BSODs caused by netio.sus and atikmdiag.sys?

#1
Hi

I've been having problems with hangs, freezes and BSODs for a while now.

Feels like I've tried everything, hope someone can help.

Hardware;
ASUS Crosshair IV Formula, Socket-AM3
XFX Radeon HD 4890 1GB "xXx" GDDR5
AMD Phenom II X4 955 Black Edition
Corsair Dominator DDR3 1600MHz 4GB CL9

Spare hardware I've also tested;
Gigabyte GA-MA790FXT-UD5P, Socket-AM3
Club3D HD3870 512 MB GDDR4 PCIe 2.0 OC

Software;
Win7 64bit Ultimate

What I've done so far;
Reinstalled Win7, both 64bit and 32bit.
Updated BIOS and all other drivers
Quite a few rounds of Memtest86+
Tested with spare hardware parts, see above.
Tested with various software for the CPU

My conclusion thus far;
I've reinstalled Win7 a lot of times, and so far I only got problems once I installed the Catalyst drivers for my graphics card.

Judging from the BSODs, which aren't always the same, there seems to be a problem with netio.sys and atikmdag.sys. I'm guessing they're interfering with each other in ways that cause the BSODs.

If theres anything else you need, let me know.

Thanks in advance.

Attaching some info files that were requested by the stickies. Can't seem to upload the memdump file, as its to big.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88004004e1e, fffff880038e7050, 0}

*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Page 103b05 not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : atikmpag.sys ( atikmpag+4e1e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88004004e1e, Address of the instruction which caused the bugcheck
Arg3: fffff880038e7050, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
atikmpag+4e1e
fffff880`04004e1e 488b9090010000  mov     rdx,qword ptr [rax+190h]

CONTEXT:  fffff880038e7050 -- (.cxr 0xfffff880038e7050)
rax=0000000000000001 rbx=fffff98017798780 rcx=fffff98017798780
rdx=0000000000000001 rsi=00000000c0000001 rdi=fffff8a002ef4058
rip=fffff88004004e1e rsp=fffff880038e7a30 rbp=0000000000000000
 r8=fffff8800516f6d0  r9=0000000000000520 r10=fffff80002a10000
r11=0000000000000000 r12=0000000000000001 r13=0000000000000002
r14=00000000001cfbb0 r15=00000000000a000a
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
atikmpag+0x4e1e:
fffff880`04004e1e 488b9090010000  mov     rdx,qword ptr [rax+190h] ds:002b:00000000`00000191=????????????????
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8800509fa69 to fffff88004004e1e

STACK_TEXT:  
fffff880`038e7a30 fffff880`0509fa69 : fffffa80`06723000 00000000`00000000 fffff980`17798780 00000000`00000018 : atikmpag+0x4e1e
fffff880`038e7a70 fffff880`050b4d7b : 00000000`00000010 fffff8a0`02ef4000 00000000`00000000 fffff8a0`02ef4058 : dxgkrnl!DXGADAPTER::DdiDestroyDevice+0x49
fffff880`038e7aa0 fffff880`050b467e : fffff8a0`02ef4000 fffff8a0`02ef4068 00000000`00000000 fffff8a0`02ef4068 : dxgkrnl!DXGDEVICE::Destroy+0xcf
fffff880`038e7ae0 fffff880`05099815 : 00000000`fffffeda fffff8a0`06c9fb40 fffff880`038e7ca0 fffffa80`06723000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x1aa
fffff880`038e7b50 fffff880`050b57de : fffffa80`059d5400 fffffa80`059d5400 00000000`028af088 fffff8a0`02ef4000 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`038e7b80 fffff960`0025b2d2 : 00000000`00000020 00000000`00010246 00000000`000007da 00000000`00000000 : dxgkrnl!DxgkDestroyDevice+0x1f6
fffff880`038e7bf0 fffff800`02a81153 : 00000000`029c1e00 fffff880`038e7ca0 00000000`029c2030 00000000`7392cd10 : win32k!NtGdiDdDDIDestroyDevice+0x12
fffff880`038e7c20 000007fe`fd36bf1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`028aef78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fd36bf1a


FOLLOWUP_IP: 
atikmpag+4e1e
fffff880`04004e1e 488b9090010000  mov     rdx,qword ptr [rax+190h]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  atikmpag+4e1e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmpag

IMAGE_NAME:  atikmpag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4cef188f

STACK_COMMAND:  .cxr 0xfffff880038e7050 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRF_atikmpag+4e1e

BUCKET_ID:  X64_0x3B_VRF_atikmpag+4e1e

Followup: MachineOwner
---------

1: kd> lmvm atikmpag
start             end                 module name
fffff880`04000000 fffff880`0404c000   atikmpag   (no symbols)           
    Loaded symbol image file: atikmpag.sys
    Image path: \SystemRoot\system32\DRIVERS\atikmpag.sys
    Image name: atikmpag.sys
    Timestamp:        Fri Nov 26 03:16:47 2010 (4CEF188F)
    CheckSum:         0004F92A
    ImageSize:        0004C000
    File version:     8.14.1.6170
    Product version:  8.14.1.6170
    File flags:       8 (Mask 3F) Private
    File OS:          40004 NT Win32
    File type:        3.4 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    CompanyName:      Advanced Micro Devices, Inc.
    ProductName:      AMD driver
    InternalName:     atikmpag.sys
    OriginalFilename: atikmpag.sys
    ProductVersion:   8.14.01.6170
    FileVersion:      8.14.01.6170
    FileDescription:  AMD multi-vendor Miniport Driver
    LegalCopyright:   Copyright (C) 2007 Advanced Micro Devices, Inc.
 


Attachments

Last edited:
#2
You didn't attach any crash dumps from C:\Windows\Minidump.

Your blue screens are caused by two things:

1 - Catalyst 10.12 Preview (atiamdag.sys)
2 - AVG + ZoneAlarm (netio.sys)


~~~~~~~


1. Uninstall Catalyst 10.12 Preview with the use of the Driver Sweeper:

AMD Game Forums - 10.12 blue screen error problem

Guru3D - Driver Sweeper


2. Install a more stable Catalyst 10.3 - 10.11, or 11.1:

AMD Catalyst 11.1a Hotfix (BETA 8.82.2) download from Guru3D.com



3. Uninstall AVG:

AVG - Download tools



4. Uninstall ZoneAlarm


5. Install MSE

https://www.microsoft.com/security_essentials/


6. Update old drivers:

Code:
Adaptec
arc                    Kernel        24.05.2007

Broadcom
Broadcom NetXtreme II  Kernel        31.12.2008  
Broadcom NetXtreme Gig Kernel        26.04.2009 

Brother Printer
Brother USB Mass-Stora Kernel        07.08.2006

Intel/ICP Raid Storport Driver
iirsp                  Kernel        13.12.2005

Intel Matrix Storage
iaStorV                Kernel        08.04.2009

Emulex LightPulse Storport Miniport Driver
elxstor                Kernel        03.02.2009

Hauppauge WinTV 885 Consumer IR Driver
Hauppauge Consumer Inf Kernel        11.05.2009
 


#3
I'll do a full reinstall of Win7 again, just to do it right. Then don't install AVG and Zone Alarm, and install the drivers and MSE you linked to.

Thanks.

Oh and by the way.

The old drivers you've posted. I've just downloaded the new version of everything I can think of. The rest must be drivers installed by Win7. Not sure how to update those, unless windows update does that.
 


Last edited:
#5
So I reinstalled Win7, just to get a clean start. Installed the drivers you linked to and MSE. Not installing AVG or ZoneAlarm.

Started Driver verifier on netio.sys and atikmdag.sys and got another BSOD soon after that.

Adding minidumps and system info.

Also tried the link to the Intel site, and it didn't help very much.

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {168, 2, 0, fffff880015a2325}

Probably caused by : NETIO.SYS ( NETIO!StreamGetCalloutContext+115 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000168, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880015a2325, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS:  0000000000000168 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!StreamGetCalloutContext+115
fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff880074af550 -- (.trap 0xfffff880074af550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffc0000017 rbx=0000000000000000 rcx=fffff880015babc0
rdx=fffff880015ba358 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880015a2325 rsp=fffff880074af6e0 rbp=fffff880074af7f8
 r8=00000000c0000017  r9=fffff880015b3a10 r10=fffff880074b0290
r11=fffff880074af640 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETIO!StreamGetCalloutContext+0x115:
fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0 ds:7453:0168=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8cca9 to fffff80002a8d740

STACK_TEXT:  
fffff880`074af408 fffff800`02a8cca9 : 00000000`0000000a 00000000`00000168 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`074af410 fffff800`02a8b920 : fffffa80`00000000 00000000`00000000 00000000`0000000d fffff800`02b50c2b : nt!KiBugCheckDispatch+0x69
fffff880`074af550 fffff880`015a2325 : 00000000`00000000 fffff880`074af800 00000000`0000000b 00000000`0000000b : nt!KiPageFault+0x260
fffff880`074af6e0 fffff880`015a5a06 : fffff880`074afe80 00000000`00000014 fffff880`074af818 fffff980`00000004 : NETIO!StreamGetCalloutContext+0x115
fffff880`074af750 fffff880`015a899a : fffff880`074afe80 fffff980`0635af80 00000000`00000000 fffff880`0000000c : NETIO!StreamGetCalloutAndDataContexts+0x66
fffff880`074af7c0 fffff880`015894fa : fffff880`074afa20 fffff880`0676ce4c fffff880`00000000 fffff880`074b0014 : NETIO!StreamProcessCallout+0xca
fffff880`074af8b0 fffff880`01572619 : fffff880`015c0014 fffff880`074aff80 fffffa80`04bace08 fffff880`074afe80 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`074af9d0 fffff880`01573bb1 : fffff880`074a0014 fffff880`074aff80 fffff880`074b0010 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`074afaa0 fffff880`015abad4 : fffff880`074b0250 fffff880`074aff80 fffff980`00000001 fffff880`074afe80 : NETIO!KfdClassify+0x934
fffff880`074afe10 fffff880`015abf48 : fffffa80`04bacdb0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`074aff30 fffff880`015ac667 : fffff980`232e0e20 fffff980`23294f80 fffff880`074b0500 fffff880`074b0300 : NETIO!StreamCommonInspect+0x228
fffff880`074b0210 fffff880`01708b94 : fffffa80`04bacdb0 fffff880`074b05b0 00000000`00000000 fffff880`074b0014 : NETIO!WfpStreamInspectSend+0x117
fffff880`074b0290 fffff880`01677c9a : fffffa80`04b8c4e0 fffffa80`06831060 00000000`00000000 fffffa80`04b8c4e0 : tcpip!InetInspectSend+0x34
fffff880`074b02c0 fffff880`01677e7b : fffff8a0`02be8000 fffff8a0`02fb4000 fffffa80`06831060 fffff8a0`098eb000 : tcpip!TcpEnqueueTcbSend+0x2aa
fffff880`074b0360 fffff800`02a9ce5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`074b0390 fffff880`0167ddaa : fffff880`01677e60 fffff880`074b04a0 00000000`00000000 fffff880`02ccc6ac : nt!KeExpandKernelStackAndCalloutEx+0xda
fffff880`074b0470 fffff880`02ce467b : fffffa80`06a93a00 fffff880`074b0ca0 00000000`00000134 fffffa80`068b93b0 : tcpip!TcpTlConnectionSend+0x7a
fffff880`074b04e0 fffff880`02ccb423 : fffffa80`067c4eb0 fffffa80`067c44e0 fffff800`02a99b25 fffff880`074b0698 : afd!AfdFastConnectionSend+0x38b
fffff880`074b06a0 fffff800`02da8473 : 00000000`00000134 fffffa80`05aa2f20 00000000`0373abf8 fffffa80`06937501 : afd!AfdFastIoDeviceControl+0x413
fffff880`074b0a10 fffff800`02da8f66 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0373abf8 : nt!IopXxxControlFile+0x373
fffff880`074b0b40 fffff800`02a8c993 : 80000201`00000000 000007fe`fa8279f0 00000000`035b2378 00000000`00007530 : nt!NtDeviceIoControlFile+0x56
fffff880`074b0bb0 00000000`7790fdca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0133f4e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7790fdca


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!StreamGetCalloutContext+115
fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!StreamGetCalloutContext+115

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115

BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115

Followup: MachineOwner
---------

1: kd> lmvm NETIO
start             end                 module name
fffff880`0156c000 fffff880`015cc000   NETIO      (pdb symbols)          c:\symbols\netio.pdb\8422557063CC44C8B9525A086FA98C032\netio.pdb
    Loaded symbol image file: NETIO.SYS
    Image path: \SystemRoot\system32\drivers\NETIO.SYS
    Image name: NETIO.SYS
    Timestamp:        Fri Apr 09 04:43:59 2010 (4BBE946F)
    CheckSum:         0005CFA1
    ImageSize:        00060000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
Got one more, this time it was atikmdag.sys

Code:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff880049799f3, fffff88002ae2810, 0}

*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Page 11801b not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : atikmdag.sys ( atikmdag+ad9f3 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880049799f3, Address of the instruction which caused the bugcheck
Arg3: fffff88002ae2810, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
atikmdag+ad9f3
fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]

CONTEXT:  fffff88002ae2810 -- (.cxr 0xfffff88002ae2810)
rax=0000000000000000 rbx=fffff98004bee3c0 rcx=fffff9800145cff5
rdx=0000067ffeba3010 rsi=fffff98004bee3c0 rdi=fffff98004bee3c0
rip=fffff880049799f3 rsp=fffff88002ae31e8 rbp=0000000000000000
 r8=0000000000000006  r9=0000000000000000 r10=0000000000000000
r11=fffff9800145cff0 r12=0000000000000000 r13=fffff980054ea470
r14=0000000000000000 r15=fffff980054ea470
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
atikmdag+0xad9f3:
fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx] ds:002b:00000000`00000005=??
Resetting default scope

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  atieclxx.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff88004960880 to fffff880049799f3

STACK_TEXT:  
fffff880`02ae31e8 fffff880`04960880 : 00000000`00000000 fffff880`02ae3430 fffff980`04acc440 fffff980`054ea470 : atikmdag+0xad9f3
fffff880`02ae31f0 fffff880`04968712 : fffff980`04bee3c0 00000000`00000000 fffff980`04bee3c0 00000000`00000001 : atikmdag+0x94880
fffff880`02ae3250 fffff880`0494c6fe : 00000000`00000000 fffff980`04acc4f0 fffff980`04acc440 fffff980`054ea470 : atikmdag+0x9c712
fffff880`02ae3280 fffff880`04956b36 : fffff880`02ae3430 fffff980`054ea470 00000000`00000001 fffff980`04acc460 : atikmdag+0x806fe
fffff880`02ae32c0 fffff880`04904d0a : fffff980`02e92f90 fffff980`02e92f90 fffff880`02ae3430 00000000`00000019 : atikmdag+0x8ab36
fffff880`02ae3320 fffff880`03f2e3bc : 00000000`00000000 fffff880`02ae3430 fffff980`02fa4f40 00000000`00000001 : atikmdag+0x38d0a
fffff880`02ae3360 fffff880`03f2b564 : 00000000`00000000 00000000`00000000 fffff880`02ae3430 fffff6fb`7e280028 : atikmpag+0xa3bc
fffff880`02ae33a0 fffff880`0403d38a : fffff6fb`7dbf1400 00000000`00000000 fffff880`02ae3430 00000000`00000001 : atikmpag+0x7564
fffff880`02ae33d0 fffff880`0409ec03 : fffff8a0`091fe9c0 00000000`00000001 fffff880`02ae3400 fffffa80`064a4000 : dxgkrnl!DXGADAPTER::DdiIsSupportedVidPn+0x116
fffff880`02ae3410 fffff880`0409efa6 : 00000000`00000002 00000000`00000001 00000000`00000001 fffff8a0`091fea20 : dxgkrnl!VIDPN_MGR::_IsSupportedVidPn+0x157
fffff880`02ae3460 fffff880`0409f446 : fffff8a0`091fea20 fffff8a0`091fea20 00000000`00000000 fffff8a0`091fea58 : dxgkrnl!VIDPN_MGR::FormalizeVidPnChange+0xa6
fffff880`02ae34c0 fffff880`0409f859 : fffffa80`06135e00 00000000`00000001 ffffffff`ffffffff fffff8a0`091fe810 : dxgkrnl!VIDPN_MGR::_AddPathToVidPnTopology+0x236
fffff880`02ae3580 fffff880`040dc1fa : fffff8a0`00adf630 fffff8a0`00000001 fffffa80`06135e00 00000000`00000000 : dxgkrnl!VIDPN_MGR::AddPathToVidPnTopology+0x279
fffff880`02ae35f0 fffff880`04066b5d : 00000000`00000000 fffffa80`05c421a8 fffffa80`00000105 00000000`00000018 : dxgkrnl!CCD_BTL::_FillTopology+0x94e
fffff880`02ae36e0 fffff880`040d9c91 : 00000000`00000000 00000000`00000010 fffff8a0`0048ebb0 fffff800`63644356 : dxgkrnl!DXGGLOBAL::IterateAdaptersWithCallback+0x71
fffff880`02ae3740 fffff880`0407e281 : 00000000`00000010 00000000`00000010 00000000`00000000 00000000`00000000 : dxgkrnl!CCD_BTL::RetrieveAllPaths+0x9d
fffff880`02ae37c0 fffff880`0407f250 : fffff900`c28590e0 fffff900`c28590e0 fffff880`02ae3a20 00000000`00000000 : dxgkrnl!DxgkGetPathsModality+0x1f9
fffff880`02ae3930 fffff880`0407f338 : fffff900`c28590e0 fffff880`02ae3bb0 fffff880`03c5f000 00000000`0000000c : dxgkrnl!GetRequestedPathsModality+0xdc
fffff880`02ae39c0 fffff960`0029e142 : 00000000`79737355 fffff880`02ae3ae8 00000000`0000000c 00000000`00000008 : dxgkrnl!DxgkQueryDisplayConfig+0x90
fffff880`02ae3a20 fffff960`001c0dd3 : 00000000`ffffc84a fffff880`02ae3bb0 00000000`00000001 fffff800`02a9b772 : win32k!DrvQueryDisplayConfig+0x132
fffff880`02ae3ab0 fffff800`02a8e993 : 00000000`0000000c fffffa80`0687e160 00000000`00487700 00000000`0283f958 : win32k!NtUserQueryDisplayConfig+0x293
fffff880`02ae3bb0 00000000`76fc729a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0283f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fc729a


FOLLOWUP_IP: 
atikmdag+ad9f3
fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  atikmdag+ad9f3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d2e78a0

STACK_COMMAND:  .cxr 0xfffff88002ae2810 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3

BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3

Followup: MachineOwner
---------
 


Attachments

Last edited:
#7
Also tried the link to the Intel site, and it didn't help very much.
Run Intel Driver Update Utility in Internet Explorer, let the utility install and find the downloads for you. Download and install them all.



Started Driver verifier on netio.sys and atikmdag.sys and got another BSOD soon after that.

Adding minidumps and system info.
Why did you turn it on? It was not a good idea, driver verifier will be crashing you non-stop so disable it -> Run > verifier /reset > reboot.
 


#8
Elmer;

For some reason the installation failed because my computer didn't meet the minimum system requirements.

cybercore;

I ran the program in IE, bit still it just gave me a "This device is unknown or unsupported. Please contact the manufacturer for possible updates."

I enabled Driver Verifier so that I could stress test the drivers. Unless I enable Driver Verifier the system just freeze up, without a BSOD, and I don't get any minidumps or anything.

As I've said, I downloaded all the new drivers from the motherboard manufacturer, so I don't see which drivers I would be missing? I've taken out every other piece of hardware that doesn't need to be there. So I guessed that with new MB drivers and graphics drivers I would be good.

Turned off Driver Verifier now, not yet had a system freeze, but it takes a while when Driver Verifier is off.

Thanks for all the help so far.
 


#9
1. http://windows7forums.com/blue-scre...mportant-every-thread-starter-please-see.html

MEMORY and SPD tabs for each slot.
Give me these links or maybe pdf files with: your RAM sticks description + motherboard description.




2. Update these:

VIA Audio
VMfilt64.sys Thu Jul 30 23:40:32 2009

JMicron RAID
jraid.sys Thu Oct 29 04:14:20 2009





Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\012411-24819-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Sun Jan 23 14:47:03.900 2011 (UTC - 5:00)
System Uptime: 0 days 0:12:16.663
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {168, 2, 0, fffff880015a2325}

Probably caused by : NETIO.SYS ( NETIO!StreamGetCalloutContext+115 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000168, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880015a2325, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
 0000000000000168 

CURRENT_IRQL:  2

FAULTING_IP: 
NETIO!StreamGetCalloutContext+115
fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0xD1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff880074af550 -- (.trap 0xfffff880074af550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffc0000017 rbx=0000000000000000 rcx=fffff880015babc0
rdx=fffff880015ba358 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880015a2325 rsp=fffff880074af6e0 rbp=fffff880074af7f8
 r8=00000000c0000017  r9=fffff880015b3a10 r10=fffff880074b0290
r11=fffff880074af640 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
NETIO!StreamGetCalloutContext+0x115:
fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0 ds:7453:00000000`00000168=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a8cca9 to fffff80002a8d740

STACK_TEXT:  
fffff880`074af408 fffff800`02a8cca9 : 00000000`0000000a 00000000`00000168 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`074af410 fffff800`02a8b920 : fffffa80`00000000 00000000`00000000 00000000`0000000d fffff800`02b50c2b : nt!KiBugCheckDispatch+0x69
fffff880`074af550 fffff880`015a2325 : 00000000`00000000 fffff880`074af800 00000000`0000000b 00000000`0000000b : nt!KiPageFault+0x260
fffff880`074af6e0 fffff880`015a5a06 : fffff880`074afe80 00000000`00000014 fffff880`074af818 fffff980`00000004 : NETIO!StreamGetCalloutContext+0x115
fffff880`074af750 fffff880`015a899a : fffff880`074afe80 fffff980`0635af80 00000000`00000000 fffff880`0000000c : NETIO!StreamGetCalloutAndDataContexts+0x66
fffff880`074af7c0 fffff880`015894fa : fffff880`074afa20 fffff880`0676ce4c fffff880`00000000 fffff880`074b0014 : NETIO!StreamProcessCallout+0xca
fffff880`074af8b0 fffff880`01572619 : fffff880`015c0014 fffff880`074aff80 fffffa80`04bace08 fffff880`074afe80 : NETIO! ?? ::FNODOBFM::`string'+0x71e2
fffff880`074af9d0 fffff880`01573bb1 : fffff880`074a0014 fffff880`074aff80 fffff880`074b0010 fffff880`00000000 : NETIO!ArbitrateAndEnforce+0x2a9
fffff880`074afaa0 fffff880`015abad4 : fffff880`074b0250 fffff880`074aff80 fffff980`00000001 fffff880`074afe80 : NETIO!KfdClassify+0x934
fffff880`074afe10 fffff880`015abf48 : fffffa80`04bacdb0 00000000`00000014 00000000`00000000 00000000`00000000 : NETIO!StreamClassify+0x104
fffff880`074aff30 fffff880`015ac667 : fffff980`232e0e20 fffff980`23294f80 fffff880`074b0500 fffff880`074b0300 : NETIO!StreamCommonInspect+0x228
fffff880`074b0210 fffff880`01708b94 : fffffa80`04bacdb0 fffff880`074b05b0 00000000`00000000 fffff880`074b0014 : NETIO!WfpStreamInspectSend+0x117
fffff880`074b0290 fffff880`01677c9a : fffffa80`04b8c4e0 fffffa80`06831060 00000000`00000000 fffffa80`04b8c4e0 : tcpip!InetInspectSend+0x34
fffff880`074b02c0 fffff880`01677e7b : fffff8a0`02be8000 fffff8a0`02fb4000 fffffa80`06831060 fffff8a0`098eb000 : tcpip!TcpEnqueueTcbSend+0x2aa
fffff880`074b0360 fffff800`02a9ce5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!TcpTlConnectionSendCalloutRoutine+0x1b
fffff880`074b0390 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutEx+0xda


STACK_COMMAND:  kb

FOLLOWUP_IP: 
NETIO!StreamGetCalloutContext+115
fffff880`015a2325 4883bb6801000000 cmp     qword ptr [rbx+168h],0

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  NETIO!StreamGetCalloutContext+115

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  4bbe946f

FAILURE_BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115

BUCKET_ID:  X64_0xD1_VRF_NETIO!StreamGetCalloutContext+115

Followup: MachineOwner
---------
















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\DMP\012411-25287-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1f000 PsLoadedModuleList = 0xfffff800`02c5ce50
Debug session time: Sun Jan 23 19:25:06.449 2011 (UTC - 5:00)
System Uptime: 0 days 0:08:01.212
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff880049799f3, fffff88002ae2810, 0}

Probably caused by : atikmdag.sys ( atikmdag+ad9f3 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880049799f3, Address of the instruction which caused the bugcheck
Arg3: fffff88002ae2810, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
atikmdag+ad9f3
fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]

CONTEXT:  fffff88002ae2810 -- (.cxr 0xfffff88002ae2810)
rax=0000000000000000 rbx=fffff98004bee3c0 rcx=fffff9800145cff5
rdx=0000067ffeba3010 rsi=fffff98004bee3c0 rdi=fffff98004bee3c0
rip=fffff880049799f3 rsp=fffff88002ae31e8 rbp=0000000000000000
 r8=0000000000000006  r9=0000000000000000 r10=0000000000000000
r11=fffff9800145cff0 r12=0000000000000000 r13=fffff980054ea470
r14=0000000000000000 r15=fffff980054ea470
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
atikmdag+0xad9f3:
fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx] ds:002b:00000000`00000005=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  0x3B

PROCESS_NAME:  atieclxx.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff880049799f3

STACK_TEXT:  
fffff880`02ae31e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmdag+0xad9f3


FOLLOWUP_IP: 
atikmdag+ad9f3
fffff880`049799f3 8a040a          mov     al,byte ptr [rdx+rcx]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  atikmdag+ad9f3

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d2e78a0

STACK_COMMAND:  .cxr 0xfffff88002ae2810 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3

BUCKET_ID:  X64_0x3B_VRF_atikmdag+ad9f3

Followup: MachineOwner
---------



Drivers:

Code:
fffff880`04166000 fffff880`041a4000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00ec2000 fffff880`00f19000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`01976000 fffff880`01a00000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`051e1000 fffff880`051f7000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`03ea7000 fffff880`03ebb000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`03f0f000 fffff880`03f24000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`00deb000 fffff880`00df6000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`04000000 fffff880`04008000   ASACPI   ASACPI.sys   Sun Mar 27 22:30:36 2005 (42476C4C)
fffff880`00e00000 fffff880`00e09000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc1000 fffff880`00deb000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`056ad000 fffff880`056cd000   AtihdW76 AtihdW76.sys Wed Nov 17 07:02:04 2010 (4CE3C43C)
fffff880`048cc000 fffff880`051c8000   atikmdag atikmdag.sys Wed Jan 12 22:59:28 2011 (4D2E78A0)
fffff880`03f24000 fffff880`03f72000   atikmpag atikmpag.sys Wed Jan 12 22:20:37 2011 (4D2E6F85)
fffff880`018ca000 fffff880`018d1000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`02ddb000 fffff880`02dec000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`039a5000 fffff880`039c3000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00790000 fffff960`007b7000   cdd      cdd.dll      Wed May 19 15:48:26 2010 (4BF4408A)
fffff880`01866000 fffff880`01890000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01800000 fffff880`01830000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d1a000 fffff880`00d78000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01102000 fffff880`01175000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`051d1000 fffff880`051e1000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05fcb000 fffff880`05fd9000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`02c00000 fffff880`02c83000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`02dbd000 fffff880`02ddb000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`02dae000 fffff880`02dbd000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0121b000 fffff880`01231000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0570a000 fffff880`0572c000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05fe5000 fffff880`05fee000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05fd9000 fffff880`05fe5000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`05732000 fffff880`05745000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05fee000 fffff880`05ffa000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`04008000 fffff880`040fc000   dxgkrnl  dxgkrnl.sys  Thu Oct 01 21:00:14 2009 (4AC5509E)
fffff880`040fc000 fffff880`04142000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`01090000 fffff880`010a4000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01044000 fffff880`01090000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01211000 fffff880`0121b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01000000 fffff880`0103a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`048bb000 fffff880`048c8000   GEARAspiWDM GEARAspiWDM.sys Mon May 18 08:17:04 2009 (4A1151C0)
fffff800`02ffb000 fffff800`03044000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04142000 fffff880`04166000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`05770000 fffff880`05789000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`05e00000 fffff880`05e08080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05762000 fffff880`05770000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`038dd000 fffff880`039a5000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`015f7000 fffff880`01600000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`00cd0000 fffff880`00cf0000   jraid    jraid.sys    Thu Oct 29 04:14:20 2009 (4AE94EDC)
fffff880`03e46000 fffff880`03e55000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05789000 fffff880`05797000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bcf000 fffff800`00bd9000   kdcom    kdcom.dll    Mon Jul 13 21:31:07 2009 (4A5BDFDB)
fffff880`03e64000 fffff880`03ea7000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013dd000 fffff880`013f7000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`0572c000 fffff880`05731200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`057d5000 fffff880`057ea000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`057b2000 fffff880`057d5000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cf9000 fffff880`00d06000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`057a4000 fffff880`057b2000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`03e55000 fffff880`03e64000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05797000 fffff880`057a4000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00da7000 fffff880`00dc1000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`01890000 fffff880`018c1000   MpFilter MpFilter.sys Tue Sep 14 20:19:28 2010 (4C901110)
fffff880`0673a000 fffff880`0674a000   MpNWMon  MpNWMon.sys  Tue Sep 14 20:19:30 2010 (4C901112)
fffff880`039c3000 fffff880`039db000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03800000 fffff880`0382d000   mrxsmb   mrxsmb.sys   Sat Feb 27 02:52:19 2010 (4B88CF33)
fffff880`0382d000 fffff880`0387b000   mrxsmb10 mrxsmb10.sys Sat Feb 27 02:52:28 2010 (4B88CF3C)
fffff880`0387b000 fffff880`0389e000   mrxsmb20 mrxsmb20.sys Sat Feb 27 02:52:26 2010 (4B88CF3A)
fffff880`0192f000 fffff880`0193a000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f22000 fffff880`00f2c000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`010a4000 fffff880`01102000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`02da3000 fffff880`02dae000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`015e5000 fffff880`015f7000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014db000 fffff880`015cd000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`03f96000 fffff880`03fa2000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`03fa2000 fffff880`03fd1000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05698000 fffff880`056ad000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02d08000 fffff880`02d17000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c94000 fffff880`02cd9000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Thu Apr 08 22:43:59 2010 (4BBE946F)
fffff880`0674a000 fffff880`0675f000   NisDrvWFP NisDrvWFP.sys Tue Sep 14 20:20:25 2010 (4C901149)
fffff880`0193a000 fffff880`0194b000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`02d97000 fffff880`02da3000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a1f000 fffff800`02ffb000   nt       ntkrnlmp.exe Sat Jun 19 00:16:41 2010 (4C1C44A9)
fffff880`0123a000 fffff880`013dd000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018c1000 fffff880`018ca000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`03ecd000 fffff880`03ee5000   nusb3hub nusb3hub.sys Thu Apr 22 21:34:35 2010 (4BD0F92B)
fffff880`041a4000 fffff880`041d4000   nusb3xhc nusb3xhc.sys Thu Apr 22 21:34:36 2010 (4BD0F92C)
fffff880`02ce2000 fffff880`02d08000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00f6c000 fffff880`00f81000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f2c000 fffff880`00f5f000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00ff2000 fffff880`00ff9000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00cc0000 fffff880`00cd0000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`01200000 fffff880`01211000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`064d2000 fffff880`06578000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`056cd000 fffff880`0570a000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00d06000 fffff880`00d1a000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`03f72000 fffff880`03f96000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`03fd1000 fffff880`03fec000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`03e00000 fffff880`03e21000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`03e21000 fffff880`03e3b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`02d46000 fffff880`02d97000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`03e3b000 fffff880`03e46000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01914000 fffff880`0191d000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`0191d000 fffff880`01926000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01926000 fffff880`0192f000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`011c1000 fffff880`011fb000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`05600000 fffff880`05618000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`00d78000 fffff880`00da7000   SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)
fffff880`06578000 fffff880`06583000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`015dd000 fffff880`015e5000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`0675f000 fffff880`067d0000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`066a4000 fffff880`0673a000   srv      srv.sys      Thu Aug 26 23:38:00 2010 (4C773318)
fffff880`06400000 fffff880`06467000   srv2     srv2.sys     Thu Aug 26 23:37:46 2010 (4C77330A)
fffff880`06583000 fffff880`065b0000   srvnet   srvnet.sys   Thu Aug 26 23:37:24 2010 (4C7732F4)
fffff880`051f7000 fffff880`051f8480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01600000 fffff880`017fd000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`065b0000 fffff880`065c2000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`01969000 fffff880`01976000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`0194b000 fffff880`01969000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02d32000 fffff880`02d46000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`005a0000 fffff960`005aa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`03ee9000 fffff880`03f0f000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03ebb000 fffff880`03ecd000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`05745000 fffff880`05762000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`041d4000 fffff880`041d5f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`041ee000 fffff880`041ff000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`041d6000 fffff880`041e3000   usbfilter usbfilter.sys Wed Oct 07 03:44:08 2009 (4ACC46C8)
fffff880`0563e000 fffff880`05698000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`041e3000 fffff880`041ee000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`04865000 fffff880`048bb000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f5f000 fffff880`00f6c000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`018d1000 fffff880`018df000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`05e0c000 fffff880`05fbd000   viahduaa viahduaa.sys Tue Mar 02 06:30:18 2010 (4B8CF6CA)
fffff880`018df000 fffff880`01904000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`05fbd000 fffff880`05fcb000   VMfilt64 VMfilt64.sys Thu Jul 30 23:40:32 2009 (4A7267B0)
fffff880`015cd000 fffff880`015dd000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00f81000 fffff880`00f96000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00f96000 fffff880`00ff2000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01175000 fffff880`011c1000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`02d17000 fffff880`02d32000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01904000 fffff880`01914000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e0f000 fffff880`00eb3000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eb3000 fffff880`00ec2000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02cd9000 fffff880`02ce2000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000e0000 fffff960`003f0000   win32k   win32k.sys   Tue Oct 19 23:08:46 2010 (4CBE5D3E)
fffff880`051c8000 fffff880`051d1000   wmiacpi  wmiacpi.sys  Mon Jul 13 19:31:02 2009 (4A5BC3B6)
fffff880`00f19000 fffff880`00f22000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`04800000 fffff880`04865000   yk62x64  yk62x64.sys  Mon Feb 15 10:46:41 2010 (4B796C61)

Unloaded modules:
fffff880`067d0000 fffff880`067d2000   MSTEE.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00002000
fffff880`067d2000 fffff880`067d5000   MSKSSRV.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00003000
fffff880`01830000 fffff880`0183e000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`0183e000 fffff880`0184a000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`0184a000 fffff880`01853000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`01853000 fffff880`01866000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 


#10
The two drivers you mention are up to date, there are no new updates available from the MB manufacturer.

Sorry about not posting from CPU-Z, didn't see that was needed.

Didn't find a pdf from the memory manufacturer, but heres a direct link; Dominator®
 


Attachments

#11
The two drivers you mention are up to date, there are no new updates available from the MB manufacturer.

Sorry about not posting from CPU-Z, didn't see that was needed.

Didn't find a pdf from the memory manufacturer, but heres a direct link; Dominator®

Maybe this is a double post, something happened while posting.
 


Attachments

#12
Sorry about not posting from CPU-Z, didn't see that was needed.
It's needed every other time, that's why he made that thread sticky. In your case, the timing values are set wrong - this causes your freezes and sooner or later will cause you another BSOD.

DDR 1066 Mhz
Timing 7-7-7-20
Voltage 1.5v

DRAM options set on "Auto" in the bios almost always adjust themselves to the right values. If not, set them manually.
 


#13
Its that simple?

I've reset and updated the BIOS already, so I guess [auto] doesn't fix it. I'll try to get the timings fixed manually.
 


#14
I did the timings right, but not sure about the "DDR 1066 Mhz"

How can I check that? I thought I found it in the BIOS, and changed it from auto to 1066mhz.
 


Attachments

#15
The settings look right now. Should be fine.
 


This website is not affiliated, owned, or endorsed by Microsoft Corporation. It is a member of the Microsoft Partner Program.
Top