- Thread Author
- #1
Lately, I have been getting bsod randomly. Any ideas?
I uploaded a few of the dump files from those bsod's. Thanks!
I uploaded a few of the dump files from those bsod's. Thanks!
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {10, 2, 0, fffff880044101d9}
Unable to load image \SystemRoot\system32\DRIVERS\avgtdia.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdia.sys
*** ERROR: Module load completed but symbols could not be loaded for...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {10, 2, 0, fffff880044101d9}
Unable to load image \SystemRoot\system32\DRIVERS\avgtdia.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for avgtdia.sys
*** ERROR: Module load completed but symbols could not be loaded for avgtdia.sys
Probably caused by : [COLOR=#ff0000][U][B]avgtdia.sys ( avgtdia+11d9 )[/B][/U][/COLOR]
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880044101d9, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000370b100
0000000000000010
CURRENT_IRQL: 2
FAULTING_IP:
avgtdia+11d9
fffff880`044101d9 397b18 cmp dword ptr [rbx+18h],edi
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: avgnsa.exe
TRAP_FRAME: fffff88006ecb700 -- (.trap 0xfffff88006ecb700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80087ce1b0
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880044101d9 rsp=fffff88006ecb890 rbp=fffff88006787080
r8=fffffa80087ce1c0 r9=0000000000000000 r10=0000000000000000
r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
avgtdia+0x11d9:
fffff880`044101d9 397b18 cmp dword ptr [rbx+18h],edi ds:66d0:00000000`00000018=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800034d81e9 to fffff800034d8c40
STACK_TEXT:
fffff880`06ecb5b8 fffff800`034d81e9 : 00000000`0000000a 00000000`00000010 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`06ecb5c0 fffff800`034d6e60 : 00000000`00000000 00000000`00000000 00000014`00000000 ffffffff`fffffff8 : nt!KiBugCheckDispatch+0x69
fffff880`06ecb700 fffff880`044101d9 : 00000000`000186a0 fffffa80`0b06a5d0 00000000`00000b12 00000000`00000000 : nt!KiPageFault+0x260
fffff880`06ecb890 00000000`000186a0 : fffffa80`0b06a5d0 00000000`00000b12 00000000`00000000 fffffa80`0b06a500 : [COLOR=#ff0000][U][B]avgtdia+0x11d9[/B][/U][/COLOR]
fffff880`06ecb898 fffffa80`0b06a5d0 : 00000000`00000b12 00000000`00000000 fffffa80`0b06a500 fffff880`04413570 : 0x186a0
fffff880`06ecb8a0 00000000`00000b12 : 00000000`00000000 fffffa80`0b06a500 fffff880`04413570 00000000`00000000 : 0xfffffa80`0b06a5d0
fffff880`06ecb8a8 00000000`00000000 : fffffa80`0b06a500 fffff880`04413570 00000000`00000000 00000000`00000000 : 0xb12
STACK_COMMAND: kb
FOLLOWUP_IP:
[COLOR=#ff0000][U][B]avgtdia+11d9[/B][/U][/COLOR]
fffff880`044101d9 397b18 cmp dword ptr [rbx+18h],edi
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: [B][U][COLOR=#ff0000]avgtdia+11d9[/COLOR][/U][/B]
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: [COLOR=#ff0000][U][B]avgtdia[/B][/U][/COLOR]
IMAGE_NAME: [COLOR=#ff0000][U][B]avgtdia.sys[/B][/U][/COLOR]
DEBUG_FLR_IMAGE_TIMESTAMP: 4e1a2bdd
FAILURE_BUCKET_ID: X64_0xD1_[COLOR=#ff0000][U][B]avgtdia+11d9[/B][/U][/COLOR]
BUCKET_ID: X64_0xD1_[B][U][COLOR=#ff0000]avgtdia+11d9[/COLOR][/U][/B]
RTCore64.sys | 5/25/2005 0:39 |
GEARAspiWDM.sys | 8/7/2006 11:11 |
ElbyCDFL.sys | 12/14/2006 15:22 |
wacommousefilter.sys | 2/16/2007 12:12 |
nvstor64.sys | 7/2/2007 18:35 |
SCDEmu.SYS | 8/7/2007 9:19 |
RTKVHD64.sys | 9/9/2008 4:06 |
nvm62x64.sys | 10/17/2008 15:01 |
adfs.SYS | 11/3/2008 10:48 |
RimSerial_AMD64.sys | 11/24/2008 11:01 |
ElbyCDIO.sys | 2/17/2009 11:11 |
wacomvhid.sys | 5/20/2009 13:53 |
netr28ux.sys | 5/24/2009 22:38 |
FileLock.sys | 5/30/2009 9:11 |
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff800034ad3b5, fffff88003532608, fffff88003531e60}
Probably caused by : [COLOR=#ff0000][U][B]ntkrnlmp.exe[/B][/U][/COLOR] ( nt!FsFilterPerformCallbacks+35 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800034b37e9, fffff8800c1af0e0, 0}
Probably caused by : [COLOR=#ff0000][U][B]win32k.sys[/B][/U][/COLOR] ( win32k!GreLockVisRgnShared+41 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
SOURCE: Link Removed
- Go to Start and type in sysdm.cpl and press Enter
- Click on the Advanced tab
- Click on the Startup and Recovery Settings button
- Ensure that Automatically restart is unchecked
- Under the Write Debugging Information header select Small memory dump (256 kB) in the dropdown box
- Ensure that the Small Dump Directory is listed as %systemroot%\Minidump << where your .dmp files can be found later
- Click OK twice to exit the dialogs, then reboot for the changes to take effect.
Done The small memory dump wasn't selected so I did that and everything else. ^_^ Thanks for the TLC. lol have forgotten to do that for a while.
My thought, from lots of past experiance: IRQL Blue Screens are either due to shoddy drivers, or faulty RAM. In either case, the module that crashes is usually not the root cause, just the bystander that got hit by the effects. A memory diagnostic using either Memtest86 or Microsoft Memory Diagnostic couldn't hurt, just to rule out the case of bad RAM.
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {28000e003f, 2, 0, fffff88004d3e6e7}
[COLOR=#ff0000][U][B]Probably caused by : USBPORT.SYS[/B][/U][/COLOR] ( USBPORT!USBPORT_Core_iCheckAbortList+c3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. [COLOR=#ff0000][U][B]This is usually
caused by drivers using improper addresses.[/B][/U][/COLOR]
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000028000e003f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88004d3e6e7, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80003907100
00000028000e003f
CURRENT_IRQL: 2
FAULTING_IP:
USBPORT!USBPORT_Core_iCheckAbortList+c3
fffff880`04d3e6e7 8b5740 mov edx,dword ptr [rdi+40h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c940 -- (.trap 0xfffff80000b9c940)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000fe3dbc49 rbx=0000000000000000 rcx=fffffa80090a7920
rdx=fffffa8008eb91a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004d3e6e7 rsp=fffff80000b9cad0 rbp=fffffa800733c260
r8=0000000058726261 r9=000000000000000b r10=00000000ffffffff
r11=fffffa8008eb91a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
USBPORT!USBPORT_Core_iCheckAbortList+0xc3:
fffff880`04d3e6e7 8b5740 mov edx,dword ptr [rdi+40h] ds:c390:00000000`00000040=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800036d41e9 to fffff800036d4c40
STACK_TEXT:
fffff800`00b9c7f8 fffff800`036d41e9 : 00000000`0000000a 00000028`000e003f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c800 fffff800`036d2e60 : ffffffff`00000000 fffffa80`0a9fd2b0 fffffa80`08eb9ba0 fffffa80`08eb9050 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c940 fffff880`04d3e6e7 : fffffa80`0a9fd7b0 fffffa80`07438cc0 fffffa80`08eb9050 fffff880`04d379b9 : nt!KiPageFault+0x260
fffff800`00b9cad0 fffff880`04d3ac9a : fffffa80`08eb9eb0 00000000`ffffffff fffffa80`08eb9050 fffff880`04d3956a : USBPORT!USBPORT_Core_iCheckAbortList+0xc3
fffff800`00b9cb20 fffff880`04d3bb0f : fffffa80`0733c202 fffffa80`0ae3bc60 00000000`ffffffff fffffa80`08eb9eb0 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x7e
fffff800`00b9cc00 fffff880`04d3966f : fffffa80`08eb9eb0 fffffa80`08eb91a0 fffffa80`08eba050 00000000`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x3a7
fffff800`00b9cc60 fffff880`04d2af89 : fffffa80`08eb9050 00000000`00000000 fffffa80`08eb9e02 fffffa80`08eb9eb0 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0xf3
fffff800`00b9cca0 fffff800`036e00ac : fffff800`0384ae80 fffffa80`08eb9eb0 fffffa80`08eb9ec8 00000000`00000000 : USBPORT!USBPORT_Xdpc_Worker+0x1d9
fffff800`00b9ccd0 fffff800`036cc96a : fffff800`0384ae80 fffff800`03858cc0 00000000`00000000 fffff880`04d2adb0 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
USBPORT!USBPORT_Core_iCheckAbortList+c3
fffff880`04d3e6e7 8b5740 mov edx,dword ptr [rdi+40h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: USBPORT!USBPORT_Core_iCheckAbortList+c3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4d8c0c08
FAILURE_BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iCheckAbortList+c3
BUCKET_ID: X64_0xD1_USBPORT!USBPORT_Core_iCheckAbortList+c3
Followup: MachineOwner