 82abc8e3

STACK_TEXT:  
97da1b94 82a7d5f8 00000000 e991210c 00000000 nt!MmAccessFault+0x106
97da1b94 82acb5e3 00000000 e991210c 00000000 nt!KiTrap0E+0xdc
97da1c20 82ade91e 97da1c30 88393438 88f9b248 nt!MiFindNodeOrParent+0x17
97da1c34 82ca51e9 b36ecbc5 0358cfb8 fe763160 nt!MiLocateAddress+0x41
97da1c74 82cbab64 0358cfe8 00000100 00000004 nt!MiSecureVirtualMemory+0x85
97da1c94 96030a9a 0358cfe8 00000100 00000004 nt!MmSecureVirtualMemory+0x1a
97da1d08 82a7a42a 070101a3 be050d29 00000000 win32k!NtGdiGetDIBitsInternal+0x109
97da1d08 77d964f4 070101a3 be050d29 00000000 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0224e850 00000000 00000000 00000000 00000000 0x77d964f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!NtGdiGetDIBitsInternal+109
96030a9a 8945dc          mov     dword ptr [ebp-24h],eax

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  win32k!NtGdiGetDIBitsInternal+109

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc2a2

FAILURE_BUCKET_ID:  0x50_win32k!NtGdiGetDIBitsInternal+109

BUCKET_ID:  0x50_win32k!NtGdiGetDIBitsInternal+109

Followup: MachineOwner
---------



















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101110-18954-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a43000 PsLoadedModuleList = 0x82b8b810
Debug session time: Mon Oct 11 13:56:41.627 2010 (GMT-5)
System Uptime: 0 days 0:04:31.578
Loading Kernel Symbols
...............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
.....
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: 98d5c000, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 96b58db3, If non-zero, the instruction address which referenced the bad memory
    address.
Arg4: 00000000, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bab718
Unable to read MiSystemVaType memory at 82b8b160
 98d5c000 

FAULTING_IP: 
win32k!memcpy+33
96b58db3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]

MM_INTERNAL_CODE:  0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  SynTPEnh.exe

CURRENT_IRQL:  0

TRAP_FRAME:  98d5b940 -- (.trap 0xffffffff98d5b940)
ErrCode = 00000002
eax=fe5f2f96 ebx=98d5ba70 ecx=00000124 edx=00000002 esi=fe5f2b04 edi=98d5c000
eip=96b58db3 esp=98d5b9b4 ebp=98d5b9bc iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
win32k!memcpy+0x33:
96b58db3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82a895f8 to 82ac88e3

STACK_TEXT:  
98d5b928 82a895f8 00000001 98d5c000 00000000 nt!MmAccessFault+0x106
98d5b928 96b58db3 00000001 98d5c000 00000000 nt!KiTrap0E+0xdc
98d5b9bc 96b66606 98d5ba70 fe5f2574 00000a22 win32k!memcpy+0x33
98d5b9e0 96b62eaf fe5f2574 98d5ba70 98d5ba0c win32k!GreGetCannonicalName+0x51
98d5ba04 96b619d0 98d5bc98 98d5bc64 98d5bc3c win32k!MAPPER::MAPPER+0x40
98d5bb64 00595e6d 0009101a 001a1f27 0042464d win32k!ppfeGetAMatch+0x4e
WARNING: Frame IP not in any known module. Following frames may be wrong.
98d5bb8c 00b4b7b9 00c6c8ca 00c4c5c7 00a7a9ac 0x595e6d
98d5bb90 00c6c8ca 00c4c5c7 00a7a9ac 007a7a7c 0xb4b7b9
98d5bb94 00c4c5c7 00a7a9ac 007a7a7c 006c7176 0xc6c8ca
98d5bb98 00a7a9ac 007a7a7c 006c7176 009599a3 0xc4c5c7
98d5bb9c 007a7a7c 006c7176 009599a3 00b6bac2 0xa7a9ac
98d5bba0 006c7176 009599a3 00b6bac2 00ccd0d8 0x7a7a7c
98d5bba4 009599a3 00b6bac2 00ccd0d8 00f5f5f5 0x6c7176
98d5bba8 00b6bac2 00ccd0d8 00f5f5f5 00838486 0x9599a3
98d5bbac 00ccd0d8 00f5f5f5 00838486 00ff00ff 0xb6bac2
98d5bbb0 00f5f5f5 00838486 00ff00ff 00ff00ff 0xccd0d8
98d5bbb4 00838486 00ff00ff 00ff00ff 00ff00ff 0xf5f5f5
98d5bbb8 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0x838486
98d5bbbc 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbc0 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbc4 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbc8 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bbcc 00ff00ff 00ff00ff 00ff00ff 00838486 0xff00ff
98d5bbd0 00ff00ff 00ff00ff 00838486 007a828f 0xff00ff
98d5bbd4 00ff00ff 00838486 007a828f 00313b45 0xff00ff
98d5bbd8 00838486 007a828f 00313b45 002a343d 0xff00ff
98d5bbdc 007a828f 00313b45 002a343d 00222b36 0x838486
98d5bbe0 00313b45 002a343d 00222b36 001e242d 0x7a828f
98d5bbe4 002a343d 00222b36 001e242d 00161c23 0x313b45
98d5bbe8 00222b36 001e242d 00161c23 002d333b 0x2a343d
98d5bbec 001e242d 00161c23 002d333b 007e838b 0x222b36
98d5bbf0 00161c23 002d333b 007e838b 00919aa6 0x1e242d
98d5bbf4 002d333b 007e838b 00919aa6 0084909e 0x161c23
98d5bbf8 007e838b 00919aa6 0084909e 006e7b8c 0x2d333b
98d5bbfc 00919aa6 0084909e 006e7b8c 00536376 0x7e838b
98d5bc00 0084909e 006e7b8c 00536376 00404e64 0x919aa6
98d5bc04 006e7b8c 00536376 00404e64 002e3d52 0x84909e
98d5bc08 00536376 00404e64 002e3d52 00243142 0x6e7b8c
98d5bc0c 00404e64 002e3d52 00243142 001e2a3a 0x536376
98d5bc10 002e3d52 00243142 001e2a3a 00182331 0x404e64
98d5bc14 00243142 001e2a3a 00182331 0027303a 0x2e3d52
98d5bc18 001e2a3a 00182331 0027303a 00989fb4 0x243142
98d5bc1c 00182331 0027303a 00989fb4 00a0a7bd 0x1e2a3a
98d5bc20 0027303a 00989fb4 00a0a7bd 00969db3 0x182331
98d5bc24 00989fb4 00a0a7bd 00969db3 001f2732 0x27303a
98d5bc28 00a0a7bd 00969db3 001f2732 0009101a 0x989fb4
98d5bc2c 00969db3 001f2732 0009101a 0010171f 0xa0a7bd
98d5bc30 001f2732 0009101a 0010171f 00343c42 0x969db3
98d5bc34 0009101a 0010171f 00343c42 00595e65 0x1f2732
98d5bc38 0010171f 00343c42 00595e65 0061676c 0x9101a
98d5bc3c 00343c42 00595e65 0061676c 006f7379 0x10171f
98d5bc40 00595e65 0061676c 006f7379 007c8186 0x343c42
98d5bc44 0061676c 006f7379 007c8186 008e9196 0x595e65
98d5bc48 006f7379 007c8186 008e9196 00a0a2a5 0x61676c
98d5bc4c 007c8186 008e9196 00a0a2a5 00b4b7b9 0x6f7379
98d5bc50 008e9196 00a0a2a5 00b4b7b9 00bfc0c1 0x7c8186
98d5bc54 00a0a2a5 00b4b7b9 00bfc0c1 00a7a9ac 0x8e9196
98d5bc58 00b4b7b9 00bfc0c1 00a7a9ac 008b8b8d 0xa0a2a5
98d5bc5c 00bfc0c1 00a7a9ac 008b8b8d 00626367 0xb4b7b9
98d5bc60 00a7a9ac 008b8b8d 00626367 007e8189 0xbfc0c1
98d5bc64 008b8b8d 00626367 007e8189 00a1a6af 0xa7a9ac
98d5bc68 00626367 007e8189 00a1a6af 00b9bec6 0x8b8b8d
98d5bc6c 007e8189 00a1a6af 00b9bec6 00ccd0d8 0x626367
98d5bc70 00a1a6af 00b9bec6 00ccd0d8 00f5f5f5 0x7e8189
98d5bc74 00b9bec6 00ccd0d8 00f5f5f5 00838486 0xa1a6af
98d5bc78 00ccd0d8 00f5f5f5 00838486 00ff00ff 0xb9bec6
98d5bc7c 00f5f5f5 00838486 00ff00ff 00ff00ff 0xccd0d8
98d5bc80 00838486 00ff00ff 00ff00ff 00ff00ff 0xf5f5f5
98d5bc84 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0x838486
98d5bc88 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc8c 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc90 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc94 00ff00ff 00ff00ff 00ff00ff 00ff00ff 0xff00ff
98d5bc98 00ff00ff 00ff00ff 00ff00ff 00838486 0xff00ff
98d5bc9c 00ff00ff 00ff00ff 00838486 007a828f 0xff00ff


STACK_COMMAND:  kb

FOLLOWUP_IP: 
win32k!memcpy+33
96b58db3 f3a5            rep movs dword ptr es:[edi],dword ptr [esi]

SYMBOL_STACK_INDEX:  2

SYMBOL_NAME:  win32k!memcpy+33

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32k

IMAGE_NAME:  win32k.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc2a2

FAILURE_BUCKET_ID:  0x50_win32k!memcpy+33

BUCKET_ID:  0x50_win32k!memcpy+33

Followup: MachineOwner
---------






















Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101110-22900-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a4b000 PsLoadedModuleList = 0x82b93810
Debug session time: Mon Oct 11 10:17:28.682 2010 (GMT-5)
System Uptime: 0 days 0:01:41.259
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {0, 2, 1, 82abd3ca}

*** WARNING: Unable to verify timestamp for yk62x86.sys
*** ERROR: Module load completed but symbols could not be loaded for yk62x86.sys
*** WARNING: Unable to verify timestamp for iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for iaStor.sys
*** WARNING: Unable to verify timestamp for amdxata.sys
*** ERROR: Module load completed but symbols could not be loaded for amdxata.sys
*** WARNING: Unable to verify timestamp for spldr.sys
*** ERROR: Module load completed but symbols could not be loaded for spldr.sys
*** WARNING: Unable to verify timestamp for dump_iaStor.sys
*** ERROR: Module load completed but symbols could not be loaded for dump_iaStor.sys
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*** WARNING: Unable to verify timestamp for nvBridge.kmd
*** ERROR: Module load completed but symbols could not be loaded for nvBridge.kmd
*** WARNING: Unable to verify timestamp for netw5v32.sys
*** ERROR: Module load completed but symbols could not be loaded for netw5v32.sys
*** WARNING: Unable to verify timestamp for o2sd.sys
*** ERROR: Module load completed but symbols could not be loaded for o2sd.sys
*** WARNING: Unable to verify timestamp for o2media.sys
*** ERROR: Module load completed but symbols could not be loaded for o2media.sys
*** WARNING: Unable to verify timestamp for SynTP.sys
*** ERROR: Module load completed but symbols could not be loaded for SynTP.sys
*** ERROR: Module load completed but symbols could not be loaded for intelppm.sys
*** WARNING: Unable to verify timestamp for mdmxsdk.sys
*** ERROR: Module load completed but symbols could not be loaded for mdmxsdk.sys
*** WARNING: Unable to verify timestamp for RTKVHDA.sys
*** ERROR: Module load completed but symbols could not be loaded for RTKVHDA.sys
*** WARNING: Unable to verify timestamp for drmk.sys
*** ERROR: Module load completed but symbols could not be loaded for drmk.sys
*** WARNING: Unable to verify timestamp for HSXHWAZL.sys
*** ERROR: Module load completed but symbols could not be loaded for HSXHWAZL.sys
*** WARNING: Unable to verify timestamp for HSX_DPV.sys
*** ERROR: Module load completed but symbols could not be loaded for HSX_DPV.sys
*** WARNING: Unable to verify timestamp for HSX_CNXT.sys
*** ERROR: Module load completed but symbols could not be loaded for HSX_CNXT.sys
*** WARNING: Unable to verify timestamp for cdd.dll
*** ERROR: Module load completed but symbols could not be loaded for cdd.dll
*** WARNING: Unable to verify timestamp for peauth.sys
*** ERROR: Module load completed but symbols could not be loaded for peauth.sys
*** WARNING: Unable to verify timestamp for secdrv.SYS
*** ERROR: Module load completed but symbols could not be loaded for secdrv.SYS
*** WARNING: Unable to verify timestamp for XAudio32.sys
*** ERROR: Module load completed but symbols could not be loaded for XAudio32.sys
*** WARNING: Unable to verify timestamp for spsys.sys
*** ERROR: Module load completed but symbols could not be loaded for spsys.sys
Probably caused by : ntkrpamp.exe ( nt!KiActivateWaiterQueue+3c )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82abd3ca, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bb3718
Unable to read MiSystemVaType memory at 82b93160
 00000000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiActivateWaiterQueue+3c
82abd3ca 890a            mov     dword ptr [edx],ecx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  8d3fda2c -- (.trap 0xffffffff8d3fda2c)
ErrCode = 00000002
eax=88f7a030 ebx=807c2120 ecx=00000000 edx=00000000 esi=8800a040 edi=88f7cd48
eip=82abd3ca esp=8d3fdaa0 ebp=8d3fdab4 iopl=0         nv up ei pl nz na po nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010202
nt!KiActivateWaiterQueue+0x3c:
82abd3ca 890a            mov     dword ptr [edx],ecx  ds:0023:00000000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82abd3ca to 82a917eb

STACK_TEXT:  
8d3fda2c 82abd3ca badb0d00 00000000 00000000 nt!KiTrap0E+0x2cf
8d3fdab4 82ab8360 88f7a030 88f7ce08 88f7cd48 nt!KiActivateWaiterQueue+0x3c
8d3fdae0 82b019d2 88f7cd48 88f7ce08 00000000 nt!KiCommitThreadWait+0x13c
8d3fdb24 82a803f3 00000000 8513d144 8513d298 nt!KeWaitForGate+0x158
8d3fdb40 82b6af6c 00120010 8d3fdc80 00000010 nt!KiAcquireGuardedMutex+0x5e
8d3fdb94 82c9ebc4 00000001 00000018 73556553 nt!ExAllocatePoolWithTag+0x3bc
8d3fdbe0 82c9bd09 00ccf164 8d3fdc80 a9837902 nt!SepProbeAndCaptureString_U+0x7b
8d3fdcb4 82c56e7f 00ccf15c 00000000 00000000 nt!SepAccessCheckAndAuditAlarm+0x2d2
8d3fdd00 82a8e42a 00ccf15c 00000000 00ccf164 nt!NtAccessCheckAndAuditAlarm+0x31
8d3fdd00 771c64f4 00ccf15c 00000000 00ccf164 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
00ccf178 00000000 00000000 00000000 00000000 0x771c64f4


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiActivateWaiterQueue+3c
82abd3ca 890a            mov     dword ptr [edx],ecx

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiActivateWaiterQueue+3c

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrpamp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bc007

FAILURE_BUCKET_ID:  0xA_nt!KiActivateWaiterQueue+3c

BUCKET_ID:  0xA_nt!KiActivateWaiterQueue+3c

Followup: MachineOwner
---------

1: kd> lmtn
start    end        module name
80bc6000 80bce000   kdcom    kdcom.dll    Tue Jul 14 04:08:58 2009 (4A5BDAAA)
82a14000 82a4b000   hal      halmacpi.dll Tue Jul 14 02:11:03 2009 (4A5BBF07)
82a4b000 82e5b000   nt       ntkrpamp.exe Tue Jul 14 02:15:19 2009 (4A5BC007)
8ac2a000 8aca2000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Tue Jul 14 04:06:41 2009 (4A5BDA21)
8aca2000 8acb3000   PSHED    PSHED.dll    Tue Jul 14 04:09:36 2009 (4A5BDAD0)
8acb3000 8acbb000   BOOTVID  BOOTVID.dll  Tue Jul 14 04:04:34 2009 (4A5BD9A2)
8acbb000 8acfd000   CLFS     CLFS.SYS     Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8acfd000 8ada8000   CI       CI.dll       Tue Jul 14 04:09:28 2009 (4A5BDAC8)
8ada8000 8adf8000   yk62x86  yk62x86.sys  Mon Feb 23 16:44:18 2009 (49A2B642)
8ae0e000 8ae7f000   Wdf01000 Wdf01000.sys Tue Jul 14 02:11:36 2009 (4A5BBF28)
8ae7f000 8ae8d000   WDFLDR   WDFLDR.SYS   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8ae8d000 8aed5000   ACPI     ACPI.sys     Tue Jul 14 02:11:11 2009 (4A5BBF0F)
8aed5000 8aede000   WMILIB   WMILIB.SYS   Tue Jul 14 02:11:22 2009 (4A5BBF1A)
8aede000 8aee6000   msisadrv msisadrv.sys Tue Jul 14 02:11:09 2009 (4A5BBF0D)
8aee6000 8af10000   pci      pci.sys      Tue Jul 14 02:11:16 2009 (4A5BBF14)
8af10000 8af1b000   vdrvroot vdrvroot.sys Tue Jul 14 02:46:19 2009 (4A5BC74B)
8af1b000 8af2c000   partmgr  partmgr.sys  Tue Jul 14 02:11:35 2009 (4A5BBF27)
8af2c000 8af34000   compbatt compbatt.sys Tue Jul 14 02:19:18 2009 (4A5BC0F6)
8af34000 8af3f000   BATTC    BATTC.SYS    Tue Jul 14 02:19:15 2009 (4A5BC0F3)
8af3f000 8af4f000   volmgr   volmgr.sys   Tue Jul 14 02:11:25 2009 (4A5BBF1D)
8af4f000 8af9a000   volmgrx  volmgrx.sys  Tue Jul 14 02:11:41 2009 (4A5BBF2D)
8af9a000 8afb0000   mountmgr mountmgr.sys Tue Jul 14 02:11:27 2009 (4A5BBF1F)
8afb0000 8aff1000   rdbss    rdbss.sys    Tue Jul 14 02:14:26 2009 (4A5BBFD2)
8b030000 8b10a000   iaStor   iaStor.sys   Fri Jun 05 04:42:33 2009 (4A287809)
8b10a000 8b113000   atapi    atapi.sys    Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b113000 8b136000   ataport  ataport.SYS  Tue Jul 14 02:11:18 2009 (4A5BBF16)
8b136000 8b140000   msahci   msahci.sys   Tue Jul 14 02:45:50 2009 (4A5BC72E)
8b140000 8b14e000   PCIIDEX  PCIIDEX.SYS  Tue Jul 14 02:11:15 2009 (4A5BBF13)
8b14e000 8b157000   amdxata  amdxata.sys  Tue May 19 20:57:35 2009 (4A12F30F)
8b157000 8b18b000   fltmgr   fltmgr.sys   Tue Jul 14 02:11:13 2009 (4A5BBF11)
8b18b000 8b19c000   fileinfo fileinfo.sys Tue Jul 14 02:21:51 2009 (4A5BC18F)
8b19c000 8b1f6000   afd      afd.sys      Tue Jul 14 02:12:34 2009 (4A5BBF62)
8b200000 8b20e000   pcw      pcw.sys      Tue Jul 14 02:11:10 2009 (4A5BBF0E)
8b20e000 8b217000   Fs_Rec   Fs_Rec.sys   Tue Jul 14 02:11:14 2009 (4A5BBF12)
8b217000 8b223000   discache discache.sys Tue Jul 14 02:24:04 2009 (4A5BC214)
8b229000 8b358000   Ntfs     Ntfs.sys     Tue Jul 14 02:12:05 2009 (4A5BBF45)
8b358000 8b383000   msrpc    msrpc.sys    Tue Jul 14 02:11:59 2009 (4A5BBF3F)
8b383000 8b396000   ksecdd   ksecdd.sys   Tue Jul 14 02:11:56 2009 (4A5BBF3C)
8b396000 8b3f3000   cng      cng.sys      Tue Jul 14 02:32:55 2009 (4A5BC427)
8b400000 8b40a000   mssmbios mssmbios.sys Tue Jul 14 02:19:25 2009 (4A5BC0FD)
8b412000 8b4c9000   ndis     ndis.sys     Tue Jul 14 02:12:24 2009 (4A5BBF58)
8b4c9000 8b507000   NETIO    NETIO.SYS    Tue Jul 14 02:12:35 2009 (4A5BBF63)
8b507000 8b52c000   ksecpkg  ksecpkg.sys  Tue Jul 14 02:34:00 2009 (4A5BC468)
8b52c000 8b559000   rdyboost rdyboost.sys Tue Jul 14 02:22:02 2009 (4A5BC19A)
8b559000 8b58b000   fvevol   fvevol.sys   Tue Jul 14 02:13:01 2009 (4A5BBF7D)
8b58b000 8b5b0000   CLASSPNP CLASSPNP.SYS Tue Jul 14 02:11:20 2009 (4A5BBF18)
8b5bd000 8b5cb000   netbios  netbios.sys  Tue Jul 14 02:53:54 2009 (4A5BC912)
8b5cb000 8b5de000   wanarp   wanarp.sys   Tue Jul 14 02:55:02 2009 (4A5BC956)
8b5de000 8b5ee000   termdd   termdd.sys   Tue Jul 14 03:01:35 2009 (4A5BCADF)
8b5ee000 8b5f8000   nsiproxy nsiproxy.sys Tue Jul 14 02:12:08 2009 (4A5BBF48)
8b600000 8b611000   disk     disk.sys     Tue Jul 14 02:11:28 2009 (4A5BBF20)
8b618000 8b761000   tcpip    tcpip.sys    Tue Jul 14 02:13:18 2009 (4A5BBF8E)
8b761000 8b792000   fwpkclnt fwpkclnt.sys Tue Jul 14 02:12:03 2009 (4A5BBF43)
8b792000 8b79a380   vmstorfl vmstorfl.sys Tue Jul 14 02:28:44 2009 (4A5BC32C)
8b79b000 8b7da000   volsnap  volsnap.sys  Tue Jul 14 02:11:34 2009 (4A5BBF26)
8b7da000 8b7e2000   spldr    spldr.sys    Mon May 11 19:13:47 2009 (4A084EBB)
8b7e2000 8b7f2000   mup      mup.sys      Tue Jul 14 02:14:14 2009 (4A5BBFC6)
8b7f2000 8b7fa000   hwpolicy hwpolicy.sys Tue Jul 14 02:11:01 2009 (4A5BBF05)
8fc00000 8fc32000   netbt    netbt.sys    Tue Jul 14 02:12:18 2009 (4A5BBF52)
8fc32000 8fc39000   wfplwf   wfplwf.sys   Tue Jul 14 02:53:51 2009 (4A5BC90F)
8fc39000 8fd13000   dump_iaStor dump_iaStor.sys Fri Jun 05 04:42:33 2009 (4A287809)
8fd27000 8fd46000   cdrom    cdrom.sys    Tue Jul 14 02:11:24 2009 (4A5BBF1C)
8fd46000 8fd4d000   Null     Null.SYS     Tue Jul 14 02:11:12 2009 (4A5BBF10)
8fd4d000 8fd54000   Beep     Beep.SYS     Tue Jul 14 02:45:00 2009 (4A5BC6FC)
8fd54000 8fd60000   vga      vga.sys      Tue Jul 14 02:25:50 2009 (4A5BC27E)
8fd60000 8fd81000   VIDEOPRT VIDEOPRT.SYS Tue Jul 14 02:25:49 2009 (4A5BC27D)
8fd81000 8fd8e000   watchdog watchdog.sys Tue Jul 14 02:24:10 2009 (4A5BC21A)
8fd8e000 8fd96000   RDPCDD   RDPCDD.sys   Tue Jul 14 03:01:40 2009 (4A5BCAE4)
8fd96000 8fd9e000   rdpencdd rdpencdd.sys Tue Jul 14 03:01:39 2009 (4A5BCAE3)
8fd9e000 8fda6000   rdprefmp rdprefmp.sys Tue Jul 14 03:01:41 2009 (4A5BCAE5)
8fda6000 8fdb1000   Msfs     Msfs.SYS     Tue Jul 14 02:11:26 2009 (4A5BBF1E)
8fdb1000 8fdbf000   Npfs     Npfs.SYS     Tue Jul 14 02:11:31 2009 (4A5BBF23)
8fdbf000 8fdd6000   tdx      tdx.sys      Tue Jul 14 02:12:10 2009 (4A5BBF4A)
8fdd6000 8fde1000   TDI      TDI.SYS      Tue Jul 14 02:12:12 2009 (4A5BBF4C)
8fde1000 8fe00000   pacer    pacer.sys    Tue Jul 14 02:53:58 2009 (4A5BC916)
9000c000 90070000   csc      csc.sys      Tue Jul 14 02:15:08 2009 (4A5BBFFC)
90070000 90088000   dfsc     dfsc.sys     Tue Jul 14 02:14:16 2009 (4A5BBFC8)
90088000 90096000   blbdrive blbdrive.sys Tue Jul 14 02:23:04 2009 (4A5BC1D8)
90096000 900b7000   tunnel   tunnel.sys   Tue Jul 14 02:54:03 2009 (4A5BC91B)
900b7000 9016e000   dxgkrnl  dxgkrnl.sys  Tue Jul 14 02:26:15 2009 (4A5BC297)
9016e000 901b9000   USBPORT  USBPORT.SYS  Tue Jul 14 02:51:13 2009 (4A5BC871)
901b9000 901fd000   usbhub   usbhub.sys   Tue Jul 14 02:52:06 2009 (4A5BC8A6)
90823000 91179840   nvlddmkm nvlddmkm.sys Tue Jul 28 17:21:09 2009 (4A6F0955)
9117a000 9117b080   nvBridge nvBridge.kmd Tue Jul 28 17:05:43 2009 (4A6F05B7)
9117c000 911b5000   dxgmms1  dxgmms1.sys  Tue Jul 14 02:25:25 2009 (4A5BC265)
911b5000 911c0000   usbuhci  usbuhci.sys  Tue Jul 14 02:51:10 2009 (4A5BC86E)
911c0000 911cf000   usbehci  usbehci.sys  Tue Jul 14 02:51:14 2009 (4A5BC872)
911cf000 911ee000   HDAudBus HDAudBus.sys Tue Jul 14 02:50:55 2009 (4A5BC85F)
911ee000 911ff000   NDProxy  NDProxy.SYS  Tue Jul 14 02:54:27 2009 (4A5BC933)
91600000 91634000   ks       ks.sys       Tue Jul 14 02:45:13 2009 (4A5BC709)
91639000 91a4c000   netw5v32 netw5v32.sys Thu May 14 18:40:33 2009 (4A0C3B71)
91a4c000 91a78000   1394ohci 1394ohci.sys Tue Jul 14 02:51:59 2009 (4A5BC89F)
91a78000 91a80a80   o2sd     o2sd.sys     Thu May 07 04:54:54 2009 (4A023F6E)
91a81000 91aa7000   SCSIPORT SCSIPORT.SYS Tue Jul 14 02:45:55 2009 (4A5BC733)
91aa7000 91ab2180   o2media  o2media.sys  Thu May 07 04:22:32 2009 (4A0237D8)
91ab3000 91ab6700   CmBatt   CmBatt.sys   Tue Jul 14 02:19:18 2009 (4A5BC0F6)
91ab7000 91acf000   i8042prt i8042prt.sys Tue Jul 14 02:11:23 2009 (4A5BBF1B)
91acf000 91adc000   kbdclass kbdclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
91adc000 91b0e380   SynTP    SynTP.sys    Fri Jun 19 05:33:00 2009 (4A3AF8DC)
91b0f000 91b10700   USBD     USBD.SYS     Tue Jul 14 02:51:05 2009 (4A5BC869)
91b11000 91b1e000   mouclass mouclass.sys Tue Jul 14 02:11:15 2009 (4A5BBF13)
91b1e000 91b27000   wmiacpi  wmiacpi.sys  Tue Jul 14 02:19:16 2009 (4A5BC0F4)
91b27000 91b39000   intelppm intelppm.sys Tue Jul 14 02:11:03 2009 (4A5BBF07)
91b39000 91b46000   CompositeBus CompositeBus.sys Tue Jul 14 02:45:26 2009 (4A5BC716)
91b46000 91b58000   AgileVpn AgileVpn.sys Tue Jul 14 02:55:00 2009 (4A5BC954)
91b58000 91b70000   rasl2tp  rasl2tp.sys  Tue Jul 14 02:54:33 2009 (4A5BC939)
91b70000 91b7b000   ndistapi ndistapi.sys Tue Jul 14 02:54:24 2009 (4A5BC930)
91b7b000 91b9d000   ndiswan  ndiswan.sys  Tue Jul 14 02:54:34 2009 (4A5BC93A)
91b9d000 91bb5000   raspppoe raspppoe.sys Tue Jul 14 02:54:53 2009 (4A5BC94D)
91bb5000 91bcc000   raspptp  raspptp.sys  Tue Jul 14 02:54:47 2009 (4A5BC947)
91bcc000 91be3000   rassstp  rassstp.sys  Tue Jul 14 02:54:57 2009 (4A5BC951)
91be3000 91bed000   rdpbus   rdpbus.sys   Tue Jul 14 03:02:40 2009 (4A5BCB20)
91bed000 91bee380   swenum   swenum.sys   Tue Jul 14 02:45:08 2009 (4A5BC704)
91bef000 91bfd000   umbus    umbus.sys    Tue Jul 14 02:51:38 2009 (4A5BC88A)
9222e000 92274000   nwifi    nwifi.sys    Tue Jul 14 02:51:59 2009 (4A5BC89F)
92274000 92284000   ndisuio  ndisuio.sys  Tue Jul 14 02:53:51 2009 (4A5BC90F)
92284000 92297000   rspndr   rspndr.sys   Tue Jul 14 02:53:20 2009 (4A5BC8F0)
92297000 9231c000   HTTP     HTTP.sys     Tue Jul 14 02:12:53 2009 (4A5BBF75)
9231c000 92335000   bowser   bowser.sys   Tue Jul 14 02:14:21 2009 (4A5BBFCD)
92335000 92347000   mpsdrv   mpsdrv.sys   Tue Jul 14 02:52:52 2009 (4A5BC8D4)
92347000 9236a000   mrxsmb   mrxsmb.sys   Tue Jul 14 02:14:24 2009 (4A5BBFD0)
9236a000 923a5000   mrxsmb10 mrxsmb10.sys Tue Jul 14 02:14:34 2009 (4A5BBFDA)
923a5000 923c0000   mrxsmb20 mrxsmb20.sys Tue Jul 14 02:14:29 2009 (4A5BBFD5)
923d8000 923db180   mdmxsdk  mdmxsdk.sys  Tue Jun 20 00:26:59 2006 (449716A3)
93a2c000 93cc8b80   RTKVHDA  RTKVHDA.sys  Wed Aug 05 12:41:49 2009 (4A7953DD)
93cc9000 93cf8000   portcls  portcls.sys  Tue Jul 14 02:51:00 2009 (4A5BC864)
93cf8000 93d11000   drmk     drmk.sys     Tue Jul 14 03:36:05 2009 (4A5BD2F5)
93d11000 93d4e000   HSXHWAZL HSXHWAZL.sys Fri Feb 13 22:58:15 2009 (4995DEE7)
93d4e000 93d65000   usbccgp  usbccgp.sys  Tue Jul 14 02:51:31 2009 (4A5BC883)
93d65000 93d88b00   usbvideo usbvideo.sys Tue Jul 14 02:51:51 2009 (4A5BC897)
93d89000 93da4000   luafv    luafv.sys    Tue Jul 14 02:15:44 2009 (4A5BC020)
93da4000 93dbe000   WudfPf   WudfPf.sys   Tue Jul 14 02:50:13 2009 (4A5BC835)
93dbe000 93dce000   lltdio   lltdio.sys   Tue Jul 14 02:53:18 2009 (4A5BC8EE)
94003000 94105000   HSX_DPV  HSX_DPV.sys  Fri Feb 13 23:00:17 2009 (4995DF61)
94105000 941ba000   HSX_CNXT HSX_CNXT.sys Fri Feb 13 22:57:25 2009 (4995DEB5)
941ba000 941c7000   modem    modem.sys    Tue Jul 14 02:55:24 2009 (4A5BC96C)
941c7000 941d1000   Dxapi    Dxapi.sys    Tue Jul 14 02:25:25 2009 (4A5BC265)
941d1000 941de000   crashdmp crashdmp.sys Tue Jul 14 02:45:50 2009 (4A5BC72E)
941de000 941ef000   dump_dumpfve dump_dumpfve.sys Tue Jul 14 02:12:47 2009 (4A5BBF6F)
941ef000 941fa000   monitor  monitor.sys  Tue Jul 14 02:25:58 2009 (4A5BC286)
96300000 9654a000   win32k   win32k.sys   Tue Jul 14 02:26:26 2009 (4A5BC2A2)
96560000 96569000   TSDDD    TSDDD.dll    Tue Jul 14 03:01:40 2009 (4A5BCAE4)
96590000 965ae000   cdd      cdd.dll      unavailable (00000000)
9880f000 988a6000   peauth   peauth.sys   Tue Jul 14 03:35:44 2009 (4A5BD2E0)
988a6000 988b0000   secdrv   secdrv.SYS   Wed Sep 13 16:18:32 2006 (45080528)
988b0000 988d1000   srvnet   srvnet.sys   Tue Jul 14 02:14:45 2009 (4A5BBFE5)
988d1000 988de000   tcpipreg tcpipreg.sys Tue Jul 14 02:54:14 2009 (4A5BC926)
988de000 988e6000   XAudio32 XAudio32.sys Wed Apr 29 21:20:55 2009 (49F89A87)
988e6000 98935000   srv2     srv2.sys     Tue Jul 14 02:14:52 2009 (4A5BBFEC)
98935000 98986000   srv      srv.sys      Tue Jul 14 02:15:10 2009 (4A5BBFFE)
98986000 989f0000   spsys    spsys.sys    Mon May 11 19:37:10 2009 (4A085436)
989f0000 989f1580   MSPQM    MSPQM.sys    Tue Jul 14 02:45:07 2009 (4A5BC703)

Unloaded modules:
923c0000 923d8000   parport.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8b5b0000 8b5bd000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8fc3c000 8fd16000   dump_iaStor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
8fd16000 8fd27000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
My System SpecsSystem Spec
11 Oct 2010   #10
cybercore

Windows 7 x64
 
 

In addition, do the memory tests:

101110-16567-01.dmp
BugCheck A, {40000, 2, 1, 82abd620}
Probably caused by : hardware
BUCKET_ID: CPU_CALL_ERROR
Possible invalid call from 82ae8b7d ( nt!MiInsertPageInFreeOrZeroedList+0x1e7 )
*** Expected target 82abd5f0 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )


MemTest: RAM reliability tester for Windows can run this one under windows

RAM - Test with Memtest86+ bootable CD, run overnight for better accuracy



Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\101110-16567-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a55000 PsLoadedModuleList = 0x82b9d810
Debug session time: Mon Oct 11 13:03:27.072 2010 (GMT-5)
System Uptime: 0 days 0:11:18.038
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {40000, 2, 1, 82abd620}

Probably caused by : hardware

Followup: MachineOwner
---------
 *** Possible invalid call from 82ae8b7d ( nt!MiInsertPageInFreeOrZeroedList+0x1e7 )
 *** Expected target 82abd5f0 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00040000, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000001, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 82abd620, address which referenced memory

Debugging Details:
------------------


WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82bbd718
Unable to read MiSystemVaType memory at 82b9d160
 00040000 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KeAcquireQueuedSpinLockAtDpcLevel+20
82abd620 8908            mov     dword ptr [eax],ecx

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  80786c18 -- (.trap 0xffffffff80786c18)
ErrCode = 00000002
eax=00040000 ebx=00000370 ecx=80786cac edx=850fcb81 esi=8432c0d0 edi=850fcb70
eip=82abd620 esp=80786c8c ebp=80786cb8 iopl=0         nv up ei ng nz na pe nc
cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010286
nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20:
82abd620 8908            mov     dword ptr [eax],ecx  ds:0023:00040000=????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from 82ae8b82 to 82abd620

POSSIBLE_INVALID_CONTROL_TRANSFER:  from 82ae8b7d to 82abd5f0

STACK_TEXT:  
80786c88 82ae8b82 00000000 843368b4 8432c0d8 nt!KeAcquireQueuedSpinLockAtDpcLevel+0x20
80786cb8 82ab8d9a 85143560 851ca020 00000000 nt!MiInsertPageInFreeOrZeroedList+0x1ec
80786d44 82be0483 00000000 80786d90 82c6366d nt!MmZeroPageThread+0x4c6
80786d50 82c6366d 8080a948 a40faa19 00000000 nt!Phase1Initialization+0x14
80786d90 82b150d9 82be046f 8080a948 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19


STACK_COMMAND:  .trap 0xffffffff80786c18 ; kb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: hardware

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  CPU_CALL_ERROR

Followup: MachineOwner
---------
 *** Possible invalid call from 82ae8b7d ( nt!MiInsertPageInFreeOrZeroedList+0x1e7 )
 *** Expected target 82abd5f0 ( nt!KeAcquireInStackQueuedSpinLockAtDpcLevel+0x0 )
My System SpecsSystem Spec
Reply

 BSOD




Thread Tools



Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 14:22.
Twitter Facebook Google+ Seven Forums iOS App Seven Forums Android App