rifters Posted September 29, 2007 Posted September 29, 2007 Hi, my PC with Vista x64 has started firing off BSOD's. Namely MEMORY_MANAGEMENT about once maybe twice a day, and occasionally the IRQ_NOT_EQUAL BSOD aswell.This PC has had Vista x64 installed for appx 3 months. During the first couple of months the system ran fine, no BSOD's or anything. Then all of a sudden, out of the blue, with no hardware changes, these BSOD problems have appeared.I've just completed a clean reinstall yesterday to see if it goes away, and today, once again, a MEMORY_MANAGEMENT BSOD.The OS is a fully updated Vista x64 OEM activated version. No hardware has been changed since the initial install and activation.Spec fwiw:Core 2 Duo E6600 @ 3GHz (334x9)4 GB OCZ DDR2 @ 502MHzAbit IP35 Pro P35 MotherboardEVGA 8800 Ultra PCIE VGA X-FI Extreme Gamer PCI SoundcardHauppauge DVB-t-500 Dual DVB Tuner PCI card700w Seasonic PSUCPU, case etc all well cooled with third part performance parts. I'm 99 percent sure hardware wise the system is stable - again - this ran fine for just over 2 months like this with no BSOD's.I've tried various different drivers, some beta, some final & certified. The problem is the same throughout. The BSOD's aren't occuring in anything specific either. For example not under a heavy gaming load, or a large download. The last one occured whilst simply opening IE7 from the desktop. Vista reports appx 1GB physical is in use once the OS has loaded. Using Orthos in blend mode, there are no errors or other problems with either memory or CPU under load either. The page file is set to auto managed by Vista.I've just downloaded the debugger kit for x64, after reading this thread http://www.msfn.org/board/Creating_memory_dumps_t90244.html, but before I go on, does that process work in Vista x64?Can anybody shed some light on this?Thanks in advance.-Rifters
Batfinks Posted September 29, 2007 Posted September 29, 2007 (edited) Am having exact same issue myself, for months my systems been perfectly fine then recently getting BSOD due to "MEMORY_MANAGEMENT" or "IRQ_NOT_EQUAL"have tested my memory each stick for over 22hrs total running memtest and both sticks pass flawlessly.all drivers are latest and working error free to my knowledge.oh before i forget am Running Vista Business 32bit OEM (original and activated)my system specs are: Intel E6600Asus P5W DH DLX/Wifi-Ap2x1gig Corsair XMS2 800MHz DDr2BFG 8800GTOCMaxtor sata2 300gig *primary* (AHCI mode)WD sata2 500gig (aaks model) *file storage* (AHCI mode)sony dvdrw x18sp.Coolmaster stacker case.580w HiperXAnother possibly related issue is this:now this is strange so read carefully:on cold boot my system will boot into vista fine, once i do the usual cache cleaning/disk cleanup/ Defender scan my system will BSOD !!!the EXACT same thing will happen if i switch my system off and unplug it from the wall for over 10mins !!but once that first BSOD has happened it doesn't happen again, any help here ?thought it could be my PSU at first but tested and working perfectly fine and it doesn't ever happen in Xp. Edited September 30, 2007 by Batfinks
cluberti Posted September 30, 2007 Posted September 30, 2007 First off, neither of those messages are speaking to the RAM in your machine, they're talking about VIRTUAL memory (kernel mode address space, to be exact) and the IRQL of a driver. This is almost always caused by a bad driver, so getting a dump of the problem for us to analyze would help out a lot.
rifters Posted September 30, 2007 Author Posted September 30, 2007 The process I linked to in my previous post about creating dumps does not work correctly for me in Vista x64. I followed the instructions re. creating registry keys, then rebooted, pressing right ctrl and scroll twice does nothing. In system properties > start up and recovery > write debugging information is set to kernel memory dump. The only other two options here are <none> and small memory dump, this is despite performing the steps in the link in my previous post. Thus, all I have been able to get into the debugger are these two minidump examples:#11: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa800310c440Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: iexplore.exeCURRENT_IRQL: 0BAD_PAGES_DETECTED: dLAST_CONTROL_TRANSFER: from fffff80002870749 to fffff8000284dbd0STACK_TEXT: fffff980`3fccfa88 fffff800`02870749 : 00000000`0000001a 00000000`00041790 fffffa80`0310c440 00000000`0000ffff : nt!KeBugCheckExfffff980`3fccfa90 fffff800`0288d52a : 00000000`00000011 00000000`0f4bafff 00000000`00000000 fffffa80`00000000 : nt!MiDeleteVirtualAddresses+0xd49fffff980`3fccfc20 fffff800`0284d673 : ffffffff`ffffffff fffffa80`095bbad0 00000000`00000001 fffffa80`00008000 : nt!NtFreeVirtualMemory+0x38afffff980`3fccfd20 fffff800`0284db80 : fffff960`000c34d8 00000000`0ee00000 00000000`00000004 00000000`00000001 : nt!KiSystemServiceCopyEnd+0x13fffff980`3fccfeb8 fffff960`000c34d8 : 00000000`0ee00000 00000000`00000004 00000000`00000001 00000000`00000001 : nt!KiServiceLinkagefffff980`3fccfec0 fffff960`000cb615 : 00000000`0ee00000 00000000`00000001 fffff900`c018d540 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x228fffff980`3fccffa0 fffff960`000c2ed4 : 00000000`00000000 fffff980`3fcd0c00 fffff900`c07a3180 fffffa80`048794f0 : win32k!NtGdiCloseProcess+0x2d5fffff980`3fcd0000 fffff960`000c251f : 00000000`00000000 fffff900`c07a3180 00000000`00000000 fffff900`c01e6460 : win32k!GdiProcessCallout+0x1f4fffff980`3fcd0080 fffff800`02ab360e : fffffa80`07ca04f0 00000000`00000000 fffffa80`07ca04f0 fffffa80`095bbad0 : win32k!W32pProcessCallout+0x6ffffff980`3fcd00b0 fffff800`02a6300d : fffffa80`000000ff 00000000`00000001 fffffa80`09a7f660 00000000`78457350 : nt!PspExitThread+0x29efffff980`3fcd0170 fffff800`02846049 : fffffa80`095bbad0 fffff980`3fcd0220 00000000`08d8d070 00000000`00000020 : nt!PsExitSpecialApc+0x1dfffff980`3fcd01a0 fffff800`0285f9ea : 00000000`7ef82000 ffe7ebf6`ffe7ebf6 fffff800`02a63020 00000000`00000001 : nt!KiDeliverApc+0x409fffff980`3fcd0240 fffff800`0284d71d : fffffa80`095bbad0 00000000`7ef82000 00000000`00000020 fffffa80`042e9b50 : nt!KiInitiateUserApc+0x7afffff980`3fcd0380 00000000`76fa1ff7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0xa200000000`08d8e0b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fa1ff7STACK_COMMAND: kbSYMBOL_NAME: PAGE_NOT_ZERO_VISTAFOLLOWUP_NAME: MachineOwnerMODULE_NAME: Unknown_ModuleIMAGE_NAME: Unknown_ImageDEBUG_FLR_IMAGE_TIMESTAMP: 0BUCKET_ID: PAGE_NOT_ZERO_VISTAFollowup: MachineOwner--------- *** Memory manager detected 13 instance(s) of page corruption, target is likely to have memory corruption.#2MEMORY_MANAGEMENT (1a) # Any other values for parameter 1 must be individually examined.Arguments:Arg1: 0000000000041790, The subtype of the bugcheck.Arg2: fffffa8003112080Arg3: 000000000000ffffArg4: 0000000000000000Debugging Details:------------------BUGCHECK_STR: 0x1a_41790DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: SearchProtocolHCURRENT_IRQL: 0BAD_PAGES_DETECTED: 2LAST_CONTROL_TRANSFER: from fffff80002870749 to fffff8000284dbd0STACK_TEXT: fffff980`1bfff798 fffff800`02870749 : 00000000`0000001a 00000000`00041790 fffffa80`03112080 00000000`0000ffff : nt!KeBugCheckExfffff980`1bfff7a0 fffff800`02871e37 : fffffa80`036f9f11 00000000`0069dfff 00000000`00000000 fffff680`00000000 : nt!MiDeleteVirtualAddresses+0xd49fffff980`1bfff930 fffff800`02880597 : fffffa80`054a1c10 00000000`00000000 fffffa80`054a1c10 fffffa80`078c3e60 : nt!MiRemoveMappedView+0x62bfffff980`1bfffa60 fffff800`02ab3756 : fffff880`0576aaa0 00000000`00000000 00000000`00000000 fffffa80`04e208d0 : nt!MmCleanProcessAddressSpace+0x277fffff980`1bfffab0 fffff800`02a85f9d : 00000000`00000000 fffffa80`04e20801 000007ff`fffdc000 00000000`00000000 : nt!PspExitThread+0x3e6fffff980`1bfffb70 fffff800`02a8b93d : 00000000`00000000 00000000`0000000c 00000000`00187cb0 fffffa80`0000000c : nt!PspTerminateThreadByPointer+0x4dfffff980`1bfffbc0 fffff800`0284d673 : fffffa80`054a1c10 fffffa80`04e208d0 fffff980`1bfffca0 00000000`00187cb0 : nt!NtTerminateProcess+0x18dfffff980`1bfffc20 00000000`7765053a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`000af9d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7765053aSTACK_COMMAND: kbSYMBOL_NAME: PAGE_NOT_ZERO_VISTAFOLLOWUP_NAME: MachineOwnerMODULE_NAME: Unknown_ModuleIMAGE_NAME: Unknown_ImageDEBUG_FLR_IMAGE_TIMESTAMP: 0BUCKET_ID: PAGE_NOT_ZERO_VISTAFollowup: MachineOwner--------- *** Memory manager detected 2 instance(s) of page corruption, target is likely to have memory corruption.One instance is the crash I referred to in my original post about IE7. The second module is unknown presumably because its a minidump.-rifters
cluberti Posted September 30, 2007 Posted September 30, 2007 Correct - however, we are doing work in win32k.sys when the crashes occur (win32k!SURFACE::bDeleteSurface+0x228), which would indicate a video card driver issue. What video card is in that machine, and what driver set are you running for that card?I followed the instructions re. creating registry keys, then rebooted, pressing right ctrl and scroll twice does nothing.First, you need a PS/2 keyboard attached for this to work (and you also need to reboot for the reg change to work). Second, since the machine is crashing on it's own, there's no need to do a keyboard dump - it'll crash dump on it's own every time it BSOD's.In system properties > start up and recovery > write debugging information is set to kernel memory dump. The only other two options here are <none> and small memory dump, this is despite performing the steps in the link in my previous post.If you set the registry key for CrashDumpEnabled to 1 and reboot, the option for a complete memory dump will NOT be seen in the GUI - however, it'll still do a complete crash dump because the CrashDumpEnabled value is 1. If you go into the GUI and click OK, it'll reset that to whatever was in the box - so, set CrashDumpEnabled to 1, make sure the page file on your C: drive is RAM+50MB or so, and reboot. Don't go back and check anything, just leave it as-is . The next time you get a memory dump from a BSOD, it'll be a complete dump.
RJARRRPCGP Posted September 30, 2007 Posted September 30, 2007 (edited) "IRQL_NOT_LESS_OR_EQUAL" is often caused by an unstable processor overclock. It can be caused by not having enough Vcore.You need to get Prime95 to confirm that your Core 2 Duo is stable. Edited September 30, 2007 by RJARRRPCGP
rifters Posted October 2, 2007 Author Posted October 2, 2007 (edited) >we are doing work in win32k.sys when the crashes occur (win32k!SURFACE::bDeleteSurface+0x228), which would indicate a video card driver issueI see the line you mention in the first dump, but what about the second one? (the blue one) I don't see the same line there. Its an nvidia geforce 8800 ultra running 163.69 (certified offiicial latest), have also tried 162.18's.I've applied the changes to page file etc, will wait and see, curiously Windows recommended a page file of 6 GB so I set it to that (it was previously at 4.3GB) and so far theres only been 1 crash since my last post here, a few minutes ago infact, unfortunatley though when I tried to open it in the debugger it would not load for some reason (used the same process for the other 2 debugs). I wasn't at the screen when the BSOD came so didn't see the message. Will post back if\when I can do another debug process with new dump files.>You need to get Prime95 to confirm that your Core 2 Duo is stable. As I said in my original post I'm 99 percent sure the hardware is stable. The Orthos test I mention is prime95 with a GUI. I run 2 instances of this test in blend mode on each core, which stress tests CPU and memory at the same time, for 24 hours continuous, the system doesn't break a sweat. Core 2 Duos are notoriously good overclockers @ default V's. Plus I have all thermal throttling enabled in the BIOS which lowers the multiplier at idle and light loads - the same time all these BSOD's occur. -rifters Edited October 2, 2007 by rifters
cluberti Posted October 2, 2007 Posted October 2, 2007 The drivers for that particular card and x64 vista don't get along well, so I'm not surprised here. The blue dump you posted seems to be removing a mapped view of a section in memory during a thread termination in kernel, which means it's likely this was a kernel mode driver thread. Hard to say without a dump, so if you can get one and post it somewhere I can get to it, I can help further.
RJARRRPCGP Posted October 3, 2007 Posted October 3, 2007 The Orthos test I mention is prime95 with a GUI. I run 2 instances of this test in blend mode on each core, which stress tests CPU and memory at the same time, for 24 hours continuous, the system doesn't break a sweat. Core 2 Duos are notoriously good overclockers @ default V's. Plus I have all thermal throttling enabled in the BIOS which lowers the multiplier at idle and light loads - the same time all these BSOD's occur.Yeah, I knew that already and if it was going for 24 hours, you're good to go.
epm999 Posted October 17, 2007 Posted October 17, 2007 I have the same problem:From what I can tell is that during the bootup a (as yet unnamed) kernel mode driver is corrupting nonpaged pool.This caused the other driver(s) to crash when it reads it nonpaged pool.I have not been able to repro the problem more than one time a day (cold boot in the morining)I can provide hardware details if you wish, but i do see that we have the graphics card (and driver) in common so I am going to focus on them for the time being. Let me know if you can find a faster repro method. Anyone have an Idea why it only happens one time a day? (only the first cold bootwarm boots and further cold boots seem ok)thanks jb
cluberti Posted October 18, 2007 Posted October 18, 2007 I could guess, but I'd rather see a dump file to analyze. Can you configure your box for a complete dump and provide that the next time it occurs?
epm999 Posted October 18, 2007 Posted October 18, 2007 Hi, I looked into this some more and have done the following:- found that I get the problem on all cold boots if I turn off power at the power supply for 10 mins- Disabled the nvidia driver so that I am only running the OS provided VGA drivershere some of the current crash dump info and a dump threads running on each processorI had verifier and gflags set to check for pool corruption and to bugcheck on exception.Sorry about the lack of debugging its been over 10 years since I used a debugger.I also have the full crash dump file if that is really what you wanted. 0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************PFN_LIST_CORRUPT (4e)Typically caused by drivers passing bad memory descriptor lists (ie: callingMmUnlockPages twice with the same list, etc). If a kernel debugger isavailable get the stack trace.Arguments:Arg1: 0000000000000099, A PTE or PFN is corruptArg2: 00000000001062e0, page frame numberArg3: 0000000000000002, current page stateArg4: 00000000001068df, 0Debugging Details:------------------Page dca58 not present in the dump file. Type ".hh dbgerr004" for detailsPage dcd25 not present in the dump file. Type ".hh dbgerr004" for detailsBUGCHECK_STR: 0x4E_99DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: svchost.exeCURRENT_IRQL: 2LAST_CONTROL_TRANSFER: from fffff800018c30db to fffff8000184dbd0STACK_TEXT: fffff980`0a729218 fffff800`018c30db : 00000000`0000004e 00000000`00000099 00000000`001062e0 00000000`00000002 : nt!KeBugCheckExfffff980`0a729220 fffff800`0187c05b : fffffa80`00000000 fffff700`0008acf0 00000000`0000139c 00000000`00022401 : nt!MiBadShareCount+0x4bfffff980`0a729260 fffff800`018824e5 : fffffa80`06cb12a0 3a100000`d9680000 00000003`0000139c 00000000`00000051 : nt!MiDeletePfnList+0x3fbfffff980`0a7292f0 fffff800`0188040e : fffffa80`06cb12a0 00000000`00000a73 fffffa80`0000000e 00000000`00000001 : nt!MiDeleteAddressesInWorkingSet+0x2f8fffff980`0a729ba0 fffff800`01ab3756 : fffffa80`03e55c50 00000000`c0000005 00000000`00000000 fffffa80`78457350 : nt!MmCleanProcessAddressSpace+0xeefffff980`0a729bf0 fffff800`01a85f9d : fffffa80`c0000005 fffffa80`0407b301 000007ff`fffa8000 00000000`c0000005 : nt!PspExitThread+0x3e6fffff980`0a729cb0 fffff800`01a8b93d : 00000000`00000000 00000000`0000000a fffff980`0a72ac20 00000000`0000000a : nt!PspTerminateThreadByPointer+0x4dfffff980`0a729d00 fffff800`0184d673 : fffffa80`06cb12a0 fffffa80`0407b370 fffff980`0a729de0 fffff980`0a72ac20 : nt!NtTerminateProcess+0x18dfffff980`0a729d60 fffff800`0184db80 : fffff800`018babec fffff980`0a72a540 fffff980`0a72aca0 fffff980`0a72ac20 : nt!KiSystemServiceCopyEnd+0x13fffff980`0a729ef8 fffff800`018babec : fffff980`0a72a540 fffff980`0a72aca0 fffff980`0a72ac20 00000000`00000030 : nt!KiServiceLinkagefffff980`0a729f00 fffff800`018fce61 : fffff980`0a72a540 fffff980`0a72a540 fffff980`0a72ac20 00000000`02e0e001 : nt! ?? ::FNODOBFM::`string'+0x1280cfffff980`0a72a500 fffff800`018521a5 : fffff980`0a72a540 fffff980`0a72a5e0 fffffa80`0407b370 00000000`00000000 : nt!KiRaiseException+0x141fffff980`0a72aae0 fffff800`0184d673 : 00000000`00000008 00000000`00000000 00000000`00000001 fffffa80`03fc3b60 : nt!NtRaiseException+0x85fffff980`0a72ac20 00000000`77bf4f30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x1300000000`02e0dfa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf4f30STACK_COMMAND: kbFOLLOWUP_IP: nt!MiBadShareCount+4bfffff800`018c30db cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt!MiBadShareCount+4bFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntDEBUG_FLR_IMAGE_TIMESTAMP: 46830f41IMAGE_NAME: memory_corruptionFAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4bBUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4bFollowup: MachineOwner---------0: kd> !pfn 1062e0 PFN 001062E0 at address FFFFFA8003128A00 flink 001064E1 blink / share count 001068DF pteaddress FFFFF88000781808 reference count 0000 used entry count 0000 Cached color 0 Priority 5 restore pte FA80061BA43004C0 containing page 107A67 Standby P Shared 0: kd> !process 0 7Here are some of the running processes (one for each cpu) THREAD fffffa8007071bb0 Cid 0004.03ac Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 3 Not impersonating DeviceMap fffff88000007820 Owning Process fffffa8003697430 Image: System Wait Start TickCount 29875 Ticks: 0 Context Switch Count 342 UserTime 00:00:00.000 KernelTime 00:00:00.015 Win32 Start Address nt!PfTLoggingWorker (0xfffff80001bcee10) Stack Init fffff98004b63db0 Current fffff98004b639d0 Base fffff98004b64000 Limit fffff98004b5e000 Call 0 Priority 13 BasePriority 7 PriorityDecrement 6 IoPriority 2 PagePriority 5 Child-SP RetAddr : Args to Child : Call Site fffff980`04b63af0 fffff800`01b4171c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PfTAcquireLogEntry+0xb fffff980`04b63b00 fffff800`01b92642 : fffffa80`0596f000 fffffa80`00000400 fffff980`04b63ba0 fffffa80`053bbf80 : nt!PfpLogPageAccess+0x1ee fffff980`04b63b70 fffff800`01bceef0 : fffffa80`07071b01 00000000`00000080 fffff800`019542c8 00000000`00000000 : nt!PfpFlushBuffers+0x1a2 fffff980`04b63c20 fffff800`01ae279b : ffffffff`ff676980 fffffa80`07071bb0 fffff980`0ba8b6c0 00000000`00461901 : nt!PfTLoggingWorker+0xe0 fffff980`04b63d50 fffff800`018344f6 : fffff980`00c98180 fffffa80`07071bb0 fffff980`00ca1c40 fffff980`014e8ce0 : nt!PspSystemThreadStartup+0x5b fffff980`04b63d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16 THREAD fffffa800407b370 Cid 0270.02c0 Teb: 0000000000000000 Win32Thread: 0000000000000000 RUNNING on processor 0 Not impersonating DeviceMap fffff88001981cb0 Owning Process fffffa8006cb12a0 Image: svchost.exe Wait Start TickCount 29875 Ticks: 0 Context Switch Count 42 UserTime 00:00:00.000 KernelTime 00:00:00.000 Win32 Start Address 0x000007fefb585000 Stack Init fffff9800a72adb0 Current fffff9800a728990 Base fffff9800a72b000 Limit fffff9800a725000 Call 0 Priority 10 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5 Child-SP RetAddr : Args to Child : Call Site fffff980`0a729218 fffff800`018c30db : 00000000`0000004e 00000000`00000099 00000000`001062e0 00000000`00000002 : nt!KeBugCheckEx fffff980`0a729220 fffff800`0187c05b : fffffa80`00000000 fffff700`0008acf0 00000000`0000139c 00000000`00022401 : nt!MiBadShareCount+0x4b fffff980`0a729260 fffff800`018824e5 : fffffa80`06cb12a0 3a100000`d9680000 00000003`0000139c 00000000`00000051 : nt!MiDeletePfnList+0x3fb fffff980`0a7292f0 fffff800`0188040e : fffffa80`06cb12a0 00000000`00000a73 fffffa80`0000000e 00000000`00000001 : nt!MiDeleteAddressesInWorkingSet+0x2f8 fffff980`0a729ba0 fffff800`01ab3756 : fffffa80`03e55c50 00000000`c0000005 00000000`00000000 fffffa80`78457350 : nt!MmCleanProcessAddressSpace+0xee fffff980`0a729bf0 fffff800`01a85f9d : fffffa80`c0000005 fffffa80`0407b301 000007ff`fffa8000 00000000`c0000005 : nt!PspExitThread+0x3e6 fffff980`0a729cb0 fffff800`01a8b93d : 00000000`00000000 00000000`0000000a fffff980`0a72ac20 00000000`0000000a : nt!PspTerminateThreadByPointer+0x4d fffff980`0a729d00 fffff800`0184d673 : fffffa80`06cb12a0 fffffa80`0407b370 fffff980`0a729de0 fffff980`0a72ac20 : nt!NtTerminateProcess+0x18d fffff980`0a729d60 fffff800`0184db80 : fffff800`018babec fffff980`0a72a540 fffff980`0a72aca0 fffff980`0a72ac20 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff980`0a729d60) fffff980`0a729ef8 fffff800`018babec : fffff980`0a72a540 fffff980`0a72aca0 fffff980`0a72ac20 00000000`00000030 : nt!KiServiceLinkage fffff980`0a729f00 fffff800`018fce61 : fffff980`0a72a540 fffff980`0a72a540 fffff980`0a72ac20 00000000`02e0e001 : nt! ?? ::FNODOBFM::`string'+0x1280c fffff980`0a72a500 fffff800`018521a5 : fffff980`0a72a540 fffff980`0a72a5e0 fffffa80`0407b370 00000000`00000000 : nt!KiRaiseException+0x141 fffff980`0a72aae0 fffff800`0184d673 : 00000000`00000008 00000000`00000000 00000000`00000001 fffffa80`03fc3b60 : nt!NtRaiseException+0x85 fffff980`0a72ac20 00000000`77bf4f30 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff980`0a72ac20) 00000000`02e0dfa8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf4f30 THREAD fffffa80042bf060 Cid 0508.0a70 Teb: 000007fffffd5000 Win32Thread: 0000000000000000 RUNNING on processor 1 IRP List: fffffa8005616ae0: (0006,03a0) Flags: 00000884 Mdl: 00000000 Not impersonating DeviceMap fffff880019eb360 Owning Process fffffa800724f930 Image: svchost.exe Wait Start TickCount 29875 Ticks: 0 Context Switch Count 16 UserTime 00:00:00.000 KernelTime 00:00:00.000 Win32 Start Address 0x0000000077be7860 Stack Init fffff9800a6f9db0 Current fffff9800a6f96e0 Base fffff9800a6fa000 Limit fffff9800a6f4000 Call 0 Priority 9 BasePriority 8 PriorityDecrement 0 IoPriority 2 PagePriority 5 Child-SP RetAddr : Args to Child : Call Site fffff980`0a6f96a8 fffff980`04825210 : 00000000`00000000 fffff800`00000030 00000000`00000000 00000000`00000000 : nt!KeReleaseSpinLock+0x5 fffff980`0a6f96b0 fffff980`048354bb : 00000000`000000a5 fffffa80`06baeb50 fffffa80`06baeb50 fffffa80`05616ae0 : netbt!NBT_REFERENCE_DEVICE+0x70 fffff980`0a6f96e0 fffff800`01a92343 : 00000000`000000a5 fffff800`01a91ac0 fffffa80`05616ae0 00000000`00000040 : netbt!NbtDispatchCreate+0x2f fffff980`0a6f9720 fffff800`01a90cf1 : fffffa80`06baeb50 fffff980`0a6f9940 fffffa80`03e19980 00000000`00000001 : nt!IopParseDevice+0x883 fffff980`0a6f98a0 fffff800`01a9d0f1 : 00000000`00000000 fffff980`0a6f9a28 00000000`00000040 00000000`00000000 : nt!ObpLookupObjectName+0xa9f fffff980`0a6f99b0 fffff800`01abdcb1 : 00000000`00100001 00000000`00000000 fffff880`017b4401 00000000`00d1ed08 : nt!ObOpenObjectByName+0x421 fffff980`0a6f9a80 fffff800`01a99fc8 : fffffa80`042bf060 00000000`00100001 00000000`00d1ed18 00000000`00d1ecb8 : nt!IopCreateFile+0x93b fffff980`0a6f9b20 fffff800`0184d673 : fffffa80`042bf060 fffffa80`0724f930 fffff880`017db350 fffff800`01ab5fbd : nt!NtCreateFile+0x78 fffff980`0a6f9bb0 00000000`77bf07ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff980`0a6f9c20) 00000000`00d1ec98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf07ca THREAD fffffa800748b2d0 Cid 0508.0a78 Teb: 000007fffffd3000 Win32Thread: 0000000000000000 RUNNING on processor 2 IRP List: fffffa80070eaab0: (0006,0118) Flags: 00060000 Mdl: 00000000 Not impersonating DeviceMap fffff880019eb360 Owning Process fffffa800724f930 Image: svchost.exe Wait Start TickCount 29875 Ticks: 0 Context Switch Count 16 UserTime 00:00:00.000 KernelTime 00:00:00.000 Win32 Start Address 0x0000000077be7860 Stack Init fffff9800cc7bdb0 Current fffff9800cc7b580 Base fffff9800cc7c000 Limit fffff9800cc76000 Call 0 Priority 10 BasePriority 8 PriorityDecrement 1 IoPriority 2 PagePriority 5 Child-SP RetAddr : Args to Child : Call Site fffff980`0cc7b690 fffff980`0095fc36 : 00000000`00000000 00000000`00000000 fffff980`0cc7bca0 fffff880`00853890 : tcpip!IpGetAllInterfaceParameters+0x46 fffff980`0cc7b6f0 fffff980`04b069a2 : fffffa80`059746a0 fffffa80`00000068 00000000`034cf1f0 00000000`034cf1f0 : NETIO!NsiGetAllParametersEx+0x141 fffff980`0cc7b7a0 fffff980`04b088c6 : fffffa80`070eab80 fffffa80`070eab80 fffffa80`001f0003 fffffa80`070eaae8 : nsiproxy!NsippGetAllParameters+0x2b2 fffff980`0cc7b990 fffff980`04b0899f : 00000000`00000003 00000000`00000001 fffffa80`06ccc7f0 fffffa80`07480df0 : nsiproxy!NsippDispatchDeviceControl+0x8a fffff980`0cc7b9d0 fffff800`01a8f017 : fffffa80`070eab00 fffffa80`07480df0 00000000`00000001 00000000`00000180 : nsiproxy!NsippDispatch+0x4b fffff980`0cc7ba00 fffff800`01a95266 : 00000000`034cf001 00000000`0000041c 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x626 fffff980`0cc7bb40 fffff800`0184d673 : fffffa80`0748b2d0 00000000`034cf038 fffff980`0cc7bbc8 fffff800`01ab5fbd : nt!NtDeviceIoControlFile+0x56 fffff980`0cc7bbb0 00000000`77bf02ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff980`0cc7bc20) 00000000`034cf0e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77bf02ea0: kd> dd nt!MmBadPageListHeadfffff800`01949400 00000000 00000000 00000005 00000000fffff800`01949410 ffffffff ffffffff ffffffff fffffffffffff800`01949420 00000000 00000000 00000002 00000000fffff800`01949430 ffffffff ffffffff ffffffff fffffffffffff800`01949440 00000009 64486c41 00000000 00000000fffff800`01949450 00000000 00000000 00000000 00000000fffff800`01949460 01a4b480 fffff800 00000000 00000000fffff800`01949470 00000000 00000000 01949478 fffff8000: kd> dd nt!MmStandbyPageListHeadfffff800`019493a0 00000000 00000000 00000002 00000000fffff800`019493b0 ffffffff ffffffff ffffffff fffffffffffff800`019493c0 00002bd4 00000000 00000003 00000000fffff800`019493d0 ffffffff ffffffff ffffffff fffffffffffff800`019493e0 00000000 00000000 00000004 00000000fffff800`019493f0 ffffffff ffffffff ffffffff fffffffffffff800`01949400 00000000 00000000 00000005 00000000fffff800`01949410 ffffffff ffffffff ffffffff ffffffff0: kd> dd nt!MmModifiedNoWritePageListHeadfffff800`019493e0 00000000 00000000 00000004 00000000fffff800`019493f0 ffffffff ffffffff ffffffff fffffffffffff800`01949400 00000000 00000000 00000005 00000000fffff800`01949410 ffffffff ffffffff ffffffff fffffffffffff800`01949420 00000000 00000000 00000002 00000000fffff800`01949430 ffffffff ffffffff ffffffff fffffffffffff800`01949440 00000009 64486c41 00000000 00000000fffff800`01949450 00000000 00000000 00000000 000000000: kd> dd nt!MmModifiedPageListHeadfffff800`019493c0 00002bd4 00000000 00000003 00000000fffff800`019493d0 ffffffff ffffffff ffffffff fffffffffffff800`019493e0 00000000 00000000 00000004 00000000fffff800`019493f0 ffffffff ffffffff ffffffff fffffffffffff800`01949400 00000000 00000000 00000005 00000000fffff800`01949410 ffffffff ffffffff ffffffff fffffffffffff800`01949420 00000000 00000000 00000002 00000000fffff800`01949430 ffffffff ffffffff ffffffff ffffffff0: kd> dd nt!MmFreePageListHeadfffff800`01949380 00000b55 00000000 00000001 00000000fffff800`01949390 000634c3 00000000 000d27f7 00000000fffff800`019493a0 00000000 00000000 00000002 00000000fffff800`019493b0 ffffffff ffffffff ffffffff fffffffffffff800`019493c0 00002bd4 00000000 00000003 00000000fffff800`019493d0 ffffffff ffffffff ffffffff fffffffffffff800`019493e0 00000000 00000000 00000004 00000000fffff800`019493f0 ffffffff ffffffff ffffffff ffffffff0: kd> dd nt!MmZeroedPageListHeadfffff800`01949360 00075673 00000000 00000000 00000000fffff800`01949370 0005e9ec 00000000 0005c909 00000000fffff800`01949380 00000b55 00000000 00000001 00000000fffff800`01949390 000634c3 00000000 000d27f7 00000000fffff800`019493a0 00000000 00000000 00000002 00000000fffff800`019493b0 ffffffff ffffffff ffffffff fffffffffffff800`019493c0 00002bd4 00000000 00000003 00000000fffff800`019493d0 ffffffff ffffffff ffffffff ffffffff0: kd> dd nt!MmRomPageListHeadfffff800`01949420 00000000 00000000 00000002 00000000fffff800`01949430 ffffffff ffffffff ffffffff fffffffffffff800`01949440 00000009 64486c41 00000000 00000000fffff800`01949450 00000000 00000000 00000000 00000000fffff800`01949460 01a4b480 fffff800 00000000 00000000fffff800`01949470 00000000 00000000 01949478 fffff800fffff800`01949480 01949478 fffff800 00000003 65536c41fffff800`01949490 00000000 00000000 00000000 00000000
cluberti Posted October 18, 2007 Posted October 18, 2007 Yes, I'd like to see the dump itself - I can see some netbt traffic there as well, so I'm curious. I'd like the opportunity to interrogate some of those addresses in the dump file itself.
epm999 Posted October 19, 2007 Posted October 19, 2007 (edited) Sure, attaching memory6.dmp.Also, I found a new BIOS update that I just installedFile upload limit was 200k and the file was 248 MBI zipped it to 58 MB, still to much to upload Edited October 19, 2007 by epm999
epm999 Posted October 19, 2007 Posted October 19, 2007 Ok, I figured this out finally. I focused on finding out why I had to have my power supply off for 10 mins. That led to the solution.Turns out one of my memory chips legs was not actually soldered to the surface mount pad. This left a hair line space that would open and close based upon the temp of the board, chips and Heat sink. Connection was open when the memory was cool, closed when it was warm.That also explains why my memory tests passed, I tested the system only after the first bugcheck, the memory was warm and all the tests passed. I turned the system off for the day, the chips would cool down, I turn the system back on in the morining and get another bugcheck.I was able to use a heat gun to warm my memory chips and prevent the bugcheck. I was also able to use my heat gun fan (no heat) to cool my chips faster so I did not have to power off for full 10 mins to reproduce the problem. Only had to wait 3 mins.Anyway, that is what caused the memory corruption and explains why I could never find any bad memory in the system with the software memroy testers. It also explains why the pool checking in verifier and gflags only produced bugchecks on reads from memory. I could never find who wrote over the memory. I think I have 11 crash dumps that I spend hours looking at. Thermal expansion, what a b***h. -jb
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now