New
#31
Did you ever attempt to update the bios because this is looking more and more like a hardware translation issue to me.
Code:IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 00650064, memory referenced Arg2: 00000002, IRQL Arg3: 00000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 8301b839, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82d74828 Unable to read MiSystemVaType memory at 82d54d80 00650064 CURRENT_IRQL: 2 FAULTING_IP: hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+29 8301b839 8902 mov dword ptr [edx],eax CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: 80e39a50 -- (.trap 0xffffffff80e39a50) ErrCode = 00000003 eax=80e39af0 ebx=00000000 ecx=8876cc80 edx=00650064 esi=8876cc4c edi=82d37d20 eip=8301b839 esp=80e39ac4 ebp=80e39b08 iopl=0 nv up ei ng nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29: 8301b839 8902 mov dword ptr [edx],eax ds:0023:00650064=???????? Resetting default scope LAST_CONTROL_TRANSFER: from 8301b839 to 82c4dc9b STACK_TEXT: 80e39a50 8301b839 badb0d00 00650064 b8c80c10 nt!KiTrap0E+0x2cf 80e39ac0 82c77907 00000002 b8fc78d0 c00000d8 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29 80e39b08 85c4322c 8876cc4c 00000000 80e39b3c nt!ExAcquireResourceExclusiveLite+0xd4 80e39b18 85c430df 8b213880 b8fc78d0 00000000 Ntfs!NtfsAcquireResourceExclusive+0x25 80e39b3c 85c41a45 8b213880 b8fc78d0 b8fc79c0 Ntfs!NtfsAcquireExclusiveFcb+0x42 80e39b94 85cd6372 8b213880 8c44f0d8 b8da02c8 Ntfs!NtfsTeardownFromLcb+0x16b 80e39be4 85c462cb 8b213880 b8da03b8 01da0560 Ntfs!NtfsTeardownStructures+0xf3 80e39c0c 85cda341 8b213880 b8da03b8 b8da0560 Ntfs!NtfsDecrementCloseCounts+0xaf 80e39c6c 85cde424 8b213880 b8da03b8 b8da02c8 Ntfs!NtfsCommonClose+0x4f2 80e39d00 82c70183 00000000 00000000 84cbf380 Ntfs!NtfsFspClose+0x118 80e39d50 82dfd400 00000000 a7985ae4 00000000 nt!ExpWorkerThread+0x10d 80e39d90 82c9e979 82c70076 00000000 00000000 nt!PspSystemThreadStartup+0x9e 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19 STACK_COMMAND: kb FOLLOWUP_IP: nt!KiTrap0E+2cf 82c4dc9b 833d80fad68200 cmp dword ptr [nt!KiFreezeFlag (82d6fa80)],0 SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!KiTrap0E+2cf FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4d9fd76c FAILURE_BUCKET_ID: 0xA_VRF_nt!KiTrap0E+2cf BUCKET_ID: 0xA_VRF_nt!KiTrap0E+2cf Followup: MachineOwner ---------