Windows 7 Unexpected BSOD results in Multiple Crash Dumps

Modifyinc

New Member
Joined
Jul 7, 2013
Messages
4
Hello everyone,

I have recently had a few crash dumps appear in my c:\windows\minidump.

I am uploading them here, for those who may wish to review them.

I am following the instructions as outlined in the youtube video: BSOD, Crash Dump, and Minidump Analysis created by Windows7Forums.

I also have the Memory.dmp but it is 469 MB, so I will not be uploading it.

The majority of the minidumps are 0A and 1E.

Dell Inspiron 5520 running Windows 7 Home Premium 64-Bit.

Link Removed
Link Removed
Link Removed
Link Removed
Link Removed
Link Removed
Link Removed
Link Removed
Link Removed
Link Removed
Link Removed
 


Solution
Hello there!

There are lot of random crashes with different Bugcheck which mostly refers to Hardware. Let's run a Hardware Diagnostic Hardware Diagnostic | Captain Debugger both RAM & Hard drive.

Then reinstall your Network Drivers completely. Run SFC Scannow to rule out any corrupted file systems. SFC /SCANNOW to Repair Windows 7 Files | Captain Debugger

Code:
DRIVER_POWER_STATE_FAILURE (9f)A driver has failed to complete a power IRP within a specific time (usually 10 minutes).
Arguments:
Arg1: 0000000000000004, The power transition timed out waiting to synchronize with the Pnp
	subsystem.
Arg2: 0000000000000258, Timeout in seconds.
Arg3: fffffa8007022660, The thread currently holding on to the Pnp lock.
Arg4...
Hello there!

There are lot of random crashes with different Bugcheck which mostly refers to Hardware. Let's run a Hardware Diagnostic Hardware Diagnostic | Captain Debugger both RAM & Hard drive.

Then reinstall your Network Drivers completely. Run SFC Scannow to rule out any corrupted file systems. SFC /SCANNOW to Repair Windows 7 Files | Captain Debugger

Code:
DRIVER_POWER_STATE_FAILURE (9f)A driver has failed to complete a power IRP within a specific time (usually 10 minutes).
Arguments:
Arg1: 0000000000000004, The power transition timed out waiting to synchronize with the Pnp
	subsystem.
Arg2: 0000000000000258, Timeout in seconds.
Arg3: fffffa8007022660, The thread currently holding on to the Pnp lock.
Arg4: fffff800047fd3d0, nt!TRIAGE_9F_PNP on Win7


Debugging Details:
------------------


Implicit thread is now fffffa80`07022660


DRVPOWERSTATE_SUBCODE:  4


CUSTOMER_CRASH_COUNT:  1


DEFAULT_BUCKET_ID:  WIN7_DRIVER_FAULT


BUGCHECK_STR:  0x9F


PROCESS_NAME:  System


CURRENT_IRQL:  2


LAST_CONTROL_TRANSFER:  from fffff80002e74652 to fffff80002e81b8a


STACK_TEXT:  
fffff880`033b5cf0 fffff800`02e74652 : fffffa80`07022660 fffffa80`07022660 00000000`00000000 00000000`00000000 : nt!KiSwapContext+0x7a
fffff880`033b5e30 fffff800`02e85a9f : fffffa80`0c13d290 fffffa80`0c13d290 fffffa80`00000000 fffff880`01a1124c : nt!KiCommitThreadWait+0x1d2
fffff880`033b5ec0 fffff800`02eda5c6 : 00000000`00000000 fffffa80`00000000 fffff880`01b69800 fffff880`0191a200 : nt!KeWaitForSingleObject+0x19f
fffff880`033b5f60 fffff880`01a1914d : 00000000`00000100 0000000c`00000003 00000000`00000000 ffffe572`40010023 : nt! ?? ::FNODOBFM::`string'+0x13006
fffff880`033b5fd0 fffff880`01b3fb9e : 00000000`c00000bb 00000000`00000008 fffff880`033b6150 fffff880`033b6150 : tcpip!FlPnpEvent+0x17d
fffff880`033b6040 fffff880`0192fb2f : 00000000`c00000bb 00000000`00000008 00000000`c00000bb fffffa80`0b0551a0 : tcpip!Fl68PnpEvent+0xe
fffff880`033b6070 fffff880`019304b7 : fffffa80`0c13c010 00000000`00000008 00000000`00000000 fffffa80`0c13c010 : ndis!ndisPnPNotifyBinding+0xbf
fffff880`033b6100 fffff880`01949911 : fffffa80`00000000 00000000`00000000 00000000`00000000 fffffa80`0dde6250 : ndis!ndisPnPNotifyAllTransports+0x377
fffff880`033b6270 fffff880`0194ac5b : 00000000`00000001 fffffa80`0b0551a0 fffffa80`0abcd020 00000000`00000002 : ndis!ndisCloseMiniportBindings+0x111
fffff880`033b6380 fffff880`018e3bc2 : fffffa80`0b0551a0 fffffa80`0b0551a0 fffffa80`0757b200 fffffa80`0abce901 : ndis!ndisPnPRemoveDevice+0x25b
fffff880`033b6520 fffff880`0194db69 : 00000000`00000000 fffffa80`0757b200 00000000`00000000 fffffa80`0b0551a0 : ndis!ndisPnPRemoveDeviceEx+0xa2
fffff880`033b6560 fffff880`00fa57cc : 00000000`00000001 fffffa80`0757b360 00000000`00000000 fffffa80`079ef060 : ndis!ndisPnPDispatch+0x609
fffff880`033b6600 fffff880`00fa0ebf : 00000000`00000001 fffff880`033b6700 fffff880`033b6700 fffff880`033b6700 : Wdf01000!FxPkgFdo::ProcessRemoveDeviceOverload+0x74
fffff880`033b6630 fffff880`00f29ecf : fffffa80`0abcd502 fffff880`033b66f0 00000000`00000000 fffff800`02fb330d : Wdf01000!FxPkgPnp::_PnpRemoveDevice+0x123
fffff880`033b66a0 fffff880`00f219da : fffffa80`0757b200 fffffa80`0757b200 fffffa80`0757b200 00000000`00000000 : Wdf01000!FxPkgPnp::Dispatch+0x18f
fffff880`033b6700 fffff880`00f21aa6 : fffffa80`0757b200 fffffa80`0abc9dc0 fffffa80`0abc9c70 fffffa80`0abc9c70 : Wdf01000!FxDevice::Dispatch+0x19a
fffff880`033b6740 fffff800`030ef0f9 : fffffa80`0abc9c70 00000000`c00000bb fffff880`033b6838 fffffa80`0757b200 : Wdf01000!FxDevice::DispatchWithLock+0xa6
fffff880`033b6780 fffff800`0326cf81 : fffffa80`079ef060 00000000`00000000 fffffa80`079efd90 00000000`00000801 : nt!IopSynchronousCall+0xc5
fffff880`033b67f0 fffff800`02f81253 : fffff8a0`0bbd11a0 fffff8a0`0bbd11a0 00000000`00000016 00000000`00000000 : nt!IopRemoveDevice+0x101
fffff880`033b68b0 fffff800`0326cad4 : fffffa80`079efd90 00000000`00000000 00000000`00000002 fffffa80`079ef060 : nt!PnpRemoveLockedDeviceNode+0x1a3
fffff880`033b6900 fffff800`0326cbe0 : 00000000`00000000 fffff8a0`31295601 fffff8a0`13f9c200 ffffe572`5a41adcc : nt!PnpDeleteLockedDeviceNode+0x44
fffff880`033b6930 fffff800`032fdaa4 : 00000000`00000002 00000000`00000000 fffffa80`079efd90 fffff8a0`00000000 : nt!PnpDeleteLockedDeviceNodes+0xa0
fffff880`033b69a0 fffff800`032fe0fc : fffff880`00000000 fffffa80`0727f200 fffffa80`07022600 fffffa80`00000000 : nt!PnpProcessQueryRemoveAndEject+0xc34
fffff880`033b6ae0 fffff800`031e72ce : 00000000`00000000 fffffa80`0727f270 fffff8a0`043e46b0 00000000`00000000 : nt!PnpProcessTargetDeviceEvent+0x4c
fffff880`033b6b10 fffff800`02e87ca9 : fffff800`030edf90 fffff8a0`31295640 fffff800`030252d8 fffffa80`07022660 : nt! ?? ::NNGAKEGL::`string'+0x5721b
fffff880`033b6b70 fffff800`0311f34a : 00000000`00000000 fffffa80`07022660 00000000`00000080 fffffa80`0700bae0 : nt!ExpWorkerThread+0x111
fffff880`033b6c00 fffff800`02e6f946 : fffff880`031d7180 fffffa80`07022660 fffff880`031e1fc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`033b6c40 00000000`00000000 : fffff880`033b7000 fffff880`033b1000 fffff880`033b5b70 00000000`00000000 : nt!KiStartSystemThread+0x16




STACK_COMMAND:  kb


FOLLOWUP_IP: 
tcpip!FlPnpEvent+17d
fffff880`01a1914d 44392d78bd1500  cmp     dword ptr [tcpip!MICROSOFT_TCPIP_PROVIDER_Context+0x24 (fffff880`01b74ecc)],r13d


SYMBOL_STACK_INDEX:  4


SYMBOL_NAME:  tcpip!FlPnpEvent+17d


FOLLOWUP_NAME:  MachineOwner


MODULE_NAME: tcpip


IMAGE_NAME:  tcpip.sys


DEBUG_FLR_IMAGE_TIMESTAMP:  5189c381


FAILURE_BUCKET_ID:  X64_0x9F_4_tcpip!FlPnpEvent+17d


BUCKET_ID:  X64_0x9F_4_tcpip!FlPnpEvent+17d


Followup: MachineOwner
 


Solution
Thanks for the quick reply.

I have already completed a few of those requested task earlier.

sfc /scannow reported no issues.

chkdsk /f and /r found no issues.

Though I did not use memtest86+, the Windows 7 Memory Diagnostic Tool found no issues with the RAM after 6 passes.

I ran the Dell Hardware Diagnostic Tool that is provided when you first power on the laptop. It found no issues.

The CPU temp reports around 50-60c.

I will try to follow through with additional test as you suggested.

This is the output of the memory.dmp as provided by windbg if it helps. I didn't upload the file because of its size.


Microsoft (R) Windows Debugger Version 6.2.8229.0 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\System32\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: .sympath cache*;srv*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.18044.amd64fre.win7sp1_gdr.130104-1431
Machine Name:
Kernel base = 0xfffff800`02e66000 PsLoadedModuleList = 0xfffff800`030aa670
Debug session time: Thu Jul 4 10:08:06.180 2013 (UTC - 4:00)
System Uptime: 0 days 0:03:41.023
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols

Loading unloaded module list
...
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\oca.ini, error 2
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\winxp\triage.ini, error 2
TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\user.ini, error 2
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {d23b, 2, 1, fffff80002f0be45}

TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2
Probably caused by : ntkrnlmp.exe ( nt!KeStackAttachProcess+115 )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 000000000000d23b, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002f0be45, address which referenced memory

Debugging Details:
------------------

TRIAGER: Could not open triage file : C:\Program Files (x86)\Windows Kits\8.0\Debuggers\x64\triage\modclass.ini, error 2

WRITE_ADDRESS: 000000000000d23b

CURRENT_IRQL: 2

FAULTING_IP:
nt!KeStackAttachProcess+115
fffff800`02f0be45 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: System

TRAP_FRAME: fffff880035f5770 -- (.trap 0xfffff880035f5770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000008 rbx=0000000000000000 rcx=fffffa800701bbb0
rdx=fffff880035f5a58 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002f0be45 rsp=fffff880035f5900 rbp=fffff880035f5a58
r8=fffffa800701bba0 r9=0000000000000130 r10=fffff880033660c0
r11=fffffa800701bb50 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeStackAttachProcess+0x115:
fffff800`02f0be45 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax ds:00000000`000000dc=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff80002edb1e9 to fffff80002edbc40

STACK_TEXT:
fffff880`035f5628 fffff800`02edb1e9 : 00000000`0000000a 00000000`0000d23b 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`035f5630 fffff800`02ed9e60 : fffff880`035f57b0 fffff8a0`037205b0 00000000`000000c2 fffffa80`0701bb50 : nt!KiBugCheckDispatch+0x69
fffff880`035f5770 fffff800`02f0be45 : 00000000`00000000 fffffa80`0701bb50 fffffa80`0701bb50 fffff800`031b12af : nt!KiPageFault+0x260
fffff880`035f5900 fffffa80`0aa809c8 : fffff880`035f5a80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeStackAttachProcess+0x115
fffff880`035f5980 fffff880`035f5a80 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffffa80`0aa809c8
fffff880`035f5988 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`035f5a80


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!KeStackAttachProcess+115
fffff800`02f0be45 f00fc186dc000000 lock xadd dword ptr [rsi+0DCh],eax

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!KeStackAttachProcess+115

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 50e79935

FAILURE_BUCKET_ID: X64_0xA_nt!KeStackAttachProcess+115

BUCKET_ID: X64_0xA_nt!KeStackAttachProcess+115

Followup: MachineOwner
---------
 


Back
Top