Here's the dump file.
I'm having a hard time loading up now.
About cleaning the old drivers... I'm a little leary about going in there and deleting stuff. I would hate to delete the wrong thing and cause even more problems.
Anyone know of a guide on how to reload all my drivers? Is a fresh install of Window's the best solution if it's a software issue?
ISK
ok I took a quick look at the 6 most recent dumps. all of them had different faulting processes but on ething most of them had in comman was memory corruption. Im wondering if you overclock, under volt, or do anything that isnt stock. If not I suggest you download memtest and run a comprehensive test on your memory. How much memory do you have and have you added memory lately.
I didnt examine the dumps that were older because You may not even have the same oriblems today.
Hope this helps and let me know if you need help with anything
ken
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\Mini090409-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*d:\symbols*
Symbol information
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6002.18005.amd64fre.lh_sp2rtm.090410-1830
Machine Name:
Kernel base = 0xfffff800`02654000 PsLoadedModuleList = 0xfffff800`02818dd0
Debug session time: Fri Sep 4 12:20:07.998 2009 (GMT-4)
System Uptime: 0 days 0:03:49.841
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {331f39, 2, 1, fffff800026baf17}
Probably caused by : memory_corruption ( nt!MiRemoveAnyPage+137 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000331f39, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800026baf17, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000287b080
0000000000331f39
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRemoveAnyPage+137
fffff800`026baf17 488344ca10ff add qword ptr [rdx+rcx*8+10h],0FFFFFFFFFFFFFFFFh
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffffa600cafa480 -- (.trap 0xfffffa600cafa480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000016 rbx=0000000000000000 rcx=0000000000000042
rdx=0000000000331d19 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800026baf17 rsp=fffffa600cafa610 rbp=0000000000000002
r8=fffffa8000000008 r9=0000000000000001 r10=0000000000000000
r11=0000000000000016 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiRemoveAnyPage+0x137:
fffff800`026baf17 488344ca10ff add qword ptr [rdx+rcx*8+10h],0FFFFFFFFFFFFFFFFh ds:3b20:00000000`00331f39=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800026ae1ee to fffff800026ae450
STACK_TEXT:
fffffa60`0cafa338 fffff800`026ae1ee : 00000000`0000000a 00000000`00331f39 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffffa60`0cafa340 fffff800`026ad0cb : 00000000`00000001 00000000`00000000 00000000`00000000 fffffa80`0418a820 : nt!KiBugCheckDispatch+0x6e
fffffa60`0cafa480 fffff800`026baf17 : fffff880`0f2cfd10 fffff800`028b4011 00000000`00000000 fffff800`026cf67a : nt!KiPageFault+0x20b
fffffa60`0cafa610 fffff800`026eea8d : fa80072d`71d004c0 fffffa80`0bca6e90 00000000`00000003 00000000`00000000 : nt!MiRemoveAnyPage+0x137
fffffa60`0cafa670 fffff800`0289d433 : fffffa80`0c213a70 fffffa80`00000000 00000000`00000000 00000000`0000003f : nt! ?? ::FNODOBFM::`string'+0x21ef6
fffffa60`0cafa770 fffff800`02a58121 : 00000000`00000000 fffff880`10ee6418 fffff880`10ee1000 fffffa60`0cafa908 : nt!MmPrefetchPages+0xef
fffffa60`0cafa7c0 fffff800`02a81b89 : fffff880`00000000 00000000`00000000 fffff880`000001bd 00000000`00000000 : nt!PfpPrefetchFilesTrickle+0x211
fffffa60`0cafa8c0 fffff800`02a81e42 : 00000000`00000000 fffffa60`0cafaca0 fffffa60`0cafaa08 fffff880`10ee1001 : nt!PfpPrefetchRequestPerform+0x2f9
fffffa60`0cafa960 fffff800`02a820a6 : fffffa60`0cafaa08 00000000`00000001 fffffa80`0c569230 00000000`00000000 : nt!PfpPrefetchRequest+0x171
fffffa60`0cafa9d0 fffff800`02a94aa8 : 00000000`00000000 00000000`00000004 fffffa60`0cafaca0 fffff800`026b0e01 : nt!PfSetSuperfetchInformation+0x1a5
fffffa60`0cafaab0 fffff800`026adef3 : fffffa80`0c152700 00000000`00000000 00000000`00000000 fffffa80`0bfd11e0 : nt!NtSetSystemInformation+0x8fb
fffffa60`0cafac20 00000000`776e838a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`022af838 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776e838a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiRemoveAnyPage+137
fffff800`026baf17 488344ca10ff add qword ptr [rdx+rcx*8+10h],0FFFFFFFFFFFFFFFFh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRemoveAnyPage+137
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49e0237f
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiRemoveAnyPage+137
BUCKET_ID: X64_0xA_nt!MiRemoveAnyPage+137
Followup: MachineOwner
---------