New
#1
BSOD (the usual) + DBG info.
I have been trying to fix this for weeks, i finally managed to get some Debugging information, i get the BSOD all of the time, every time the error code is different, so expect me back again
That is what i got. I attached my minidump file.Code:Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\072410-22448-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7600 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7600.16539.amd64fre.win7_gdr.100226-1909 Machine Name: Kernel base = 0xfffff800`03008000 PsLoadedModuleList = 0xfffff800`03245e50 Debug session time: Sat Jul 24 05:16:07.339 2010 (UTC - 4:00) System Uptime: 3 days 1:46:10.744 Loading Kernel Symbols ............................................................... ................................................................ ........................... Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {fffff86b057b2fff, 2, 1, fffff8000307e803} Probably caused by : ntkrnlmp.exe ( nt!SwapContext_PatchXSave+0 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffff86b057b2fff, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff8000307e803, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032b00e0 fffff86b057b2fff CURRENT_IRQL: 2 FAULTING_IP: nt!SwapContext_PatchXSave+0 fffff800`0307e803 0fae01 fxsave [rcx] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: System TRAP_FRAME: fffff880057b1e40 -- (.trap 0xfffff880057b1e40) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=fffff86b057b2e00 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8000307e803 rsp=fffff880057b1fd0 rbp=fffff86b057b2db0 r8=fffffa80026fa450 r9=0000000000000000 r10=fffff800031f2e80 r11=fffffa800320bc00 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!SwapContext_PatchXSave: fffff800`0307e803 0fae01 fxsave [rcx] ds:ecc0:fffff86b`057b2e00=?? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003077b69 to fffff80003078600 STACK_TEXT: fffff880`057b1cf8 fffff800`03077b69 : 00000000`0000000a fffff86b`057b2fff 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`057b1d00 fffff800`030767e0 : 00000000`00000000 fffff800`031f2e80 00000000`00040001 00000000`00000002 : nt!KiBugCheckDispatch+0x69 fffff880`057b1e40 fffff800`0307e803 : fffffa80`00000001 00000000`00000000 fffff880`00000001 fffff880`057b20a0 : nt!KiPageFault+0x260 fffff880`057b1fd0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!SwapContext_PatchXSave STACK_COMMAND: kb FOLLOWUP_IP: nt!SwapContext_PatchXSave+0 fffff800`0307e803 0fae01 fxsave [rcx] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!SwapContext_PatchXSave+0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb FAILURE_BUCKET_ID: X64_0xA_nt!SwapContext_PatchXSave+0 BUCKET_ID: X64_0xA_nt!SwapContext_PatchXSave+0 Followup: MachineOwner ---------