I have confirmed that I am running the latest versions of NVSTOR.SYS and NVSTOR64.SYS.
Here are a few more updates/things I've tried:
- Yesterday I ran the computer for over 24 hours in safe mode without a BSOD.
- This morning I unplugged my NVIDIA video card and my DVD-ROM (which is also using a SATA connection). Therefore I was using the original on-board video card. I then booted up into regular (non-safe) mode. The computer still crashed multiple times over a few hours. I'm attaching the minidumps from those crashes. Does it still look like NVSTOR.SYS and/or NVSTOR64.SYS are causing the crashes?
- Just a reminder, I ran memtest for 6 successful passes a few days ago.
Any other suggestions? I'm thinking about formatting and starting with a fresh install of Windows 7 and possible using the 32-bit version rather than the 64-bit version to see if that will help straighten things out.
Thank you for your help.
-Scott
Still memory corruption being blamed. Suspect a driver perhaps your storage driver. ONly way to tell is to run driver verifier
Beyond that, please run Verifier with these settings:
Using Driver Verifier is an iffy proposition. Most times it'll crash and it'll tell you what the driver is. But sometimes it'll crash and won't tell you the driver. Other times it'll crash before you can log in to Windows. If you can't get to Safe Mode, then you'll have to resort to offline editing of the registry to disable Driver Verifier.
So, I'd suggest that you first backup your stuff and then make sure you've got access to another computer so you can contact us if problems arise. Then make a System Restore point (so you can restore the system using the Vista/Win7 Startup Repair feature).
Then, here's the procedure:
- Go to Start and type in "verifier" (without the quotes) and press Enter
- Select "Create custom settings (for code developers)" and click "Next"
- Select "Select individual settings from a full list" and click "Next"
- Select everything EXCEPT FOR "Low Resource Simulation" and click "Next"
NOTE: You can use Low Resource Simulation if you'd like. From my limited experimentation it makes the BSOD's come faster.
- Select "Select driver names from a list" and click "Next"
Then select all drivers NOT provided by Microsoft and click "Next"
- Select "Finish" on the next page.
Reboot the system and wait for it to crash to the Blue Screen. Continue to use your system normally, and if you know what causes the crash, do that repeatedly. The objective here is to get the system to crash because Driver Verifier is stressing the drivers out. If it doesn't crash for you, then let it run for at least 36 hours of continuous operation (an estimate on my part).
Reboot into Windows (after the crash) and turn off Driver Verifier by going back in and selecting "Delete existing settings" on the first page, then locate and zip up the memory dump file and upload it with your next post.
If you can't get into Windows because it crashes too soon, try it in Safe Mode.
If you can't get into Safe Mode, try using System Restore from your installation DVD to set the system back to the previous restore point that you created.
If that doesn't work, post back and we'll have to see about fixing the registry entry off-line:
Code:
Delete these registry keys (works in XP, Vista, Win7):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\VerifyDrivers
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\VerifyDriverLevel
Using Driver Verifier to identify issues with Windows drivers for advanced users
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\New folder\112010-19515-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03062000 PsLoadedModuleList = 0xfffff800`0329fe50
Debug session time: Sat Nov 20 11:10:24.590 2010 (GMT-5)
System Uptime: 0 days 0:19:41.056
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff6ec40017a18, 2, 1, fffff800030eac84}
Probably caused by : memory_corruption ( nt!MiPfnShareCountIsZero+104 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff6ec40017a18, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030eac84, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330a0e0
fffff6ec40017a18
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiPfnShareCountIsZero+104
fffff800`030eac84 4c890410 mov qword ptr [rax+rdx],r8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88004ea7770 -- (.trap 0xfffff88004ea7770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000006c40017a18 rbx=0000000000000000 rcx=0000000000000045
rdx=fffff68000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030eac84 rsp=fffff88004ea7900 rbp=0000058000000000
r8=00000000d49f9963 r9=0000000000000005 r10=ffffd88002f439f0
r11=0000007ffffffff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiPfnShareCountIsZero+0x104:
fffff800`030eac84 4c890410 mov qword ptr [rax+rdx],r8 ds:fffff6ec`40017a18=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d1ca9 to fffff800030d2740
STACK_TEXT:
fffff880`04ea7628 fffff800`030d1ca9 : 00000000`0000000a fffff6ec`40017a18 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`04ea7630 fffff800`030d0920 : 00000000`00000000 fffffa80`03445bc0 00000000`000007ff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`04ea7770 fffff800`030eac84 : fffffa80`0344e980 fffff800`030f8b83 ffffffff`ffffffff fffff800`031d8c76 : nt!KiPageFault+0x260
fffff880`04ea7900 fffff800`03117db5 : 00000003`00000000 00000000`00000000 fffffa80`03c6a060 81d00001`16c94225 : nt!MiPfnShareCountIsZero+0x104
fffff880`04ea7970 fffff800`030ece2b : 00000000`77163004 fffff680`003b8b18 00000000`00000000 fffff800`00000000 : nt!MiCopyOnWrite+0x7a5
fffff880`04ea7ac0 fffff800`030d082e : 00000000`00000001 00000000`77030000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0xa2b
fffff880`04ea7c20 00000000`77078f69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`000ef7f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77078f69
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiPfnShareCountIsZero+104
fffff800`030eac84 4c890410 mov qword ptr [rax+rdx],r8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiPfnShareCountIsZero+104
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiPfnShareCountIsZero+104
BUCKET_ID: X64_0xA_nt!MiPfnShareCountIsZero+104
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff6ec40017a18, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030eac84, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: fffff6ec40017a18
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiPfnShareCountIsZero+104
fffff800`030eac84 4c890410 mov qword ptr [rax+rdx],r8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff88004ea7770 -- (.trap 0xfffff88004ea7770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000006c40017a18 rbx=0000000000000000 rcx=0000000000000045
rdx=fffff68000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030eac84 rsp=fffff88004ea7900 rbp=0000058000000000
r8=00000000d49f9963 r9=0000000000000005 r10=ffffd88002f439f0
r11=0000007ffffffff8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiPfnShareCountIsZero+0x104:
fffff800`030eac84 4c890410 mov qword ptr [rax+rdx],r8 ds:fffff6ec`40017a18=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d1ca9 to fffff800030d2740
STACK_TEXT:
fffff880`04ea7628 fffff800`030d1ca9 : 00000000`0000000a fffff6ec`40017a18 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`04ea7630 fffff800`030d0920 : 00000000`00000000 fffffa80`03445bc0 00000000`000007ff 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`04ea7770 fffff800`030eac84 : fffffa80`0344e980 fffff800`030f8b83 ffffffff`ffffffff fffff800`031d8c76 : nt!KiPageFault+0x260
fffff880`04ea7900 fffff800`03117db5 : 00000003`00000000 00000000`00000000 fffffa80`03c6a060 81d00001`16c94225 : nt!MiPfnShareCountIsZero+0x104
fffff880`04ea7970 fffff800`030ece2b : 00000000`77163004 fffff680`003b8b18 00000000`00000000 fffff800`00000000 : nt!MiCopyOnWrite+0x7a5
fffff880`04ea7ac0 fffff800`030d082e : 00000000`00000001 00000000`77030000 00000000`00000001 00000000`00000000 : nt!MmAccessFault+0xa2b
fffff880`04ea7c20 00000000`77078f69 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`000ef7f0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77078f69
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiPfnShareCountIsZero+104
fffff800`030eac84 4c890410 mov qword ptr [rax+rdx],r8
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiPfnShareCountIsZero+104
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiPfnShareCountIsZero+104
BUCKET_ID: X64_0xA_nt!MiPfnShareCountIsZero+104
Followup: MachineOwner
---------