So I upgraded to 7 from XP a couple days ago after my computer got to the point of no return (I'm thinking McAfee did it).
Since then, I've got constant, seemingly random, BSOD. It happens when I'm using it, and when I'm not even at home. Most of the time it's a "IRQL_NOT_LESS_OR_EQUAL" but other ones have appeared as well. I ran a video card stability test and it was fine. I ran a memory test and it was fine. I have no idea what to do at this point.
I've attached the minidump from the crash that occurred about 2 minutes after I left my house this morning, so this happened when nothing was being done to the computer. I really hope you can help!
this one is straight forward. Memory corruption. I would download memtestx86 and run it for 5 passees to test it.
Let us know if you need help
Ken
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\042610-29234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82801000 PsLoadedModuleList = 0x82940570
Debug session time: Mon Apr 26 09:49:06.446 2010 (GMT-4)
System Uptime: 0 days 0:31:17.024
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {180c, 2, 0, 8282c630}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+244 )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000180c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8282c630, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82960700
Unable to read MiSystemVaType memory at 829400c0
0000180c
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+244
8282c630 8b500c mov edx,dword ptr [eax+0Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: 8a65a6e4 -- (.trap 0xffffffff8a65a6e4)
ErrCode = 00000000
eax=00001800 ebx=8469f6c0 ecx=844df328 edx=00000000 esi=844df300 edi=844df300
eip=8282c630 esp=8a65a758 ebp=8a65a794 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!MiIdentifyPfn+0x244:
8282c630 8b500c mov edx,dword ptr [eax+0Ch] ds:0023:0000180c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8282c630 to 82839b7b
STACK_TEXT:
8a65a6e4 8282c630 badb0d00 00000000 00000801 nt!KiTrap0E+0x2cf
8a65a794 8282a6f1 00000000 8469f000 8a65a83c nt!MiIdentifyPfn+0x244
8a65a7c0 829e4ef6 8469f060 97644776 8a65a850 nt!MmQueryPfnList+0xaf
8a65a808 82a160de 8a65ad01 976447f6 00000000 nt!PfpPfnPrioRequest+0xde
8a65a888 829fb60f 00000000 8a65ad01 8a65acd0 nt!PfQuerySuperfetchInformation+0xea
8a65ad00 829f915b 0000004f 00000000 00000000 nt!ExpQuerySystemInformation+0x24a4
8a65ad1c 8283679a 0000004f 0179f090 00000014 nt!NtQuerySystemInformation+0x76
8a65ad1c 776264f4 0000004f 0179f090 00000014 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0179cf50 00000000 00000000 00000000 00000000 0x776264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+244
8282c630 8b500c mov edx,dword ptr [eax+0Ch]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiIdentifyPfn+244
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cac3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiIdentifyPfn+244
BUCKET_ID: 0xA_nt!MiIdentifyPfn+244
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\042610-29234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*F:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 UP Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.x86fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0x82801000 PsLoadedModuleList = 0x82940570
Debug session time: Mon Apr 26 09:49:06.446 2010 (GMT-4)
System Uptime: 0 days 0:31:17.024
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {180c, 2, 0, 8282c630}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+244 )
Followup: MachineOwner
---------
kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000180c, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: 8282c630, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 82960700
Unable to read MiSystemVaType memory at 829400c0
0000180c
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+244
8282c630 8b500c mov edx,dword ptr [eax+0Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: 8a65a6e4 -- (.trap 0xffffffff8a65a6e4)
ErrCode = 00000000
eax=00001800 ebx=8469f6c0 ecx=844df328 edx=00000000 esi=844df300 edi=844df300
eip=8282c630 esp=8a65a758 ebp=8a65a794 iopl=0 nv up ei pl nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010206
nt!MiIdentifyPfn+0x244:
8282c630 8b500c mov edx,dword ptr [eax+0Ch] ds:0023:0000180c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 8282c630 to 82839b7b
STACK_TEXT:
8a65a6e4 8282c630 badb0d00 00000000 00000801 nt!KiTrap0E+0x2cf
8a65a794 8282a6f1 00000000 8469f000 8a65a83c nt!MiIdentifyPfn+0x244
8a65a7c0 829e4ef6 8469f060 97644776 8a65a850 nt!MmQueryPfnList+0xaf
8a65a808 82a160de 8a65ad01 976447f6 00000000 nt!PfpPfnPrioRequest+0xde
8a65a888 829fb60f 00000000 8a65ad01 8a65acd0 nt!PfQuerySuperfetchInformation+0xea
8a65ad00 829f915b 0000004f 00000000 00000000 nt!ExpQuerySystemInformation+0x24a4
8a65ad1c 8283679a 0000004f 0179f090 00000014 nt!NtQuerySystemInformation+0x76
8a65ad1c 776264f4 0000004f 0179f090 00000014 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
0179cf50 00000000 00000000 00000000 00000000 0x776264f4
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+244
8282c630 8b500c mov edx,dword ptr [eax+0Ch]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiIdentifyPfn+244
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cac3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xA_nt!MiIdentifyPfn+244
BUCKET_ID: 0xA_nt!MiIdentifyPfn+244
Followup: MachineOwner
---------