Windows Vista Home 64 Bit constant BSOD

samueldrgeene

New Member
Hey guys,

I just built a new system and am getting constant bsod. My specs are.

4Gb corsair ddr 2 800MHZ
Asus Striker II Formula MB
Msi Geforce 9600 Gt 1gb
2.86 quad core intel
Generic 450w Power Supply

I have not overclocked at all. I am running Vista Service Pack one due to BSOD when I attempt to install SP2.



I suspect the crappy power supply.
The blue screens are random and there seem to be many causes. How do I post the dumps? Thanks in advance!

Here are the minidump readings:

Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18000.amd64fre.longhorn_rtm.080118-1840
Machine Name:
Kernel base = 0xfffff800`01814000 PsLoadedModuleList = 0xfffff800`019d9db0
Debug session time: Mon Jul 13 13:24:57.227 2009 (GMT-4)
System Uptime: 0 days 0:15:28.883
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904aa, fffffa600460d0d8, fffffa600460cab0, fffff8000187a4bc}

Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushUserStream+18f )

Followup: MachineOwner
---------

3: kd> .reload
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
..........
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa600460d0d8
Arg3: fffffa600460cab0
Arg4: fffff8000187a4bc

Debugging Details:
------------------


EXCEPTION_RECORD:  fffffa600460d0d8 -- (.exr 0xfffffa600460d0d8)
ExceptionAddress: fffff8000187a4bc (nt!IoGetRelatedDeviceObject+0x000000000000000c)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffa600460cab0 -- (.cxr 0xfffffa600460cab0)
rax=71f474ae20a69876 rbx=0000000000000000 rcx=fffffa8002659980
rdx=fffffa8002659980 rsi=fffffa80047081c0 rdi=0000000000000000
rip=fffff8000187a4bc rsp=fffffa600460d318 rbp=fffffa8002659980
 r8=0000000000000080  r9=fffff88007958000 r10=0000000000000002
r11=0000000000000000 r12=fffffa600460d350 r13=fffffa8002659980
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!IoGetRelatedDeviceObject+0xc:
fffff800`0187a4bc 488b4008        mov     rax,qword ptr [rax+8] ds:002b:71f474ae`20a6987e=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  VSSVC.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001a3d080
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsFlushUserStream+18f
fffffa60`010ca4ff 4084f6          test    sil,sil

FAULTING_IP: 
nt!IoGetRelatedDeviceObject+c
fffff800`0187a4bc 488b4008        mov     rax,qword ptr [rax+8]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff80001afe1ae to fffff8000187a4bc

STACK_TEXT:  
fffffa60`0460d318 fffff800`01afe1ae : 00000000`00000000 00000000`00000000 fffffa60`01069c00 00000000`0000000e : nt!IoGetRelatedDeviceObject+0xc
fffffa60`0460d320 fffff800`0187aec5 : fffffa60`0460d7a8 00000000`00000000 fffffa80`02659980 fffffa60`0460d7a8 : nt!FsRtlAcquireFileForCcFlushEx+0x32
fffffa60`0460d5c0 fffff800`0187eb7f : 00000000`00000000 fffff980`13df3500 00000000`00000000 fffffa60`00000000 : nt!MmFlushSection+0xf5
fffffa60`0460d680 fffffa60`010ca4ff : fffffa80`03c71840 00000000`00000000 fffffa80`00000000 fffffa60`0460d7a8 : nt!CcFlushCache+0x840
fffffa60`0460d770 fffffa60`0109cec8 : fffff880`0897e830 fffff880`08678c80 fffffa80`04ddabb0 fffff880`00000000 : Ntfs!NtfsFlushUserStream+0x18f
fffffa60`0460d800 fffffa60`010cb722 : fffffa80`04ddabb0 fffffa80`04727180 fffffa60`0460d901 fffffa60`0460d900 : Ntfs!NtfsFlushVolume+0x298
fffffa60`0460d920 fffffa60`010cbd8b : fffffa80`04ddabb0 fffffa80`045f5c60 fffffa80`045f5c60 fffffa80`04727180 : Ntfs!NtfsCommonFlushBuffers+0x681
fffffa60`0460d9f0 fffffa60`00a81e17 : fffffa80`045f5fb8 fffffa80`045f5c60 fffffa80`04ddabb0 fffffa60`0460da18 : Ntfs!NtfsFsdFlushBuffers+0x10b
fffffa60`0460da60 fffffa60`00a810dd : fffffa80`02d16dc0 fffffa80`04045ba0 fffffa80`0521f800 00000000`00000003 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`0460dad0 fffff800`01af832c : 00000000`00000000 00000000`0426efa8 00000000`00000000 fffffa80`044809d0 : fltmgr!FltpDispatch+0xcd
fffffa60`0460db30 fffff800`01adb473 : 00000000`00000000 00000000`00000000 fffffa80`04045ba0 fffffa60`0460dca0 : nt!IopSynchronousServiceTail+0x13c
fffffa60`0460db90 fffff800`01868e33 : fffffa80`044809d0 00000000`ffa21600 fffffa80`0521f8e0 fffffa80`04045ba0 : nt!NtFlushBuffersFile+0x193
fffffa60`0460dc20 00000000`77285f2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0426f4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77285f2a


SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  Ntfs!NtfsFlushUserStream+18f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  479190d1

STACK_COMMAND:  .cxr 0xfffffa600460cab0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushUserStream+18f

BUCKET_ID:  X64_0x24_Ntfs!NtfsFlushUserStream+18f

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a19000 PsLoadedModuleList = 0xfffff800`01bdedb0
Debug session time: Mon Jul 13 18:08:42.251 2009 (GMT-4)
System Uptime: 0 days 0:33:24.232
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffffa6004695e23, 0, ffffffffffffffff}

Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : athrxusb.sys ( athrxusb+ee23 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffffa6004695e23, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
athrxusb+ee23
fffffa60`04695e23 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c42080
 ffffffffffffffff 

CUSTOMER_CRASH_COUNT:  2

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x1E

PROCESS_NAME:  System

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80001a47e67 to fffff80001a6d650

STACK_TEXT:  
fffff800`02b19e98 fffff800`01a47e67 : 00000000`0000001e ffffffff`c0000005 fffffa60`04695e23 00000000`00000000 : nt!KeBugCheckEx
fffff800`02b19ea0 fffff800`01a6d4a9 : fffff800`02b1a5d8 fffffa80`05781be0 fffff800`02b1a680 fffffa80`07084600 : nt! ?? ::FNODOBFM::`string'+0x29317
fffff800`02b1a4a0 fffff800`01a6c08d : fffffa80`066a2940 fffffa80`52547571 00000000`00000000 fffffa60`03dc0300 : nt!KiExceptionDispatch+0xa9
fffff800`02b1a680 fffffa60`04695e23 : fffffa80`0668fab0 fffffa60`42554855 fffffa80`05781be0 fffffa60`046d76e7 : nt!KiGeneralProtectionFault+0xcd
fffff800`02b1a810 fffffa80`0668fab0 : fffffa60`42554855 fffffa80`05781be0 fffffa60`046d76e7 fffffa80`0668fae8 : athrxusb+0xee23
fffff800`02b1a818 fffffa60`42554855 : fffffa80`05781be0 fffffa60`046d76e7 fffffa80`0668fae8 fffffa80`0622005f : 0xfffffa80`0668fab0
fffff800`02b1a820 fffffa80`05781be0 : fffffa60`046d76e7 fffffa80`0668fae8 fffffa80`0622005f 00000000`00000bc8 : 0xfffffa60`42554855
fffff800`02b1a828 fffffa60`046d76e7 : fffffa80`0668fae8 fffffa80`0622005f 00000000`00000bc8 fffffa80`0622e404 : 0xfffffa80`05781be0
fffff800`02b1a830 fffffa80`0668fae8 : fffffa80`0622005f 00000000`00000bc8 fffffa80`0622e404 00000000`00000000 : athrxusb+0x506e7
fffff800`02b1a838 fffffa80`0622005f : 00000000`00000bc8 fffffa80`0622e404 00000000`00000000 fffffa60`03d9f726 : 0xfffffa80`0668fae8
fffff800`02b1a840 00000000`00000bc8 : fffffa80`0622e404 00000000`00000000 fffffa60`03d9f726 00000000`00000000 : 0xfffffa80`0622005f
fffff800`02b1a848 fffffa80`0622e404 : 00000000`00000000 fffffa60`03d9f726 00000000`00000000 fffffa60`03da39c3 : 0xbc8
fffff800`02b1a850 00000000`00000000 : fffffa60`03d9f726 00000000`00000000 fffffa60`03da39c3 00000000`00000000 : 0xfffffa80`0622e404


STACK_COMMAND:  kb

FOLLOWUP_IP: 
athrxusb+ee23
fffffa60`04695e23 ??              ???

SYMBOL_STACK_INDEX:  4

SYMBOL_NAME:  athrxusb+ee23

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: athrxusb

IMAGE_NAME:  athrxusb.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  45bdef26

FAILURE_BUCKET_ID:  X64_0x1E_athrxusb+ee23

BUCKET_ID:  X64_0x1E_athrxusb+ee23

Followup: MachineOwner
---------






Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-09.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a4e000 PsLoadedModuleList = 0xfffff800`01c13db0
Debug session time: Mon Jul 13 22:22:24.075 2009 (GMT-4)
System Uptime: 0 days 0:04:34.652
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffffa6004a08e2a, fffffa600731eb70, 0}

Probably caused by : afd.sys ( afd!AfdTLReleaseIndications+1a )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa6004a08e2a, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa600731eb70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
afd!AfdTLReleaseIndications+1a
fffffa60`04a08e2a 488b4108        mov     rax,qword ptr [rcx+8]

CONTEXT:  fffffa600731eb70 -- (.cxr 0xfffffa600731eb70)
rax=fffffa6004a0c020 rbx=fffffa8006cd9180 rcx=161598f33faa38c2
rdx=fffffa600731f3f0 rsi=fffffa80067ab040 rdi=fffffa8006e72100
rip=fffffa6004a08e2a rsp=fffffa600731f3d0 rbp=fffffa600731fca0
 r8=fffffa6007320000  r9=ffffffffc0000005 r10=fffffa600731f118
r11=fffffa600731db60 r12=fffffa8004791010 r13=00000000000000a4
r14=fffffa600731fa70 r15=fffffa600731f760
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
afd!AfdTLReleaseIndications+0x1a:
fffffa60`04a08e2a 488b4108        mov     rax,qword ptr [rcx+8] ds:002b:161598f3`3faa38ca=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  9

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffffa6004a41d67 to fffffa6004a08e2a

STACK_TEXT:  
fffffa60`0731f3d0 fffffa60`04a41d67 : fffffa60`0731fa70 00000000`000000a4 fffffa80`06cd9180 fffffa60`0731fca0 : afd!AfdTLReleaseIndications+0x1a
fffffa60`0731f420 fffffa60`04a3d6ea : fffffa60`0731f950 00000000`ffffffff 00000000`ffffffff fffffa80`069d8af0 : afd!AfdReturnBuffer+0x47
fffffa60`0731f450 fffffa60`04a2b76a : fffffa80`04791010 fffffa60`0731f760 fffff800`00001000 00000000`0000af00 : afd!AfdFastConnectionReceive+0x41b
fffffa60`0731f670 fffff800`01d2750b : 00000000`00001000 fffffa80`06e8c7c0 00000000`00000001 fffffa60`0731fc01 : afd!AfdFastIoDeviceControl+0x75a
fffffa60`0731f9f0 fffff800`01d40706 : fffffa80`00000002 00000000`000001b4 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x35b
fffffa60`0731fb40 fffff800`01aa20f3 : fffffa80`06b47640 fffff800`01d1d37f 00000000`000000e0 00000000`00000006 : nt!NtDeviceIoControlFile+0x56
fffffa60`0731fbb0 00000000`74f5385e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02d3ec08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74f5385e


FOLLOWUP_IP: 
afd!AfdTLReleaseIndications+1a
fffffa60`04a08e2a 488b4108        mov     rax,qword ptr [rcx+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  afd!AfdTLReleaseIndications+1a

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: afd

IMAGE_NAME:  afd.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  47919ad7

STACK_COMMAND:  .cxr 0xfffffa600731eb70 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_afd!AfdTLReleaseIndications+1a

BUCKET_ID:  X64_0x3B_afd!AfdTLReleaseIndications+1a

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-08.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a04000 PsLoadedModuleList = 0xfffff800`01bc9db0
Debug session time: Mon Jul 13 21:51:08.022 2009 (GMT-4)
System Uptime: 0 days 0:09:35.599
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80001ae96e2, fffffa6006aeff60, 0}

Probably caused by : memory_corruption ( nt!MiIdentifyPfn+6f2 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80001ae96e2, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6006aeff60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiIdentifyPfn+6f2
fffff800`01ae96e2 498b5b40        mov     rbx,qword ptr [r11+40h]

CONTEXT:  fffffa6006aeff60 -- (.cxr 0xfffffa6006aeff60)
rax=0200000000000000 rbx=0000058000000000 rcx=0000000000000002
rdx=00000000004d1628 rsi=fffffa80055d1a00 rdi=028000000009bb5a
rip=fffff80001ae96e2 rsp=fffffa6006af07c0 rbp=fffffa6006af0800
 r8=0200000000000000  r9=0000000000000542 r10=fffffa80069a69e0
r11=900136d160a08097 r12=0000000000000000 r13=fffffffffffff000
r14=000fffffffffffff r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
nt!MiIdentifyPfn+0x6f2:
fffff800`01ae96e2 498b5b40        mov     rbx,qword ptr [r11+40h] ds:002b:900136d1`60a080d7=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  8

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

LAST_CONTROL_TRANSFER:  from fffff80001b03fde to fffff80001ae96e2

STACK_TEXT:  
fffffa60`06af07c0 fffff800`01b03fde : 00000000`0009a2c5 fffffa80`055d1a00 fffffa80`075166b0 00000000`00000000 : nt!MiIdentifyPfn+0x6f2
fffffa60`06af0860 fffff800`01df2c05 : fffffa80`055d1000 fffffa60`06af0ca0 fffffa60`06af0928 00000000`00000000 : nt!MmQueryPfnList+0x13e
fffffa60`06af08a0 fffff800`01d3a19c : fffffa60`000000a8 00000000`00000000 fffffa80`055d1000 00000000`04402f01 : nt!PfpPfnPrioRequest+0x115
fffffa60`06af08f0 fffff800`01ccf9aa : 00000000`00000000 00000000`04402ff0 00000000`0240eea0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x467aa
fffffa60`06af0960 fffff800`01a580f3 : fffffa80`075166b0 00000000`04402ff0 00000000`0433f4e0 00000000`00000000 : nt!NtQuerySystemInformation+0xd0a
fffffa60`06af0c20 00000000`774e5dda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0240edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774e5dda


FOLLOWUP_IP: 
nt!MiIdentifyPfn+6f2
fffff800`01ae96e2 498b5b40        mov     rbx,qword ptr [r11+40h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiIdentifyPfn+6f2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  49ac93e1

STACK_COMMAND:  .cxr 0xfffffa6006aeff60 ; kb

IMAGE_NAME:  memory_corruption

FAILURE_BUCKET_ID:  X64_0x3B_nt!MiIdentifyPfn+6f2

BUCKET_ID:  X64_0x3B_nt!MiIdentifyPfn+6f2

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-07.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a05000 PsLoadedModuleList = 0xfffff800`01bcadb0
Debug session time: Mon Jul 13 21:40:29.722 2009 (GMT-4)
System Uptime: 0 days 0:48:05.711
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffffa600497a0d3, fffffa6004db4cf0, 0}

Probably caused by : Npfs.SYS ( Npfs!NpTranslateAlias+cb )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa600497a0d3, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6004db4cf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800        cmp     word ptr [rax],0

CONTEXT:  fffffa6004db4cf0 -- (.cxr 0xfffffa6004db4cf0)
rax=faf3b38f74db86f7 rbx=fffffa80079ba9e0 rcx=0000000000000043
rdx=fffffa6004db5580 rsi=fffffa6004db5638 rdi=000000000000000e
rip=fffffa600497a0d3 rsp=fffffa6004db5550 rbp=0000000000000000
 r8=0000000000000007  r9=0000000000000006 r10=fffff98000020654
r11=0000000000000010 r12=0000000000000000 r13=fffffa8005699960
r14=000000000012019f r15=fffffa800582ed30
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
Npfs!NpTranslateAlias+0xcb:
fffffa60`0497a0d3 66833800        cmp     word ptr [rax],0 ds:002b:faf3b38f`74db86f7=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  7

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  AiNap.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffffa600497a7aa to fffffa600497a0d3

STACK_TEXT:  
fffffa60`04db5550 fffffa60`0497a7aa : fffffa60`04db5698 00000000`00000005 00000000`00000000 fffffa60`04db5600 : Npfs!NpTranslateAlias+0xcb
fffffa60`04db55d0 fffff800`01ce01f3 : 00000000`00000005 fffffa80`0579bb10 00000000`00000040 fffffa80`0579bb10 : Npfs!NpFsdCreate+0x20a
fffffa60`04db5700 fffff800`01cd9ec9 : fffffa80`079e0df0 00000000`00000000 fffffa80`0572b3c0 fffffa80`03cbd901 : nt!IopParseDevice+0x5e3
fffffa60`04db58a0 fffff800`01cdddb4 : 00000000`00000000 fffffa80`043ae801 00000000`00000040 00000000`00000000 : nt!ObpLookupObjectName+0x5eb
fffffa60`04db59b0 fffff800`01cea360 : 00000000`c0100080 00000000`0007e620 00000000`0007e501 fffffa80`048546b0 : nt!ObOpenObjectByName+0x2f4
fffffa60`04db5a80 fffff800`01ceae98 : 00000000`0007e558 00000000`c0100080 00000000`0007e568 00000000`0007e548 : nt!IopCreateFile+0x290
fffffa60`04db5b20 fffff800`01a590f3 : 00000000`74ff3380 00000000`0007ee70 00000000`00000000 00000000`74f80a10 : nt!NtCreateFile+0x78
fffffa60`04db5bb0 00000000`77015fca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007e4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77015fca


FOLLOWUP_IP: 
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800        cmp     word ptr [rax],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Npfs!NpTranslateAlias+cb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  47919075

STACK_COMMAND:  .cxr 0xfffffa6004db4cf0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_Npfs!NpTranslateAlias+cb

BUCKET_ID:  X64_0x3B_Npfs!NpTranslateAlias+cb

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa600497a0d3, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6004db4cf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800        cmp     word ptr [rax],0

CONTEXT:  fffffa6004db4cf0 -- (.cxr 0xfffffa6004db4cf0)
rax=faf3b38f74db86f7 rbx=fffffa80079ba9e0 rcx=0000000000000043
rdx=fffffa6004db5580 rsi=fffffa6004db5638 rdi=000000000000000e
rip=fffffa600497a0d3 rsp=fffffa6004db5550 rbp=0000000000000000
 r8=0000000000000007  r9=0000000000000006 r10=fffff98000020654
r11=0000000000000010 r12=0000000000000000 r13=fffffa8005699960
r14=000000000012019f r15=fffffa800582ed30
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
Npfs!NpTranslateAlias+0xcb:
fffffa60`0497a0d3 66833800        cmp     word ptr [rax],0 ds:002b:faf3b38f`74db86f7=????
Resetting default scope

CUSTOMER_CRASH_COUNT:  7

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  AiNap.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffffa600497a7aa to fffffa600497a0d3

STACK_TEXT:  
fffffa60`04db5550 fffffa60`0497a7aa : fffffa60`04db5698 00000000`00000005 00000000`00000000 fffffa60`04db5600 : Npfs!NpTranslateAlias+0xcb
fffffa60`04db55d0 fffff800`01ce01f3 : 00000000`00000005 fffffa80`0579bb10 00000000`00000040 fffffa80`0579bb10 : Npfs!NpFsdCreate+0x20a
fffffa60`04db5700 fffff800`01cd9ec9 : fffffa80`079e0df0 00000000`00000000 fffffa80`0572b3c0 fffffa80`03cbd901 : nt!IopParseDevice+0x5e3
fffffa60`04db58a0 fffff800`01cdddb4 : 00000000`00000000 fffffa80`043ae801 00000000`00000040 00000000`00000000 : nt!ObpLookupObjectName+0x5eb
fffffa60`04db59b0 fffff800`01cea360 : 00000000`c0100080 00000000`0007e620 00000000`0007e501 fffffa80`048546b0 : nt!ObOpenObjectByName+0x2f4
fffffa60`04db5a80 fffff800`01ceae98 : 00000000`0007e558 00000000`c0100080 00000000`0007e568 00000000`0007e548 : nt!IopCreateFile+0x290
fffffa60`04db5b20 fffff800`01a590f3 : 00000000`74ff3380 00000000`0007ee70 00000000`00000000 00000000`74f80a10 : nt!NtCreateFile+0x78
fffffa60`04db5bb0 00000000`77015fca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007e4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77015fca


FOLLOWUP_IP: 
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800        cmp     word ptr [rax],0

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  Npfs!NpTranslateAlias+cb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Npfs

IMAGE_NAME:  Npfs.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  47919075

STACK_COMMAND:  .cxr 0xfffffa6004db4cf0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_Npfs!NpTranslateAlias+cb

BUCKET_ID:  X64_0x3B_Npfs!NpTranslateAlias+cb

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-05.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a18000 PsLoadedModuleList = 0xfffff800`01bdddb0
Debug session time: Mon Jul 13 20:32:13.743 2009 (GMT-4)
System Uptime: 0 days 0:28:46.695
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck FE, {6, fffffa800792e940, 48676643, 0}

Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_AssertSig+25 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BUGCODE_USB_DRIVER (fe)
USB Driver bugcheck, first parameter is USB bugcheck code.
Arguments:
Arg1: 0000000000000006, USBBUGCODE_BAD_SIGNATURE An Internal data structure (object)
    has been corrupted.
Arg2: fffffa800792e940, Object address
Arg3: 0000000048676643, Signature that was expected
Arg4: 0000000000000000

Debugging Details:
------------------


CUSTOMER_CRASH_COUNT:  5

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

BUGCHECK_STR:  0xFE

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffffa6003dc5395 to fffff80001a6c650

STACK_TEXT:  
fffffa60`01bc6888 fffffa60`03dc5395 : 00000000`000000fe 00000000`00000006 fffffa80`0792e940 00000000`48676643 : nt!KeBugCheckEx
fffffa60`01bc6890 fffffa60`03dc781c : fffffa80`00000000 fffffa80`00000000 fffffa80`34637000 fffffa80`0784a000 : USBPORT!USBPORT_AssertSig+0x25
fffffa60`01bc68d0 fffffa60`03d9dec6 : fffffa80`31484453 fffffa80`0640b1a0 fffffa80`0784a1b0 fffffa80`0784cc30 : USBPORT!USBPORT_InternalCloseConfiguration+0xb8
fffffa60`01bc6920 fffffa60`0409557f : fffffa80`564d4552 00000000`00000100 fffffa80`0784a1b0 fffffa80`065bc050 : USBPORT!USBPORTBUSIF_RemoveUsbDevice+0xda
fffffa60`01bc6950 fffffa60`0408cc51 : fffffa80`0784a1b0 fffffa80`077c4fa0 fffffa80`0784a060 00000000`00000030 : usbhub!UsbhUnlinkPdoDeviceHandle+0x153
fffffa60`01bc69b0 fffffa60`0408c24c : 00000000`00000002 fffffa80`077c4fa0 00000000`00000000 fffffa60`04071d38 : usbhub!UsbhPortDisconnect+0x8d
fffffa60`01bc69f0 fffffa60`04073a45 : fffffa80`077c4fa0 fffffa80`0792b180 fffffa80`065bc050 fffffa80`065bc1a0 : usbhub!UsbhWaitConnect+0x2fc
fffffa60`01bc6a40 fffffa60`04073f73 : fffffa80`077c4fa0 fffffa80`077c4fb8 fffffa80`0792b180 fffffa80`077c4fb8 : usbhub!UsbhHubDispatchPortEvent+0x611
fffffa60`01bc6ac0 fffffa60`04070681 : 00000000`00000000 00000000`00000004 fffffa80`00020300 00000000`00000001 : usbhub!UsbhHubRunPortChangeQueue+0x32f
fffffa60`01bc6b90 fffffa60`0406d6d7 : 00000000`00000001 fffffa60`50447100 fffffa80`077c4fa0 fffffa80`065bc050 : usbhub!Usbh_PCE_wRun_Action+0x1fd
fffffa60`01bc6be0 fffffa60`04074170 : fffffa80`065bc050 fffffa80`046212b0 00000000`0000000a fffffa80`077c4fa0 : usbhub!UsbhDispatch_PortChangeQueueEventEx+0xbf
fffffa60`01bc6c20 fffffa60`0406889b : fffffa80`065bc1a0 fffff800`01baa8f8 fffffa80`065bc050 fffffa60`00000000 : usbhub!UsbhHubProcessChangeWorker+0x10c
fffffa60`01bc6c80 fffff800`01cd5dff : fffffa80`065bc050 fffffa80`03cb2bb0 fffffa80`07fd0010 fffffa80`03cb2bb0 : usbhub!UsbhHubWorker+0x63
fffffa60`01bc6cc0 fffff800`01a79366 : fffffa60`05eb90d8 fffff800`01baa801 fffffa80`03cb2b00 00000000`00000001 : nt!IopProcessWorkItem+0x27
fffffa60`01bc6cf0 fffff800`01c90fd3 : fffffa80`07daa780 101c5314`35a5011e fffffa80`03cb2bb0 00000000`00000080 : nt!ExpWorkerThread+0x11a
fffffa60`01bc6d50 fffff800`01aa6816 : fffffa60`005ec180 fffffa80`03cb2bb0 fffffa60`005f5d40 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`01bc6d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
USBPORT!USBPORT_AssertSig+25
fffffa60`03dc5395 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  USBPORT!USBPORT_AssertSig+25

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: USBPORT

IMAGE_NAME:  USBPORT.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  479199d8

FAILURE_BUCKET_ID:  X64_0xFE_USBPORT!USBPORT_AssertSig+25

BUCKET_ID:  X64_0xFE_USBPORT!USBPORT_AssertSig+25

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-04.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a0d000 PsLoadedModuleList = 0xfffff800`01bd2db0
Debug session time: Mon Jul 13 19:17:42.784 2009 (GMT-4)
System Uptime: 0 days 0:16:31.361
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 19, {20, fffffa8006533a70, fffffa8006534330, 48cea26}

Unable to load image \SystemRoot\system32\DRIVERS\ASACPI.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ASACPI.sys
*** ERROR: Module load completed but symbols could not be loaded for ASACPI.sys
Probably caused by : ASACPI.sys ( ASACPI+15ce )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffffa8006533a70, The pool entry we were looking for within the page.
Arg3: fffffa8006534330, The next pool entry.
Arg4: 00000000048cea26, (reserved)

Debugging Details:
------------------


BUGCHECK_STR:  0x19_20

POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c36080
 fffffa8006533a70 

CUSTOMER_CRASH_COUNT:  4

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

PROCESS_NAME:  aaCenter.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80001b4205d to fffff80001a61650

STACK_TEXT:  
fffffa60`04c5f4a8 fffff800`01b4205d : 00000000`00000019 00000000`00000020 fffffa80`06533a70 fffffa80`06534330 : nt!KeBugCheckEx
fffffa60`04c5f4b0 fffffa60`009108cb : 00000000`00000000 00000000`00000000 00000000`00008000 fffffa60`5254535f : nt!ExDeferredFreePool+0x9db
fffffa60`04c5f560 fffffa60`00910f7e : fffffa80`0636b000 00000000`00008000 fffffa80`0636b000 00000000`00000001 : acpi!FreeContext+0xdf
fffffa60`04c5f5b0 fffffa60`0090e675 : fffffa80`0636b000 00000000`00000001 fffffa80`0637ae00 fffffa60`0090b9ba : acpi!RunContext+0x18a
fffffa60`04c5f5f0 fffffa60`0090e716 : fffffa80`0636b000 fffffa80`0637ae78 fffffa80`0636b000 fffffa80`0637ae78 : acpi!InsertReadyQueue+0xd5
fffffa60`04c5f620 fffffa60`0091145c : 00000000`00000000 fffffa80`047f6710 00000000`00000000 fffffa60`5254535f : acpi!RestartContext+0x36
fffffa60`04c5f650 fffffa60`009111e3 : fffffa80`04b2aaa0 fffff880`0fbcd780 00000000`00000001 fffff880`0fbf8190 : acpi!AsyncEvalObject+0x1cc
fffffa60`04c5f6b0 fffffa60`0090a7dc : 00000000`00000000 fffffa80`04b2aaa0 00000000`00000001 00000000`00000000 : acpi!SyncEvalObject+0x143
fffffa60`04c5f760 fffffa60`009000b4 : 00000000`00000000 fffffa80`04c19190 fffffa80`047eac60 fffff880`0fbf8190 : acpi!AMLIEvalNameSpaceObject+0xbc
fffffa60`04c5f7b0 fffffa60`0090122e : fffffa60`009229a0 fffffa80`00000001 fffffa80`057626c0 fffff880`0fbcd780 : acpi!ACPIIoctlEvalControlMethod+0x68
fffffa60`04c5f810 fffffa60`008f9297 : fffffa60`009229a0 fffffa80`04c20010 00000000`20206f49 00000000`00001000 : acpi!ACPIIrpDispatchDeviceControl+0x14e
fffffa60`04c5f840 fffffa60`037635ce : fffffa80`04c19190 fffffa80`04c19190 fffffa80`04c19190 fffffa80`05762ae8 : acpi!ACPIDispatchIrp+0x12b
fffffa60`04c5f8c0 fffffa80`04c19190 : fffffa80`04c19190 fffffa80`04c19190 fffffa80`05762ae8 fffffa80`057626c0 : ASACPI+0x15ce
fffffa60`04c5f8c8 fffffa80`04c19190 : fffffa80`04c19190 fffffa80`05762ae8 fffffa80`057626c0 fffffa80`00000400 : 0xfffffa80`04c19190
fffffa60`04c5f8d0 fffffa80`04c19190 : fffffa80`05762ae8 fffffa80`057626c0 fffffa80`00000400 00000000`00000000 : 0xfffffa80`04c19190
fffffa60`04c5f8d8 fffffa80`05762ae8 : fffffa80`057626c0 fffffa80`00000400 00000000`00000000 fffffa60`04c5f928 : 0xfffffa80`04c19190
fffffa60`04c5f8e0 fffffa80`057626c0 : fffffa80`00000400 00000000`00000000 fffffa60`04c5f928 fffffa60`04c5f918 : 0xfffffa80`05762ae8
fffffa60`04c5f8e8 fffffa80`00000400 : 00000000`00000000 fffffa60`04c5f928 fffffa60`04c5f918 fffff800`01b24dc9 : 0xfffffa80`057626c0
fffffa60`04c5f8f0 00000000`00000000 : fffffa60`04c5f928 fffffa60`04c5f918 fffff800`01b24dc9 00000000`00000000 : 0xfffffa80`00000400


STACK_COMMAND:  kb

FOLLOWUP_IP: 
ASACPI+15ce
fffffa60`037635ce ??              ???

SYMBOL_STACK_INDEX:  c

SYMBOL_NAME:  ASACPI+15ce

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: ASACPI

IMAGE_NAME:  ASACPI.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4546b048

FAILURE_BUCKET_ID:  X64_0x19_20_ASACPI+15ce

BUCKET_ID:  X64_0x19_20_ASACPI+15ce

Followup: MachineOwner
---------




Thank you so much for your help this is driving me crazy. I am sorry for posting so much information I figure the more you all have the more help you can give. Let me know if I posted too much and I will be sure to limit myself next time.


Sam
 
Last edited by a moderator:

My Computer

And here is my most resent crash....GRRRR I will be forever great-full to the one who helps me.



Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\Mini071309-10.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*[URL="http://msdl.microsoft.com/download/symbols"]Symbol information[/URL]
Executable search path is: 
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a48000 PsLoadedModuleList = 0xfffff800`01c0ddb0
Debug session time: Mon Jul 13 22:50:06.165 2009 (GMT-4)
System Uptime: 0 days 0:25:44.772
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904aa, fffffa60052c4ae8, fffffa60052c44c0, fffff80001aa67a2}

Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonQueryInformation+133 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa60052c4ae8
Arg3: fffffa60052c44c0
Arg4: fffff80001aa67a2

Debugging Details:
------------------


EXCEPTION_RECORD:  fffffa60052c4ae8 -- (.exr 0xfffffa60052c4ae8)
ExceptionAddress: fffff80001aa67a2 (nt!ExAcquireResourceSharedLite+0x00000000000000a2)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffffa60052c44c0 -- (.cxr 0xfffffa60052c44c0)
rax=f261c9fb934dcdfc rbx=fffffa8006c62af0 rcx=fffffa8006c62af0
rdx=fffffa8006c62b20 rsi=fffffa60052c4ef0 rdi=fffffa80046c6060
rip=fffff80001aa67a2 rsp=fffffa60052c4d20 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000001 r10=00f3f8f4e4b669de
r11=fffffa60052c4e48 r12=0000000000000009 r13=fffffa800546eb38
r14=fffff8800b48db50 r15=fffffa800546e7e0
iopl=0         nv up di pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010006
nt!ExAcquireResourceSharedLite+0xa2:
fffff800`01aa67a2 418b4a08        mov     ecx,dword ptr [r10+8] ds:002b:00f3f8f4`e4b669e6=????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  10

DEFAULT_BUCKET_ID:  COMMON_SYSTEM_FAULT

PROCESS_NAME:  firefox.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c71080
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsCommonQueryInformation+133
fffffa60`010c2ac3 c644244401      mov     byte ptr [rsp+44h],1

FAULTING_IP: 
nt!ExAcquireResourceSharedLite+a2
fffff800`01aa67a2 418b4a08        mov     ecx,dword ptr [r10+8]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffffa60010c2ac3 to fffff80001aa67a2

STACK_TEXT:  
fffffa60`052c4d20 fffffa60`010c2ac3 : ffffffff`ffffffff fffffa60`052c4ef0 00000000`00000200 fffff880`0b48dc80 : nt!ExAcquireResourceSharedLite+0xa2
fffffa60`052c4d90 fffffa60`010c3713 : fffffa60`052c4ef0 fffffa60`00001fc4 fffffa80`00000002 fffff880`0eb92000 : Ntfs!NtfsCommonQueryInformation+0x133
fffffa60`052c4e50 fffffa60`010c3bf4 : fffffa60`052c4ef0 fffffa80`0546e7e0 fffffa80`0546eb38 fffffa60`052c4ff8 : Ntfs!NtfsFsdDispatchSwitch+0x103
fffffa60`052c4ed0 fffffa60`00a83e17 : 00000000`00000801 fffffa60`052c5440 00000000`00000002 fffffa80`05142030 : Ntfs!NtfsFsdDispatchWait+0x14
fffffa60`052c50b0 fffffa60`00a830dd : fffffa80`04c794c0 fffffa80`06329040 fffffa80`06329000 fffff880`00005c50 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`052c5120 fffff800`01cf3a11 : fffffa80`0546e7e0 00000000`00000004 00000000`0000000a fffffa80`06ed1800 : fltmgr!FltpDispatch+0xcd
fffffa60`052c5180 fffff800`01cedc80 : 00000000`00000004 fffffa60`052c5440 fffff880`0eb92000 fffff800`01bd9260 : nt!IopGetFileInformation+0x119
fffffa60`052c5200 fffff800`01cfbf9a : fffffa80`06ed1850 fffffa60`052c5440 fffffa80`054ad000 fffffa80`054ad000 : nt!IopQueryNameInternal+0x188
fffffa60`052c52a0 fffff800`01ceb216 : fffffa80`054ad010 00000000`00000066 fffffa60`052c52d0 00000000`00000002 : nt!IopQueryName+0x26
fffffa60`052c52f0 fffff800`01d602ef : fffffa80`06ed1850 fffffa80`054ad000 00000000`00002000 fffffa60`052c5458 : nt!ObpQueryNameString+0x156
fffffa60`052c53c0 fffff800`01ced1f9 : fffffa80`0478d040 00000000`00000000 fffffa80`046c6060 fffff800`01d44471 : nt! ?? ::NNGAKEGL::`string'+0x2176f
fffffa60`052c5550 fffff800`01d43f63 : fffffa80`06f5b9b0 00000000`7efdb000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x4d
fffffa60`052c55b0 fffff800`01d444c9 : 00000000`00000000 fffffa80`046c6001 00000000`7efdb000 00000000`000ecf00 : nt!PspExitThread+0x47f
fffffa60`052c5670 fffff800`01cfc33a : 00000000`00000000 00000000`0000000c 00000000`7efdd000 fffff880`0000000c : nt!PspTerminateThreadByPointer+0x4d
fffffa60`052c56c0 fffff800`01a9c0f3 : fffffa80`0478d040 fffffa80`046c6060 fffffa60`052c57a0 00000000`7efdd000 : nt!NtTerminateProcess+0xfa
fffffa60`052c5720 00000000`771d5d3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000ebe58 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x771d5d3a


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsCommonQueryInformation+133

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  479190d1

STACK_COMMAND:  .cxr 0xfffffa60052c44c0 ; kb

FAILURE_BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonQueryInformation+133

BUCKET_ID:  X64_0x24_Ntfs!NtfsCommonQueryInformation+133

Followup: MachineOwner
---------
 

My Computer

Running a quad core on a 450w generic PSU and given your erratic causes of your BSoD's, yes, the PSU is where I would start.
 

My Computer

System One

  • CPU
    Athlon X2 BE @ 3.1
    Motherboard
    Asus
    Memory
    6GB DDR2 800 GeIL
    Graphics Card(s)
    HIS Radeon HD4870
    Sound Card
    Asus Xonar
    Monitor(s) Displays
    2x Samsung 226BW 22" LCDs
    Hard Drives
    160GB, 500GB, 750GB
    PSU
    Antec NeoPower 650w modular
    Case
    Apevia XQpack2
    Other Info
    Logitech Z5500
Back
Top