Hi, I have the same problem(it happens frequently). Dmp files I attached here
Hi and welcome
TBH this is the first time I have ever seen this error and so had to do some digging. One possible cause is an iomega.zip drive. Some hardware like it may also be the cause.
All of the dumps are identical so no help there
Code:
121609-14445-01.dmp 12/16/2009 10:02:53 PM ATTEMPTED_SWITCH_FROM_DPC 0x100000b8 0x82b6a280 0x86baca00 0x82b5dfd0 0x00000000 ntkrnlpa.exe ntkrnlpa.exe+67966
121609-15194-01.dmp 12/16/2009 10:12:51 PM ATTEMPTED_SWITCH_FROM_DPC 0x100000b8 0x82b73280 0x85f753b8 0x82b66fd0 0x00000000 ntkrnlpa.exe ntkrnlpa.exe+67966
121609-15241-01.dmp 12/16/2009 7:50:04 PM ATTEMPTED_SWITCH_FROM_DPC 0x100000b8 0x82b78280 0x85f3c6b0 0x82b6bfd0 0x00000000 ntkrnlpa.exe ntkrnlpa.exe+67966
121609-16426-01.dmp 12/16/2009 9:37:29 PM ATTEMPTED_SWITCH_FROM_DPC 0x100000b8 0x82b41280 0x86fa4d48 0x82b34fd0 0x00000000 ntkrnlpa.exe ntkrnlpa.exe+67966
122309-15178-01.dmp 12/23/2009 7:39:56 PM ATTEMPTED_SWITCH_FROM_DPC 0x100000b8 0x82b75280 0x86154020 0x82b68fd0 0x00000000 ntkrnlpa.exe ntkrnlpa.exe+67966
122309-22916-01.dmp 12/23/2009 7:34:47 PM ATTEMPTED_SWITCH_FROM_DPC 0x100000b8 0x86fa6270 0x86025d48 0x8dbdefd0 0x00000000 ntkrnlpa.exe ntkrnlpa.exe+67966
These drivers are old and need to be updated
Code:
steth.sys 0x94c00000 0x94c09d80 0x00009d80 0x435cc54c 10/24/2005 6:28:12 AM
lpwdm.sys 0x94f29000 0x94f2cf00 0x00003f00 0x435f9082 10/26/2005 9:19:46 AM
st330.sys 0x94f21000 0x94f28700 0x00007700 0x435f9083 10/26/2005 9:19:47 AM
stbus.sys 0x94f2d000 0x94f30180 0x00003180 0x435f9083 10/26/2005 9:19:47 AM
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\121609-14445-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a37000 PsLoadedModuleList = 0x82b7f810
Debug session time: Wed Dec 16 15:01:14.363 2009 (GMT-5)
System Uptime: 0 days 0:00:18.064
Loading Kernel Symbols
...............................................................
................................................................
.
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000B8, {82b6a280, 86baca00, 82b5dfd0, 0}
Probably caused by : ntkrpamp.exe ( nt!KiSwapContext+26 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_SWITCH_FROM_DPC (b8)
A wait operation, attach process, or yield was attempted from a DPC routine.
This is an illegal operation and the stack track will lead to the offending
code and original DPC routine.
Arguments:
Arg1: 82b6a280, Original thread which is the cause of the failure
Arg2: 86baca00, New thread
Arg3: 82b5dfd0, Stack address of the original thread
Arg4: 00000000
Debugging Details:
------------------
FAULTING_THREAD: 82b6a280
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xB8
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 82a9e8c7 to 82a9e966
STACK_TEXT:
82b5da90 82a9e8c7 00000000 82b6ea4c 82b60d20 nt!KiSwapContext+0x26
82b5dac4 82a9e777 82b60d20 00000000 00000001 nt!KiExitDispatcher+0x140
82b5daf8 82a4dda1 82b6ea4c 00000000 00000000 nt!KeSetEvent+0xb2
82b5db0c 82b29202 82b28f69 82b28efe 00000000 nt!PpmReleaseLock+0x15
82b5db10 82b28f69 82b28efe 00000000 00000000 nt!PpmCheckEnd+0x14
82b5db14 82b28efe 00000000 00000000 00000000 nt!PpmCheckRun+0x5a
82b5db38 82aa104d 82b6ec58 00000000 857d1d46 nt!PpmCheckStart+0x4d
82b5db7c 82aa0ff1 82b60d20 82b5dca8 00000001 nt!KiProcessTimerDpcTable+0x50
82b5dc68 82aa0eae 82b60d20 82b5dca8 00000000 nt!KiProcessExpiredTimerList+0x101
82b5dcdc 82a9f20e 00000485 85fa9d48 82b6a280 nt!KiTimerExpiration+0x25c
82b5dd20 82a9f038 00000000 0000000e 00000000 nt!KiRetireDpcList+0xcb
82b5dd24 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x38
STACK_COMMAND: .thread 0xffffffff82b6a280 ; kb
FOLLOWUP_IP:
nt!KiSwapContext+26
82a9e966 8b2c24 mov ebp,dword ptr [esp]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KiSwapContext+26
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc007
FAILURE_BUCKET_ID: 0xB8_nt!KiSwapContext+26
BUCKET_ID: 0xB8_nt!KiSwapContext+26
Followup: MachineOwner
---------