Constant BSOD


  1. Posts : 1
    Windows 7
       #1

    Constant BSOD


    So I upgraded to 7 from XP a couple days ago after my computer got to the point of no return (I'm thinking McAfee did it).

    Since then, I've got constant, seemingly random, BSOD. It happens when I'm using it, and when I'm not even at home. Most of the time it's a "IRQL_NOT_LESS_OR_EQUAL" but other ones have appeared as well. I ran a video card stability test and it was fine. I ran a memory test and it was fine. I have no idea what to do at this point.

    I've attached the minidump from the crash that occurred about 2 minutes after I left my house this morning, so this happened when nothing was being done to the computer. I really hope you can help!
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    ZugTheMegasauru said:
    So I upgraded to 7 from XP a couple days ago after my computer got to the point of no return (I'm thinking McAfee did it).

    Since then, I've got constant, seemingly random, BSOD. It happens when I'm using it, and when I'm not even at home. Most of the time it's a "IRQL_NOT_LESS_OR_EQUAL" but other ones have appeared as well. I ran a video card stability test and it was fine. I ran a memory test and it was fine. I have no idea what to do at this point.

    I've attached the minidump from the crash that occurred about 2 minutes after I left my house this morning, so this happened when nothing was being done to the computer. I really hope you can help!

    this one is straight forward. Memory corruption. I would download memtestx86 and run it for 5 passees to test it.

    Let us know if you need help

    Ken

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\042610-29234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x82801000 PsLoadedModuleList = 0x82940570
    Debug session time: Mon Apr 26 09:49:06.446 2010 (GMT-4)
    System Uptime: 0 days 0:31:17.024
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {180c, 2, 0, 8282c630}
    
    Probably caused by : memory_corruption ( nt!MiIdentifyPfn+244 )
    
    Followup: MachineOwner
    ---------
    
    kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000180c, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 8282c630, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82960700
    Unable to read MiSystemVaType memory at 829400c0
     0000180c 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiIdentifyPfn+244
    8282c630 8b500c          mov     edx,dword ptr [eax+0Ch]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  8a65a6e4 -- (.trap 0xffffffff8a65a6e4)
    ErrCode = 00000000
    eax=00001800 ebx=8469f6c0 ecx=844df328 edx=00000000 esi=844df300 edi=844df300
    eip=8282c630 esp=8a65a758 ebp=8a65a794 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!MiIdentifyPfn+0x244:
    8282c630 8b500c          mov     edx,dword ptr [eax+0Ch] ds:0023:0000180c=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 8282c630 to 82839b7b
    
    STACK_TEXT:  
    8a65a6e4 8282c630 badb0d00 00000000 00000801 nt!KiTrap0E+0x2cf
    8a65a794 8282a6f1 00000000 8469f000 8a65a83c nt!MiIdentifyPfn+0x244
    8a65a7c0 829e4ef6 8469f060 97644776 8a65a850 nt!MmQueryPfnList+0xaf
    8a65a808 82a160de 8a65ad01 976447f6 00000000 nt!PfpPfnPrioRequest+0xde
    8a65a888 829fb60f 00000000 8a65ad01 8a65acd0 nt!PfQuerySuperfetchInformation+0xea
    8a65ad00 829f915b 0000004f 00000000 00000000 nt!ExpQuerySystemInformation+0x24a4
    8a65ad1c 8283679a 0000004f 0179f090 00000014 nt!NtQuerySystemInformation+0x76
    8a65ad1c 776264f4 0000004f 0179f090 00000014 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0179cf50 00000000 00000000 00000000 00000000 0x776264f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiIdentifyPfn+244
    8282c630 8b500c          mov     edx,dword ptr [eax+0Ch]
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiIdentifyPfn+244
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cac3
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0xA_nt!MiIdentifyPfn+244
    
    BUCKET_ID:  0xA_nt!MiIdentifyPfn+244
    
    Followup: MachineOwner
    ---------
    
    
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\042610-29234-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16539.x86fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0x82801000 PsLoadedModuleList = 0x82940570
    Debug session time: Mon Apr 26 09:49:06.446 2010 (GMT-4)
    System Uptime: 0 days 0:31:17.024
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...................
    Loading User Symbols
    Loading unloaded module list
    .......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {180c, 2, 0, 8282c630}
    
    Probably caused by : memory_corruption ( nt!MiIdentifyPfn+244 )
    
    Followup: MachineOwner
    ---------
    
    kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000180c, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000000, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: 8282c630, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from 82960700
    Unable to read MiSystemVaType memory at 829400c0
     0000180c 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiIdentifyPfn+244
    8282c630 8b500c          mov     edx,dword ptr [eax+0Ch]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  8a65a6e4 -- (.trap 0xffffffff8a65a6e4)
    ErrCode = 00000000
    eax=00001800 ebx=8469f6c0 ecx=844df328 edx=00000000 esi=844df300 edi=844df300
    eip=8282c630 esp=8a65a758 ebp=8a65a794 iopl=0         nv up ei pl nz na pe nc
    cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs=0000             efl=00010206
    nt!MiIdentifyPfn+0x244:
    8282c630 8b500c          mov     edx,dword ptr [eax+0Ch] ds:0023:0000180c=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from 8282c630 to 82839b7b
    
    STACK_TEXT:  
    8a65a6e4 8282c630 badb0d00 00000000 00000801 nt!KiTrap0E+0x2cf
    8a65a794 8282a6f1 00000000 8469f000 8a65a83c nt!MiIdentifyPfn+0x244
    8a65a7c0 829e4ef6 8469f060 97644776 8a65a850 nt!MmQueryPfnList+0xaf
    8a65a808 82a160de 8a65ad01 976447f6 00000000 nt!PfpPfnPrioRequest+0xde
    8a65a888 829fb60f 00000000 8a65ad01 8a65acd0 nt!PfQuerySuperfetchInformation+0xea
    8a65ad00 829f915b 0000004f 00000000 00000000 nt!ExpQuerySystemInformation+0x24a4
    8a65ad1c 8283679a 0000004f 0179f090 00000014 nt!NtQuerySystemInformation+0x76
    8a65ad1c 776264f4 0000004f 0179f090 00000014 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0179cf50 00000000 00000000 00000000 00000000 0x776264f4
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiIdentifyPfn+244
    8282c630 8b500c          mov     edx,dword ptr [eax+0Ch]
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiIdentifyPfn+244
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cac3
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  0xA_nt!MiIdentifyPfn+244
    
    BUCKET_ID:  0xA_nt!MiIdentifyPfn+244
    
    Followup: MachineOwner
    ---------
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 04:57.
Find Us