BSODs caused by netio.sus and atikmdiag.sys?

Discussion in 'Windows 7 Blue Screen of Death (BSOD)' started by Antatra, Jan 23, 2011.

  1. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    Hi

    I've been having problems with hangs, freezes and BSODs for a while now.

    Feels like I've tried everything, hope someone can help.

    Hardware;
    ASUS Crosshair IV Formula, Socket-AM3
    XFX Radeon HD 4890 1GB "xXx" GDDR5
    AMD Phenom II X4 955 Black Edition
    Corsair Dominator DDR3 1600MHz 4GB CL9

    Spare hardware I've also tested;
    Gigabyte GA-MA790FXT-UD5P, Socket-AM3
    Club3D HD3870 512 MB GDDR4 PCIe 2.0 OC

    Software;
    Win7 64bit Ultimate

    What I've done so far;
    Reinstalled Win7, both 64bit and 32bit.
    Updated BIOS and all other drivers
    Quite a few rounds of Memtest86+
    Tested with spare hardware parts, see above.
    Tested with various software for the CPU

    My conclusion thus far;
    I've reinstalled Win7 a lot of times, and so far I only got problems once I installed the Catalyst drivers for my graphics card.

    Judging from the BSODs, which aren't always the same, there seems to be a problem with netio.sys and atikmdag.sys. I'm guessing they're interfering with each other in ways that cause the BSODs.

    If theres anything else you need, let me know.

    Thanks in advance.

    Attaching some info files that were requested by the stickies. Can't seem to upload the memdump file, as its to big.

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff88004004e1e, fffff880038e7050, 0}
    
    *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
    Page 103b05 not present in the dump file. Type ".hh dbgerr004" for details
    Probably caused by : atikmpag.sys ( atikmpag+4e1e )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff88004004e1e, Address of the instruction which caused the bugcheck
    Arg3: fffff880038e7050, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    atikmpag+4e1e
    fffff880`04004e1e 488b9090010000  mov     rdx,qword ptr [rax+190h]
    
    CONTEXT:  fffff880038e7050 -- (.cxr 0xfffff880038e7050)
    rax=0000000000000001 rbx=fffff98017798780 rcx=fffff98017798780
    rdx=0000000000000001 rsi=00000000c0000001 rdi=fffff8a002ef4058
    rip=fffff88004004e1e rsp=fffff880038e7a30 rbp=0000000000000000
     r8=fffff8800516f6d0  r9=0000000000000520 r10=fffff80002a10000
    r11=0000000000000000 r12=0000000000000001 r13=0000000000000002
    r14=00000000001cfbb0 r15=00000000000a000a
    iopl=0         nv up ei pl nz na pe nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
    atikmpag+0x4e1e:
    fffff880`04004e1e 488b9090010000  mov     rdx,qword ptr [rax+190h] ds:002b:00000000`00000191=????????????????
    Resetting default scope
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  dwm.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff8800509fa69 to fffff88004004e1e
    
    STACK_TEXT:  
    fffff880`038e7a30 fffff880`0509fa69 : fffffa80`06723000 00000000`00000000 fffff980`17798780 00000000`00000018 : atikmpag+0x4e1e
    fffff880`038e7a70 fffff880`050b4d7b : 00000000`00000010 fffff8a0`02ef4000 00000000`00000000 fffff8a0`02ef4058 : dxgkrnl!DXGADAPTER::DdiDestroyDevice+0x49
    fffff880`038e7aa0 fffff880`050b467e : fffff8a0`02ef4000 fffff8a0`02ef4068 00000000`00000000 fffff8a0`02ef4068 : dxgkrnl!DXGDEVICE::Destroy+0xcf
    fffff880`038e7ae0 fffff880`05099815 : 00000000`fffffeda fffff8a0`06c9fb40 fffff880`038e7ca0 fffffa80`06723000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x1aa
    fffff880`038e7b50 fffff880`050b57de : fffffa80`059d5400 fffffa80`059d5400 00000000`028af088 fffff8a0`02ef4000 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
    fffff880`038e7b80 fffff960`0025b2d2 : 00000000`00000020 00000000`00010246 00000000`000007da 00000000`00000000 : dxgkrnl!DxgkDestroyDevice+0x1f6
    fffff880`038e7bf0 fffff800`02a81153 : 00000000`029c1e00 fffff880`038e7ca0 00000000`029c2030 00000000`7392cd10 : win32k!NtGdiDdDDIDestroyDevice+0x12
    fffff880`038e7c20 000007fe`fd36bf1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`028aef78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd36bf1a
    
    
    FOLLOWUP_IP: 
    atikmpag+4e1e
    fffff880`04004e1e 488b9090010000  mov     rdx,qword ptr [rax+190h]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  atikmpag+4e1e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: atikmpag
    
    IMAGE_NAME:  atikmpag.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4cef188f
    
    STACK_COMMAND:  .cxr 0xfffff880038e7050 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_VRF_atikmpag+4e1e
    
    BUCKET_ID:  X64_0x3B_VRF_atikmpag+4e1e
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmvm atikmpag
    start             end                 module name
    fffff880`04000000 fffff880`0404c000   atikmpag   (no symbols)           
        Loaded symbol image file: atikmpag.sys
        Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
        Image name: atikmpag.sys
        Timestamp:        Fri Nov 26 03:16:47 2010 (4CEF188F)
        CheckSum:         0004F92A
        ImageSize:        0004C000
        File version:     8.14.1.6170
        Product version:  8.14.1.6170
        File flags:       8 (Mask 3F) Private
        File OS:          40004 NT Win32
        File type:        3.4 Driver
        File date:        00000000.00000000
        Translations:     0409.04b0
        CompanyName:      Advanced Micro Devices, Inc.
        ProductName:      AMD driver
        InternalName:     atikmpag.sys
        OriginalFilename: atikmpag.sys
        ProductVersion:   8.14.01.6170
        FileVersion:      8.14.01.6170
        FileDescription:  AMD multi-vendor Miniport Driver
        LegalCopyright:   Copyright (C) 2007 Advanced Micro Devices, Inc.
    
     

    Attached Files:

    #1 Antatra, Jan 23, 2011
    Last edited: Jan 23, 2011
  2. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    You didn't attach any crash dumps from C:\Windows\Minidump.

    Your blue screens are caused by two things:

    1 - Catalyst 10.12 Preview (atiamdag.sys)
    2 - AVG + ZoneAlarm (netio.sys)


    ~~~~~~~


    1. Uninstall Catalyst 10.12 Preview with the use of the Driver Sweeper:

    AMD Game Forums - 10.12 blue screen error problem

    Guru3D - Driver Sweeper


    2. Install a more stable Catalyst 10.3 - 10.11, or 11.1:

    AMD Catalyst 11.1a Hotfix (BETA 8.82.2) download from Guru3D.com



    3. Uninstall AVG:

    AVG - Download tools



    4. Uninstall ZoneAlarm


    5. Install MSE

    https://www.microsoft.com/security_essentials/


    6. Update old drivers:

    Code:
    Adaptec
    arc                    Kernel        24.05.2007
    
    Broadcom
    Broadcom NetXtreme II  Kernel        31.12.2008  
    Broadcom NetXtreme Gig Kernel        26.04.2009 
    
    Brother Printer
    Brother USB Mass-Stora Kernel        07.08.2006
    
    Intel/ICP Raid Storport Driver
    iirsp                  Kernel        13.12.2005
    
    Intel Matrix Storage
    iaStorV                Kernel        08.04.2009
    
    Emulex LightPulse Storport Miniport Driver
    elxstor                Kernel        03.02.2009
    
    Hauppauge WinTV 885 Consumer IR Driver
    Hauppauge Consumer Inf Kernel        11.05.2009
    
    
     
  3. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    I'll do a full reinstall of Win7 again, just to do it right. Then don't install AVG and Zone Alarm, and install the drivers and MSE you linked to.

    Thanks.

    Oh and by the way.

    The old drivers you've posted. I've just downloaded the new version of everything I can think of. The rest must be drivers installed by Win7. Not sure how to update those, unless windows update does that.
     
    #3 Antatra, Jan 23, 2011
    Last edited: Jan 23, 2011
  4. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Plz don't use windows update - get them from support sites. http://www.intel.com/support/detect.htm
    No need to reinstall your system, unless you want to.
     
  5. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    So I reinstalled Win7, just to get a clean start. Installed the drivers you linked to and MSE. Not installing AVG or ZoneAlarm.

    Started Driver verifier on netio.sys and atikmdag.sys and got another BSOD soon after that.

    Adding minidumps and system info.

    Also tried the link to the Intel site, and it didn't help very much.

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {168, 2, 0, fffff880015a2325}
    
    Probably caused by : NETIO.SYS ( NETIO!StreamGetCalloutContext+115 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000168, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880015a2325, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS:  0000000000000168 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!StreamGetCalloutContext+115
    fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff880074af550 -- (.trap 0xfffff880074af550)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffffffc0000017 rbx=0000000000000000 rcx=fffff880015babc0
    rdx=fffff880015ba358 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880015a2325 rsp=fffff880074af6e0 rbp=fffff880074af7f8
     r8=00000000c0000017  r9=fffff880015b3a10 r10=fffff880074b0290
    r11=fffff880074af640 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    NETIO!StreamGetCalloutContext+0x115:
    fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0 ds:7453:0168=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a8cca9 to fffff80002a8d740
    
    STACK_TEXT:  
    fffff880`074af408 fffff800`02a8cca9 : 00000000`0000000a 00000000`00000168 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`074af410 fffff800`02a8b920 : fffffa80`00000000 00000000`00000000 00000000`0000000d fffff800`02b50c2b : nt!KiBugCheckDispatch+0x69
    fffff880`074af550 fffff880`015a2325 : 00000000`00000000 fffff880`074af800 00000000`0000000b 00000000`0000000b : nt!KiPageFault+0x260
    fffff880`074af6e0 fffff880`015a5a06 : fffff880`074afe80 00000000`00000014 fffff880`074af818 fffff980`00000004 : NETIO!StreamGetCalloutContext+0x115
    fffff880`074af750 fffff880`015a899a : fffff880`074afe80 fffff980`0635af80 00000000`00000000 fffff880`0000000c : NETIO!StreamGetCalloutAndDataContexts+0x66
    fffff880`074af7c0 fffff880`015894fa : fffff880`074afa20 fffff880`0676ce4c fffff880`00000000 fffff880`074b0014 : NETIO!StreamProcessCallout+0xca
    fffff880`074af8b0 fffff880`01572619 : fffff880`015c0014 fffff880`074aff80 fffffa80`04bace08 fffff880`074afe80 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
    fffff880`074af9d0 fffff880`01573bb1 : fffff880`074a0014 fffff880`074aff80 fffff880`074b0010 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
    fffff880`074afaa0 fffff880`015abad4 : fffff880`074b0250 fffff880`074aff80 fffff980`00000001 fffff880`074afe80 : NETIO!KfdClassify+0x934
    fffff880`074afe10 fffff880`015abf48 : fffffa80`04bacdb0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
    fffff880`074aff30 fffff880`015ac667 : fffff980`232e0e20 fffff980`23294f80 fffff880`074b0500 fffff880`074b0300 : NETIO!StreamCommonInspect+0x228
    fffff880`074b0210 fffff880`01708b94 : fffffa80`04bacdb0 fffff880`074b05b0 00000000`00000000 fffff880`074b0014 : NETIO!WfpStreamInspectSend+0x117
    fffff880`074b0290 fffff880`01677c9a : fffffa80`04b8c4e0 fffffa80`06831060 00000000`00000000 fffffa80`04b8c4e0 : tcpip!InetInspectSend+0x34
    fffff880`074b02c0 fffff880`01677e7b : fffff8a0`02be8000 fffff8a0`02fb4000 fffffa80`06831060 fffff8a0`098eb000 : tcpip!TcpEnqueueTcbSend+0x2aa
    fffff880`074b0360 fffff800`02a9ce5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
    fffff880`074b0390 fffff880`0167ddaa : fffff880`01677e60 fffff880`074b04a0 00000000`00000000 fffff880`02ccc6ac : nt!KeExpandKernelStackAndCalloutEx+0xda
    fffff880`074b0470 fffff880`02ce467b : fffffa80`06a93a00 fffff880`074b0ca0 00000000`00000134 fffffa80`068b93b0 : tcpip!TcpTlConnectionSend+0x7a
    fffff880`074b04e0 fffff880`02ccb423 : fffffa80`067c4eb0 fffffa80`067c44e0 fffff800`02a99b25 fffff880`074b0698 : afd!AfdFastConnectionSend+0x38b
    fffff880`074b06a0 fffff800`02da8473 : 00000000`00000134 fffffa80`05aa2f20 00000000`0373abf8 fffffa80`06937501 : afd!AfdFastIoDeviceControl+0x413
    fffff880`074b0a10 fffff800`02da8f66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0373abf8 : nt!IopXxxControlFile+0x373
    fffff880`074b0b40 fffff800`02a8c993 : 80000201`00000000 000007fe`fa8279f0 00000000`035b2378 00000000`00007530 : nt!NtDeviceIoControlFile+0x56
    fffff880`074b0bb0 00000000`7790fdca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0133f4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7790fdca
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!StreamGetCalloutContext+115
    fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!StreamGetCalloutContext+115
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f
    
    FAILURE_BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115
    
    BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115
    
    Followup: MachineOwner
    ---------
    
    1: kd> lmvm NETIO
    start             end                 module name
    fffff880`0156c000 fffff880`015cc000   NETIO      (pdb symbols)          c:\symbols\netio.pdb\8422557063CC44C8B9525A086FA98C032\netio.pdb
        Loaded symbol image file: NETIO.SYS
        Image path: \SystemRoot\system32\drivers\NETIO.SYS
        Image name: NETIO.SYS
        Timestamp:        Fri Apr 09 04:43:59 2010 (4BBE946F)
        CheckSum:         0005CFA1
        ImageSize:        00060000
        Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
    
    Got one more, this time it was atikmdag.sys

    Code:
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff880049799f3, fffff88002ae2810, 0}
    
    *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
    *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
    Page 11801b not present in the dump file. Type ".hh dbgerr004" for details
    Probably caused by : atikmdag.sys ( atikmdag+ad9f3 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff880049799f3, Address of the instruction which caused the bugcheck
    Arg3: fffff88002ae2810, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    atikmdag+ad9f3
    fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]
    
    CONTEXT:  fffff88002ae2810 -- (.cxr 0xfffff88002ae2810)
    rax=0000000000000000 rbx=fffff98004bee3c0 rcx=fffff9800145cff5
    rdx=0000067ffeba3010 rsi=fffff98004bee3c0 rdi=fffff98004bee3c0
    rip=fffff880049799f3 rsp=fffff88002ae31e8 rbp=0000000000000000
     r8=0000000000000006  r9=0000000000000000 r10=0000000000000000
    r11=fffff9800145cff0 r12=0000000000000000 r13=fffff980054ea470
    r14=0000000000000000 r15=fffff980054ea470
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
    atikmdag+0xad9f3:
    fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx] ds:002b:00000000`00000005=??
    Resetting default scope
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  atieclxx.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from fffff88004960880 to fffff880049799f3
    
    STACK_TEXT:  
    fffff880`02ae31e8 fffff880`04960880 : 00000000`00000000 fffff880`02ae3430 fffff980`04acc440 fffff980`054ea470 : atikmdag+0xad9f3
    fffff880`02ae31f0 fffff880`04968712 : fffff980`04bee3c0 00000000`00000000 fffff980`04bee3c0 00000000`00000001 : atikmdag+0x94880
    fffff880`02ae3250 fffff880`0494c6fe : 00000000`00000000 fffff980`04acc4f0 fffff980`04acc440 fffff980`054ea470 : atikmdag+0x9c712
    fffff880`02ae3280 fffff880`04956b36 : fffff880`02ae3430 fffff980`054ea470 00000000`00000001 fffff980`04acc460 : atikmdag+0x806fe
    fffff880`02ae32c0 fffff880`04904d0a : fffff980`02e92f90 fffff980`02e92f90 fffff880`02ae3430 00000000`00000019 : atikmdag+0x8ab36
    fffff880`02ae3320 fffff880`03f2e3bc : 00000000`00000000 fffff880`02ae3430 fffff980`02fa4f40 00000000`00000001 : atikmdag+0x38d0a
    fffff880`02ae3360 fffff880`03f2b564 : 00000000`00000000 00000000`00000000 fffff880`02ae3430 fffff6fb`7e280028 : atikmpag+0xa3bc
    fffff880`02ae33a0 fffff880`0403d38a : fffff6fb`7dbf1400 00000000`00000000 fffff880`02ae3430 00000000`00000001 : atikmpag+0x7564
    fffff880`02ae33d0 fffff880`0409ec03 : fffff8a0`091fe9c0 00000000`00000001 fffff880`02ae3400 fffffa80`064a4000 : dxgkrnl!DXGADAPTER::DdiIsSupportedVidPn+0x116
    fffff880`02ae3410 fffff880`0409efa6 : 00000000`00000002 00000000`00000001 00000000`00000001 fffff8a0`091fea20 : dxgkrnl!VIDPN_MGR::_IsSupportedVidPn+0x157
    fffff880`02ae3460 fffff880`0409f446 : fffff8a0`091fea20 fffff8a0`091fea20 00000000`00000000 fffff8a0`091fea58 : dxgkrnl!VIDPN_MGR::FormalizeVidPnChange+0xa6
    fffff880`02ae34c0 fffff880`0409f859 : fffffa80`06135e00 00000000`00000001 ffffffff`ffffffff fffff8a0`091fe810 : dxgkrnl!VIDPN_MGR::_AddPathToVidPnTopology+0x236
    fffff880`02ae3580 fffff880`040dc1fa : fffff8a0`00adf630 fffff8a0`00000001 fffffa80`06135e00 00000000`00000000 : dxgkrnl!VIDPN_MGR::AddPathToVidPnTopology+0x279
    fffff880`02ae35f0 fffff880`04066b5d : 00000000`00000000 fffffa80`05c421a8 fffffa80`00000105 00000000`00000018 : dxgkrnl!CCD_BTL::_FillTopology+0x94e
    fffff880`02ae36e0 fffff880`040d9c91 : 00000000`00000000 00000000`00000010 fffff8a0`0048ebb0 fffff800`63644356 : dxgkrnl!DXGGLOBAL::IterateAdaptersWithCallback+0x71
    fffff880`02ae3740 fffff880`0407e281 : 00000000`00000010 00000000`00000010 00000000`00000000 00000000`00000000 : dxgkrnl!CCD_BTL::RetrieveAllPaths+0x9d
    fffff880`02ae37c0 fffff880`0407f250 : fffff900`c28590e0 fffff900`c28590e0 fffff880`02ae3a20 00000000`00000000 : dxgkrnl!DxgkGetPathsModality+0x1f9
    fffff880`02ae3930 fffff880`0407f338 : fffff900`c28590e0 fffff880`02ae3bb0 fffff880`03c5f000 00000000`0000000c : dxgkrnl!GetRequestedPathsModality+0xdc
    fffff880`02ae39c0 fffff960`0029e142 : 00000000`79737355 fffff880`02ae3ae8 00000000`0000000c 00000000`00000008 : dxgkrnl!DxgkQueryDisplayConfig+0x90
    fffff880`02ae3a20 fffff960`001c0dd3 : 00000000`ffffc84a fffff880`02ae3bb0 00000000`00000001 fffff800`02a9b772 : win32k!DrvQueryDisplayConfig+0x132
    fffff880`02ae3ab0 fffff800`02a8e993 : 00000000`0000000c fffffa80`0687e160 00000000`00487700 00000000`0283f958 : win32k!NtUserQueryDisplayConfig+0x293
    fffff880`02ae3bb0 00000000`76fc729a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0283f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fc729a
    
    
    FOLLOWUP_IP: 
    atikmdag+ad9f3
    fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  atikmdag+ad9f3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: atikmdag
    
    IMAGE_NAME:  atikmdag.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d2e78a0
    
    STACK_COMMAND:  .cxr 0xfffff88002ae2810 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3
    
    BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3
    
    Followup: MachineOwner
    ---------
    
     

    Attached Files:

    #5 Antatra, Jan 23, 2011
    Last edited: Jan 23, 2011
  6. Elmer

    Elmer Extraordinary Member

    Joined:
    Mar 5, 2010
    Messages:
    3,873
    Likes Received:
    284
    1 person likes this.
  7. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    Run Intel Driver Update Utility in Internet Explorer, let the utility install and find the downloads for you. Download and install them all.



    Why did you turn it on? It was not a good idea, driver verifier will be crashing you non-stop so disable it -> Run > verifier /reset > reboot.
     
  8. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    Elmer;

    For some reason the installation failed because my computer didn't meet the minimum system requirements.

    cybercore;

    I ran the program in IE, bit still it just gave me a "This device is unknown or unsupported. Please contact the manufacturer for possible updates."

    I enabled Driver Verifier so that I could stress test the drivers. Unless I enable Driver Verifier the system just freeze up, without a BSOD, and I don't get any minidumps or anything.

    As I've said, I downloaded all the new drivers from the motherboard manufacturer, so I don't see which drivers I would be missing? I've taken out every other piece of hardware that doesn't need to be there. So I guessed that with new MB drivers and graphics drivers I would be good.

    Turned off Driver Verifier now, not yet had a system freeze, but it takes a while when Driver Verifier is off.

    Thanks for all the help so far.
     
  9. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    1. http://windows7forums.com/blue-screen-death-bsod/54459-important-every-thread-starter-please-see.html

    MEMORY and SPD tabs for each slot.
    Give me these links or maybe pdf files with: your RAM sticks description + motherboard description.




    2. Update these:

    VIA Audio
    VMfilt64.sys Thu Jul 30 23:40:32 2009

    JMicron RAID
    jraid.sys Thu Oct 29 04:14:20 2009





    Crash Dumps:

    Code:
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\012411-24819-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
    Debug session time: Sun Jan 23 14:47:03.900 2011 (UTC - 5:00)
    System Uptime: 0 days 0:12:16.663
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {168, 2, 0, fffff880015a2325}
    
    Probably caused by : NETIO.SYS ( NETIO!StreamGetCalloutContext+115 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000168, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880015a2325, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
     0000000000000168 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!StreamGetCalloutContext+115
    fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff880074af550 -- (.trap 0xfffff880074af550)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=ffffffffc0000017 rbx=0000000000000000 rcx=fffff880015babc0
    rdx=fffff880015ba358 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880015a2325 rsp=fffff880074af6e0 rbp=fffff880074af7f8
     r8=00000000c0000017  r9=fffff880015b3a10 r10=fffff880074b0290
    r11=fffff880074af640 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    NETIO!StreamGetCalloutContext+0x115:
    fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0 ds:7453:00000000`00000168=????????????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002a8cca9 to fffff80002a8d740
    
    STACK_TEXT:  
    fffff880`074af408 fffff800`02a8cca9 : 00000000`0000000a 00000000`00000168 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`074af410 fffff800`02a8b920 : fffffa80`00000000 00000000`00000000 00000000`0000000d fffff800`02b50c2b : nt!KiBugCheckDispatch+0x69
    fffff880`074af550 fffff880`015a2325 : 00000000`00000000 fffff880`074af800 00000000`0000000b 00000000`0000000b : nt!KiPageFault+0x260
    fffff880`074af6e0 fffff880`015a5a06 : fffff880`074afe80 00000000`00000014 fffff880`074af818 fffff980`00000004 : NETIO!StreamGetCalloutContext+0x115
    fffff880`074af750 fffff880`015a899a : fffff880`074afe80 fffff980`0635af80 00000000`00000000 fffff880`0000000c : NETIO!StreamGetCalloutAndDataContexts+0x66
    fffff880`074af7c0 fffff880`015894fa : fffff880`074afa20 fffff880`0676ce4c fffff880`00000000 fffff880`074b0014 : NETIO!StreamProcessCallout+0xca
    fffff880`074af8b0 fffff880`01572619 : fffff880`015c0014 fffff880`074aff80 fffffa80`04bace08 fffff880`074afe80 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
    fffff880`074af9d0 fffff880`01573bb1 : fffff880`074a0014 fffff880`074aff80 fffff880`074b0010 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
    fffff880`074afaa0 fffff880`015abad4 : fffff880`074b0250 fffff880`074aff80 fffff980`00000001 fffff880`074afe80 : NETIO!KfdClassify+0x934
    fffff880`074afe10 fffff880`015abf48 : fffffa80`04bacdb0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
    fffff880`074aff30 fffff880`015ac667 : fffff980`232e0e20 fffff980`23294f80 fffff880`074b0500 fffff880`074b0300 : NETIO!StreamCommonInspect+0x228
    fffff880`074b0210 fffff880`01708b94 : fffffa80`04bacdb0 fffff880`074b05b0 00000000`00000000 fffff880`074b0014 : NETIO!WfpStreamInspectSend+0x117
    fffff880`074b0290 fffff880`01677c9a : fffffa80`04b8c4e0 fffffa80`06831060 00000000`00000000 fffffa80`04b8c4e0 : tcpip!InetInspectSend+0x34
    fffff880`074b02c0 fffff880`01677e7b : fffff8a0`02be8000 fffff8a0`02fb4000 fffffa80`06831060 fffff8a0`098eb000 : tcpip!TcpEnqueueTcbSend+0x2aa
    fffff880`074b0360 fffff800`02a9ce5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
    fffff880`074b0390 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!StreamGetCalloutContext+115
    fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!StreamGetCalloutContext+115
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f
    
    FAILURE_BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115
    
    BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115
    
    Followup: MachineOwner
    ---------
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [F:\a\Minidump\D M P\DMP\012411-25287-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
    Machine Name:
    Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
    Debug session time: Sun Jan 23 19:25:06.449 2011 (UTC - 5:00)
    System Uptime: 0 days 0:08:01.212
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ......................
    Loading User Symbols
    Loading unloaded module list
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 3B, {c0000005, fffff880049799f3, fffff88002ae2810, 0}
    
    Probably caused by : atikmdag.sys ( atikmdag+ad9f3 )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    SYSTEM_SERVICE_EXCEPTION (3b)
    An exception happened while executing a system service routine.
    Arguments:
    Arg1: 00000000c0000005, Exception code that caused the bugcheck
    Arg2: fffff880049799f3, Address of the instruction which caused the bugcheck
    Arg3: fffff88002ae2810, Address of the context record for the exception that caused the bugcheck
    Arg4: 0000000000000000, zero.
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    atikmdag+ad9f3
    fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]
    
    CONTEXT:  fffff88002ae2810 -- (.cxr 0xfffff88002ae2810)
    rax=0000000000000000 rbx=fffff98004bee3c0 rcx=fffff9800145cff5
    rdx=0000067ffeba3010 rsi=fffff98004bee3c0 rdi=fffff98004bee3c0
    rip=fffff880049799f3 rsp=fffff88002ae31e8 rbp=0000000000000000
     r8=0000000000000006  r9=0000000000000000 r10=0000000000000000
    r11=fffff9800145cff0 r12=0000000000000000 r13=fffff980054ea470
    r14=0000000000000000 r15=fffff980054ea470
    iopl=0         nv up ei ng nz na po nc
    cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
    atikmdag+0xad9f3:
    fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx] ds:002b:00000000`00000005=??
    Resetting default scope
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    BUGCHECK_STR:  0x3B
    
    PROCESS_NAME:  atieclxx.exe
    
    CURRENT_IRQL:  0
    
    LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880049799f3
    
    STACK_TEXT:  
    fffff880`02ae31e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmdag+0xad9f3
    
    
    FOLLOWUP_IP: 
    atikmdag+ad9f3
    fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]
    
    SYMBOL_STACK_INDEX:  0
    
    SYMBOL_NAME:  atikmdag+ad9f3
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: atikmdag
    
    IMAGE_NAME:  atikmdag.sys
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d2e78a0
    
    STACK_COMMAND:  .cxr 0xfffff88002ae2810 ; kb
    
    FAILURE_BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3
    
    BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3
    
    Followup: MachineOwner
    ---------
    
    
    



    Drivers:

    Code:
    fffff880`04166000 fffff880`041a4000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
    fffff880`00ec2000 fffff880`00f19000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
    fffff880`01976000 fffff880`01a00000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`051e1000 fffff880`051f7000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
    fffff880`03ea7000 fffff880`03ebb000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
    fffff880`03f0f000 fffff880`03f24000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
    fffff880`00deb000 fffff880`00df6000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
    fffff880`04000000 fffff880`04008000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
    fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00dc1000 fffff880`00deb000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
    fffff880`056ad000 fffff880`056cd000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
    fffff880`048cc000 fffff880`051c8000   atikmdag atikmdag.sys Wed Jan 12 22:59:28 2011 (4D2E78A0)
    fffff880`03f24000 fffff880`03f72000   atikmpag atikmpag.sys Wed Jan 12 22:20:37 2011 (4D2E6F85)
    fffff880`018ca000 fffff880`018d1000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
    fffff880`02ddb000 fffff880`02dec000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
    fffff880`039a5000 fffff880`039c3000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
    fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
    fffff880`01866000 fffff880`01890000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
    fffff880`01800000 fffff880`01830000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00d1a000 fffff880`00d78000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`01102000 fffff880`01175000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
    fffff880`051d1000 fffff880`051e1000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
    fffff880`05fcb000 fffff880`05fd9000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
    fffff880`02c00000 fffff880`02c83000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
    fffff880`02dbd000 fffff880`02ddb000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
    fffff880`02dae000 fffff880`02dbd000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
    fffff880`0121b000 fffff880`01231000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`0570a000 fffff880`0572c000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
    fffff880`05fe5000 fffff880`05fee000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05fd9000 fffff880`05fe5000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`05732000 fffff880`05745000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
    fffff880`05fee000 fffff880`05ffa000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
    fffff880`04008000 fffff880`040fc000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
    fffff880`040fc000 fffff880`04142000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
    fffff880`01090000 fffff880`010a4000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
    fffff880`01044000 fffff880`01090000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
    fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
    fffff880`01000000 fffff880`0103a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
    fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
    fffff880`048bb000 fffff880`048c8000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
    fffff800`02ffb000 fffff800`03044000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
    fffff880`04142000 fffff880`04166000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
    fffff880`05770000 fffff880`05789000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
    fffff880`05e00000 fffff880`05e08080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
    fffff880`05762000 fffff880`05770000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
    fffff880`038dd000 fffff880`039a5000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
    fffff880`015f7000 fffff880`01600000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
    fffff880`00cd0000 fffff880`00cf0000   jraid    jraid.sys    Thu Oct 29 04:14:20 2009 (4AE94EDC)
    fffff880`03e46000 fffff880`03e55000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05789000 fffff880`05797000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff800`00bcf000 fffff800`00bd9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
    fffff880`03e64000 fffff880`03ea7000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
    fffff880`013dd000 fffff880`013f7000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
    fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
    fffff880`0572c000 fffff880`05731200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
    fffff880`057d5000 fffff880`057ea000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`057b2000 fffff880`057d5000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
    fffff880`00cf9000 fffff880`00d06000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
    fffff880`057a4000 fffff880`057b2000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
    fffff880`03e55000 fffff880`03e64000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
    fffff880`05797000 fffff880`057a4000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
    fffff880`00da7000 fffff880`00dc1000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`01890000 fffff880`018c1000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
    fffff880`0673a000 fffff880`0674a000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
    fffff880`039c3000 fffff880`039db000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
    fffff880`03800000 fffff880`0382d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
    fffff880`0382d000 fffff880`0387b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
    fffff880`0387b000 fffff880`0389e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
    fffff880`0192f000 fffff880`0193a000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
    fffff880`00f22000 fffff880`00f2c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
    fffff880`010a4000 fffff880`01102000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
    fffff880`02da3000 fffff880`02dae000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
    fffff880`015e5000 fffff880`015f7000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
    fffff880`014db000 fffff880`015cd000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
    fffff880`03f96000 fffff880`03fa2000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
    fffff880`03fa2000 fffff880`03fd1000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`05698000 fffff880`056ad000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
    fffff880`02d08000 fffff880`02d17000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff880`02c94000 fffff880`02cd9000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
    fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
    fffff880`0674a000 fffff880`0675f000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
    fffff880`0193a000 fffff880`0194b000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`02d97000 fffff880`02da3000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
    fffff800`02a1f000 fffff800`02ffb000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
    fffff880`0123a000 fffff880`013dd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
    fffff880`018c1000 fffff880`018ca000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
    fffff880`03ecd000 fffff880`03ee5000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
    fffff880`041a4000 fffff880`041d4000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
    fffff880`02ce2000 fffff880`02d08000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
    fffff880`00f6c000 fffff880`00f81000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
    fffff880`00f2c000 fffff880`00f5f000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`00ff2000 fffff880`00ff9000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
    fffff880`00cc0000 fffff880`00cd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
    fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
    fffff880`064d2000 fffff880`06578000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
    fffff880`056cd000 fffff880`0570a000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
    fffff880`00d06000 fffff880`00d1a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
    fffff880`03f72000 fffff880`03f96000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
    fffff880`03fd1000 fffff880`03fec000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
    fffff880`03e00000 fffff880`03e21000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
    fffff880`03e21000 fffff880`03e3b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
    fffff880`02d46000 fffff880`02d97000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
    fffff880`03e3b000 fffff880`03e46000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
    fffff880`01914000 fffff880`0191d000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`0191d000 fffff880`01926000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
    fffff880`01926000 fffff880`0192f000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
    fffff880`011c1000 fffff880`011fb000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
    fffff880`05600000 fffff880`05618000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
    fffff880`00d78000 fffff880`00da7000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
    fffff880`06578000 fffff880`06583000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
    fffff880`015dd000 fffff880`015e5000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
    fffff880`0675f000 fffff880`067d0000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
    fffff880`066a4000 fffff880`0673a000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
    fffff880`06400000 fffff880`06467000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
    fffff880`06583000 fffff880`065b0000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
    fffff880`051f7000 fffff880`051f8480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
    fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
    fffff880`065b0000 fffff880`065c2000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
    fffff880`01969000 fffff880`01976000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
    fffff880`0194b000 fffff880`01969000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
    fffff880`02d32000 fffff880`02d46000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
    fffff960`005a0000 fffff960`005aa000   TSDDD    TSDDD.dll    unavailable (00000000)
    fffff880`03ee9000 fffff880`03f0f000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
    fffff880`03ebb000 fffff880`03ecd000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
    fffff880`05745000 fffff880`05762000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
    fffff880`041d4000 fffff880`041d5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
    fffff880`041ee000 fffff880`041ff000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`041d6000 fffff880`041e3000   usbfilter usbfilter.sys Wed Oct 07 03:44:08 2009 (4ACC46C8)
    fffff880`0563e000 fffff880`05698000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
    fffff880`041e3000 fffff880`041ee000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
    fffff880`04865000 fffff880`048bb000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
    fffff880`00f5f000 fffff880`00f6c000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
    fffff880`018d1000 fffff880`018df000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
    fffff880`05e0c000 fffff880`05fbd000   viahduaa viahduaa.sys Tue Mar 02 06:30:18 2010 (4B8CF6CA)
    fffff880`018df000 fffff880`01904000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
    fffff880`05fbd000 fffff880`05fcb000   VMfilt64 VMfilt64.sys Thu Jul 30 23:40:32 2009 (4A7267B0)
    fffff880`015cd000 fffff880`015dd000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
    fffff880`00f81000 fffff880`00f96000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
    fffff880`00f96000 fffff880`00ff2000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
    fffff880`01175000 fffff880`011c1000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
    fffff880`02d17000 fffff880`02d32000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
    fffff880`01904000 fffff880`01914000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
    fffff880`00e0f000 fffff880`00eb3000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
    fffff880`00eb3000 fffff880`00ec2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
    fffff880`02cd9000 fffff880`02ce2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
    fffff960`000e0000 fffff960`003f0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
    fffff880`051c8000 fffff880`051d1000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
    fffff880`00f19000 fffff880`00f22000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
    fffff880`04800000 fffff880`04865000   yk62x64  yk62x64.sys  Mon Feb 15 10:46:41 2010 (4B796C61)
    
    Unloaded modules:
    fffff880`067d0000 fffff880`067d2000   MSTEE.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00002000
    fffff880`067d2000 fffff880`067d5000   MSKSSRV.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00003000
    fffff880`01830000 fffff880`0183e000   crashdmp.sys
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000E000
    fffff880`0183e000 fffff880`0184a000   dump_ataport
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  0000C000
    fffff880`0184a000 fffff880`01853000   dump_atapi.s
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00009000
    fffff880`01853000 fffff880`01866000   dump_dumpfve
        Timestamp: unavailable (00000000)
        Checksum:  00000000
        ImageSize:  00013000
    
    
     
  10. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    The two drivers you mention are up to date, there are no new updates available from the MB manufacturer.

    Sorry about not posting from CPU-Z, didn't see that was needed.

    Didn't find a pdf from the memory manufacturer, but heres a direct link; Dominator®
     

    Attached Files:

  11. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    The two drivers you mention are up to date, there are no new updates available from the MB manufacturer.

    Sorry about not posting from CPU-Z, didn't see that was needed.

    Didn't find a pdf from the memory manufacturer, but heres a direct link; Dominator®

    Maybe this is a double post, something happened while posting.
     

    Attached Files:

  12. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    It's needed every other time, that's why he made that thread sticky. In your case, the timing values are set wrong - this causes your freezes and sooner or later will cause you another BSOD.

    DDR 1066 Mhz
    Timing 7-7-7-20
    Voltage 1.5v

    DRAM options set on "Auto" in the bios almost always adjust themselves to the right values. If not, set them manually.
     
  13. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    Its that simple?

    I've reset and updated the BIOS already, so I guess [auto] doesn't fix it. I'll try to get the timings fixed manually.
     
  14. Antatra

    Antatra New Member

    Joined:
    Jan 23, 2011
    Messages:
    16
    Likes Received:
    0
    I did the timings right, but not sure about the "DDR 1066 Mhz"

    How can I check that? I thought I found it in the BIOS, and changed it from auto to 1066mhz.
     

    Attached Files:

  15. cybercore

    cybercore New Member

    Joined:
    Jul 7, 2009
    Messages:
    15,823
    Likes Received:
    321
    The settings look right now. Should be fine.
     

Share This Page

Loading...