New
#1
Intermittent BSOD or just screen flashes then reboot
Attached windows7_bsod_jcgriff2 folder. Also pasted windbg report from the memory dmp file below. Machine specs: Win7 64bit retail version, Dell Dimension 9200C, 2006, replaced video card with ATI Radeon HD 4550 about 2 months ago.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_CALLER (c2)
The current thread is making a bad pool request. Typically this is at a bad IRQL level or double freeing the same allocation, etc.
Arguments:
Arg1: 0000000000000007, Attempt to free pool which was already freed
Arg2: 0000000000001097, (reserved)
Arg3: 0000000000000310, Memory contents of the pool block
Arg4: fffff8a00db7cde0, Address of the block of pool being deallocated
Debugging Details:
------------------
POOL_ADDRESS: fffff8a00db7cde0 Paged pool
FREED_POOL_TAG: l0le
BUGCHECK_STR: 0xc2_7_l0le
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: iexplore.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002baf60e to fffff80002a7c600
STACK_TEXT:
fffff880`05b30118 fffff800`02baf60e : 00000000`000000c2 00000000`00000007 00000000`00001097 00000000`00000310 : nt!KeBugCheckEx
fffff880`05b30120 fffff880`02ceb924 : fffff880`05b30300 fffff880`00000000 fffff880`00000000 fffff880`02cf1b69 : nt!ExFreePool+0xccb
fffff880`05b301d0 fffff880`02ceb9be : fffff8a0`0dc43510 00000000`000000cf 00000000`656f306e 00000000`00000000 : FPAV_RTP+0x8924
fffff880`05b30200 fffff880`02cf1766 : fffff8a0`0c28f280 fffff8a0`0ac01000 fffff8a0`656f306e 00000000`00000001 : FPAV_RTP+0x89be
fffff880`05b30230 fffff880`02cf22e5 : fffff8a0`0c28f280 fffff8a0`0c28f219 00000000`00000000 00000000`9921004b : FPAV_RTP+0xe766
fffff880`05b30260 fffff880`02ce87db : fffff8a0`0ac01000 00000000`00000000 fffff8a0`0c2cde58 fffff880`05b30420 : FPAV_RTP+0xf2e5
fffff880`05b30290 fffff880`02ce93e1 : 00000000`ffffff00 00000000`ffffffff 00000000`ffffff00 00000000`00000000 : FPAV_RTP+0x57db
fffff880`05b302d0 fffff880`02ce7460 : fffffa80`00000001 00000000`00000000 fffff8a0`029aa000 fffff880`02da9910 : FPAV_RTP+0x63e1
fffff880`05b30350 fffff880`02ce6727 : 00000000`00000000 00000000`00000000 fffff880`05b30558 fffff880`05b30450 : FPAV_RTP+0x4460
fffff880`05b30390 fffff880`02ce58ea : 00000000`00000000 fffffa80`02850800 fffff880`05b304f0 fffff880`05b30558 : FPAV_RTP+0x3727
fffff880`05b303e0 fffff880`02ce6d27 : fffffa80`02c67400 00000000`00000000 fffffa80`00000008 fffff8a0`0c2cde50 : FPAV_RTP+0x28ea
fffff880`05b304f0 fffff880`01085027 : 00000000`00000000 fffffa80`02850750 00000000`00000000 00000000`00000000 : FPAV_RTP+0x3d27
fffff880`05b30540 fffff880`010878ca : fffffa80`02104200 fffffa80`02104200 fffffa80`02d37600 fffffa80`02d44300 : fltmgr!FltpPerformPreCallbacks+0x2f7
fffff880`05b30640 fffff880`010a52a3 : fffffa80`01a2bc60 fffffa80`01a2bc60 fffffa80`01a2bc60 fffffa80`6d4e6f49 : fltmgr!FltpPassThroughInternal+0x4a
fffff880`05b30670 fffff800`02d80777 : 00000000`00000005 fffff800`02d801d0 fffffa80`0264b530 00000000`00000000 : fltmgr!FltpCreate+0x293
fffff880`05b30720 fffff800`02d76a64 : fffffa80`02486840 00000000`00000000 fffffa80`0273d530 00000000`00000701 : nt!IopParseDevice+0x5a7
fffff880`05b308b0 fffff800`02d7bb76 : fffffa80`0273d530 fffff880`05b30a30 fffff880`00000040 fffffa80`018c38e0 : nt!ObpLookupObjectName+0x585
fffff880`05b309b0 fffff800`02d82887 : fffffa80`02c897a0 00000000`00000001 00000000`00000001 fffffa80`036000c0 : nt!ObOpenObjectByName+0x306
fffff880`05b30a80 fffff800`02d8c498 : 00000000`033ee378 00000000`80100080 fffffa80`00000000 00000000`033ee390 : nt!IopCreateFile+0x2b7
fffff880`05b30b20 fffff800`02a7b853 : 00000000`00000020 fffff960`00108384 fffffa80`01cb8b60 00000000`00000000 : nt!NtCreateFile+0x78
fffff880`05b30bb0 00000000`772602aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`033ee308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772602aa
STACK_COMMAND: kb
FOLLOWUP_IP:
FPAV_RTP+8924
fffff880`02ceb924 4885db test rbx,rbx
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: FPAV_RTP+8924
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: FPAV_RTP
IMAGE_NAME: FPAV_RTP.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c20d7c3
FAILURE_BUCKET_ID: X64_0xc2_7_l0le_FPAV_RTP+8924
BUCKET_ID: X64_0xc2_7_l0le_FPAV_RTP+8924
Followup: MachineOwner
---------