locked
Windows 7 crashes multiple times RRS feed

  • Question

  • i keep getting blue screens on win 7 i have win 7 on 500GB western digital hard drive runing on sata channel 1 i have both .dmp files and the listings from debug.exe i will include both could you determine my issue i have had this problem for a while and have tried alot of problem solving methods via microsoft.com  thanks for any info i have a p4p800mx mobo 2.5 GB ram nvidia 8400gs graphics card sound blaster live 24 bit sound card and ati wonder pci tuner card 800 watt atx psu pentium 4 ht processor 2.8GHz OClocked to 3.0GHz through the bios.
    i also have tried both oem and microsoft drivers for graphics and i still get an occasional your graphics card has unexpectantly stopped working and has recovered i cant send the actual dmp files it wont let me any info on this matter would be appreciated.





    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\112709-19343-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
    Machine Name:
    Kernel base = 0x82800000 PsLoadedModuleList = 0x8293f570
    Debug session time: Fri Nov 27 14:39:43.708 2009 (GMT-5)
    System Uptime: 0 days 2:07:57.115
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    .........
    0: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc). If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 00000099, A PTE or PFN is corrupt
    Arg2: 0004e977, page frame number
    Arg3: 00000002, current page state
    Arg4: 0004e974, 0

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x4E_99

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: firefox.exe

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from 828d7500 to 828bbe94

    STACK_TEXT:
    821e7778 828d7500 0000004e 00000099 0004e977 nt!KeBugCheckEx+0x1e
    821e7790 82889e01 00001c90 00000000 00000059 nt!MiBadShareCount+0x24
    821e7868 82888ca3 c03f7d70 00000014 00000000 nt!MiDeleteSystemPagableVm+0x58f
    821e7944 829168fa fdf17000 00000000 00059000 nt!MiFreePagedPoolPages+0x33d
    821e7a0c 82917ed5 fdf17000 00000026 fdf17000 nt!MiFreePoolPages+0x2ba
    821e7a70 93991c6f fdf17000 00000000 00000000 nt!ExFreePoolWithTag+0x438
    821e7b20 93991a59 ff9e4648 00000026 00000006 win32k!EngRealizeBrush+0x190
    821e7bb8 93991316 93b64200 ffb63748 93991adf win32k!bGetRealizedBrush+0x70c
    821e7bd0 93a04153 ff9e4648 ff9e4648 fe4d5000 win32k!pvGetEngRbrush+0x1f
    821e7c34 93a1dd63 fe4d5010 00000000 00000000 win32k!EngBitBlt+0x2e2
    821e7c98 939b2411 ff9e4648 821e7cfc 821e7cec win32k!GrePatBltLockedDC+0x22b
    821e7d14 8284135a d3010772 00000000 00000000 win32k!NtGdiPatBlt+0x14c
    821e7d14 778c8244 d3010772 00000000 00000000 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    75cd6180 00000000 00000000 00000000 00000000 0x778c8244


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!MiBadShareCount+24
    828d7500 cc int 3

    SYMBOL_STACK_INDEX: 1

    SYMBOL_NAME: nt!MiBadShareCount+24

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8b48

    IMAGE_NAME: memory_corruption

    FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24

    BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24

    Followup: MachineOwner
    ---------

    eax=8292e934 ebx=00000002 ecx=00000026 edx=00000000 esi=82921d20 edi=00000000
    eip=828bbe94 esp=821e7760 ebp=821e7778 iopl=0 nv up ei pl nz na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000206
    nt!KeBugCheckEx+0x1e:
    828bbe94 cc int 3
    ChildEBP RetAddr Args to Child
    821e7778 828d7500 0000004e 00000099 0004e977 nt!KeBugCheckEx+0x1e
    821e7790 82889e01 00001c90 00000000 00000059 nt!MiBadShareCount+0x24 (FPO: [0,0,0])
    821e7868 82888ca3 c03f7d70 00000014 00000000 nt!MiDeleteSystemPagableVm+0x58f
    821e7944 829168fa fdf17000 00000000 00059000 nt!MiFreePagedPoolPages+0x33d
    821e7a0c 82917ed5 fdf17000 00000026 fdf17000 nt!MiFreePoolPages+0x2ba
    821e7a70 93991c6f fdf17000 00000000 00000000 nt!ExFreePoolWithTag+0x438
    821e7b20 93991a59 ff9e4648 00000026 00000006 win32k!EngRealizeBrush+0x190 (FPO: [6,37,4])
    821e7bb8 93991316 93b64200 ffb63748 93991adf win32k!bGetRealizedBrush+0x70c (FPO: [3,27,4])
    821e7bd0 93a04153 ff9e4648 ff9e4648 fe4d5000 win32k!pvGetEngRbrush+0x1f (FPO: [1,0,4])
    821e7c34 93a1dd63 fe4d5010 00000000 00000000 win32k!EngBitBlt+0x2e2 (FPO: [11,19,4])
    821e7c98 939b2411 ff9e4648 821e7cfc 821e7cec win32k!GrePatBltLockedDC+0x22b (FPO: [9,9,4])
    821e7d14 8284135a d3010772 00000000 00000000 win32k!NtGdiPatBlt+0x14c (FPO: [6,17,4])
    821e7d14 778c8244 d3010772 00000000 00000000 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 821e7d34)
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    75cd6180 00000000 00000000 00000000 00000000 0x778c8244
    start end module name
    80bc8000 80bd0000 kdcom kdcom.dll Wed Apr 22 01:07:23 2009 (49EEA60B)
    82800000 82c00000 nt ntkrnlmp.exe Tue Apr 21 23:13:12 2009 (49EE8B48)
    82c00000 82c37000 hal halmacpi.dll Tue Apr 21 23:08:30 2009 (49EE8A2E)
    8a02b000 8a09c000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Wed Apr 22 01:05:20 2009 (49EEA590)
    8a09c000 8a0ad000 PSHED PSHED.dll Wed Apr 22 01:09:07 2009 (49EEA673)
    8a0ad000 8a0b5000 BOOTVID BOOTVID.dll Wed Apr 22 01:01:42 2009 (49EEA4B6)
    8a0b5000 8a0f7000 CLFS CLFS.SYS Tue Apr 21 23:08:36 2009 (49EE8A34)
    8a0f7000 8a1a2000 CI CI.dll Wed Apr 22 01:08:59 2009 (49EEA66B)
    8a1a2000 8a213000 Wdf01000 Wdf01000.sys Tue Apr 21 23:09:01 2009 (49EE8A4D)
    8a213000 8a221000 WDFLDR WDFLDR.SYS Tue Apr 21 23:08:47 2009 (49EE8A3F)
    8a221000 8a269000 ACPI ACPI.sys Tue Apr 21 23:08:37 2009 (49EE8A35)
    8a269000 8a272000 WMILIB WMILIB.SYS Tue Apr 21 23:08:46 2009 (49EE8A3E)
    8a272000 8a27a000 msisadrv msisadrv.sys Tue Apr 21 23:08:33 2009 (49EE8A31)
    8a27a000 8a2a4000 pci pci.sys Tue Apr 21 23:08:40 2009 (49EE8A38)
    8a2a4000 8a2af000 vdrvroot vdrvroot.sys Tue Apr 21 23:44:49 2009 (49EE92B1)
    8a2af000 8a2c0000 partmgr partmgr.sys Tue Apr 21 23:08:57 2009 (49EE8A49)
    8a2c0000 8a2d0000 volmgr volmgr.sys Tue Apr 21 23:08:47 2009 (49EE8A3F)
    8a2d0000 8a31b000 volmgrx volmgrx.sys Tue Apr 21 23:09:06 2009 (49EE8A52)
    8a31b000 8a322000 intelide intelide.sys Tue Apr 21 23:08:44 2009 (49EE8A3C)
    8a322000 8a330000 PCIIDEX PCIIDEX.SYS Tue Apr 21 23:08:40 2009 (49EE8A38)
    8a330000 8a346000 mountmgr mountmgr.sys Tue Apr 21 23:08:51 2009 (49EE8A43)
    8a346000 8a34f000 atapi atapi.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
    8a34f000 8a372000 ataport ataport.SYS Tue Apr 21 23:08:42 2009 (49EE8A3A)
    8a372000 8a37b000 amdxata amdxata.sys Tue Mar 10 19:22:16 2009 (49B6F628)
    8a37b000 8a3af000 fltmgr fltmgr.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
    8a3af000 8a3c0000 fileinfo fileinfo.sys Tue Apr 21 23:19:22 2009 (49EE8CBA)
    8a3c0000 8a3d7000 rassstp rassstp.sys Tue Apr 21 23:53:30 2009 (49EE94BA)
    8a3d7000 8a3e5000 umbus umbus.sys Tue Apr 21 23:50:03 2009 (49EE93EB)
    8a400000 8a417000 raspptp raspptp.sys Tue Apr 21 23:53:17 2009 (49EE94AD)
    8a417000 8a424000 kbdclass kbdclass.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
    8a42a000 8a559000 Ntfs Ntfs.sys Tue Apr 21 23:09:31 2009 (49EE8A6B)
    8a559000 8a584000 msrpc msrpc.sys Tue Apr 21 23:09:19 2009 (49EE8A5F)
    8a584000 8a597000 ksecdd ksecdd.sys Tue Apr 21 23:09:16 2009 (49EE8A5C)
    8a597000 8a5f4000 cng cng.sys Tue Apr 21 23:31:04 2009 (49EE8F78)
    8a5f4000 8a602000 pcw pcw.sys Tue Apr 21 23:08:34 2009 (49EE8A32)
    8a602000 8a60b000 Fs_Rec Fs_Rec.sys Tue Apr 21 23:08:38 2009 (49EE8A36)
    8a60b000 8a6c2000 ndis ndis.sys Tue Apr 21 23:09:42 2009 (49EE8A76)
    8a6c2000 8a700000 NETIO NETIO.SYS Tue Apr 21 23:10:05 2009 (49EE8A8D)
    8a700000 8a725000 ksecpkg ksecpkg.sys Tue Apr 21 23:32:15 2009 (49EE8FBF)
    8a725000 8a757000 netbt netbt.sys Tue Apr 21 23:09:39 2009 (49EE8A73)
    8a757000 8a771000 serial serial.sys Tue Apr 21 23:44:02 2009 (49EE9282)
    8a771000 8a784000 wanarp wanarp.sys Tue Apr 21 23:53:29 2009 (49EE94B9)
    8a784000 8a794000 termdd termdd.sys Wed Apr 22 00:00:07 2009 (49EE9647)
    8a794000 8a7d5000 rdbss rdbss.sys Tue Apr 21 23:11:43 2009 (49EE8AEF)
    8a7d5000 8a7df000 mssmbios mssmbios.sys Tue Apr 21 23:16:49 2009 (49EE8C21)
    8a7df000 8a7eb000 discache discache.sys Tue Apr 21 23:21:34 2009 (49EE8D3E)
    8a7eb000 8a7f8000 mouclass mouclass.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
    8a800000 8a81e000 pacer pacer.sys Tue Apr 21 23:52:32 2009 (49EE9480)
    8a81e000 8a828000 nsiproxy nsiproxy.sys Tue Apr 21 23:09:25 2009 (49EE8A65)
    8a82b000 8a970000 tcpip tcpip.sys Tue Apr 21 23:10:47 2009 (49EE8AB7)
    8a970000 8a9a1000 fwpkclnt fwpkclnt.sys Tue Apr 21 23:09:26 2009 (49EE8A66)
    8a9a1000 8a9a9380 vmstorfl vmstorfl.sys Tue Apr 21 23:26:29 2009 (49EE8E65)
    8a9aa000 8a9e8000 volsnap volsnap.sys Tue Apr 21 23:08:58 2009 (49EE8A4A)
    8a9e8000 8a9f0000 spldr spldr.sys Wed Mar 25 15:16:08 2009 (49CA82F8)
    8a9f0000 8aa1d000 rdyboost rdyboost.sys Tue Apr 21 23:19:32 2009 (49EE8CC4)
    8aa1d000 8aa2d000 mup mup.sys Tue Apr 21 23:11:32 2009 (49EE8AE4)
    8aa2d000 8aa35000 hwpolicy hwpolicy.sys Tue Apr 21 23:08:27 2009 (49EE8A2B)
    8aa35000 8aa67000 fvevol fvevol.sys Tue Apr 21 23:10:25 2009 (49EE8AA1)
    8aa67000 8aa78000 disk disk.sys Tue Apr 21 23:08:52 2009 (49EE8A44)
    8aa78000 8aa9d000 CLASSPNP CLASSPNP.SYS Tue Apr 21 23:08:43 2009 (49EE8A3B)
    8aacf000 8aaee000 cdrom cdrom.sys Tue Apr 21 23:08:48 2009 (49EE8A40)
    8aaee000 8aaf5000 Null Null.SYS Tue Apr 21 23:08:37 2009 (49EE8A35)
    8aaf5000 8aafc000 Beep Beep.SYS Tue Apr 21 23:43:27 2009 (49EE925F)
    8aafc000 8ab08000 vga vga.sys Tue Apr 21 23:23:17 2009 (49EE8DA5)
    8ab08000 8ab29000 VIDEOPRT VIDEOPRT.SYS Tue Apr 21 23:23:20 2009 (49EE8DA8)
    8ab29000 8ab36000 watchdog watchdog.sys Tue Apr 21 23:21:46 2009 (49EE8D4A)
    8ab36000 8ab3e000 RDPCDD RDPCDD.sys Wed Apr 22 00:00:11 2009 (49EE964B)
    8ab3e000 8ab46000 rdpencdd rdpencdd.sys Wed Apr 22 00:00:11 2009 (49EE964B)
    8ab46000 8ab4e000 rdprefmp rdprefmp.sys Wed Apr 22 00:00:11 2009 (49EE964B)
    8ab4e000 8ab59000 Msfs Msfs.SYS Tue Apr 21 23:08:46 2009 (49EE8A3E)
    8ab59000 8ab67000 Npfs Npfs.SYS Tue Apr 21 23:08:49 2009 (49EE8A41)
    8ab67000 8ab7e000 tdx tdx.sys Tue Apr 21 23:09:29 2009 (49EE8A69)
    8ab7e000 8ab89000 TDI TDI.SYS Tue Apr 21 23:09:31 2009 (49EE8A6B)
    8ab89000 8abe3000 afd afd.sys Tue Apr 21 23:09:58 2009 (49EE8A86)
    8abe3000 8abea000 wfplwf wfplwf.sys Tue Apr 21 23:52:24 2009 (49EE9478)
    8abea000 8abf8000 netbios netbios.sys Tue Apr 21 23:52:28 2009 (49EE947C)
    90400000 90423000 ndiswan ndiswan.sys Tue Apr 21 23:53:08 2009 (49EE94A4)
    90423000 9042d000 rdpbus rdpbus.sys Wed Apr 22 00:01:12 2009 (49EE9688)
    9042d000 9042e380 swenum swenum.sys Tue Apr 21 23:43:34 2009 (49EE9266)
    9042f000 90493000 csc csc.sys Tue Apr 21 23:12:21 2009 (49EE8B15)
    90493000 904ab000 dfsc dfsc.sys Tue Apr 21 23:11:34 2009 (49EE8AE6)
    904ab000 904b9000 blbdrive blbdrive.sys Tue Apr 21 23:20:31 2009 (49EE8CFF)
    904b9000 904d8000 tunnel tunnel.sys Tue Apr 21 23:52:38 2009 (49EE9486)
    904d8000 904ea000 intelppm intelppm.sys Tue Apr 21 23:08:27 2009 (49EE8A2B)
    904ea000 904f5000 usbuhci usbuhci.sys Tue Apr 21 23:49:34 2009 (49EE93CE)
    904f5000 9053f000 USBPORT USBPORT.SYS Tue Apr 21 23:49:38 2009 (49EE93D2)
    9053f000 9054e000 usbehci usbehci.sys Tue Apr 21 23:49:40 2009 (49EE93D4)
    9054e000 9057f280 atidvcxx atidvcxx.sys Thu Dec 08 18:44:40 2005 (4398C568)
    90580000 9058d180 STREAM STREAM.SYS Tue Apr 21 23:49:23 2009 (49EE93C3)
    9058e000 905c2000 ks ks.sys Tue Apr 21 23:43:43 2009 (49EE926F)
    905c2000 905c5200 atidacxx atidacxx.sys Thu Dec 08 18:44:59 2005 (4398C57B)
    905c6000 905c8780 atiddcxx atiddcxx.sys Thu Dec 08 18:44:06 2005 (4398C546)
    905c9000 90726000 P17 P17.sys Thu Oct 15 22:11:53 2009 (4AD7D669)
    90726000 90755000 portcls portcls.sys Tue Apr 21 23:49:26 2009 (49EE93C6)
    90755000 9076e000 drmk drmk.sys Wed Apr 22 00:40:17 2009 (49EE9FB1)
    9076e000 90778000 serenum serenum.sys Tue Apr 21 23:43:55 2009 (49EE927B)
    90778000 90783000 fdc fdc.sys Tue Apr 21 23:44:14 2009 (49EE928E)
    90783000 90790000 CompositeBus CompositeBus.sys Tue Apr 21 23:43:54 2009 (49EE927A)
    90790000 907a3000 HIDCLASS HIDCLASS.SYS Tue Apr 21 23:49:26 2009 (49EE93C6)
    907a3000 907a9480 HIDPARSE HIDPARSE.SYS Tue Apr 21 23:49:24 2009 (49EE93C4)
    907aa000 907bc000 AgileVpn AgileVpn.sys Tue Apr 21 23:53:30 2009 (49EE94BA)
    907bc000 907d4000 rasl2tp rasl2tp.sys Tue Apr 21 23:53:07 2009 (49EE94A3)
    907d4000 907df000 ndistapi ndistapi.sys Tue Apr 21 23:52:58 2009 (49EE949A)
    907df000 907f7000 raspppoe raspppoe.sys Tue Apr 21 23:53:24 2009 (49EE94B4)
    907f7000 907fb880 hamachi hamachi.sys Wed Aug 15 19:05:00 2007 (46C3869C)
    92000000 92af9d00 nvlddmkm nvlddmkm.sys Fri Nov 20 22:55:33 2009 (4B0764B5)
    92afa000 92afb040 nvBridge nvBridge.kmd Fri Nov 20 22:41:44 2009 (4B076178)
    92afc000 92bb3000 dxgkrnl dxgkrnl.sys Tue Apr 21 23:23:48 2009 (49EE8DC4)
    92bb3000 92bec000 dxgmms1 dxgmms1.sys Tue Apr 21 23:22:57 2009 (49EE8D91)
    92bec000 92bfd000 Rtnicxp Rtnicxp.sys Mon Mar 31 01:41:05 2008 (47F07971)
    92bfd000 92bfeb80 x10hid x10hid.sys Fri Nov 17 13:20:44 2006 (455DFD7C)
    9301d000 93061000 usbhub usbhub.sys Tue Apr 21 23:50:25 2009 (49EE9401)
    93061000 9306be00 atidtuxx atidtuxx.sys Thu Dec 08 18:44:52 2005 (4398C574)
    9306c000 9306f000 BdaSup BdaSup.SYS Tue Apr 21 23:49:46 2009 (49EE93DA)
    9306f000 93071600 atidxbxx atidxbxx.sys Thu Dec 08 18:44:43 2005 (4398C56B)
    93072000 9307c000 flpydisk flpydisk.sys Tue Apr 21 23:44:14 2009 (49EE928E)
    9307c000 93088000 kbdhid kbdhid.sys Tue Apr 21 23:43:35 2009 (49EE9267)
    93088000 93099000 NDProxy NDProxy.SYS Tue Apr 21 23:53:01 2009 (49EE949D)
    93099000 930b0000 usbccgp usbccgp.sys Tue Apr 21 23:49:53 2009 (49EE93E1)
    930b0000 930b1700 USBD USBD.SYS Tue Apr 21 23:49:30 2009 (49EE93CA)
    930b2000 930bc000 x10ufx2 x10ufx2.sys Thu Nov 30 18:18:56 2006 (456F66E0)
    930bc000 930ca000 usbscan usbscan.sys Wed Apr 22 00:13:48 2009 (49EE997C)
    930ca000 930d5000 usbprint usbprint.sys Wed Apr 22 00:16:54 2009 (49EE9A36)
    930d5000 930de000 dc3d dc3d.sys Tue Nov 03 21:38:29 2009 (4AF0E925)
    930de000 930e9000 hidusb hidusb.sys Tue Apr 21 23:49:29 2009 (49EE93C9)
    930e9000 930f0000 NuidFltr NuidFltr.sys Fri May 08 04:35:42 2009 (4A03EEDE)
    930f0000 930fb000 mouhid mouhid.sys Tue Apr 21 23:43:33 2009 (49EE9265)
    930fb000 93105000 Dxapi Dxapi.sys Tue Apr 21 23:22:56 2009 (49EE8D90)
    93105000 9311b000 cdfs cdfs.sys Tue Apr 21 23:08:38 2009 (49EE8A36)
    9311b000 93126000 monitor monitor.sys Tue Apr 21 23:23:20 2009 (49EE8DA8)
    93126000 93133000 crashdmp crashdmp.sys Tue Apr 21 23:44:19 2009 (49EE9293)
    93133000 9313e000 dump_dumpata dump_dumpata.sys Tue Apr 21 23:08:41 2009 (49EE8A39)
    9313e000 93147000 dump_atapi dump_atapi.sys Tue Apr 21 23:08:39 2009 (49EE8A37)
    93147000 93158000 dump_dumpfve dump_dumpfve.sys Tue Apr 21 23:10:11 2009 (49EE8A93)
    93158000 93173000 luafv luafv.sys Tue Apr 21 23:13:02 2009 (49EE8B3E)
    93173000 9318d000 WudfPf WudfPf.sys Tue Apr 21 23:48:41 2009 (49EE9399)
    9318d000 9319d000 lltdio lltdio.sys Tue Apr 21 23:51:49 2009 (49EE9455)
    9319d000 931b0000 rspndr rspndr.sys Tue Apr 21 23:51:50 2009 (49EE9456)
    931b0000 93235000 HTTP HTTP.sys Tue Apr 21 23:10:08 2009 (49EE8A90)
    93235000 9324e000 bowser bowser.sys Tue Apr 21 23:11:38 2009 (49EE8AEA)
    9324e000 93260000 mpsdrv mpsdrv.sys Tue Apr 21 23:51:21 2009 (49EE9439)
    93260000 93283000 mrxsmb mrxsmb.sys Tue Apr 21 23:11:40 2009 (49EE8AEC)
    93283000 932be000 mrxsmb10 mrxsmb10.sys Tue Apr 21 23:11:55 2009 (49EE8AFB)
    932be000 932d9000 mrxsmb20 mrxsmb20.sys Tue Apr 21 23:11:48 2009 (49EE8AF4)
    932f1000 93388000 peauth peauth.sys Wed Apr 22 00:40:09 2009 (49EE9FA9)
    93388000 93392000 secdrv secdrv.SYS Wed Sep 13 09:18:32 2006 (45080528)
    93392000 933b3000 srvnet srvnet.sys Tue Apr 21 23:12:06 2009 (49EE8B06)
    933b3000 933c0000 tcpipreg tcpipreg.sys Tue Apr 21 23:52:46 2009 (49EE948E)
    93950000 93b9a000 win32k win32k.sys Tue Apr 21 23:23:55 2009 (49EE8DCB)
    93bb0000 93bb9000 TSDDD TSDDD.dll unavailable (00000000)
    93be0000 93bfe000 cdd cdd.dll unavailable (00000000)
    9e40c000 9e45b000 srv2 srv2.sys Wed Sep 09 23:10:12 2009 (4AA86E14)
    9e45b000 9e4ac000 srv srv.sys Tue Apr 21 23:12:29 2009 (49EE8B1D)
    9e516000 9e51f000 asyncmac asyncmac.sys Tue Apr 21 23:53:14 2009 (49EE94AA)
    9e51f000 9e520580 MSPQM MSPQM.sys Tue Apr 21 23:43:35 2009 (49EE9267)
    9e521000 9e522700 MSPCLOCK MSPCLOCK.sys Tue Apr 21 23:43:35 2009 (49EE9267)

    Unloaded modules:
    9e523000 9e52e000 hiber_atapor
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    9e52e000 9e537000 hiber_atapi.
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    9e537000 9e548000 hiber_dumpfv
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    9e4ac000 9e516000 spsys.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    932d9000 932f1000 parport.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aa9d000 8aaaa000 crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aaaa000 8aab5000 dump_ataport
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aab5000 8aabe000 dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aabe000 8aacf000 dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    Closing open log file c:debuglog.txt
    My System SpecsSystem Spec     Edit/Delete Message Reply With Quote Multi-Quote This Message
    System Manufacturer/Model Number homemade
    OS windows 7
    CPU pent 4 ht
    Motherboard asus p4p800mx
    Memory 2.5 GB
    Graphics Card Nvidia GeForce 8400 gs
    Sound Card sound blaster live 24 bit
    Monitor(s) Displays dual stone age monitors e772p and e773p

    Update your System Spec
    PSU diablotek da series 400w
    Case factory modded Dell 2350
    Cooling air
    Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
    jcm2302
    View Public Profile
    Find More Posts by jcm2302
    Add jcm2302 to Your Contacts
    Old 1 Minute Ago       #2 (permalink)
    jcm2302
    New Member

    jcm2302 is on a distinguished road


    Join Date: Nov 2009
    windows 7
    3 posts
     
       
      jcm2302 is online now Add to jcm2302's Reputation   Report Post 

    Default
    also i get this




    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\112709-19593-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
    Machine Name:
    Kernel base = 0x82807000 PsLoadedModuleList = 0x82946570
    Debug session time: Fri Nov 27 18:22:52.563 2009 (GMT-5)
    System Uptime: 0 days 3:42:22.985
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............................
    Loading User Symbols
    Loading unloaded module list
    ......
    1: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    MACHINE_CHECK_EXCEPTION (9c)
    A fatal Machine Check Exception has occurred.
    KeBugCheckEx parameters;
    x86 Processors
    If the processor has ONLY MCE feature available (For example Intel
    Pentium), the parameters are:
    1 - Low 32 bits of P5_MC_TYPE MSR
    2 - Address of MCA_EXCEPTION structure
    3 - High 32 bits of P5_MC_ADDR MSR
    4 - Low 32 bits of P5_MC_ADDR MSR
    If the processor also has MCA feature available (For example Intel
    Pentium Pro), the parameters are:
    1 - Bank number
    2 - Address of MCA_EXCEPTION structure
    3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
    4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
    IA64 Processors
    1 - Bugcheck Type
    1 - MCA_ASSERT
    2 - MCA_GET_STATEINFO
    SAL returned an error for SAL_GET_STATEINFO while processing MCA.
    3 - MCA_CLEAR_STATEINFO
    SAL returned an error for SAL_CLEAR_STATEINFO while processing MCA.
    4 - MCA_FATAL
    FW reported a fatal MCA.
    5 - MCA_NONFATAL
    SAL reported a recoverable MCA and we don't support currently
    support recovery or SAL generated an MCA and then couldn't
    produce an error record.
    0xB - INIT_ASSERT
    0xC - INIT_GET_STATEINFO
    SAL returned an error for SAL_GET_STATEINFO while processing INIT event.
    0xD - INIT_CLEAR_STATEINFO
    SAL returned an error for SAL_CLEAR_STATEINFO while processing INIT event.
    0xE - INIT_FATAL
    Not used.
    2 - Address of log
    3 - Size of log
    4 - Error code in the case of x_GET_STATEINFO or x_CLEAR_STATEINFO
    AMD64 Processors
    1 - Bank number
    2 - Address of MCA_EXCEPTION structure
    3 - High 32 bits of MCi_STATUS MSR for the MCA bank that had the error
    4 - Low 32 bits of MCi_STATUS MSR for the MCA bank that had the error
    Arguments:
    Arg1: 00000000
    Arg2: 80dc794c
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------

    NOTE: This is a hardware error. This error was reported by the CPU
    via Interrupt 18. This analysis will provide more information about
    the specific error. Please contact the manufacturer for additional
    information about this error and troubleshooting assistance.

    This error is documented in the following publication:

    - IA-32 Intel(r) Architecture Software Developer's Manual
    Volume 3: System Programming Guide

    Bit Mask:

    MA Model Specific MCA
    O ID Other Information Error Code Error Code
    VV SDP ___________|____________ _______|_______ _______|______
    AEUECRC| | | |
    LRCNVVC| | | |
    ^^^^^^^| | | |
    6 5 4 3 2 1
    3210987654321098765432109876543210987654321098765432109876543210
    ----------------------------------------------------------------
    0000000000000000000000000000000000000000000000000000000000000000




    Concatenated Error Code:
    --------------------------


    This error code can be reported back to the manufacturer.
    They may be able to provide additional information based upon
    this error. All questions regarding STOP 0x9C should be
    directed to the hardware manufacturer.

    BUGCHECK_STR: 0x9C_GenuineIntel

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: csrss.exe

    CURRENT_IRQL: 1f

    LAST_CONTROL_TRANSFER: from 82c161f9 to 828c2e94

    SYMBOL_ON_RAW_STACK: 1

    STACK_ADDR_RAW_STACK_SYMBOL: ffffffff80dc7958

    STACK_COMMAND: dds 80DC7958-0x20 ; kb

    STACK_TEXT:
    80dc7938 00000000
    80dc793c 80dc794c
    80dc7940 00000000
    80dc7944 00000000
    80dc7948 82c23e34 hal!HalpMceRendezvousCount
    80dc794c 00000001
    80dc7950 00000000
    80dc7954 8abaa8cd afd!AfdUnBindSocket+0x24a
    80dc7958 01ca6fb8
    80dc795c 00000001
    80dc7960 00000000
    80dc7964 00000000
    80dc7968 00000000
    80dc796c 00000000
    80dc7970 00000000
    80dc7974 00000000
    80dc7978 00000000
    80dc797c 00000000
    80dc7980 00000000
    80dc7984 00000000
    80dc7988 00000000
    80dc798c 00000000
    80dc7990 00000000
    80dc7994 00000000
    80dc7998 00000000
    80dc799c 00000000
    80dc79a0 00000000
    80dc79a4 00000000
    80dc79a8 00000000
    80dc79ac 00000000
    80dc79b0 00000000
    80dc79b4 00000000


    FOLLOWUP_IP:
    afd!AfdUnBindSocket+24a
    8abaa8cd 750d jne afd!AfdUnBindSocket+0x259 (8abaa8dc)

    SYMBOL_NAME: afd!AfdUnBindSocket+24a

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: afd

    IMAGE_NAME: afd.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8a86

    FAILURE_BUCKET_ID: 0x9C_GenuineIntel_afd!AfdUnBindSocket+24a

    BUCKET_ID: 0x9C_GenuineIntel_afd!AfdUnBindSocket+24a

    Followup: MachineOwner
    ---------

    eax=82935934 ebx=0000001f ecx=00000018 edx=829358b4 esi=80dbf120 edi=00000000
    eip=828c2e94 esp=80dc7910 ebp=80dc792c iopl=0 nv up di pl nz na po nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000002
    nt!KeBugCheckEx+0x1e:
    828c2e94 cc int 3
    ChildEBP RetAddr Args to Child
    80dc792c 82c161f9 0000009c 00000000 80dc794c nt!KeBugCheckEx+0x1e
    80dc7a50 82c163ff 00000000 00000000 00000000 hal!HalpMcaReportError+0x81 (FPO: [2,65,0])
    80dc7a70 82c1650a 00000000 85df66b0 80dc7b90 hal!HalpMceHandlerWithRendezvous+0x89 (FPO: [2,1,4])
    80dc7a80 82c0c5f5 00000000 00000000 00000000 hal!HalpHandleMachineCheck+0x34 (FPO: [1,0,0])
    80dc7b90 82c09261 00000000 80dc2750 00000000 hal!HalpMcaExceptionHandler+0x87 (FPO: [0,65,0])
    80dc7b90 00000000 00000000 80dc2750 00000000 hal!HalpMcaExceptionHandlerWrapper+0x89 (FPO: TSS f10f10:0)


    Unloaded modules:
    9e8df000 9e949000 spsys.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    926ac000 926c4000 parport.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aaa6000 8aab3000 crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aab3000 8aabe000 dump_ataport
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aabe000 8aac7000 dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aac7000 8aad8000 dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    Closing open log file c:debuglog.txt
    My System SpecsSystem Spec     Edit/Delete Message Reply With Quote Multi-Quote This Message
    System Manufacturer/Model Number homemade
    OS windows 7
    CPU pent 4 ht
    Motherboard asus p4p800mx
    Memory 2.5 GB
    Graphics Card Nvidia GeForce 8400 gs
    Sound Card sound blaster live 24 bit
    Monitor(s) Displays dual stone age monitors e772p and e773p

    Update your System Spec
    PSU diablotek da series 400w
    Case factory modded Dell 2350
    Cooling air
    Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
    jcm2302
    View Public Profile
    Find More Posts by jcm2302
    Add jcm2302 to Your Contacts
    Unread 1 Minute Ago       #3 (permalink)
    jcm2302
    New Member

    jcm2302 is on a distinguished road


    Join Date: Nov 2009
    windows 7
    3 posts
     
       
      jcm2302 is online now Add to jcm2302's Reputation   Report Post 

    Default
    and this




    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\112709-18812-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
    Machine Name:
    Kernel base = 0x82808000 PsLoadedModuleList = 0x82947570
    Debug session time: Fri Nov 27 00:37:26.002 2009 (GMT-5)
    System Uptime: 0 days 0:48:09.393
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000008E, {c000001d, 82876c42, 9d9ada78, 0}

    Probably caused by : hardware ( fileinfo!FILockSharedAcquire+14 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
    This is a very common bugcheck. Usually the exception address pinpoints
    the driver/function that caused the problem. Always note this address
    as well as the link date of the driver/image that contains this address.
    Some common problems are exception code 0x80000003. This means a hard
    coded breakpoint or assertion was hit, but this system was booted
    /NODEBUG. This is not supposed to happen as developers should never have
    hardcoded breakpoints in retail code, but ...
    If this happens, make sure a debugger gets connected, and the
    system is booted /DEBUG. This will let us see why this breakpoint is
    happening.
    Arguments:
    Arg1: c000001d, The exception code that was not handled
    Arg2: 82876c42, The address that the exception occurred at
    Arg3: 9d9ada78, Trap Frame
    Arg4: 00000000

    Debugging Details:
    ------------------


    EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.

    FAULTING_IP:
    nt!ExfAcquirePushLockShared+7
    82876c42 f083ec44 lock sub esp,44h

    TRAP_FRAME: 9d9ada78 -- (.trap 0xffffffff9d9ada78)
    .trap 0xffffffff9d9ada78
    ErrCode = 00000000
    eax=87040030 ebx=8a3bd364 ecx=8a3bd364 edx=00000000 esi=9d9adb50 edi=00000000
    eip=82876c42 esp=9d9adaec ebp=9d9adaec iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    nt!ExfAcquirePushLockShared+0x7:
    82876c42 f083ec44 lock sub esp,44h
    .trap
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    BUGCHECK_STR: 0x8E

    PROCESS_NAME: sidebar.exe

    CURRENT_IRQL: 0

    MISALIGNED_IP:
    nt!ExfAcquirePushLockShared+7
    82876c42 f083ec44 lock sub esp,44h

    LAST_CONTROL_TRANSFER: from 8a3ba02e to 82876c42

    FAILED_INSTRUCTION_ADDRESS:
    nt!ExfAcquirePushLockShared+7
    82876c42 f083ec44 lock sub esp,44h

    STACK_TEXT:
    9d9adaec 8a3ba02e 9d9adb14 8a3bef2a 8a3bd364 nt!ExfAcquirePushLockShared+0x7
    9d9adaf4 8a3bef2a 8a3bd364 9d9adb50 850c8008 fileinfo!FILockSharedAcquire+0x14
    9d9adb14 8a3c00f7 84faab40 9d9adb2c 9d9adb40 fileinfo!FIFileObjectGetContext+0x34
    9d9adb30 8a387aeb 850c8068 9d9adb50 00010000 fileinfo!FIPreCloseCallback+0x45
    9d9adb9c 8a38a9f0 9d9adbf0 84d705e0 84d70794 fltmgr!FltpPerformPreCallbacks+0x34d
    9d9adbb4 8a38af01 9d9adbf0 00000000 864a1218 fltmgr!FltpPassThroughInternal+0x40
    9d9adbd8 8a38b3ba 029adbf0 864a1218 84faab40 fltmgr!FltpPassThrough+0x203
    9d9adc08 82841dd2 864a1218 84d705e0 864a7024 fltmgr!FltpDispatch+0xb4
    9d9adc20 82a2e0a7 84bddf78 84faab28 00000000 nt!IofCallDriver+0x63
    9d9adc64 82a276c8 84faab40 84faab40 84faab28 nt!IopDeleteFile+0x10c
    9d9adc7c 828e64fd 00000000 87040030 84faab28 nt!ObpRemoveObjectRoutine+0x59
    9d9adc90 8287fa85 84faab40 82a27baf 9ed9cd38 nt!ObfDereferenceObjectWithTag+0x88
    9d9adc98 82a27baf 9ed9cd38 87040030 00000320 nt!ObfDereferenceObject+0xd
    9d9adcdc 82a278d5 9ed9cd38 9edb1640 86f43030 nt!ObpCloseHandleTableEntry+0x21d
    9d9add0c 82a27c0d 86f43030 87040001 020a80fc nt!ObpCloseHandle+0x7f
    9d9add28 8284935a 00000320 020a8100 77cf8244 nt!NtClose+0x4e
    9d9add28 77cf8244 00000320 020a8100 77cf8244 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    020a8100 00000000 00000000 00000000 00000000 0x77cf8244


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    fileinfo!FILockSharedAcquire+14
    8a3ba02e 5d pop ebp

    SYMBOL_STACK_INDEX: 1

    SYMBOL_NAME: fileinfo!FILockSharedAcquire+14

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: hardware

    IMAGE_NAME: hardware

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    FAILURE_BUCKET_ID: IP_MISALIGNED

    BUCKET_ID: IP_MISALIGNED

    Followup: MachineOwner
    ---------

    eax=87040030 ebx=8a3bd364 ecx=8a3bd364 edx=00000000 esi=9d9adb50 edi=00000000
    eip=82876c42 esp=9d9adaec ebp=9d9adaec iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    nt!ExfAcquirePushLockShared+0x7:
    82876c42 f083ec44 lock sub esp,44h
    ChildEBP RetAddr Args to Child
    9d9adaec 8a3ba02e 9d9adb14 8a3bef2a 8a3bd364 nt!ExfAcquirePushLockShared+0x7
    9d9adaf4 8a3bef2a 8a3bd364 9d9adb50 850c8008 fileinfo!FILockSharedAcquire+0x14 (FPO: [1,0,0])
    9d9adb14 8a3c00f7 84faab40 9d9adb2c 9d9adb40 fileinfo!FIFileObjectGetContext+0x34 (FPO: [3,2,4])
    9d9adb30 8a387aeb 850c8068 9d9adb50 00010000 fileinfo!FIPreCloseCallback+0x45 (FPO: [3,1,4])
    9d9adb9c 8a38a9f0 9d9adbf0 84d705e0 84d70794 fltmgr!FltpPerformPreCallbacks+0x34d (FPO: [1,19,4])
    9d9adbb4 8a38af01 9d9adbf0 00000000 864a1218 fltmgr!FltpPassThroughInternal+0x40 (FPO: [2,0,4])
    9d9adbd8 8a38b3ba 029adbf0 864a1218 84faab40 fltmgr!FltpPassThrough+0x203 (FPO: [1,2,4])
    9d9adc08 82841dd2 864a1218 84d705e0 864a7024 fltmgr!FltpDispatch+0xb4 (FPO: [2,6,4])
    9d9adc20 82a2e0a7 84bddf78 84faab28 00000000 nt!IofCallDriver+0x63
    9d9adc64 82a276c8 84faab40 84faab40 84faab28 nt!IopDeleteFile+0x10c
    9d9adc7c 828e64fd 00000000 87040030 84faab28 nt!ObpRemoveObjectRoutine+0x59
    9d9adc90 8287fa85 84faab40 82a27baf 9ed9cd38 nt!ObfDereferenceObjectWithTag+0x88 (FPO: [0,0,3])
    9d9adc98 82a27baf 9ed9cd38 87040030 00000320 nt!ObfDereferenceObject+0xd (FPO: [0,1,0])
    9d9adcdc 82a278d5 9ed9cd38 9edb1640 86f43030 nt!ObpCloseHandleTableEntry+0x21d
    9d9add0c 82a27c0d 86f43030 87040001 020a80fc nt!ObpCloseHandle+0x7f
    9d9add28 8284935a 00000320 020a8100 77cf8244 nt!NtClose+0x4e
    9d9add28 77cf8244 00000320 020a8100 77cf8244 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ 9d9add34)
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    020a8100 00000000 00000000 00000000 00000000 0x77cf8244


    Unloaded modules:
    9e4f4000 9e55e000 spsys.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    93f36000 93f4e000 parport.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aaab000 8aab8000 crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aab8000 8aac3000 dump_ataport
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aac3000 8aacc000 dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aacc000 8aadd000 dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    Closing open log file c:debuglog.txt
    My System SpecsSystem Spec     Edit/Delete Message Reply With Quote Multi-Quote This Message
    System Manufacturer/Model Number homemade
    OS windows 7
    CPU pent 4 ht
    Motherboard asus p4p800mx
    Memory 2.5 GB
    Graphics Card Nvidia GeForce 8400 gs
    Sound Card sound blaster live 24 bit
    Monitor(s) Displays dual stone age monitors e772p and e773p

    Update your System Spec
    PSU diablotek da series 400w
    Case factory modded Dell 2350
    Cooling air
    Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
    jcm2302
    View Public Profile
    Find More Posts by jcm2302
    Add jcm2302 to Your Contacts
    Unread 1 Minute Ago       #4 (permalink)
    jcm2302
    New Member

    jcm2302 is on a distinguished road


    Join Date: Nov 2009
    windows 7
    4 posts
     
       
      jcm2302 is online now Add to jcm2302's Reputation   Report Post 

    Default
    even this sometimes




    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\112709-21312-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
    Machine Name:
    Kernel base = 0x8283d000 PsLoadedModuleList = 0x8297c570
    Debug session time: Fri Nov 27 09:19:52.006 2009 (GMT-5)
    System Uptime: 0 days 1:28:39.428
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................
    Loading User Symbols
    Loading unloaded module list
    .........
    0: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc). If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 00000099, A PTE or PFN is corrupt
    Arg2: 00089140, page frame number
    Arg3: 00000003, current page state
    Arg4: 0008c60f, 0

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x4E_99

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: sidebar.exe

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from 82914500 to 828f8e94

    STACK_TEXT:
    a07267e0 82914500 0000004e 00000099 00089140 nt!KeBugCheckEx+0x1e
    a07267f8 828dad84 c000b790 00000fff 86b58a68 nt!MiBadShareCount+0x24
    a0726838 828daa70 86e65b60 00000200 86f6d090 nt!MiDeletePteList+0x2ba
    a0726c84 828c2f60 c000b78c 86e65b60 e6c8320c nt!MiDecommitPages+0x38b
    a0726d1c 8287e35a ffffffff 01f78f00 01f78f14 nt!NtFreeVirtualMemory+0x882
    a0726d1c 77078244 ffffffff 01f78f00 01f78f14 nt!KiFastCallEntry+0x12a
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    01f78ed4 00000000 00000000 00000000 00000000 0x77078244


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!MiBadShareCount+24
    82914500 cc int 3

    SYMBOL_STACK_INDEX: 1

    SYMBOL_NAME: nt!MiBadShareCount+24

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP: 49ee8b48

    IMAGE_NAME: memory_corruption

    FAILURE_BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24

    BUCKET_ID: 0x4E_99_nt!MiBadShareCount+24

    Followup: MachineOwner
    ---------

    eax=8296b934 ebx=848d9e02 ecx=00000018 edx=00000000 esi=8295ed20 edi=00000000
    eip=828f8e94 esp=a07267c8 ebp=a07267e0 iopl=0 nv up ei pl nz na po nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000202
    nt!KeBugCheckEx+0x1e:
    828f8e94 cc int 3
    ChildEBP RetAddr Args to Child
    a07267e0 82914500 0000004e 00000099 00089140 nt!KeBugCheckEx+0x1e
    a07267f8 828dad84 c000b790 00000fff 86b58a68 nt!MiBadShareCount+0x24 (FPO: [0,0,0])
    a0726838 828daa70 86e65b60 00000200 86f6d090 nt!MiDeletePteList+0x2ba
    a0726c84 828c2f60 c000b78c 86e65b60 e6c8320c nt!MiDecommitPages+0x38b
    a0726d1c 8287e35a ffffffff 01f78f00 01f78f14 nt!NtFreeVirtualMemory+0x882
    a0726d1c 77078244 ffffffff 01f78f00 01f78f14 nt!KiFastCallEntry+0x12a (FPO: [0,3] TrapFrame @ a0726d34)
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    01f78ed4 00000000 00000000 00000000 00000000 0x77078244


    Unloaded modules:
    9d4a2000 9d4c3000 WUDFRd.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    93d35000 93d4c000 USBSTOR.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    93d2f000 93d35000 RimUsb.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    9d4c3000 9d52d000 spsys.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    93f34000 93f4c000 parport.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aa73000 8aa80000 crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aa80000 8aa8b000 dump_ataport
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aa8b000 8aa94000 dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    8aa94000 8aaa5000 dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    Closing open log file c:debuglog.txt
    My System SpecsSystem Spec     Edit/Delete Message Reply With Quote Multi-Quote This Message
    System Manufacturer/Model Number homemade
    OS windows 7
    CPU pent 4 ht
    Motherboard asus p4p800mx
    Memory 2.5 GB
    Graphics Card Nvidia GeForce 8400 gs
    Sound Card sound blaster live 24 bit
    Monitor(s) Displays dual stone age monitors e772p and e773p

    Update your System Spec
    PSU diablotek da series 400w
    Case factory modded Dell 2350
    Cooling air
    Hard Drives WD 500 GB sata, WD 56 GB IDE Primary, WD 34 GB IDE Slave
    jcm2302
    View Public Profile
    Find More Posts by jcm2302
    Add jcm2302 to Your Contacts
    Unread 1 Minute Ago       #5 (permalink)
    jcm2302
    New Member

    jcm2302 is on a distinguished road


    Join Date: Nov 2009
    windows 7
    5 posts
     
       
      jcm2302 is online now Add to jcm2302's Reputation   Report Post 

    Default
    and this so far




    Opened log file 'c:debuglog.txt'

    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Windows\Minidump\112609-26937-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\symbols*Symbol information
    Executable search path is: C:\Windows;C:\Windows\system32;C:\Windows\system32\drivers
    Windows 7 Kernel Version 7100 MP (2 procs) Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7100.0.x86fre.winmain_win7rc.090421-1700
    Machine Name:
    Kernel base = 0x82810000 PsLoadedModuleList = 0x8294f570
    Debug session time: Thu Nov 26 23:48:06.587 2009 (GMT-5)
    System Uptime: 0 days 1:14:21.994
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................
    Loading User Symbols
    Loading unloaded module list
    ...............
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 7F, {0, 0, 0, 0}

    *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
    Probably caused by : nvlddmkm.sys ( nvlddmkm+5021c9 )

    Followup: MachineOwner
    ---------

    0: kd> !analyze -v;r;kv;lmtn;.logclose;q
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    UNEXPECTED_KERNEL_MODE_TRAP (7f)
    This means a trap occurred in kernel mode, and it's a trap of a kind
    that the kernel isn't allowed to have/catch (bound trap) or that
    is always instant death (double fault). The first number in the
    bugcheck params is the number of the trap (8 = double fault, etc)
    Consult an Intel x86 family manual to learn more about what these
    traps are. Here is a *portion* of those codes:
    If kv shows a taskGate
    use .tss on the part before the colon, then kv.
    Else if kv shows a trapframe
    use .trap on that value
    Else
    .trap on the appropriate frame will show where the trap was taken
    (on x86, this will be the ebp that goes with the procedure KiTrap)
    Endif
    kb will then show the corrected stack.
    Arguments:
    Arg1: 00000000, EXCEPTION_DIVIDED_BY_ZERO
    Arg2: 00000000
    Arg3: 00000000
    Arg4: 00000000

    Debugging Details:
    ------------------


    BUGCHECK_STR: 0x7f_0

    TRAP_FRAME: 80d8a7e0 -- (.trap 0xffffffff80d8a7e0)
    .trap 0xffffffff80d8a7e0
    ErrCode = 00000000
    eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=86d2f8e0 edi=84fce530
    eip=af5161c9 esp=80d8a854 ebp=80d8a85c iopl=0 nv up ei pl zr na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
    nvlddmkm+0x5021c9:
    af5161c9 f7f1 div eax,ecx
    .trap
    Resetting default scope

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

    PROCESS_NAME: firefox.exe

    CURRENT_IRQL: 2

    LAST_CONTROL_TRANSFER: from af5161c9 to 828521bb

    STACK_TEXT:
    80d8a7e0 af5161c9 badb0d00 00000000 84fce530 nt!KiTrap00+0x8b
    WARNING: Stack unwind information not available. Following frames may be wrong.
    80d8a85c af2d7932 84fce530 00000001 8533603c nvlddmkm+0x5021c9
    80d8a878 af51b8c3 84fce530 851f3000 86d2f8e0 nvlddmkm+0x2c3932
    80d8a8a8 af51f44a 84fce530 851f3000 00000003 nvlddmkm+0x5078c3
    80d8a8c8 af24c9de 84fce530 851f3000 86d2f8b8 nvlddmkm+0x50b44a
    80d8a90c af33c161 00000000 86b0a1b0 86d2f8b8 nvlddmkm+0x2389de
    80d8a97c af33ba4f 84fce530 850181a8 00000000 nvlddmkm+0x328161
    80d8a9d0 af4345a9 00000001 850181a8 0000001a nvlddmkm+0x327a4f
    80d8aa24 af42fa7d 850181a8 86c1dba0 00e00000 nvlddmkm+0x4205a9
    80d8aa4c af434bf1 84fce530 86c1dba0 00e00000 nvlddmkm+0x41ba7d
    80d8ab88 af3b5912 850181a8 00e00000 86b0a1b0 nvlddmkm+0x420bf1
    80d8ac10 af43616e 00000001 86b0a1b0 0021704b nvlddmkm+0x3a1912
    80d8ac4c af434b36 00000000 86c1dba0 00000400 nvlddmkm+0x42216e
    80d8ad88 af3b521b 850181a8 ffffffff 85eae380 nvlddmkm+0x420b36
    80d8ae64 af2e1b90 00000000 86b0a1b0 86b0a1b0 nvlddmkm+0x3a121b
    80d8ae80 af15b642 84fce530 86b0a1b0 850bd000 nvlddmkm+0x2cdb90
    80d8af00 af091f13 850bd000 00000000 850bd010 nvlddmkm+0x147642
    80d8af24 af0280f0 8504edcc 80d8af3c af0f2947 nvlddmkm+0x7df13
    80d8af30 af0f2947 af0280bf 80d8af48 af0633ec nvlddmkm+0x140f0
    80d8af3c af0633ec 850bd000 80d8afa4 828d3f82 nvlddmkm+0xde947
    80d8af48 828d3f82 850bd010 850bd000 00000000 nvlddmkm+0x4f3ec
    80d8afa4 82874c10 82931d20 8504ed48 00000000 nt!KiExecuteAllDpcs+0xf9
    80d8aff4 828713dc 9e59fce4 00000000 00000000 nt!KiRetireDpcList+0xd5
    80d8aff8 9e59fce4 00000000 00000000 00000000 nt!KiDispatchInterrupt+0x2c
    828713dc 00000000 0000001a 00d6850f bb830000 0x9e59fce4


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nvlddmkm+5021c9
    af5161c9 f7f1 div eax,ecx

    SYMBOL_STACK_INDEX: 1

    SYMBOL_NAME: nvlddmkm+5021c9

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nvlddmkm

    IMAGE_NAME: nvlddmkm.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 4b0764b5

    FAILURE_BUCKET_ID: 0x7f_0_nvlddmkm+5021c9

    BUCKET_ID: 0x7f_0_nvlddmkm+5021c9

    Followup: MachineOwner
    ---------

    eax=8293e934 ebx=80d8a802 ecx=0000001f edx=00000000 esi=82931d20 edi=00000000
    eip=828521bb esp=80d8a7c8 ebp=80d8a7e0 iopl=0 nv up ei pl nz ac po nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000212
    nt!KiTrap00+0x8b:
    828521bb 66837d6c1b cmp word ptr [ebp+6Ch],1Bh ss:0010:80d8a84c=0008
    ChildEBP RetAddr Args to Child
    80d8a7e0 af5161c9 badb0d00 00000000 84fce530 nt!KiTrap00+0x8b (FPO: [0,0] TrapFrame @ 80d8a7e0)
    WARNING: Stack unwind information not available. Following frames may be wrong.
    80d8a85c af2d7932 84fce530 00000001 8533603c nvlddmkm+0x5021c9
    80d8a878 af51b8c3 84fce530 851f3000 86d2f8e0 nvlddmkm+0x2c3932
    80d8a8a8 af51f44a 84fce530 851f3000 00000003 nvlddmkm+0x5078c3
    80d8a8c8 af24c9de 84fce530 851f3000 86d2f8b8 nvlddmkm+0x50b44a
    80d8a90c af33c161 00000000 86b0a1b0 86d2f8b8 nvlddmkm+0x2389de
    80d8a97c af33ba4f 84fce530 850181a8 00000000 nvlddmkm+0x328161
    80d8a9d0 af4345a9 00000001 850181a8 0000001a nvlddmkm+0x327a4f
    80d8aa24 af42fa7d 850181a8 86c1dba0 00e00000 nvlddmkm+0x4205a9
    80d8aa4c af434bf1 84fce530 86c1dba0 00e00000 nvlddmkm+0x41ba7d
    80d8ab88 af3b5912 850181a8 00e00000 86b0a1b0 nvlddmkm+0x420bf1
    80d8ac10 af43616e 00000001 86b0a1b0 0021704b nvlddmkm+0x3a1912
    80d8ac4c af434b36 00000000 86c1dba0 00000400 nvlddmkm+0x42216e
    80d8ad88 af3b521b 850181a8 ffffffff 85eae380 nvlddmkm+0x420b36
    80d8ae64 af2e1b90 00000000 86b0a1b0 86b0a1b0 nvlddmkm+0x3a121b
    80d8ae80 af15b642 84fce530 86b0a1b0 850bd000 nvlddmkm+0x2cdb90
    80d8af00 af091f13 850bd000 00000000 850bd010 nvlddmkm+0x147642
    80d8af24 af0280f0 8504edcc 80d8af3c af0f2947 nvlddmkm+0x7df13
    80d8af30 af0f2947 af0280bf 80d8af48 af0633ec nvlddmkm+0x140f0
    80d8af3c af0633ec 850bd000 80d8afa4 828d3f82 nvlddmkm+0xde947
    Saturday, November 28, 2009 3:18 PM

Answers