samueldrgeene
New Member
Hey guys,
I just built a new system and am getting constant bsod. My specs are.
4Gb corsair ddr 2 800MHZ
Asus Striker II Formula MB
Msi Geforce 9600 Gt 1gb
2.86 quad core intel
Generic 450w Power Supply
I have not overclocked at all. I am running Vista Service Pack one due to BSOD when I attempt to install SP2.
I suspect the crappy power supply.
The blue screens are random and there seem to be many causes. How do I post the dumps? Thanks in advance!
Here are the minidump readings:
---------
Thank you so much for your help this is driving me crazy. I am sorry for posting so much information I figure the more you all have the more help you can give. Let me know if I posted too much and I will be sure to limit myself next time.
Sam
I just built a new system and am getting constant bsod. My specs are.
4Gb corsair ddr 2 800MHZ
Asus Striker II Formula MB
Msi Geforce 9600 Gt 1gb
2.86 quad core intel
Generic 450w Power Supply
I have not overclocked at all. I am running Vista Service Pack one due to BSOD when I attempt to install SP2.
I suspect the crappy power supply.
The blue screens are random and there seem to be many causes. How do I post the dumps? Thanks in advance!
Here are the minidump readings:
Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini071309-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18000.amd64fre.longhorn_rtm.080118-1840
Machine Name:
Kernel base = 0xfffff800`01814000 PsLoadedModuleList = 0xfffff800`019d9db0
Debug session time: Mon Jul 13 13:24:57.227 2009 (GMT-4)
System Uptime: 0 days 0:15:28.883
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 24, {1904aa, fffffa600460d0d8, fffffa600460cab0, fffff8000187a4bc}
Probably caused by : Ntfs.sys ( Ntfs!NtfsFlushUserStream+18f )
Followup: MachineOwner
---------
3: kd> .reload
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
..........
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000001904aa
Arg2: fffffa600460d0d8
Arg3: fffffa600460cab0
Arg4: fffff8000187a4bc
Debugging Details:
------------------
EXCEPTION_RECORD: fffffa600460d0d8 -- (.exr 0xfffffa600460d0d8)
ExceptionAddress: fffff8000187a4bc (nt!IoGetRelatedDeviceObject+0x000000000000000c)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffffa600460cab0 -- (.cxr 0xfffffa600460cab0)
rax=71f474ae20a69876 rbx=0000000000000000 rcx=fffffa8002659980
rdx=fffffa8002659980 rsi=fffffa80047081c0 rdi=0000000000000000
rip=fffff8000187a4bc rsp=fffffa600460d318 rbp=fffffa8002659980
r8=0000000000000080 r9=fffff88007958000 r10=0000000000000002
r11=0000000000000000 r12=fffffa600460d350 r13=fffffa8002659980
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!IoGetRelatedDeviceObject+0xc:
fffff800`0187a4bc 488b4008 mov rax,qword ptr [rax+8] ds:002b:71f474ae`20a6987e=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: VSSVC.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001a3d080
ffffffffffffffff
FOLLOWUP_IP:
Ntfs!NtfsFlushUserStream+18f
fffffa60`010ca4ff 4084f6 test sil,sil
FAULTING_IP:
nt!IoGetRelatedDeviceObject+c
fffff800`0187a4bc 488b4008 mov rax,qword ptr [rax+8]
BUGCHECK_STR: 0x24
LAST_CONTROL_TRANSFER: from fffff80001afe1ae to fffff8000187a4bc
STACK_TEXT:
fffffa60`0460d318 fffff800`01afe1ae : 00000000`00000000 00000000`00000000 fffffa60`01069c00 00000000`0000000e : nt!IoGetRelatedDeviceObject+0xc
fffffa60`0460d320 fffff800`0187aec5 : fffffa60`0460d7a8 00000000`00000000 fffffa80`02659980 fffffa60`0460d7a8 : nt!FsRtlAcquireFileForCcFlushEx+0x32
fffffa60`0460d5c0 fffff800`0187eb7f : 00000000`00000000 fffff980`13df3500 00000000`00000000 fffffa60`00000000 : nt!MmFlushSection+0xf5
fffffa60`0460d680 fffffa60`010ca4ff : fffffa80`03c71840 00000000`00000000 fffffa80`00000000 fffffa60`0460d7a8 : nt!CcFlushCache+0x840
fffffa60`0460d770 fffffa60`0109cec8 : fffff880`0897e830 fffff880`08678c80 fffffa80`04ddabb0 fffff880`00000000 : Ntfs!NtfsFlushUserStream+0x18f
fffffa60`0460d800 fffffa60`010cb722 : fffffa80`04ddabb0 fffffa80`04727180 fffffa60`0460d901 fffffa60`0460d900 : Ntfs!NtfsFlushVolume+0x298
fffffa60`0460d920 fffffa60`010cbd8b : fffffa80`04ddabb0 fffffa80`045f5c60 fffffa80`045f5c60 fffffa80`04727180 : Ntfs!NtfsCommonFlushBuffers+0x681
fffffa60`0460d9f0 fffffa60`00a81e17 : fffffa80`045f5fb8 fffffa80`045f5c60 fffffa80`04ddabb0 fffffa60`0460da18 : Ntfs!NtfsFsdFlushBuffers+0x10b
fffffa60`0460da60 fffffa60`00a810dd : fffffa80`02d16dc0 fffffa80`04045ba0 fffffa80`0521f800 00000000`00000003 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x227
fffffa60`0460dad0 fffff800`01af832c : 00000000`00000000 00000000`0426efa8 00000000`00000000 fffffa80`044809d0 : fltmgr!FltpDispatch+0xcd
fffffa60`0460db30 fffff800`01adb473 : 00000000`00000000 00000000`00000000 fffffa80`04045ba0 fffffa60`0460dca0 : nt!IopSynchronousServiceTail+0x13c
fffffa60`0460db90 fffff800`01868e33 : fffffa80`044809d0 00000000`ffa21600 fffffa80`0521f8e0 fffffa80`04045ba0 : nt!NtFlushBuffersFile+0x193
fffffa60`0460dc20 00000000`77285f2a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0426f4a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77285f2a
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: Ntfs!NtfsFlushUserStream+18f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 479190d1
STACK_COMMAND: .cxr 0xfffffa600460cab0 ; kb
FAILURE_BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+18f
BUCKET_ID: X64_0x24_Ntfs!NtfsFlushUserStream+18f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini071309-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a19000 PsLoadedModuleList = 0xfffff800`01bdedb0
Debug session time: Mon Jul 13 18:08:42.251 2009 (GMT-4)
System Uptime: 0 days 0:33:24.232
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffffa6004695e23, 0, ffffffffffffffff}
Unable to load image \SystemRoot\system32\DRIVERS\athrxusb.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for athrxusb.sys
*** ERROR: Module load completed but symbols could not be loaded for athrxusb.sys
Probably caused by : athrxusb.sys ( athrxusb+ee23 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffffa6004695e23, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
athrxusb+ee23
fffffa60`04695e23 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c42080
ffffffffffffffff
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x1E
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001a47e67 to fffff80001a6d650
STACK_TEXT:
fffff800`02b19e98 fffff800`01a47e67 : 00000000`0000001e ffffffff`c0000005 fffffa60`04695e23 00000000`00000000 : nt!KeBugCheckEx
fffff800`02b19ea0 fffff800`01a6d4a9 : fffff800`02b1a5d8 fffffa80`05781be0 fffff800`02b1a680 fffffa80`07084600 : nt! ?? ::FNODOBFM::`string'+0x29317
fffff800`02b1a4a0 fffff800`01a6c08d : fffffa80`066a2940 fffffa80`52547571 00000000`00000000 fffffa60`03dc0300 : nt!KiExceptionDispatch+0xa9
fffff800`02b1a680 fffffa60`04695e23 : fffffa80`0668fab0 fffffa60`42554855 fffffa80`05781be0 fffffa60`046d76e7 : nt!KiGeneralProtectionFault+0xcd
fffff800`02b1a810 fffffa80`0668fab0 : fffffa60`42554855 fffffa80`05781be0 fffffa60`046d76e7 fffffa80`0668fae8 : athrxusb+0xee23
fffff800`02b1a818 fffffa60`42554855 : fffffa80`05781be0 fffffa60`046d76e7 fffffa80`0668fae8 fffffa80`0622005f : 0xfffffa80`0668fab0
fffff800`02b1a820 fffffa80`05781be0 : fffffa60`046d76e7 fffffa80`0668fae8 fffffa80`0622005f 00000000`00000bc8 : 0xfffffa60`42554855
fffff800`02b1a828 fffffa60`046d76e7 : fffffa80`0668fae8 fffffa80`0622005f 00000000`00000bc8 fffffa80`0622e404 : 0xfffffa80`05781be0
fffff800`02b1a830 fffffa80`0668fae8 : fffffa80`0622005f 00000000`00000bc8 fffffa80`0622e404 00000000`00000000 : athrxusb+0x506e7
fffff800`02b1a838 fffffa80`0622005f : 00000000`00000bc8 fffffa80`0622e404 00000000`00000000 fffffa60`03d9f726 : 0xfffffa80`0668fae8
fffff800`02b1a840 00000000`00000bc8 : fffffa80`0622e404 00000000`00000000 fffffa60`03d9f726 00000000`00000000 : 0xfffffa80`0622005f
fffff800`02b1a848 fffffa80`0622e404 : 00000000`00000000 fffffa60`03d9f726 00000000`00000000 fffffa60`03da39c3 : 0xbc8
fffff800`02b1a850 00000000`00000000 : fffffa60`03d9f726 00000000`00000000 fffffa60`03da39c3 00000000`00000000 : 0xfffffa80`0622e404
STACK_COMMAND: kb
FOLLOWUP_IP:
athrxusb+ee23
fffffa60`04695e23 ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: athrxusb+ee23
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: athrxusb
IMAGE_NAME: athrxusb.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 45bdef26
FAILURE_BUCKET_ID: X64_0x1E_athrxusb+ee23
BUCKET_ID: X64_0x1E_athrxusb+ee23
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini071309-09.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a4e000 PsLoadedModuleList = 0xfffff800`01c13db0
Debug session time: Mon Jul 13 22:22:24.075 2009 (GMT-4)
System Uptime: 0 days 0:04:34.652
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffffa6004a08e2a, fffffa600731eb70, 0}
Probably caused by : afd.sys ( afd!AfdTLReleaseIndications+1a )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa6004a08e2a, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa600731eb70, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
afd!AfdTLReleaseIndications+1a
fffffa60`04a08e2a 488b4108 mov rax,qword ptr [rcx+8]
CONTEXT: fffffa600731eb70 -- (.cxr 0xfffffa600731eb70)
rax=fffffa6004a0c020 rbx=fffffa8006cd9180 rcx=161598f33faa38c2
rdx=fffffa600731f3f0 rsi=fffffa80067ab040 rdi=fffffa8006e72100
rip=fffffa6004a08e2a rsp=fffffa600731f3d0 rbp=fffffa600731fca0
r8=fffffa6007320000 r9=ffffffffc0000005 r10=fffffa600731f118
r11=fffffa600731db60 r12=fffffa8004791010 r13=00000000000000a4
r14=fffffa600731fa70 r15=fffffa600731f760
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
afd!AfdTLReleaseIndications+0x1a:
fffffa60`04a08e2a 488b4108 mov rax,qword ptr [rcx+8] ds:002b:161598f3`3faa38ca=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 9
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffffa6004a41d67 to fffffa6004a08e2a
STACK_TEXT:
fffffa60`0731f3d0 fffffa60`04a41d67 : fffffa60`0731fa70 00000000`000000a4 fffffa80`06cd9180 fffffa60`0731fca0 : afd!AfdTLReleaseIndications+0x1a
fffffa60`0731f420 fffffa60`04a3d6ea : fffffa60`0731f950 00000000`ffffffff 00000000`ffffffff fffffa80`069d8af0 : afd!AfdReturnBuffer+0x47
fffffa60`0731f450 fffffa60`04a2b76a : fffffa80`04791010 fffffa60`0731f760 fffff800`00001000 00000000`0000af00 : afd!AfdFastConnectionReceive+0x41b
fffffa60`0731f670 fffff800`01d2750b : 00000000`00001000 fffffa80`06e8c7c0 00000000`00000001 fffffa60`0731fc01 : afd!AfdFastIoDeviceControl+0x75a
fffffa60`0731f9f0 fffff800`01d40706 : fffffa80`00000002 00000000`000001b4 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x35b
fffffa60`0731fb40 fffff800`01aa20f3 : fffffa80`06b47640 fffff800`01d1d37f 00000000`000000e0 00000000`00000006 : nt!NtDeviceIoControlFile+0x56
fffffa60`0731fbb0 00000000`74f5385e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02d3ec08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74f5385e
FOLLOWUP_IP:
afd!AfdTLReleaseIndications+1a
fffffa60`04a08e2a 488b4108 mov rax,qword ptr [rcx+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: afd!AfdTLReleaseIndications+1a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 47919ad7
STACK_COMMAND: .cxr 0xfffffa600731eb70 ; kb
FAILURE_BUCKET_ID: X64_0x3B_afd!AfdTLReleaseIndications+1a
BUCKET_ID: X64_0x3B_afd!AfdTLReleaseIndications+1a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini071309-08.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a04000 PsLoadedModuleList = 0xfffff800`01bc9db0
Debug session time: Mon Jul 13 21:51:08.022 2009 (GMT-4)
System Uptime: 0 days 0:09:35.599
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80001ae96e2, fffffa6006aeff60, 0}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+6f2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80001ae96e2, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6006aeff60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiIdentifyPfn+6f2
fffff800`01ae96e2 498b5b40 mov rbx,qword ptr [r11+40h]
CONTEXT: fffffa6006aeff60 -- (.cxr 0xfffffa6006aeff60)
rax=0200000000000000 rbx=0000058000000000 rcx=0000000000000002
rdx=00000000004d1628 rsi=fffffa80055d1a00 rdi=028000000009bb5a
rip=fffff80001ae96e2 rsp=fffffa6006af07c0 rbp=fffffa6006af0800
r8=0200000000000000 r9=0000000000000542 r10=fffffa80069a69e0
r11=900136d160a08097 r12=0000000000000000 r13=fffffffffffff000
r14=000fffffffffffff r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
nt!MiIdentifyPfn+0x6f2:
fffff800`01ae96e2 498b5b40 mov rbx,qword ptr [r11+40h] ds:002b:900136d1`60a080d7=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 8
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80001b03fde to fffff80001ae96e2
STACK_TEXT:
fffffa60`06af07c0 fffff800`01b03fde : 00000000`0009a2c5 fffffa80`055d1a00 fffffa80`075166b0 00000000`00000000 : nt!MiIdentifyPfn+0x6f2
fffffa60`06af0860 fffff800`01df2c05 : fffffa80`055d1000 fffffa60`06af0ca0 fffffa60`06af0928 00000000`00000000 : nt!MmQueryPfnList+0x13e
fffffa60`06af08a0 fffff800`01d3a19c : fffffa60`000000a8 00000000`00000000 fffffa80`055d1000 00000000`04402f01 : nt!PfpPfnPrioRequest+0x115
fffffa60`06af08f0 fffff800`01ccf9aa : 00000000`00000000 00000000`04402ff0 00000000`0240eea0 00000000`00000001 : nt! ?? ::NNGAKEGL::`string'+0x467aa
fffffa60`06af0960 fffff800`01a580f3 : fffffa80`075166b0 00000000`04402ff0 00000000`0433f4e0 00000000`00000000 : nt!NtQuerySystemInformation+0xd0a
fffffa60`06af0c20 00000000`774e5dda : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0240edf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x774e5dda
FOLLOWUP_IP:
nt!MiIdentifyPfn+6f2
fffff800`01ae96e2 498b5b40 mov rbx,qword ptr [r11+40h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiIdentifyPfn+6f2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 49ac93e1
STACK_COMMAND: .cxr 0xfffffa6006aeff60 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiIdentifyPfn+6f2
BUCKET_ID: X64_0x3B_nt!MiIdentifyPfn+6f2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini071309-07.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a05000 PsLoadedModuleList = 0xfffff800`01bcadb0
Debug session time: Mon Jul 13 21:40:29.722 2009 (GMT-4)
System Uptime: 0 days 0:48:05.711
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffffa600497a0d3, fffffa6004db4cf0, 0}
Probably caused by : Npfs.SYS ( Npfs!NpTranslateAlias+cb )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa600497a0d3, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6004db4cf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800 cmp word ptr [rax],0
CONTEXT: fffffa6004db4cf0 -- (.cxr 0xfffffa6004db4cf0)
rax=faf3b38f74db86f7 rbx=fffffa80079ba9e0 rcx=0000000000000043
rdx=fffffa6004db5580 rsi=fffffa6004db5638 rdi=000000000000000e
rip=fffffa600497a0d3 rsp=fffffa6004db5550 rbp=0000000000000000
r8=0000000000000007 r9=0000000000000006 r10=fffff98000020654
r11=0000000000000010 r12=0000000000000000 r13=fffffa8005699960
r14=000000000012019f r15=fffffa800582ed30
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
Npfs!NpTranslateAlias+0xcb:
fffffa60`0497a0d3 66833800 cmp word ptr [rax],0 ds:002b:faf3b38f`74db86f7=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 7
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AiNap.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffffa600497a7aa to fffffa600497a0d3
STACK_TEXT:
fffffa60`04db5550 fffffa60`0497a7aa : fffffa60`04db5698 00000000`00000005 00000000`00000000 fffffa60`04db5600 : Npfs!NpTranslateAlias+0xcb
fffffa60`04db55d0 fffff800`01ce01f3 : 00000000`00000005 fffffa80`0579bb10 00000000`00000040 fffffa80`0579bb10 : Npfs!NpFsdCreate+0x20a
fffffa60`04db5700 fffff800`01cd9ec9 : fffffa80`079e0df0 00000000`00000000 fffffa80`0572b3c0 fffffa80`03cbd901 : nt!IopParseDevice+0x5e3
fffffa60`04db58a0 fffff800`01cdddb4 : 00000000`00000000 fffffa80`043ae801 00000000`00000040 00000000`00000000 : nt!ObpLookupObjectName+0x5eb
fffffa60`04db59b0 fffff800`01cea360 : 00000000`c0100080 00000000`0007e620 00000000`0007e501 fffffa80`048546b0 : nt!ObOpenObjectByName+0x2f4
fffffa60`04db5a80 fffff800`01ceae98 : 00000000`0007e558 00000000`c0100080 00000000`0007e568 00000000`0007e548 : nt!IopCreateFile+0x290
fffffa60`04db5b20 fffff800`01a590f3 : 00000000`74ff3380 00000000`0007ee70 00000000`00000000 00000000`74f80a10 : nt!NtCreateFile+0x78
fffffa60`04db5bb0 00000000`77015fca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007e4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77015fca
FOLLOWUP_IP:
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800 cmp word ptr [rax],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Npfs!NpTranslateAlias+cb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 47919075
STACK_COMMAND: .cxr 0xfffffa6004db4cf0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_Npfs!NpTranslateAlias+cb
BUCKET_ID: X64_0x3B_Npfs!NpTranslateAlias+cb
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffffa600497a0d3, Address of the exception record for the exception that caused the bugcheck
Arg3: fffffa6004db4cf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800 cmp word ptr [rax],0
CONTEXT: fffffa6004db4cf0 -- (.cxr 0xfffffa6004db4cf0)
rax=faf3b38f74db86f7 rbx=fffffa80079ba9e0 rcx=0000000000000043
rdx=fffffa6004db5580 rsi=fffffa6004db5638 rdi=000000000000000e
rip=fffffa600497a0d3 rsp=fffffa6004db5550 rbp=0000000000000000
r8=0000000000000007 r9=0000000000000006 r10=fffff98000020654
r11=0000000000000010 r12=0000000000000000 r13=fffffa8005699960
r14=000000000012019f r15=fffffa800582ed30
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
Npfs!NpTranslateAlias+0xcb:
fffffa60`0497a0d3 66833800 cmp word ptr [rax],0 ds:002b:faf3b38f`74db86f7=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 7
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: AiNap.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffffa600497a7aa to fffffa600497a0d3
STACK_TEXT:
fffffa60`04db5550 fffffa60`0497a7aa : fffffa60`04db5698 00000000`00000005 00000000`00000000 fffffa60`04db5600 : Npfs!NpTranslateAlias+0xcb
fffffa60`04db55d0 fffff800`01ce01f3 : 00000000`00000005 fffffa80`0579bb10 00000000`00000040 fffffa80`0579bb10 : Npfs!NpFsdCreate+0x20a
fffffa60`04db5700 fffff800`01cd9ec9 : fffffa80`079e0df0 00000000`00000000 fffffa80`0572b3c0 fffffa80`03cbd901 : nt!IopParseDevice+0x5e3
fffffa60`04db58a0 fffff800`01cdddb4 : 00000000`00000000 fffffa80`043ae801 00000000`00000040 00000000`00000000 : nt!ObpLookupObjectName+0x5eb
fffffa60`04db59b0 fffff800`01cea360 : 00000000`c0100080 00000000`0007e620 00000000`0007e501 fffffa80`048546b0 : nt!ObOpenObjectByName+0x2f4
fffffa60`04db5a80 fffff800`01ceae98 : 00000000`0007e558 00000000`c0100080 00000000`0007e568 00000000`0007e548 : nt!IopCreateFile+0x290
fffffa60`04db5b20 fffff800`01a590f3 : 00000000`74ff3380 00000000`0007ee70 00000000`00000000 00000000`74f80a10 : nt!NtCreateFile+0x78
fffffa60`04db5bb0 00000000`77015fca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0007e4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77015fca
FOLLOWUP_IP:
Npfs!NpTranslateAlias+cb
fffffa60`0497a0d3 66833800 cmp word ptr [rax],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: Npfs!NpTranslateAlias+cb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 47919075
STACK_COMMAND: .cxr 0xfffffa6004db4cf0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_Npfs!NpTranslateAlias+cb
BUCKET_ID: X64_0x3B_Npfs!NpTranslateAlias+cb
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini071309-05.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a18000 PsLoadedModuleList = 0xfffff800`01bdddb0
Debug session time: Mon Jul 13 20:32:13.743 2009 (GMT-4)
System Uptime: 0 days 0:28:46.695
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FE, {6, fffffa800792e940, 48676643, 0}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_AssertSig+25 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BUGCODE_USB_DRIVER (fe)
USB Driver bugcheck, first parameter is USB bugcheck code.
Arguments:
Arg1: 0000000000000006, USBBUGCODE_BAD_SIGNATURE An Internal data structure (object)
has been corrupted.
Arg2: fffffa800792e940, Object address
Arg3: 0000000048676643, Signature that was expected
Arg4: 0000000000000000
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 5
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
BUGCHECK_STR: 0xFE
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffffa6003dc5395 to fffff80001a6c650
STACK_TEXT:
fffffa60`01bc6888 fffffa60`03dc5395 : 00000000`000000fe 00000000`00000006 fffffa80`0792e940 00000000`48676643 : nt!KeBugCheckEx
fffffa60`01bc6890 fffffa60`03dc781c : fffffa80`00000000 fffffa80`00000000 fffffa80`34637000 fffffa80`0784a000 : USBPORT!USBPORT_AssertSig+0x25
fffffa60`01bc68d0 fffffa60`03d9dec6 : fffffa80`31484453 fffffa80`0640b1a0 fffffa80`0784a1b0 fffffa80`0784cc30 : USBPORT!USBPORT_InternalCloseConfiguration+0xb8
fffffa60`01bc6920 fffffa60`0409557f : fffffa80`564d4552 00000000`00000100 fffffa80`0784a1b0 fffffa80`065bc050 : USBPORT!USBPORTBUSIF_RemoveUsbDevice+0xda
fffffa60`01bc6950 fffffa60`0408cc51 : fffffa80`0784a1b0 fffffa80`077c4fa0 fffffa80`0784a060 00000000`00000030 : usbhub!UsbhUnlinkPdoDeviceHandle+0x153
fffffa60`01bc69b0 fffffa60`0408c24c : 00000000`00000002 fffffa80`077c4fa0 00000000`00000000 fffffa60`04071d38 : usbhub!UsbhPortDisconnect+0x8d
fffffa60`01bc69f0 fffffa60`04073a45 : fffffa80`077c4fa0 fffffa80`0792b180 fffffa80`065bc050 fffffa80`065bc1a0 : usbhub!UsbhWaitConnect+0x2fc
fffffa60`01bc6a40 fffffa60`04073f73 : fffffa80`077c4fa0 fffffa80`077c4fb8 fffffa80`0792b180 fffffa80`077c4fb8 : usbhub!UsbhHubDispatchPortEvent+0x611
fffffa60`01bc6ac0 fffffa60`04070681 : 00000000`00000000 00000000`00000004 fffffa80`00020300 00000000`00000001 : usbhub!UsbhHubRunPortChangeQueue+0x32f
fffffa60`01bc6b90 fffffa60`0406d6d7 : 00000000`00000001 fffffa60`50447100 fffffa80`077c4fa0 fffffa80`065bc050 : usbhub!Usbh_PCE_wRun_Action+0x1fd
fffffa60`01bc6be0 fffffa60`04074170 : fffffa80`065bc050 fffffa80`046212b0 00000000`0000000a fffffa80`077c4fa0 : usbhub!UsbhDispatch_PortChangeQueueEventEx+0xbf
fffffa60`01bc6c20 fffffa60`0406889b : fffffa80`065bc1a0 fffff800`01baa8f8 fffffa80`065bc050 fffffa60`00000000 : usbhub!UsbhHubProcessChangeWorker+0x10c
fffffa60`01bc6c80 fffff800`01cd5dff : fffffa80`065bc050 fffffa80`03cb2bb0 fffffa80`07fd0010 fffffa80`03cb2bb0 : usbhub!UsbhHubWorker+0x63
fffffa60`01bc6cc0 fffff800`01a79366 : fffffa60`05eb90d8 fffff800`01baa801 fffffa80`03cb2b00 00000000`00000001 : nt!IopProcessWorkItem+0x27
fffffa60`01bc6cf0 fffff800`01c90fd3 : fffffa80`07daa780 101c5314`35a5011e fffffa80`03cb2bb0 00000000`00000080 : nt!ExpWorkerThread+0x11a
fffffa60`01bc6d50 fffff800`01aa6816 : fffffa60`005ec180 fffffa80`03cb2bb0 fffffa60`005f5d40 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`01bc6d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_AssertSig+25
fffffa60`03dc5395 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: USBPORT!USBPORT_AssertSig+25
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 479199d8
FAILURE_BUCKET_ID: X64_0xFE_USBPORT!USBPORT_AssertSig+25
BUCKET_ID: X64_0xFE_USBPORT!USBPORT_AssertSig+25
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\Mini071309-04.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*[URL]http://msdl.microsoft.com/download/symbols[/URL]
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`01a0d000 PsLoadedModuleList = 0xfffff800`01bd2db0
Debug session time: Mon Jul 13 19:17:42.784 2009 (GMT-4)
System Uptime: 0 days 0:16:31.361
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {20, fffffa8006533a70, fffffa8006534330, 48cea26}
Unable to load image \SystemRoot\system32\DRIVERS\ASACPI.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ASACPI.sys
*** ERROR: Module load completed but symbols could not be loaded for ASACPI.sys
Probably caused by : ASACPI.sys ( ASACPI+15ce )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000020, a pool block header size is corrupt.
Arg2: fffffa8006533a70, The pool entry we were looking for within the page.
Arg3: fffffa8006534330, The next pool entry.
Arg4: 00000000048cea26, (reserved)
Debugging Details:
------------------
BUGCHECK_STR: 0x19_20
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff80001c36080
fffffa8006533a70
CUSTOMER_CRASH_COUNT: 4
DEFAULT_BUCKET_ID: COMMON_SYSTEM_FAULT
PROCESS_NAME: aaCenter.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80001b4205d to fffff80001a61650
STACK_TEXT:
fffffa60`04c5f4a8 fffff800`01b4205d : 00000000`00000019 00000000`00000020 fffffa80`06533a70 fffffa80`06534330 : nt!KeBugCheckEx
fffffa60`04c5f4b0 fffffa60`009108cb : 00000000`00000000 00000000`00000000 00000000`00008000 fffffa60`5254535f : nt!ExDeferredFreePool+0x9db
fffffa60`04c5f560 fffffa60`00910f7e : fffffa80`0636b000 00000000`00008000 fffffa80`0636b000 00000000`00000001 : acpi!FreeContext+0xdf
fffffa60`04c5f5b0 fffffa60`0090e675 : fffffa80`0636b000 00000000`00000001 fffffa80`0637ae00 fffffa60`0090b9ba : acpi!RunContext+0x18a
fffffa60`04c5f5f0 fffffa60`0090e716 : fffffa80`0636b000 fffffa80`0637ae78 fffffa80`0636b000 fffffa80`0637ae78 : acpi!InsertReadyQueue+0xd5
fffffa60`04c5f620 fffffa60`0091145c : 00000000`00000000 fffffa80`047f6710 00000000`00000000 fffffa60`5254535f : acpi!RestartContext+0x36
fffffa60`04c5f650 fffffa60`009111e3 : fffffa80`04b2aaa0 fffff880`0fbcd780 00000000`00000001 fffff880`0fbf8190 : acpi!AsyncEvalObject+0x1cc
fffffa60`04c5f6b0 fffffa60`0090a7dc : 00000000`00000000 fffffa80`04b2aaa0 00000000`00000001 00000000`00000000 : acpi!SyncEvalObject+0x143
fffffa60`04c5f760 fffffa60`009000b4 : 00000000`00000000 fffffa80`04c19190 fffffa80`047eac60 fffff880`0fbf8190 : acpi!AMLIEvalNameSpaceObject+0xbc
fffffa60`04c5f7b0 fffffa60`0090122e : fffffa60`009229a0 fffffa80`00000001 fffffa80`057626c0 fffff880`0fbcd780 : acpi!ACPIIoctlEvalControlMethod+0x68
fffffa60`04c5f810 fffffa60`008f9297 : fffffa60`009229a0 fffffa80`04c20010 00000000`20206f49 00000000`00001000 : acpi!ACPIIrpDispatchDeviceControl+0x14e
fffffa60`04c5f840 fffffa60`037635ce : fffffa80`04c19190 fffffa80`04c19190 fffffa80`04c19190 fffffa80`05762ae8 : acpi!ACPIDispatchIrp+0x12b
fffffa60`04c5f8c0 fffffa80`04c19190 : fffffa80`04c19190 fffffa80`04c19190 fffffa80`05762ae8 fffffa80`057626c0 : ASACPI+0x15ce
fffffa60`04c5f8c8 fffffa80`04c19190 : fffffa80`04c19190 fffffa80`05762ae8 fffffa80`057626c0 fffffa80`00000400 : 0xfffffa80`04c19190
fffffa60`04c5f8d0 fffffa80`04c19190 : fffffa80`05762ae8 fffffa80`057626c0 fffffa80`00000400 00000000`00000000 : 0xfffffa80`04c19190
fffffa60`04c5f8d8 fffffa80`05762ae8 : fffffa80`057626c0 fffffa80`00000400 00000000`00000000 fffffa60`04c5f928 : 0xfffffa80`04c19190
fffffa60`04c5f8e0 fffffa80`057626c0 : fffffa80`00000400 00000000`00000000 fffffa60`04c5f928 fffffa60`04c5f918 : 0xfffffa80`05762ae8
fffffa60`04c5f8e8 fffffa80`00000400 : 00000000`00000000 fffffa60`04c5f928 fffffa60`04c5f918 fffff800`01b24dc9 : 0xfffffa80`057626c0
fffffa60`04c5f8f0 00000000`00000000 : fffffa60`04c5f928 fffffa60`04c5f918 fffff800`01b24dc9 00000000`00000000 : 0xfffffa80`00000400
STACK_COMMAND: kb
FOLLOWUP_IP:
ASACPI+15ce
fffffa60`037635ce ?? ???
SYMBOL_STACK_INDEX: c
SYMBOL_NAME: ASACPI+15ce
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ASACPI
IMAGE_NAME: ASACPI.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4546b048
FAILURE_BUCKET_ID: X64_0x19_20_ASACPI+15ce
BUCKET_ID: X64_0x19_20_ASACPI+15ce
Followup: MachineOwner
Thank you so much for your help this is driving me crazy. I am sorry for posting so much information I figure the more you all have the more help you can give. Let me know if I posted too much and I will be sure to limit myself next time.
Sam
Last edited by a moderator: