BSOD on every time I start my PC


  1. Posts : 7
    Windows 7 Ultimate x64
       #1

    BSOD on every time I start my PC


    For the last couple of months now I get the BSOD everytime I start my PC. I get the BSOD when windows has booted to the desktop. Its the same with windows xp on another hard drive. However, after 6 or 7 BSODs and restarts the computer seems and runs fine.

    Im not really sure what is causing the problem or how to fix it. I have attached an rar file with my mini dumps along with a crash list. Hope someone can help me with this issue.
      My Computer


  2. Posts : 9,606
    Win7 Enterprise, Win7 x86 (Ult 7600), Win7 x64 Ult 7600, TechNet RTM on AMD x64 (2.8Ghz)
       #2

    Welcome raliy2k



    It would help us if you added your hardware specs, also
      My Computer


  3. Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #3

    Sorry, that is a common sense thing to do. I have updated my system specs, can be viewed in my profile.
      My Computer


  4. Posts : 13,354
    Windows 7 Professional x64
       #4

    Welcome to SF!

    It looks as if Acronis is causing your problems. I suggest removing it completely, and see what happens.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Jonathan\Desktop\041810-26348-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02e0b000 PsLoadedModuleList = 0xfffff800`03048e50
    Debug session time: Sun Apr 18 08:04:05.850 2010 (GMT-4)
    System Uptime: 0 days 0:17:34.270
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ....
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffff6fe61000008, 2, 0, fffff80002ea47f1}
    
    Unable to load image \SystemRoot\system32\DRIVERS\tdrpm258.sys, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for tdrpm258.sys
    *** ERROR: Module load completed but symbols could not be loaded for tdrpm258.sys
    Probably caused by : tdrpm258.sys ( tdrpm258+4dd5e )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffff6fe61000008, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002ea47f1, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b30e0
     fffff6fe61000008 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiObtainSystemCacheView+125
    fffff800`02ea47f1 488b4e08        mov     rcx,qword ptr [rsi+8]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  ekrn.exe
    
    TRAP_FRAME:  fffff88007710e60 -- (.trap 0xfffff88007710e60)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=000000000000dfe6 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002ea47f1 rsp=fffff88007710ff0 rbp=0000000000000000
     r8=fffff6fc00000000  r9=0000000000000000 r10=fffff80003049780
    r11=fffff88007711358 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na pe nc
    nt!MiObtainSystemCacheView+0x125:
    fffff800`02ea47f1 488b4e08        mov     rcx,qword ptr [rsi+8] ds:7610:00000000`00000008=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002e7ab69 to fffff80002e7b600
    
    STACK_TEXT:  
    fffff880`07710d18 fffff800`02e7ab69 : 00000000`0000000a fffff6fe`61000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07710d20 fffff800`02e797e0 : fffff8a0`0bfa8cb0 00000000`ffffffff fffff780`c0000000 fffffa80`01312bc0 : nt!KiBugCheckDispatch+0x69
    fffff880`07710e60 fffff800`02ea47f1 : fffff8a0`0c045580 00000000`00000000 fffff800`030b5700 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`07710ff0 fffff800`02ea4d42 : fffffa80`03a1d200 00000000`00000000 00000000`00000000 fffff800`0317819b : nt!MiObtainSystemCacheView+0x125
    fffff880`07711130 fffff800`02ea42d7 : fffff8a0`0c045580 fffff800`02ff6530 fffff880`077112d8 fffff8a0`0255c720 : nt!MmMapViewInSystemCache+0xc2
    fffff880`077112a0 fffff800`02e9a170 : fffffa80`00000000 00000000`00000000 fffffa80`04ea1010 00000000`00000000 : nt!CcGetVacbMiss+0x177
    fffff880`07711360 fffff800`031998d2 : 00000000`00000000 00000000`00000000 fffff880`07711430 fffff880`077114c0 : nt!CcGetVirtualAddress+0x1b0
    fffff880`077113f0 fffff880`0120cfc0 : fffff8a0`00000000 fffff880`00000005 fffffa80`05222830 fffff880`01260001 : nt!CcCopyRead+0x132
    fffff880`077114b0 fffff880`01211303 : 00000000`00000000 fffff8a0`0256b7a0 fffff880`077116e0 fffff880`077115d8 : Ntfs!NtfsCachedRead+0x180
    fffff880`07711510 fffff880`01213f78 : fffffa80`05222830 fffffa80`0690e9d0 fffff880`07711601 fffffa80`06984600 : Ntfs!NtfsCommonRead+0x583
    fffff880`077116b0 fffff880`011a423f : fffffa80`0690ef68 fffffa80`0690e9d0 fffffa80`069846f0 00000000`00000001 : Ntfs!NtfsFsdRead+0x1b8
    fffff880`07711760 fffff880`011a26df : fffffa80`04b29530 fffffa80`049da3c0 fffffa80`04b29500 fffffa80`0690e9d0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
    fffff880`077117f0 fffff880`01ca5d5e : 00000000`60000001 fffffa80`049d9d90 fffffa80`00000020 fffffa80`049da3c0 : fltmgr!FltpDispatch+0xcf
    fffff880`07711850 00000000`60000001 : fffffa80`049d9d90 fffffa80`00000020 fffffa80`049da3c0 fffffa80`0690e901 : tdrpm258+0x4dd5e
    fffff880`07711858 fffffa80`049d9d90 : fffffa80`00000020 fffffa80`049da3c0 fffffa80`0690e901 fffff880`01ca474c : 0x60000001
    fffff880`07711860 fffffa80`00000020 : fffffa80`049da3c0 fffffa80`0690e901 fffff880`01ca474c fffffa80`049da3c0 : 0xfffffa80`049d9d90
    fffff880`07711868 fffffa80`049da3c0 : fffffa80`0690e901 fffff880`01ca474c fffffa80`049da3c0 fffffa80`049d9d90 : 0xfffffa80`00000020
    fffff880`07711870 fffffa80`0690e901 : fffff880`01ca474c fffffa80`049da3c0 fffffa80`049d9d90 00000000`60000001 : 0xfffffa80`049da3c0
    fffff880`07711878 fffff880`01ca474c : fffffa80`049da3c0 fffffa80`049d9d90 00000000`60000001 fffffa80`0690e9d0 : 0xfffffa80`0690e901
    fffff880`07711880 fffffa80`049da3c0 : fffffa80`049d9d90 00000000`60000001 fffffa80`0690e9d0 fffffa80`0690e9d0 : tdrpm258+0x4c74c
    fffff880`07711888 fffffa80`049d9d90 : 00000000`60000001 fffffa80`0690e9d0 fffffa80`0690e9d0 fffff880`01ca4da1 : 0xfffffa80`049da3c0
    fffff880`07711890 00000000`60000001 : fffffa80`0690e9d0 fffffa80`0690e9d0 fffff880`01ca4da1 fffffa80`0690ef68 : 0xfffffa80`049d9d90
    fffff880`07711898 fffffa80`0690e9d0 : fffffa80`0690e9d0 fffff880`01ca4da1 fffffa80`0690ef68 fffffa80`0690e9d0 : 0x60000001
    fffff880`077118a0 fffffa80`0690e9d0 : fffff880`01ca4da1 fffffa80`0690ef68 fffffa80`0690e9d0 fffffa80`049da3c0 : 0xfffffa80`0690e9d0
    fffff880`077118a8 fffff880`01ca4da1 : fffffa80`0690ef68 fffffa80`0690e9d0 fffffa80`049da3c0 fffffa80`049d9d90 : 0xfffffa80`0690e9d0
    fffff880`077118b0 fffffa80`0690ef68 : fffffa80`0690e9d0 fffffa80`049da3c0 fffffa80`049d9d90 00000000`00000000 : tdrpm258+0x4cda1
    fffff880`077118b8 fffffa80`0690e9d0 : fffffa80`049da3c0 fffffa80`049d9d90 00000000`00000000 fffffa80`04c6cbf0 : 0xfffffa80`0690ef68
    fffff880`077118c0 fffffa80`049da3c0 : fffffa80`049d9d90 00000000`00000000 fffffa80`04c6cbf0 00000000`80002134 : 0xfffffa80`0690e9d0
    fffff880`077118c8 fffffa80`049d9d90 : 00000000`00000000 fffffa80`04c6cbf0 00000000`80002134 fffff880`01ca2792 : 0xfffffa80`049da3c0
    fffff880`077118d0 00000000`00000000 : fffffa80`04c6cbf0 00000000`80002134 fffff880`01ca2792 fffffa80`0690ef68 : 0xfffffa80`049d9d90
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    tdrpm258+4dd5e
    fffff880`01ca5d5e ??              ???
    
    SYMBOL_STACK_INDEX:  d
    
    SYMBOL_NAME:  tdrpm258+4dd5e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: tdrpm258
    
    IMAGE_NAME:  tdrpm258.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4add6949
    
    FAILURE_BUCKET_ID:  X64_0xA_tdrpm258+4dd5e
    
    BUCKET_ID:  X64_0xA_tdrpm258+4dd5e
    
    Followup: MachineOwner
    --------
      My Computer


  5. Posts : 7
    Windows 7 Ultimate x64
    Thread Starter
       #5

    Thank you Jonathan,

    I have removed it as of now. Will keep you posted if it has corrected the problem.

    Many thanks.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 09:44.
Find Us