New
#1
BSOD
Hi,
Just found the BSOD posting instructions and have including the files. Hopefully, I was able to provide everything correctly.
Windows 7 64bit
OEM from Best Buy
Bought in January 2009
Thanks,
Russell
Hi,
Just found the BSOD posting instructions and have including the files. Hopefully, I was able to provide everything correctly.
Windows 7 64bit
OEM from Best Buy
Bought in January 2009
Thanks,
Russell
IRQL_NOT_LESS_OR_EQUAL (a)
This is usually caused by drivers using improper addresses.
Update:
WmXlCore.sys Thu Jan 24 18:01:22 2008
Logitech gamepad
Rt64win7.sys Thu Jul 30 07:58:43 2009
Realtek 8136/8168/8169 PCI/PCIe Adapters
rtl8192se.sys Fri Oct 02 01:33:48 2009
Realtek RTL81892SE Wireless LAN PCI-E NIC
RTKVHD64.sys Tue Jul 28 09:00:05 2009
Realtek Audio
atikmdag.sys Thu Jul 30 00:23:28 2009
ATI
pgeffect.sys Mon Jun 22 05:00:11 2009
TOSHIBA Universal Camera
SynTP.sys Mon Jul 20 20:07:29 2009
Synaptics Touchpad
tos_sps64.sys Wed Jun 24 01:31:09 2009
Get all available Toshiba updates
DMP
Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\a\Minidump\D M P\121310-41901-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`0381a000 PsLoadedModuleList = 0xfffff800`03a57e50 Debug session time: Mon Dec 13 09:29:16.227 2010 (UTC - 5:00) System Uptime: 0 days 0:01:14.053 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {90, 2, 0, fffff80003891995} Probably caused by : msrpc.sys ( msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000090, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003891995, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003ac20e0 0000000000000090 CURRENT_IRQL: 2 FAULTING_IP: nt!KiCommitThreadWait+1d5 fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: SmartFaceVWatc TRAP_FRAME: fffff88007ad62f0 -- (.trap 0xfffff88007ad62f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007ad6440 rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003891995 rsp=fffff88007ad6480 rbp=0000000000000001 r8=0000000000000000 r9=0000000000007e00 r10=0000000000000009 r11=fffffa80033d433c r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiCommitThreadWait+0x1d5: fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h] ds:00000000`00000090=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003889ca9 to fffff8000388a740 STACK_TEXT: fffff880`07ad61a8 fffff800`03889ca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`07ad61b0 fffff800`03888920 : fffffa80`05a73060 00000000`00000000 00000000`0986fd3a fffff800`03a04e80 : nt!KiBugCheckDispatch+0x69 fffff880`07ad62f0 fffff800`03891995 : fffffa80`06688060 fffffa80`06688060 fffff800`03a19a20 fffff800`00000009 : nt!KiPageFault+0x260 fffff880`07ad6480 fffff800`03893cff : fffff800`03a04e80 fffff800`03a04e80 00000000`0000006c fffffa80`06089940 : nt!KiCommitThreadWait+0x1d5 fffff880`07ad6510 fffff880`0115c1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`05ca3c00 : nt!KeWaitForSingleObject+0x19f fffff880`07ad65b0 fffff880`0115b05d : fffffa80`06688060 fffff8a0`02c87320 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118 fffff880`07ad6620 fffff880`0115b37b : fffff8a0`03133e40 00000000`00000000 fffff8a0`03133e40 fffff8a0`02c87320 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d fffff880`07ad6760 fffff880`0115e9d2 : fffff8a0`02c87320 fffff8a0`02c87320 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b fffff880`07ad6790 fffff960`003644f3 : fffff8a0`0308b3a0 fffff900`c29096a0 00000000`00000001 00000000`000007ff : msrpc!RpcBindingCopy+0x42 fffff880`07ad67c0 fffff960`000e26a9 : fffff900`c29096a0 00000000`00000000 fffffa80`06529b30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77 fffff880`07ad6820 fffff960`0013d285 : 00000000`00000030 fffffa80`06688060 fffff880`07ad6c20 fffffa80`06529b30 : win32k!PostPlaySoundMessage+0x25 fffff880`07ad6850 fffff960`001342cb : fffff900`c29096a0 fffff880`07ad6c20 00000000`ffffffff fffffa80`06529b30 : win32k!DestroyProcessInfo+0x125 fffff880`07ad6880 fffff960`001343c6 : fffffa80`04b34500 fffff900`c29096a0 00020508`00000000 fffff8a0`002dd001 : win32k!xxxUserProcessCallout+0x15f fffff880`07ad68d0 fffff800`03b6fa01 : fffffa80`04b345e0 00000000`00000000 00000000`00000000 fffffa80`06688060 : win32k!W32pProcessCallout+0x4e fffff880`07ad6900 fffff800`03b48635 : 00000000`00000000 fffff800`03b89101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561 fffff880`07ad69c0 fffff800`038671db : fffffa80`05bfc001 fffffa80`0665c010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d fffff880`07ad69f0 fffff800`03867620 : 00000000`00383930 fffff880`07ad6a70 fffff800`03b4874c 00000000`00000001 : nt!KiDeliverApc+0x2eb fffff880`07ad6a70 fffff800`03889a37 : 00000000`0000046e 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70 fffff880`07ad6bb0 00000000`779601ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c 00000000`02acf508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779601ea STACK_COMMAND: kb FOLLOWUP_IP: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 fffff880`0115c1c8 8b7710 mov esi,dword ptr [rdi+10h] SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 FOLLOWUP_NAME: MachineOwner MODULE_NAME: msrpc IMAGE_NAME: msrpc.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc17c FAILURE_BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000090, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80003891995, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 0000000000000090 CURRENT_IRQL: 2 FAULTING_IP: nt!KiCommitThreadWait+1d5 fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: SmartFaceVWatc TRAP_FRAME: fffff88007ad62f0 -- (.trap 0xfffff88007ad62f0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=000007fffffd0001 rbx=0000000000000000 rcx=fffff88007ad6440 rdx=00000000000007ff rsi=0000000000000000 rdi=0000000000000000 rip=fffff80003891995 rsp=fffff88007ad6480 rbp=0000000000000001 r8=0000000000000000 r9=0000000000007e00 r10=0000000000000009 r11=fffffa80033d433c r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc nt!KiCommitThreadWait+0x1d5: fffff800`03891995 488bbb90000000 mov rdi,qword ptr [rbx+90h] ds:00000000`00000090=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003889ca9 to fffff8000388a740 STACK_TEXT: fffff880`07ad61a8 fffff800`03889ca9 : 00000000`0000000a 00000000`00000090 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`07ad61b0 fffff800`03888920 : fffffa80`05a73060 00000000`00000000 00000000`0986fd3a fffff800`03a04e80 : nt!KiBugCheckDispatch+0x69 fffff880`07ad62f0 fffff800`03891995 : fffffa80`06688060 fffffa80`06688060 fffff800`03a19a20 fffff800`00000009 : nt!KiPageFault+0x260 fffff880`07ad6480 fffff800`03893cff : fffff800`03a04e80 fffff800`03a04e80 00000000`0000006c fffffa80`06089940 : nt!KiCommitThreadWait+0x1d5 fffff880`07ad6510 fffff880`0115c1c8 : 00000000`00000000 fffff8a0`00000000 00000000`00000000 fffffa80`05ca3c00 : nt!KeWaitForSingleObject+0x19f fffff880`07ad65b0 fffff880`0115b05d : fffffa80`06688060 fffff8a0`02c87320 00000000`00000001 fffffa80`cd637052 : msrpc!LRPC_CASSOCIATION::OpenSecurityContext+0x118 fffff880`07ad6620 fffff880`0115b37b : fffff8a0`03133e40 00000000`00000000 fffff8a0`03133e40 fffff8a0`02c87320 : msrpc!LRPC_BASE_BINDING_HANDLE::BaseBindingCopy+0x15d fffff880`07ad6760 fffff880`0115e9d2 : fffff8a0`02c87320 fffff8a0`02c87320 00000000`00000001 00000000`00000058 : msrpc!LRPC_FAST_BINDING_HANDLE::BindingCopy+0x8b fffff880`07ad6790 fffff960`003644f3 : fffff8a0`0308b3a0 fffff900`c29096a0 00000000`00000001 00000000`000007ff : msrpc!RpcBindingCopy+0x42 fffff880`07ad67c0 fffff960`000e26a9 : fffff900`c29096a0 00000000`00000000 fffffa80`06529b30 00000000`00000000 : win32k!PlaySoundPostMessage+0x77 fffff880`07ad6820 fffff960`0013d285 : 00000000`00000030 fffffa80`06688060 fffff880`07ad6c20 fffffa80`06529b30 : win32k!PostPlaySoundMessage+0x25 fffff880`07ad6850 fffff960`001342cb : fffff900`c29096a0 fffff880`07ad6c20 00000000`ffffffff fffffa80`06529b30 : win32k!DestroyProcessInfo+0x125 fffff880`07ad6880 fffff960`001343c6 : fffffa80`04b34500 fffff900`c29096a0 00020508`00000000 fffff8a0`002dd001 : win32k!xxxUserProcessCallout+0x15f fffff880`07ad68d0 fffff800`03b6fa01 : fffffa80`04b345e0 00000000`00000000 00000000`00000000 fffffa80`06688060 : win32k!W32pProcessCallout+0x4e fffff880`07ad6900 fffff800`03b48635 : 00000000`00000000 fffff800`03b89101 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561 fffff880`07ad69c0 fffff800`038671db : fffffa80`05bfc001 fffffa80`0665c010 00000000`00000000 00000000`00000000 : nt!PsExitSpecialApc+0x1d fffff880`07ad69f0 fffff800`03867620 : 00000000`00383930 fffff880`07ad6a70 fffff800`03b4874c 00000000`00000001 : nt!KiDeliverApc+0x2eb fffff880`07ad6a70 fffff800`03889a37 : 00000000`0000046e 00000000`00000000 00000000`00000001 0000007f`ffffffff : nt!KiInitiateUserApc+0x70 fffff880`07ad6bb0 00000000`779601ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c 00000000`02acf508 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x779601ea STACK_COMMAND: kb FOLLOWUP_IP: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 fffff880`0115c1c8 8b7710 mov esi,dword ptr [rdi+10h] SYMBOL_STACK_INDEX: 5 SYMBOL_NAME: msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 FOLLOWUP_NAME: MachineOwner MODULE_NAME: msrpc IMAGE_NAME: msrpc.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc17c FAILURE_BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 BUCKET_ID: X64_0xA_msrpc!LRPC_CASSOCIATION::OpenSecurityContext+118 Followup: MachineOwner Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\a\Minidump\D M P\121310-93241-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16617.amd64fre.win7_gdr.100618-1621 Machine Name: Kernel base = 0xfffff800`03854000 PsLoadedModuleList = 0xfffff800`03a91e50 Debug session time: Mon Dec 13 10:20:07.631 2010 (UTC - 5:00) System Uptime: 0 days 0:37:41.473 Loading Kernel Symbols ............................................................... ................................................................ .......................... Loading User Symbols Loading unloaded module list ..... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {0, 2, 0, fffff800038e42b3} Probably caused by : win32k.sys ( win32k!GreLockVisRgn+19 ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800038e42b3, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003afc0e0 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: nt!IopCompleteRequest+ae3 fffff800`038e42b3 488b09 mov rcx,qword ptr [rcx] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: rundll32.exe IRP_ADDRESS: ffffffffffffff89 TRAP_FRAME: fffff88006ef33a0 -- (.trap 0xfffff88006ef33a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff88006ef3728 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff800038e42b3 rsp=fffff88006ef3530 rbp=fffff88006ef3680 r8=fffffa8005bc0850 r9=fffff88006ef3630 r10=0000000000000002 r11=fffffa8005bc0f40 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po cy nt!IopCompleteRequest+0xae3: fffff800`038e42b3 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800038c3ca9 to fffff800038c4740 STACK_TEXT: fffff880`06ef3258 fffff800`038c3ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`06ef3260 fffff800`038c2920 : fffffa80`04a0c4c0 fffffa80`05c6f660 fffffa80`04a0c500 fffff800`038f7f8c : nt!KiBugCheckDispatch+0x69 fffff880`06ef33a0 fffff800`038e42b3 : fffffa80`043b6f68 fffffa80`042da400 00000000`0000007f 00000000`00000030 : nt!KiPageFault+0x260 fffff880`06ef3530 fffff800`038a10c7 : 00000000`00000001 fffffa80`039371c0 00000000`00000000 fffffa80`00000000 : nt!IopCompleteRequest+0xae3 fffff880`06ef3600 fffff800`038a1487 : fffffa80`051dcb60 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7 fffff880`06ef3680 fffff800`038bade5 : fffff800`038d07e3 00000000`00000030 fffffa80`051dcb60 fffff900`c1ad3010 : nt!KiApcInterrupt+0xd7 fffff880`06ef3818 fffff800`038d07e3 : 00000000`00000030 fffffa80`051dcb60 fffff900`c1ad3010 00000000`00000000 : nt!ExAcquireResourceSharedLite+0x5 fffff880`06ef3820 fffff960`001f6db1 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff900`00000000 : nt!ExEnterPriorityRegionAndAcquireResourceShared+0x23 fffff880`06ef3850 fffff960`00134313 : fffff900`c1ad3010 fffff880`06ef3c20 00000000`ffffffff fffffa80`03937060 : win32k!GreLockVisRgn+0x19 fffff880`06ef3880 fffff960`001343c6 : fffffa80`0574e900 fffff900`c1ad3010 00000000`a0000000 fffffa80`05c64890 : win32k!xxxUserProcessCallout+0x1a7 fffff880`06ef38d0 fffff800`03ba9a01 : fffffa80`0574e960 00000000`00000000 00000000`00000000 fffffa80`051dcb60 : win32k!W32pProcessCallout+0x4e fffff880`06ef3900 fffff800`03b82635 : 00000000`00000000 fffffa80`051dcb01 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561 fffff880`06ef39c0 fffff800`038a11db : 00000000`00000000 00000000`00000000 fffffa80`05c64960 00000000`00000000 : nt!PsExitSpecialApc+0x1d fffff880`06ef39f0 fffff800`038a1620 : 00000000`000ffb90 fffff880`06ef3a70 fffff800`03b8274c 00000000`00000001 : nt!KiDeliverApc+0x2eb fffff880`06ef3a70 fffff800`038c3a37 : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInitiateUserApc+0x70 fffff880`06ef3bb0 00000000`775dff1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c 00000000`00c5ee88 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775dff1a STACK_COMMAND: kb FOLLOWUP_IP: win32k!GreLockVisRgn+19 fffff960`001f6db1 488b1588331500 mov rdx,qword ptr [win32k!ghsemDynamicModeChange (fffff960`0034a140)] SYMBOL_STACK_INDEX: 8 SYMBOL_NAME: win32k!GreLockVisRgn+19 FOLLOWUP_NAME: MachineOwner MODULE_NAME: win32k IMAGE_NAME: win32k.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4c7dc13c FAILURE_BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19 BUCKET_ID: X64_0xA_win32k!GreLockVisRgn+19 Followup: MachineOwner ---------
DRIVERS:
Code:start end module name fffff880`00f2b000 fffff880`00f82000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106) fffff880`02cca000 fffff880`02d54000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`0453d000 fffff880`04553000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0) fffff880`03a77000 fffff880`03a8c000 amdppm amdppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD) fffff880`00dba000 fffff880`00dc5000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB) fffff880`00d7c000 fffff880`00d85000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00d85000 fffff880`00daf000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118) fffff880`03ce0000 fffff880`042f7000 atikmdag atikmdag.sys Thu Jul 30 00:23:28 2009 (4A712040) fffff880`01880000 fffff880`01888000 AtiPcie AtiPcie.sys Tue May 05 11:00:22 2009 (4A005486) fffff880`00ff3000 fffff880`00fff000 BATTC BATTC.SYS Mon Jul 13 19:31:01 2009 (4A5BC3B5) fffff880`018ad000 fffff880`018b4000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D) fffff880`02ded000 fffff880`02dfe000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF) fffff880`02ac8000 fffff880`02ae6000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206) fffff960`00700000 fffff960`00727000 cdd cdd.dll unavailable (00000000) fffff880`0122b000 fffff880`01255000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`00c00000 fffff880`00cc0000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D) fffff880`01850000 fffff880`01880000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00d04000 fffff880`00d62000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03a8c000 fffff880`03a90500 CmBatt CmBatt.sys Mon Jul 13 19:31:03 2009 (4A5BC3B7) fffff880`01377000 fffff880`013ea000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814) fffff880`00fea000 fffff880`00ff3000 compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6) fffff880`0452d000 fffff880`0453d000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1) fffff880`05612000 fffff880`05620000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`02ca6000 fffff880`02cc4000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200) fffff880`02c97000 fffff880`02ca6000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E) fffff880`0183a000 fffff880`01850000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`04efa000 fffff880`04f1c000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5) fffff880`04f39000 fffff880`04f45000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`04f50000 fffff880`04f63000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F) fffff880`04f45000 fffff880`04f50000 dump_msahci dump_msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`010ce000 fffff880`010f9000 dwprot dwprot.sys Mon Jul 26 08:54:08 2010 (4C4D8570) fffff880`05606000 fffff880`05612000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574) fffff880`042f7000 fffff880`043eb000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E) fffff880`03c00000 fffff880`03c46000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578) fffff880`010ba000 fffff880`010ce000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481) fffff880`0106e000 fffff880`010ba000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F) fffff880`015e2000 fffff880`015ec000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111) fffff880`01800000 fffff880`0183a000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7) fffff880`03a6f000 fffff880`03a77000 FwLnk FwLnk.sys Mon Jul 06 20:51:41 2009 (4A529C1D) fffff880`01000000 fffff880`0104a000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164) fffff880`03c9b000 fffff880`03ca8000 GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0) fffff800`0380b000 fffff800`03854000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08) fffff880`03a00000 fffff880`03a24000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5) fffff880`02a00000 fffff880`02ac8000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8) fffff880`019db000 fffff880`019e4000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA) fffff880`03a24000 fffff880`03a42000 i8042prt i8042prt.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`03cc4000 fffff880`03cd3000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff800`00ba6000 fffff800`00ba9000 kdcom kdcom.dll Tue Nov 30 09:40:39 2010 (4CF50CE7) fffff880`0441c000 fffff880`0445f000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F) fffff880`015b7000 fffff880`015d1000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156) fffff880`01200000 fffff880`0122b000 ksecpkg ksecpkg.sys Fri Dec 11 01:03:32 2009 (4B21E0B4) fffff880`05600000 fffff880`05605200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93) fffff880`04fea000 fffff880`04fff000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`04fa6000 fffff880`04fc9000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295) fffff880`00ce3000 fffff880`00cf0000 mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65) fffff880`04f98000 fffff880`04fa6000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C) fffff880`0451e000 fffff880`0452d000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116) fffff880`00d62000 fffff880`00d7c000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`011b7000 fffff880`011e4000 MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0) fffff880`02b6d000 fffff880`02b85000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79) fffff880`02b85000 fffff880`02bb2000 mrxsmb mrxsmb.sys Sat Feb 27 02:52:19 2010 (4B88CF33) fffff880`02bb2000 fffff880`02c00000 mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C) fffff880`04e00000 fffff880`04e23000 mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A) fffff880`00daf000 fffff880`00dba000 msahci msahci.sys Mon Jul 13 20:01:01 2009 (4A5BCABD) fffff880`013f3000 fffff880`013fe000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113) fffff880`00f8b000 fffff880`00f95000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE) fffff880`010f9000 fffff880`01157000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C) fffff880`02c8c000 fffff880`02c97000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE) fffff880`019c9000 fffff880`019db000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201) fffff880`0126b000 fffff880`0135d000 NDIS NDIS.SYS Mon Jul 13 19:21:40 2009 (4A5BC184) fffff880`04577000 fffff880`04583000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8) fffff880`02b42000 fffff880`02b55000 ndisuio ndisuio.sys Mon Jul 13 20:09:25 2009 (4A5BCCB5) fffff880`04583000 fffff880`045b2000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`04ea8000 fffff880`04ebd000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD) fffff880`02dde000 fffff880`02ded000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff880`02d54000 fffff880`02d99000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178) fffff880`01157000 fffff880`011b7000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A) fffff880`011e4000 fffff880`011f5000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`02c80000 fffff880`02c8c000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E) fffff800`03854000 fffff800`03e30000 nt ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9) fffff880`01414000 fffff880`015b7000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F) fffff880`019f7000 fffff880`01a00000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109) fffff880`02aef000 fffff880`02b42000 nwifi nwifi.sys Mon Jul 13 20:07:23 2009 (4A5BCC3B) fffff880`02da2000 fffff880`02dc8000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5) fffff880`00fd5000 fffff880`00fea000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E) fffff880`00f95000 fffff880`00fc8000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`00e71000 fffff880`00e78000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115) fffff880`00cc0000 fffff880`00cd0000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114) fffff880`015d1000 fffff880`015e2000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF) fffff880`06283000 fffff880`06329000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF) fffff880`04f91000 fffff880`04f97e80 pgeffect pgeffect.sys Mon Jun 22 05:00:11 2009 (4A3F481B) fffff880`04ebd000 fffff880`04efa000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03) fffff880`00cf0000 fffff880`00d04000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027) fffff880`0136a000 fffff880`01376040 PxHlpa64 PxHlpa64.sys Tue Oct 20 14:08:42 2009 (4ADDFCAA) fffff880`04553000 fffff880`04577000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3) fffff880`045b2000 fffff880`045cd000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9) fffff880`045cd000 fffff880`045ee000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA) fffff880`04400000 fffff880`0441a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1) fffff880`02c2f000 fffff880`02c80000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219) fffff880`01255000 fffff880`0125e000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`0125e000 fffff880`01267000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`013ea000 fffff880`013f3000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63) fffff880`0638d000 fffff880`063c5000 RDPWD RDPWD.SYS Mon Jul 13 20:16:47 2009 (4A5BCE6F) fffff880`0198f000 fffff880`019c9000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A) fffff880`02b55000 fffff880`02b6d000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92) fffff880`03c53000 fffff880`03c91000 Rt64win7 Rt64win7.sys Thu Jul 30 07:58:43 2009 (4A718AF3) fffff880`05621000 fffff880`057ffd00 RTKVHD64 RTKVHD64.sys Tue Jul 28 09:00:05 2009 (4A6EF655) fffff880`03a91000 fffff880`03b99000 rtl8192se rtl8192se.sys Fri Oct 02 01:33:48 2009 (4AC590BC) fffff880`06329000 fffff880`06334000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E) fffff880`01987000 fffff880`0198f000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB) fffff880`0683f000 fffff880`068d5000 srv srv.sys Thu Aug 26 23:38:00 2010 (4C773318) fffff880`06200000 fffff880`06267000 srv2 srv2.sys Thu Aug 26 23:37:46 2010 (4C77330A) fffff880`06334000 fffff880`06361000 srvnet srvnet.sys Thu Aug 26 23:37:24 2010 (4C7732F4) fffff880`0441a000 fffff880`0441b480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92) fffff880`044d3000 fffff880`0451c000 SynTP SynTP.sys Mon Jul 20 20:07:29 2009 (4A6506C1) fffff880`01600000 fffff880`017fd000 tcpip tcpip.sys Sun Jun 13 23:39:04 2010 (4C15A458) fffff880`06361000 fffff880`06373000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD) fffff880`03c91000 fffff880`03c9b000 tdcmdpst tdcmdpst.sys Thu Jul 30 04:39:35 2009 (4A715C47) fffff880`0135d000 fffff880`0136a000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E) fffff880`06373000 fffff880`0637e000 tdtcp tdtcp.sys Mon Jul 13 20:16:32 2009 (4A5BCE60) fffff880`0104a000 fffff880`01068000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B) fffff880`02c1b000 fffff880`02c2f000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64) fffff880`0190d000 fffff880`01987000 tos_sps64 tos_sps64.sys Wed Jun 24 01:31:09 2009 (4A41BA1D) fffff960`005d0000 fffff960`005da000 TSDDD TSDDD.dll Mon Jul 13 20:16:34 2009 (4A5BCE62) fffff880`0637e000 fffff880`0638d000 tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69) fffff880`03a42000 fffff880`03a68000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1) fffff880`01908000 fffff880`0190ce00 TVALZ_O TVALZ_O.SYS Mon Jul 13 22:19:26 2009 (4A5BEB2E) fffff880`03a68000 fffff880`03a6f000 TVALZFL TVALZFL.sys Fri Jun 19 06:05:44 2009 (4A3B62F8) fffff880`04470000 fffff880`04482000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20) fffff880`04f1c000 fffff880`04f39000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15) fffff880`0451c000 fffff880`0451df00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF) fffff880`03cb3000 fffff880`03cc4000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`04e4e000 fffff880`04ea8000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D) fffff880`03ca8000 fffff880`03cb3000 usbohci usbohci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06) fffff880`03b99000 fffff880`03bef000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07) fffff880`04f63000 fffff880`04f90100 usbvideo usbvideo.sys Mon Jul 13 20:07:00 2009 (4A5BCC24) fffff880`00fc8000 fffff880`00fd5000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB) fffff880`015ec000 fffff880`015fa000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587) fffff880`00dc5000 fffff880`00dea000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B) fffff880`00e00000 fffff880`00e15000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D) fffff880`00e15000 fffff880`00e71000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141) fffff880`018bc000 fffff880`01908000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128) fffff880`03c46000 fffff880`03c53000 vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39) fffff880`02dc8000 fffff880`02dde000 vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A) fffff880`02c00000 fffff880`02c1b000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED) fffff880`01400000 fffff880`01410000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F) fffff880`00e78000 fffff880`00f1c000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F) fffff880`00f1c000 fffff880`00f2b000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A) fffff880`02d99000 fffff880`02da2000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6) fffff960`00070000 fffff960`0037f000 win32k win32k.sys Tue Aug 31 22:58:04 2010 (4C7DC13C) fffff880`0445f000 fffff880`04462c00 WmBEnum WmBEnum.sys Thu Jan 24 18:01:30 2008 (479918CA) fffff880`00f82000 fffff880`00f8b000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117) fffff880`04463000 fffff880`0446f600 WmXlCore WmXlCore.sys Thu Jan 24 18:01:22 2008 (479918C2) fffff880`04fc9000 fffff880`04fea000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1) Unloaded modules: fffff880`068d5000 fffff880`06946000 spsys.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00071000 fffff880`01888000 fffff880`01896000 crashdmp.sys Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0000E000 fffff880`01896000 fffff880`018a2000 dump_pciidex Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0000C000 fffff880`018a2000 fffff880`018ad000 dump_msahci. Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 0000B000 fffff880`019e4000 fffff880`019f7000 dump_dumpfve Timestamp: unavailable (00000000) Checksum: 00000000 ImageSize: 00013000
Welcome to SF.
If you can, upgrade your ATI Mobility driver:An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
Driver c:\windows\system32\drivers\atikmdag.sys (8.1.1.921, 5.76 MB (6,037,504 bytes), 12/8/2009 5:24 PM)
Also your realtec network controller:
Driver c:\windows\system32\drivers\rt64win7.sys (7.5.730.2009, 231.00 KB (236,544 bytes), 12/8/2009 5:30 PM)
And your realtec wireless adapter:
Driver c:\windows\system32\drivers\rtl8192se.sys (2007.1.1002.2009, 924.50 KB (946,688 bytes), 12/8/2009 5:28 PM)
If the above does not help (it certainly won't hurt), we can look at limiting the number of drivers at startup as part of our process of elimination.