Hello there,
I install windows 7 yesterday and i have blue screen three times already! I don't know what the problem is... I'd attach a rar file of the dmp's and if anyone understand them or know any solution, please, respond. Thank you.
This one was probably caused by afd.sys. It is part of the tcpip stack. since it is a windows file I would run a system file check
type cmd in search>right click and run as admin>sfc /scannow
Let us know the results as you may have to run other things.
Ken
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\New folder\022610-28111-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02813000 PsLoadedModuleList = 0xfffff800`02a50e50
Debug session time: Fri Feb 26 09:23:33.623 2010 (GMT-5)
System Uptime: 0 days 0:29:22.449
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {a, 2, 0, fffff80002861436}
Probably caused by : afd.sys ( afd!AfdCompletePollIrp+b7 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000000a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002861436, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002abb0e0
000000000000000a
CURRENT_IRQL: 2
FAULTING_IP:
nt!KiInsertQueueApc+8e
fffff800`02861436 483b5d08 cmp rbx,qword ptr [rbp+8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff80003d451b0 -- (.trap 0xfffff80003d451b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa800931b0b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002861436 rsp=fffff80003d45340 rbp=0000000000000002
r8=0000000000000000 r9=fffffa800931b0b0 r10=0000000000000000
r11=fffff80003d45402 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x8e:
fffff800`02861436 483b5d08 cmp rbx,qword ptr [rbp+8] ss:0018:00000000`0000000a=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002884469 to fffff80002884f00
STACK_TEXT:
fffff800`03d45068 fffff800`02884469 : 00000000`0000000a 00000000`0000000a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`03d45070 fffff800`028830e0 : fffff800`03d45250 fffffa80`0931b060 00001a43`00001843 fffff880`0488c288 : nt!KiBugCheckDispatch+0x69
fffff800`03d451b0 fffff800`02861436 : fffff880`02fd5180 fffff800`02df7b7f 00000000`0027b277 00000000`00000000 : nt!KiPageFault+0x260
fffff800`03d45340 fffff800`02864850 : fffffa80`0931b060 00000000`00000002 00000000`00000000 fffffa80`072499f8 : nt!KiInsertQueueApc+0x8e
fffff800`03d45370 fffff800`02887d4b : fffffa80`0953e480 00000000`a000000c 00000000`00000000 00000000`00000001 : nt!KeInsertQueueApc+0x80
fffff800`03d453d0 fffff880`03efa627 : 00000000`00000000 fffffa80`0722ab02 00000000`00000001 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`03d454b0 fffff880`03efa85e : 00000000`00000001 fffff800`02a00080 00000000`00000000 fffff800`03d455c0 : afd!AfdCompletePollIrp+0xb7
fffff800`03d45500 fffff800`02890fa6 : 00000000`00000000 fffffa80`070b3c60 00000002`40510a00 00000000`00000007 : afd!AfdTimeoutPoll+0x2e
fffff800`03d45530 fffff800`02890326 : fffffa80`0722ac40 00000000`0001b950 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`03d455a0 fffff800`02890e7e : 00000004`1a8086e1 fffff800`03d45c18 00000000`0001b950 fffff800`02a00c88 : nt!KiProcessExpiredTimerList+0xc6
fffff800`03d45bf0 fffff800`02890697 : 00000001`115f38c1 00000001`0001b950 00000001`115f3840 00000000`00000050 : nt!KiTimerExpiration+0x1be
fffff800`03d45c90 fffff800`0288d6fa : fffff800`029fde80 fffff800`02a0bc40 00000000`00000000 fffff880`043cf480 : nt!KiRetireDpcList+0x277
fffff800`03d45d40 00000000`00000000 : fffff800`03d46000 fffff800`03d40000 fffff800`03d45d00 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
afd!AfdCompletePollIrp+b7
fffff880`03efa627 488b6c2450 mov rbp,qword ptr [rsp+50h]
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: afd!AfdCompletePollIrp+b7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
FAILURE_BUCKET_ID: X64_0xA_afd!AfdCompletePollIrp+b7
BUCKET_ID: X64_0xA_afd!AfdCompletePollIrp+b7
Followup: MachineOwner
---------