Solved BSOD

Tarka Dal

I know nothing!
Vista Guru
Gold Member
This hasn't finished yet!

I just tried to add my 2GB memory to the other 2 GB of memory and got more BSODs.

More info below!


    374.5 KB · Views: 4


Vista Guru
Gold Member
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\richc46\AppData\Local\Temp\Temp19_Windows_NT6_BSOD_jcgriff2[1].zip\Windows_NT6_BSOD_jcgriff2\Mini021411-03.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
Executable search path is: 
Windows Vista Kernel Version 6000 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6000.16830.amd64fre.vista_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01800000 PsLoadedModuleList = 0xfffff800`0199af70
Debug session time: Mon Feb 14 12:50:22.321 2011 (GMT-5)
System Uptime: 0 days 0:00:34.820
Loading Kernel Symbols
Loading User Symbols
Loading unloaded module list
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffaa5f59f001a, 2, 0, fffff8000185dd11}
Probably caused by : storport.sys ( storport!RaidpAdapterContinueScatterGather+d8 )
Followup: MachineOwner
2: kd> !analyze -v
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arg1: fffffaa5f59f001a, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000185dd11, address which referenced memory
Debugging Details:

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800019fa0b0
fffff800`0185dd11 0fb64b1a        movzx   ecx,byte ptr [rbx+1Ah]
TRAP_FRAME:  fffff980012d9f00 -- (.trap 0xfffff980012d9f00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000012e7c4963 rbx=0000000000000000 rcx=0000000000000001
rdx=000000000000286c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000185dd11 rsp=fffff980012da090 rbp=000000000000096b
 r8=00000000ca735000  r9=5000a02fb400000f r10=000000fffffff000
r11=0000000000000963 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
fffff800`0185dd11 0fb64b1a        movzx   ecx,byte ptr [rbx+1Ah] ds:a300:00000000`0000001a=??
Resetting default scope
LOCK_ADDRESS:  fffff800019d0a40 -- (!locks fffff800019d0a40)
Resource @ nt!PiEngineLock (0xfffff800019d0a40)    Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.

WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
 Lock address  : 0xfffff800019d0a40
 Thread Count  : 0
 Thread address: 0x0000000000000000
 Thread wait   : 0x0
LAST_CONTROL_TRANSFER:  from fffff8000184db33 to fffff8000184dd90
fffff980`012d9db8 fffff800`0184db33 : 00000000`0000000a fffffaa5`f59f001a 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff980`012d9dc0 fffff800`0184ca0b : 00000000`00000000 fffff6fc`c000dfe0 ffffffff`80000200 00000000`00f8006a : nt!KiBugCheckDispatch+0x73
fffff980`012d9f00 fffff800`0185dd11 : fffffa80`05367f40 fffff800`01ce12ad fffffa80`049643b0 fffff980`012da160 : nt!KiPageFault+0x20b
fffff980`012da090 fffff980`004b729c : fffffa80`050a9660 fffffa80`00000000 fffff980`036e5010 fffffa80`05367f40 : nt!MmMapLockedPagesSpecifyCache+0x3d8
fffff980`012da120 fffff800`01ce085a : fffffa80`050a9660 fffff980`036e5100 00000000`00000018 00000000`00000000 : storport!RaidpAdapterContinueScatterGather+0xd8
fffff980`012da160 fffff800`01ce0ef1 : fffffa80`03a24060 fffffa80`04964b80 fffff980`0009e000 fffff6fc`00000000 : hal!HalpAllocateAdapterCallback+0x146
fffff980`012da200 fffff800`01ce05af : fffff980`036e50b8 00000000`00000008 fffffa80`04964b80 fffffa80`05367f40 : hal!HalAllocateAdapterChannel+0x101
fffff980`012da240 fffff980`004b73d5 : 00000000`00000008 fffffa80`03a241b0 fffffa80`000000a0 fffff980`03eaf000 : hal!HalBuildScatterGatherList+0x2f3
fffff980`012da2b0 fffff980`004c3b7a : fffffa80`0496b1b0 00000000`00000000 fffffa80`04b79fa0 fffffa80`0535ea80 : storport!RaidAdapterScatterGatherExecute+0x8d
fffff980`012da310 fffff980`004bc1cb : fffffa80`0535eaf8 fffffa80`0535eaf8 00000000`00000000 fffffa80`0496b1b0 : storport!RaUnitStartIo+0xe2
fffff980`012da370 fffff980`004c349f : fffffa80`04b79fa0 00000000`00000001 fffffa80`0496b1b0 fffffa80`0535ea80 : storport!RaidStartIoPacket+0x1fb
fffff980`012da3f0 fffff980`004c3112 : 00000000`00000000 00000000`80000000 00000000`63536353 00000000`00000000 : storport!RaidUnitSubmitRequest+0x97
fffff980`012da420 fffff980`004bb3ae : fffffa80`0535ea80 fffffa80`049683e0 00000000`000007ff fffffa80`0496b060 : storport!RaUnitScsiIrp+0xc6
fffff980`012da4a0 fffff980`00221b84 : fffffa80`0535ea80 fffffa80`0535ea80 fffffa80`0535ea80 fffff880`01fa7480 : storport!RaDriverScsiIrp+0x7e
fffff980`012da4e0 fffff980`002299e9 : fffff980`00249b60 00000000`00000004 fffff800`01969200 00000000`00010000 : acpi!ACPIDispatchForwardIrp+0x38
fffff980`012da510 fffff980`00221e1f : fffff980`00249b60 fffffa80`048d9360 00000000`00000000 00000000`00000000 : acpi!ACPIIrpDispatchDeviceControl+0x75
fffff980`012da540 fffff980`03e9dac3 : fffffa80`04c641b0 fffff980`03e9dbda fffffa80`04b79fa0 fffffa80`04c641b0 : acpi!ACPIDispatchIrp+0x12b
fffff980`012da5c0 fffff980`03e9e872 : fffffa80`04b79fa0 00000000`00000000 00000000`00000008 fffffa80`04c64670 : cdrom!ScratchBuffer_SendSynchronousSrb+0x87
fffff980`012da600 fffff980`03ea88e7 : fffffa80`00000000 00000000`00000000 fffffa80`04c64670 fffffa80`04c641b0 : cdrom!CdRompCacheDeviceInquiryData+0xa6
fffff980`012da670 fffff980`00b2456b : fffffa80`04c64100 fffff980`00b1f100 00000000`00000000 fffffa80`04c64000 : cdrom!CdRomInitDevice+0x213
fffff980`012da700 fffff980`00b23ad9 : 00000000`c00000bb fffffa80`00000010 00000000`00000000 00000000`00000000 : CLASSPNP!ClassPnpStartDevice+0x32f
fffff980`012da770 fffff800`01a1c291 : 00000000`00000000 fffffa80`04c69c88 fffffa80`04c69c70 fffffa80`0500d860 : CLASSPNP!ClassDispatchPnp+0x3f5
fffff980`012da800 fffff800`01803086 : 00000000`00000000 fffff800`018f7d90 00000000`00000000 00000000`00000000 : nt!PnpAsynchronousCall+0xd1
fffff980`012da840 fffff800`01a21dec : 00000000`ffffffff fffffa80`0496dde0 00000000`00000000 00000000`00000000 : nt!PnpStartDevice+0xf6
fffff980`012da8f0 fffff800`01a21af7 : fffffa80`0496dde0 00000000`0000003f 00000000`00000000 fffffa80`03962760 : nt!PnpStartDeviceNode+0x2dc
fffff980`012da980 fffff800`01a1b13b : fffffa80`0496dde0 00000000`00000000 fffffa80`03962760 00000000`00000002 : nt!PipProcessStartPhase1+0x77
fffff980`012da9b0 fffff800`01bfdda6 : fffffa80`053cde00 fffff800`018eda46 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x26b
fffff980`012dac20 fffff800`0180348c : 00000001`00000003 fffff800`01b470c2 fffff800`01969200 00000000`32706e50 : nt!PiProcessStartSystemDevices+0x46
fffff980`012dac70 fffff800`01859ea3 : fffff800`019d0be0 fffffa80`039aab01 fffff800`019689d8 00000000`00000000 : nt!PnpDeviceActionWorker+0x1fc
fffff980`012dace0 fffff800`01ae1d5b : fffff800`019d0be0 00000000`00000000 fffffa80`039aabb0 00000000`00000001 : nt!ExpWorkerThread+0x12a
fffff980`012dad50 fffff800`01834686 : fffff980`00ccf180 fffffa80`039aabb0 fffff980`00cd8c40 fffffa80`039aa040 : nt!PspSystemThreadStartup+0x5b
fffff980`012dad80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16

Update driver and follow advice in the article

You randomly receive a "Stop 0x0000000A" error in Storport.sys when you start Windows Vista

Nvstor.sys file description
Productname: NVIDIA nForce(TM) SATA Driver
Description: NVIDIA® nForce(TM) Sata Performance Driver
Company: NVIDIA Corporation

wither 3

Vista Guru
Gold Member
okay Richard- Time for you to get back to this-

I have another thread on this subject but no one will help out.

I have a dual boot system (Vista Sp2 updated) on both drives. Last week, the MBR somehow got screwed up such that when I booted to the primary drive, Windows would read the Registry off the secondary drive and give me the desktop for that drive even though Windows Explorer was reading the primary drive when I started it.

Long story short, I tried reinstalling Windows on both drives and got the exact BSOD identified in the first post of this thread with the same parameters. I then tried it on a brand new drive, with the same results. Thing is, every time I try a reinstall, I get that error but also other errors such as the NVIDIA Boot Agent telling me there's no boot media or the boot manager is missing. I can't get to safe mode because it either stops after loading the files or I get another BSOD such as the 0xA. As a result, I'm unable to look at the .dmp file or the event log (if there is one).

I keep blaming the NVIDIA Boot Agent but there's no way to remove it from the BIOS. I did set the boot options such that "other devices" is disabled. I'm thinking I need to flash the BIOS but I don't know if that will get rid of the Agent (if that's what's causing the issue).

Any ideas?