New
#1
Random BSOD IRQL
I wasn't using flash or anything remotely taxing on my system. I had the desktop up and was about to open Solitaire when it BSOD'd. Can anyone give me a clue whats up? .dmp attached.
I wasn't using flash or anything remotely taxing on my system. I had the desktop up and was about to open Solitaire when it BSOD'd. Can anyone give me a clue whats up? .dmp attached.
This crash was probably caused by your network driver. netw5v64.sys
I would uninstall it and download a fresh copy to install
I would run a system file check
type cmd in search>right click and run as admin>sfc /scannow
Let us know the results
Code:Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\K\Desktop\030910-101135-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*d:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7600.16385.amd64fre.win7_rtm.090713-1255 Machine Name: Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c97e50 Debug session time: Tue Mar 9 23:19:45.399 2010 (GMT-5) System Uptime: 0 days 3:56:27.022 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list .... ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {0, 2, 0, fffff80002a13477} Unable to load image \SystemRoot\system32\DRIVERS\netw5v64.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for netw5v64.sys *** ERROR: Module load completed but symbols could not be loaded for netw5v64.sys Probably caused by : netw5v64.sys ( netw5v64+5b7d ) Followup: MachineOwner --------- 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff80002a13477, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d020e0 0000000000000000 CURRENT_IRQL: 2 FAULTING_IP: hal!HalpDmaNextContiguousPiece+103 fffff800`02a13477 448b08 mov r9d,dword ptr [rax] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: uTorrent.exe TRAP_FRAME: fffff8800b369f40 -- (.trap 0xfffff8800b369f40) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000180 rdx=0000000000000180 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002a13477 rsp=fffff8800b36a0d8 rbp=0000000000000000 r8=0000000000000065 r9=0000000000000000 r10=00000000000fffff r11=fffffa800c32e0f0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac po nc hal!HalpDmaNextContiguousPiece+0x103: fffff800`02a13477 448b08 mov r9d,dword ptr [rax] ds:0001:00000000`00000000=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002acb469 to fffff80002acbf00 STACK_TEXT: fffff880`0b369df8 fffff800`02acb469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx fffff880`0b369e00 fffff800`02aca0e0 : 00000000`00002000 fffffa80`046999d0 00000000`00000001 fffff880`04aee060 : nt!KiBugCheckDispatch+0x69 fffff880`0b369f40 fffff800`02a13477 : fffffa80`047acbc0 fffffa80`0436fe80 fffff800`02a13524 fffffa80`046999d0 : nt!KiPageFault+0x260 fffff880`0b36a0d8 fffff800`02a13524 : fffffa80`046999d0 fffffa80`0c32e0f0 fffffa80`045ba820 00000000`00000000 : hal!HalpDmaNextContiguousPiece+0x103 fffff880`0b36a0f0 fffff800`02a164fb : fffffa80`046999d0 fffffa80`0c32e0f0 fffffa80`047acbc0 fffff880`04a871c7 : hal!HalpDmaMapScatterTransfer+0x34 fffff880`0b36a140 fffff800`02a16472 : fffffa80`046999d0 fffffa80`046999c8 00000000`00000065 00000000`00000000 : hal!HalpMapTransfer+0x7b fffff880`0b36a1d0 fffff800`02a1594f : 00000000`00000000 fffff800`02a1301e 00000000`00000000 00000000`00000003 : hal!IoMapTransfer+0x8e fffff880`0b36a210 fffff800`02a15afd : fffffa80`0c011050 fffffa80`0c32e0f0 00000000`00000001 fffffa80`000004df : hal!HalpAllocateAdapterCallback+0xc7 fffff880`0b36a2b0 fffff800`02a16156 : fffffa80`0c32e0f0 00000000`00000000 fffffa80`0c32e000 00000000`00000003 : hal!IoFreeAdapterChannel+0x109 fffff880`0b36a2e0 fffff800`02a1571f : fffffa80`0e284690 00000000`00000058 fffffa80`0c32e0f0 fffffa80`0435a830 : hal!HalAllocateAdapterChannel+0x11a fffff880`0b36a320 fffff880`016c47c0 : fffffa80`0474f320 fffffa80`0c33fc30 00000000`000000a0 fffff880`04cc4537 : hal!HalBuildScatterGatherList+0x2f3 fffff880`0b36a390 fffff880`04a7cb7d : fffffa80`0c0111a0 fffff880`04cc4130 fffffa80`047f7dc0 fffff780`00000014 : ndis!NdisMAllocateNetBufferSGList+0x110 fffff880`0b36a430 fffffa80`0c0111a0 : fffff880`04cc4130 fffffa80`047f7dc0 fffff780`00000014 00000000`00000000 : netw5v64+0x5b7d fffff880`0b36a438 fffff880`04cc4130 : fffffa80`047f7dc0 fffff780`00000014 00000000`00000000 00000058`00000100 : 0xfffffa80`0c0111a0 fffff880`0b36a440 fffffa80`047f7dc0 : fffff780`00000014 00000000`00000000 00000058`00000100 00000000`00000000 : netw5v64+0x24d130 fffff880`0b36a448 fffff780`00000014 : 00000000`00000000 00000058`00000100 00000000`00000000 fffff880`04a84fb9 : 0xfffffa80`047f7dc0 fffff880`0b36a450 00000000`00000000 : 00000058`00000100 00000000`00000000 fffff880`04a84fb9 fffff880`04d445e0 : 0xfffff780`00000014 STACK_COMMAND: kb FOLLOWUP_IP: netw5v64+5b7d fffff880`04a7cb7d ?? ??? SYMBOL_STACK_INDEX: c SYMBOL_NAME: netw5v64+5b7d FOLLOWUP_NAME: MachineOwner MODULE_NAME: netw5v64 IMAGE_NAME: netw5v64.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4a2bd700 FAILURE_BUCKET_ID: X64_0xA_netw5v64+5b7d BUCKET_ID: X64_0xA_netw5v64+5b7d Followup: MachineOwner ---------