ntoskrnl.exe causing BSOD Windows 7

Page 3 of 4 FirstFirst 1234 LastLast

  1. Posts : 13,354
    Windows 7 Professional x64
       #21

    That is actually a very good sign. It means you have a bad driver, as opposed to a hardware problem. Now the trick is finding out which driver is the cause...

    Just for the heck of it, run a RAM test. Download a copy of Memtest86 and burn the ISO to a CD using ISO Recorder. Boot from the CD, and let it run for at least 5 passes.

    Memtest86+ - Advanced Memory Diagnostic Tool

    ISO Recorder v3

    Now, for the bad driver. In Safe Mode, disable Verifier, as found in the instructions, and then reboot into Normal mode. Then enable verifier again, and see what happens.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\DOCUME~1\JK\LOCALS~1\Temp\Temporary Directory 3 for minidump (1).zip\072710-17425-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
    Debug session time: Tue Jul 27 12:14:30.368 2010 (GMT-4)
    System Uptime: 0 days 0:00:15.428
    Loading Kernel Symbols
    ...............................................................
    ......................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, 102e5930c, 8, 102e5930c}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: 0000000102e5930c, The address that the exception occurred at
    Arg3: 0000000000000008, Parameter 0 of the exception
    Arg4: 0000000102e5930c, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
    
    FAULTING_IP: 
    +325952f00e9dfdc
    00000001`02e5930c ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000008
    
    EXCEPTION_PARAMETER2:  0000000102e5930c
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb70e0
     0000000102e5930c 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88002fd5bd8 -- (.exr 0xfffff88002fd5bd8)
    ExceptionAddress: 0000000102e5930c
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000008
       Parameter[1]: 0000000102e5930c
    Attempt to execute non-executable address 0000000102e5930c
    
    TRAP_FRAME:  fffff88002fd5c80 -- (.trap 0xfffff88002fd5c80)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8000c2b5a0
    rdx=fffff8a000c2b4e0 rsi=0000000000000000 rdi=0000000000000000
    rip=0000000102e5930c rsp=fffff88002fd5e10 rbp=0000000000000000
     r8=0000000000000000  r9=fffff8a000c2b4e0 r10=fffff8a000c2b4e0
    r11=fffff88002fd5c60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    00000001`02e5930c ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab9929 to fffff80002a7f600
    
    STACK_TEXT:  
    fffff880`02fd5408 fffff800`02ab9929 : 00000000`0000001e ffffffff`c0000005 00000001`02e5930c 00000000`00000008 : nt!KeBugCheckEx
    fffff880`02fd5410 fffff800`02a7ec42 : fffff880`02fd5bd8 00000000`00000008 fffff880`02fd5c80 fffff880`00000000 : nt!KiDispatchException+0x1b9
    fffff880`02fd5aa0 fffff800`02a7d7ba : 00000000`00000008 00000000`00000008 00000000`00000000 fffffa80`00c9d040 : nt!KiExceptionDispatch+0xc2
    fffff880`02fd5c80 00000001`02e5930c : ffffffff`8000015c 00000000`00100000 00000000`001d0000 ffffffff`8000004c : nt!KiPageFault+0x23a
    fffff880`02fd5e10 ffffffff`8000015c : 00000000`00100000 00000000`001d0000 ffffffff`8000004c fffff880`00000005 : 0x1`02e5930c
    fffff880`02fd5e18 00000000`00100000 : 00000000`001d0000 ffffffff`8000004c fffff880`00000005 00001f80`00000000 : 0xffffffff`8000015c
    fffff880`02fd5e20 00000000`001d0000 : ffffffff`8000004c fffff880`00000005 00001f80`00000000 00000000`00000051 : 0x100000
    fffff880`02fd5e28 ffffffff`8000004c : fffff880`00000005 00001f80`00000000 00000000`00000051 0000007f`ffffffff : 0x1d0000
    fffff880`02fd5e30 fffff880`00000005 : 00001f80`00000000 00000000`00000051 0000007f`ffffffff 00000980`00000000 : 0xffffffff`8000004c
    fffff880`02fd5e38 00001f80`00000000 : 00000000`00000051 0000007f`ffffffff 00000980`00000000 00000000`00000001 : 0xfffff880`00000005
    fffff880`02fd5e40 00000000`00000051 : 0000007f`ffffffff 00000980`00000000 00000000`00000001 fffff880`00000030 : 0x1f80`00000000
    fffff880`02fd5e48 0000007f`ffffffff : 00000980`00000000 00000000`00000001 fffff880`00000030 00000000`00000000 : 0x51
    fffff880`02fd5e50 00000980`00000000 : 00000000`00000001 fffff880`00000030 00000000`00000000 fffff880`02fd6080 : 0x7f`ffffffff
    fffff880`02fd5e58 00000000`00000001 : fffff880`00000030 00000000`00000000 fffff880`02fd6080 fffff880`00000240 : 0x980`00000000
    fffff880`02fd5e60 fffff880`00000030 : 00000000`00000000 fffff880`02fd6080 fffff880`00000240 00000000`00000000 : 0x1
    fffff880`02fd5e68 00000000`00000000 : fffff880`02fd6080 fffff880`00000240 00000000`00000000 00000000`00000000 : 0xfffff880`00000030
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDispatchException+1b9
    fffff800`02ab9929 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiDispatchException+1b9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    FAILURE_BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9
    
    BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmtsmn
    start             end                 module name
    fffff880`00f22000 fffff880`00f79000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03a6d000 fffff880`03af7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`01143000 fffff880`0114e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`01105000 fffff880`0110e000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0110e000 fffff880`01138000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`00fea000 fffff880`00ff6000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`03f8f000 fffff880`03fa0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cfb000 fffff880`00dbb000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c9d000 fffff880`00cfb000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`014d3000 fffff880`01546000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00fe1000 fffff880`00fea000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`01480000 fffff880`0148e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03eee000 fffff880`03f71000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03f71000 fffff880`03f8f000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03bbf000 fffff880`03bce000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0149a000 fffff880`014a3000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0148e000 fffff880`0149a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`014a3000 fffff880`014b6000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`03c03000 fffff880`03cf7000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03cf7000 fffff880`03d3d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0119a000 fffff880`011ae000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0114e000 fffff880`0119a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01557000 fffff880`01561000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01781000 fffff880`017cb000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02feb000 fffff800`03034000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`017f5000 fffff880`017fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0400b000 fffff880`045effe0   igdkmd64 igdkmd64.sys Wed Sep 23 15:22:57 2009 (4ABA7591)
    fffff880`010d3000 fffff880`010db000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03fc6000 fffff880`03fdc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff800`00ba2000 fffff800`00bac000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`013de000 fffff880`013f8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01756000 fffff880`01781000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`00c45000 fffff880`00c89000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`010eb000 fffff880`01105000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`011ae000 fffff880`011db000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
    fffff880`01138000 fffff880`01143000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01067000 fffff880`01072000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f82000 fffff880`00f8c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03a5d000 fffff880`03a68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`017e3000 fffff880`017f5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01604000 fffff880`016f6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03b81000 fffff880`03b90000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03af7000 fffff880`03b3c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`016f6000 fffff880`01756000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`00e15000 fffff880`00e26000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03a51000 fffff880`03a5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a0f000 fffff800`02feb000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
    fffff880`0123b000 fffff880`013de000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`014b6000 fffff880`014bf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03b45000 fffff880`03b6b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fcc000 fffff880`00fe1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f8c000 fffff880`00fbf000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`010db000 fffff880`010eb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01546000 fffff880`01557000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`00c89000 fffff880`00c9d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03a00000 fffff880`03a51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`015f7000 fffff880`01600000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0122a000 fffff880`01233000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0105e000 fffff880`01067000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`015ad000 fffff880`015e7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`017db000 fffff880`017e3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`00e44000 fffff880`00e51000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`00e26000 fffff880`00e44000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03bab000 fffff880`03bbf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`03fa0000 fffff880`03fc6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03d3d000 fffff880`03d4a000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00fbf000 fffff880`00fcc000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`014bf000 fffff880`014cd000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`011db000 fffff880`01200000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`017cb000 fffff880`017db000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01077000 fffff880`010d3000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01561000 fffff880`015ad000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03b6b000 fffff880`03b81000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`03b90000 fffff880`03bab000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`015e7000 fffff880`015f7000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e6f000 fffff880`00f13000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f13000 fffff880`00f22000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03b3c000 fffff880`03b45000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`00f79000 fffff880`00f82000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    One last thing, I see no anti-virus installed. Make sure you are running the free Microsoft Security Essentials.

    www.microsoft.com/Security_Essentials/
      My Computer


  2. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #22

    The mini dump points to memory error, bugcheck code 1E. Unfortunately, it does not pinpoint the driver.

    STOP 0x0000001E: KMODE_EXCEPTION_NOT_HANDLED

    Usual causes: Device driver, hardware, System service, compatibility, Remote control programs, memory, BIOS
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_minidump(3).zip\072710-17425-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
    Debug session time: Tue Jul 27 12:14:30.368 2010 (GMT-4)
    System Uptime: 0 days 0:00:15.428
    Loading Kernel Symbols
    ...............................................................
    ......................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, 102e5930c, 8, 102e5930c}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: 0000000102e5930c, The address that the exception occurred at
    Arg3: 0000000000000008, Parameter 0 of the exception
    Arg4: 0000000102e5930c, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    +5cfc952f01f0df14
    00000001`02e5930c ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000008
    
    EXCEPTION_PARAMETER2:  0000000102e5930c
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb70e0
     0000000102e5930c 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88002fd5bd8 -- (.exr 0xfffff88002fd5bd8)
    ExceptionAddress: 0000000102e5930c
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000008
       Parameter[1]: 0000000102e5930c
    Attempt to execute non-executable address 0000000102e5930c
    
    TRAP_FRAME:  fffff88002fd5c80 -- (.trap 0xfffff88002fd5c80)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8000c2b5a0
    rdx=fffff8a000c2b4e0 rsi=0000000000000000 rdi=0000000000000000
    rip=0000000102e5930c rsp=fffff88002fd5e10 rbp=0000000000000000
     r8=0000000000000000  r9=fffff8a000c2b4e0 r10=fffff8a000c2b4e0
    r11=fffff88002fd5c60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    00000001`02e5930c ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab9929 to fffff80002a7f600
    
    STACK_TEXT:  
    fffff880`02fd5408 fffff800`02ab9929 : 00000000`0000001e ffffffff`c0000005 00000001`02e5930c 00000000`00000008 : nt!KeBugCheckEx
    fffff880`02fd5410 fffff800`02a7ec42 : fffff880`02fd5bd8 00000000`00000008 fffff880`02fd5c80 fffff880`00000000 : nt!KiDispatchException+0x1b9
    fffff880`02fd5aa0 fffff800`02a7d7ba : 00000000`00000008 00000000`00000008 00000000`00000000 fffffa80`00c9d040 : nt!KiExceptionDispatch+0xc2
    fffff880`02fd5c80 00000001`02e5930c : ffffffff`8000015c 00000000`00100000 00000000`001d0000 ffffffff`8000004c : nt!KiPageFault+0x23a
    fffff880`02fd5e10 ffffffff`8000015c : 00000000`00100000 00000000`001d0000 ffffffff`8000004c fffff880`00000005 : 0x1`02e5930c
    fffff880`02fd5e18 00000000`00100000 : 00000000`001d0000 ffffffff`8000004c fffff880`00000005 00001f80`00000000 : 0xffffffff`8000015c
    fffff880`02fd5e20 00000000`001d0000 : ffffffff`8000004c fffff880`00000005 00001f80`00000000 00000000`00000051 : 0x100000
    fffff880`02fd5e28 ffffffff`8000004c : fffff880`00000005 00001f80`00000000 00000000`00000051 0000007f`ffffffff : 0x1d0000
    fffff880`02fd5e30 fffff880`00000005 : 00001f80`00000000 00000000`00000051 0000007f`ffffffff 00000980`00000000 : 0xffffffff`8000004c
    fffff880`02fd5e38 00001f80`00000000 : 00000000`00000051 0000007f`ffffffff 00000980`00000000 00000000`00000001 : 0xfffff880`00000005
    fffff880`02fd5e40 00000000`00000051 : 0000007f`ffffffff 00000980`00000000 00000000`00000001 fffff880`00000030 : 0x1f80`00000000
    fffff880`02fd5e48 0000007f`ffffffff : 00000980`00000000 00000000`00000001 fffff880`00000030 00000000`00000000 : 0x51
    fffff880`02fd5e50 00000980`00000000 : 00000000`00000001 fffff880`00000030 00000000`00000000 fffff880`02fd6080 : 0x7f`ffffffff
    fffff880`02fd5e58 00000000`00000001 : fffff880`00000030 00000000`00000000 fffff880`02fd6080 fffff880`00000240 : 0x980`00000000
    fffff880`02fd5e60 fffff880`00000030 : 00000000`00000000 fffff880`02fd6080 fffff880`00000240 00000000`00000000 : 0x1
    fffff880`02fd5e68 00000000`00000000 : fffff880`02fd6080 fffff880`00000240 00000000`00000000 00000000`00000000 : 0xfffff880`00000030
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDispatchException+1b9
    fffff800`02ab9929 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiDispatchException+1b9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    FAILURE_BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9
    
    BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9
    
    Followup: MachineOwner
    ---------
    To answer your question, yes, it sometimes happens that you have to operate in the safe mode. Read through the instructions in the link to Driver Verifier and you will see the explanation.

    Edited to add: Jonathan and I were posting at the same time. Follow his suggestions.
      My Computer


  3. Posts : 19
    Windows 7 Pro
    Thread Starter
       #23

    It now works in normal mode so i am happy with that, i have already eliminated bad ram, i am using a 1gb stick from a laptop that is working.

    i do have microsoft security essentials but it was disabled due to me being in safe mode. i am back in normal mode nos wo it is enabled.

    since the verifier tool didnt come up with a conclusive result, should i run it again and wait for another bsod?


    on another note, the newer broadcom driver seems to be very elusive, i will post in the driver forums later.

    thanks for all of your help. Elis
      My Computer


  4. Posts : 13,354
    Windows 7 Professional x64
       #24

    Go ahead and enable it again.
      My Computer


  5. Posts : 19
    Windows 7 Pro
    Thread Starter
       #25

    okay, it has bsoded again with the verifier tool running, here is the minidump.

    Elis
      My Computer


  6. Posts : 13,354
    Windows 7 Professional x64
       #26

    I wonder if your Intel graphics drivers are the cause, just from the date of it. It should be compatible with Windows 7 RTM, but it is 10 months old now.

    Go to the computer manufacturer's site, or go to the Intel support page to find an updated version. If you need any help with that, please follow these directions: https://www.sevenforums.com/crashes-d...tructions.html
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\DOCUME~1\JK\LOCALS~1\Temp\Temporary Directory 4 for minidump.zip\072710-17425-01 - Copy.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c4ce50
    Debug session time: Tue Jul 27 12:14:30.368 2010 (GMT-4)
    System Uptime: 0 days 0:00:15.428
    Loading Kernel Symbols
    ...............................................................
    ......................
    Loading User Symbols
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, 102e5930c, 8, 102e5930c}
    
    Probably caused by : ntkrnlmp.exe ( nt!KiDispatchException+1b9 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: 0000000102e5930c, The address that the exception occurred at
    Arg3: 0000000000000008, Parameter 0 of the exception
    Arg4: 0000000102e5930c, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
    
    FAULTING_IP: 
    +325952f00e8dfdc
    00000001`02e5930c ??              ???
    
    EXCEPTION_PARAMETER1:  0000000000000008
    
    EXCEPTION_PARAMETER2:  0000000102e5930c
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cb70e0
     0000000102e5930c 
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  System
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff88002fd5bd8 -- (.exr 0xfffff88002fd5bd8)
    ExceptionAddress: 0000000102e5930c
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000008
       Parameter[1]: 0000000102e5930c
    Attempt to execute non-executable address 0000000102e5930c
    
    TRAP_FRAME:  fffff88002fd5c80 -- (.trap 0xfffff88002fd5c80)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8000c2b5a0
    rdx=fffff8a000c2b4e0 rsi=0000000000000000 rdi=0000000000000000
    rip=0000000102e5930c rsp=fffff88002fd5e10 rbp=0000000000000000
     r8=0000000000000000  r9=fffff8a000c2b4e0 r10=fffff8a000c2b4e0
    r11=fffff88002fd5c60 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    00000001`02e5930c ??              ???
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ab9929 to fffff80002a7f600
    
    STACK_TEXT:  
    fffff880`02fd5408 fffff800`02ab9929 : 00000000`0000001e ffffffff`c0000005 00000001`02e5930c 00000000`00000008 : nt!KeBugCheckEx
    fffff880`02fd5410 fffff800`02a7ec42 : fffff880`02fd5bd8 00000000`00000008 fffff880`02fd5c80 fffff880`00000000 : nt!KiDispatchException+0x1b9
    fffff880`02fd5aa0 fffff800`02a7d7ba : 00000000`00000008 00000000`00000008 00000000`00000000 fffffa80`00c9d040 : nt!KiExceptionDispatch+0xc2
    fffff880`02fd5c80 00000001`02e5930c : ffffffff`8000015c 00000000`00100000 00000000`001d0000 ffffffff`8000004c : nt!KiPageFault+0x23a
    fffff880`02fd5e10 ffffffff`8000015c : 00000000`00100000 00000000`001d0000 ffffffff`8000004c fffff880`00000005 : 0x1`02e5930c
    fffff880`02fd5e18 00000000`00100000 : 00000000`001d0000 ffffffff`8000004c fffff880`00000005 00001f80`00000000 : 0xffffffff`8000015c
    fffff880`02fd5e20 00000000`001d0000 : ffffffff`8000004c fffff880`00000005 00001f80`00000000 00000000`00000051 : 0x100000
    fffff880`02fd5e28 ffffffff`8000004c : fffff880`00000005 00001f80`00000000 00000000`00000051 0000007f`ffffffff : 0x1d0000
    fffff880`02fd5e30 fffff880`00000005 : 00001f80`00000000 00000000`00000051 0000007f`ffffffff 00000980`00000000 : 0xffffffff`8000004c
    fffff880`02fd5e38 00001f80`00000000 : 00000000`00000051 0000007f`ffffffff 00000980`00000000 00000000`00000001 : 0xfffff880`00000005
    fffff880`02fd5e40 00000000`00000051 : 0000007f`ffffffff 00000980`00000000 00000000`00000001 fffff880`00000030 : 0x1f80`00000000
    fffff880`02fd5e48 0000007f`ffffffff : 00000980`00000000 00000000`00000001 fffff880`00000030 00000000`00000000 : 0x51
    fffff880`02fd5e50 00000980`00000000 : 00000000`00000001 fffff880`00000030 00000000`00000000 fffff880`02fd6080 : 0x7f`ffffffff
    fffff880`02fd5e58 00000000`00000001 : fffff880`00000030 00000000`00000000 fffff880`02fd6080 fffff880`00000240 : 0x980`00000000
    fffff880`02fd5e60 fffff880`00000030 : 00000000`00000000 fffff880`02fd6080 fffff880`00000240 00000000`00000000 : 0x1
    fffff880`02fd5e68 00000000`00000000 : fffff880`02fd6080 fffff880`00000240 00000000`00000000 00000000`00000000 : 0xfffff880`00000030
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KiDispatchException+1b9
    fffff800`02ab9929 cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!KiDispatchException+1b9
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4b88cfeb
    
    FAILURE_BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9
    
    BUCKET_ID:  X64_0x1E_VRF_nt!KiDispatchException+1b9
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmtsmn
    start             end                 module name
    fffff880`00f22000 fffff880`00f79000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`03a6d000 fffff880`03af7000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`01143000 fffff880`0114e000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`01105000 fffff880`0110e000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0110e000 fffff880`01138000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`00fea000 fffff880`00ff6000   BATTC    BATTC.SYS    Mon Jul 13 19:31:01 2009 (4A5BC3B5)
    fffff880`03f8f000 fffff880`03fa0000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`01200000 fffff880`0122a000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00cfb000 fffff880`00dbb000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01450000 fffff880`01480000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00c9d000 fffff880`00cfb000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`014d3000 fffff880`01546000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`00fe1000 fffff880`00fea000   compbatt compbatt.sys Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`01480000 fffff880`0148e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`03eee000 fffff880`03f71000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`03f71000 fffff880`03f8f000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`03bbf000 fffff880`03bce000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0143a000 fffff880`01450000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0149a000 fffff880`014a3000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`0148e000 fffff880`0149a000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`014a3000 fffff880`014b6000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`03c03000 fffff880`03cf7000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`03cf7000 fffff880`03d3d000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`0119a000 fffff880`011ae000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`0114e000 fffff880`0119a000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01557000 fffff880`01561000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01400000 fffff880`0143a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`01781000 fffff880`017cb000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff800`02feb000 fffff800`03034000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`017f5000 fffff880`017fe000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`0400b000 fffff880`045effe0   igdkmd64 igdkmd64.sys Wed Sep 23 15:22:57 2009 (4ABA7591)
    fffff880`010d3000 fffff880`010db000   intelide intelide.sys Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03fc6000 fffff880`03fdc000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff800`00ba2000 fffff800`00bac000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`013de000 fffff880`013f8000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01756000 fffff880`01781000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`00c45000 fffff880`00c89000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
    fffff880`010eb000 fffff880`01105000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`011ae000 fffff880`011db000   MpFilter MpFilter.sys Sat Mar 20 01:58:08 2010 (4BA463F0)
    fffff880`01138000 fffff880`01143000   msahci   msahci.sys   Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`01067000 fffff880`01072000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f82000 fffff880`00f8c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`01000000 fffff880`0105e000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`03a5d000 fffff880`03a68000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`017e3000 fffff880`017f5000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`01604000 fffff880`016f6000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03b81000 fffff880`03b90000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`03af7000 fffff880`03b3c000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`016f6000 fffff880`01756000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
    fffff880`00e15000 fffff880`00e26000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`03a51000 fffff880`03a5d000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a0f000 fffff800`02feb000   nt       ntkrnlmp.exe Sat Feb 27 02:55:23 2010 (4B88CFEB)
    fffff880`0123b000 fffff880`013de000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`014b6000 fffff880`014bf000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03b45000 fffff880`03b6b000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00fcc000 fffff880`00fe1000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f8c000 fffff880`00fbf000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`010db000 fffff880`010eb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01546000 fffff880`01557000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`00c89000 fffff880`00c9d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03a00000 fffff880`03a51000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`015f7000 fffff880`01600000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0122a000 fffff880`01233000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0105e000 fffff880`01067000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`015ad000 fffff880`015e7000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`017db000 fffff880`017e3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`01803000 fffff880`01a00000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
    fffff880`00e44000 fffff880`00e51000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`00e26000 fffff880`00e44000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`03bab000 fffff880`03bbf000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff880`03fa0000 fffff880`03fc6000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03d3d000 fffff880`03d4a000   usbuhci  usbuhci.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00fbf000 fffff880`00fcc000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`014bf000 fffff880`014cd000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`011db000 fffff880`01200000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`017cb000 fffff880`017db000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00e00000 fffff880`00e15000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01077000 fffff880`010d3000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01561000 fffff880`015ad000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`03b6b000 fffff880`03b81000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
    fffff880`03b90000 fffff880`03bab000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`015e7000 fffff880`015f7000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e6f000 fffff880`00f13000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00f13000 fffff880`00f22000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`03b3c000 fffff880`03b45000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`00f79000 fffff880`00f82000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
      My Computer


  7. Posts : 19
    Windows 7 Pro
    Thread Starter
       #27

    okay, so what do i do next?
      My Computer


  8. Posts : 13,354
    Windows 7 Professional x64
       #28

    If you have updated those drivers, just use your computer normally and hope the BSODs go away. If they don't, post the new dumps, but we will run some hardware tests most likely, because I don't see any more software causes.
      My Computer


  9. Posts : 19
    Windows 7 Pro
    Thread Starter
       #29

    Hi, ran the verifier again with the following result.

    If it is the broadcom ethernet driver that is causing the trouble, can i just disable it in the bios as i have no real need for it as my laptop has wifi?

    Elis
      My Computer


  10. Posts : 13,354
    Windows 7 Professional x64
       #30

    That dump wasn't too specific. All it say is that you have a bad driver somewhere.

    Yes, go right ahead and disable the ethernet adapter in the BIOS.

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\DOCUME~1\JK\LOCALS~1\Temp\Temporary Directory 4 for minidump.zip\072810-19110-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\symbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (2 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
    Machine Name:
    Kernel base = 0xfffff800`02a58000 PsLoadedModuleList = 0xfffff800`02c95e50
    Debug session time: Wed Jul 28 06:09:34.505 2010 (GMT-4)
    System Uptime: 0 days 0:07:20.565
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ...........................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 19, {3, fffffa8000c10da0, f060a060a060a06, 2d7502838402820}
    
    Probably caused by : Pool_Corruption ( nt!ExFreePool+536 )
    
    Followup: Pool_corruption
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    BAD_POOL_HEADER (19)
    The pool is already corrupt at the time of the current request.
    This may or may not be due to the caller.
    The internal pool links must be walked to figure out a possible cause of
    the problem, and then special pool applied to the suspect tags or the driver
    verifier to a suspect driver.
    Arguments:
    Arg1: 0000000000000003, the pool freelist is corrupt.
    Arg2: fffffa8000c10da0, the pool entry being checked.
    Arg3: 0f060a060a060a06, the read back flink freelist value (should be the same as 2).
    Arg4: 02d7502838402820, the read back blink freelist value (should be the same as 2).
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x19_3
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  firefox.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff80002bfbd6f to fffff80002ac8600
    
    STACK_TEXT:  
    fffff880`02313038 fffff800`02bfbd6f : 00000000`00000019 00000000`00000003 fffffa80`00c10da0 0f060a06`0a060a06 : nt!KeBugCheckEx
    fffff880`02313040 fffff800`02d8c5f5 : 00000000`00000002 00000000`03320000 00000000`00000001 00000000`00000000 : nt!ExFreePool+0x536
    fffff880`02313130 fffff800`02dc48d1 : fffff8a0`02ca4e10 fffff880`02313340 00000000`00000115 00000000`00000001 : nt!MiRelocateImage+0x345
    fffff880`023132a0 fffff800`02db9b83 : fffff880`02313500 00000000`00000000 fffff880`023135a8 00000000`00000001 : nt!MmCreateSection+0x825
    fffff880`023134b0 fffff800`02f24d75 : fffff8a0`0304b7d8 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x162
    fffff880`02313530 fffff800`02f25127 : 00000000`00000010 fffff8a0`030a7250 fffff880`023136c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
    fffff880`02313620 fffff800`02f25557 : fffff880`02313740 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
    fffff880`02313710 fffff800`02f2597f : 0000006d`e83b8119 fffffa80`0144bb30 fffff8a0`03187000 00000000`00000000 : nt!PfSnPrefetchScenario+0x187
    fffff880`02313980 fffff800`02d1e11f : 00000000`00000000 00000000`18acfcff fffffa80`031c9910 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
    fffff880`02313a50 fffff800`02d97130 : fffffa80`0368db60 fffffa80`031c9910 00000000`14050800 00000000`7efde000 : nt! ?? ::NNGAKEGL::`string'+0x503f0
    fffff880`02313a80 fffff800`02aa6c35 : fffff800`02c42e80 00000000`00000000 fffff800`02d97034 fffffa80`0368db60 : nt!PspUserThreadStartup+0xfc
    fffff880`02313ae0 fffff800`02aa6bb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
    fffff880`02313c20 00000000`77b83000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
    00000000`0008f948 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b83000
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!ExFreePool+536
    fffff800`02bfbd6f cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!ExFreePool+536
    
    FOLLOWUP_NAME:  Pool_corruption
    
    IMAGE_NAME:  Pool_Corruption
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: Pool_Corruption
    
    FAILURE_BUCKET_ID:  X64_0x19_3_nt!ExFreePool+536
    
    BUCKET_ID:  X64_0x19_3_nt!ExFreePool+536
    
    Followup: Pool_corruption
    ---------
      My Computer


 
Page 3 of 4 FirstFirst 1234 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 17:46.
Find Us