Gingerale Posted January 27, 2010 Posted January 27, 2010 Hi all new to the forums!I've had a few days of BSOD's and now the computer is slow.Found out how to read the dump files and here they are.Any help would be greatly appreciated on what to do now?Cheers+ Oh I just realized I have SP0?/no Service Packs Updated, and found that I installed dotnetfx35 SP1? I'm not sure if there is some sort of conflict or something.Additionally I recently installed Microsoft Visual C++ 2008 for a video game and a few weeks ago I ranNT Registry Optimizer. This is Windows Vista Ultimate.Oh and BSOD read Kernel Stack In page Error stop:0x00000077,(0X000000E, 0xL000000E, 0x00000000, 0x018EL000Update: I tried chkdsk /f /r and i got - could not load the hive file systemroot/system/32/config /security?------------------------------Microsoft ® Windows Debugger Version 6.8.0004.0 X86Copyright © Microsoft Corporation. All rights reserved.Loading Dump File [C:\Windows\MEMORY.DMP]Kernel Summary Dump File: Only kernel address space is availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatibleProduct: WinNt, suite: TerminalServer SingleUserTSBuilt by: 6000.16901.x86fre.vista_gdr.090805-0102Kernel base = 0x81800000 PsLoadedModuleList = 0x81908ad0Debug session time: Tue Jan 19 08:44:04.278 2010 (GMT-5)System Uptime: 0 days 16:54:12.403Loading Kernel Symbols............................................................................................................................................Loading User SymbolsPEB is paged out (Peb.Ldr = 7ffdd00c). Type ".hh dbgerr001" for detailsLoading unloaded module list...................******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 7F, {d, 0, 0, 0}PEB is paged out (Peb.Ldr = 7ffdd00c). Type ".hh dbgerr001" for detailsPEB is paged out (Peb.Ldr = 7ffdd00c). Type ".hh dbgerr001" for detailsProbably caused by : ntkrnlmp.exe ( nt!KiSystemFatalException+f )Followup: MachineOwner---------windbg> .hh dbgerr001--------------------------------------------------------second attempt-----------------------------------------------------------------------------1: kd> kd> !analyze -vNumeric expression missing from '> !analyze -v'1: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************UNEXPECTED_KERNEL_MODE_TRAP (7f)This means a trap occurred in kernel mode, and it's a trap of a kindthat the kernel isn't allowed to have/catch (bound trap) or thatis always instant death (double fault). The first number in thebugcheck params is the number of the trap (8 = double fault, etc)Consult an Intel x86 family manual to learn more about what thesetraps are. Here is a *portion* of those codes:If kv shows a taskGateuse .tss on the part before the colon, then kv.Else if kv shows a trapframeuse .trap on that valueElse.trap on the appropriate frame will show where the trap was taken(on x86, this will be the ebp that goes with the procedure KiTrap)Endifkb will then show the corrected stack.Arguments:Arg1: 0000000d, EXCEPTION_GP_FAULTArg2: 00000000Arg3: 00000000Arg4: 00000000Debugging Details:------------------PEB is paged out (Peb.Ldr = 7ffdd00c). Type ".hh dbgerr001" for detailsPEB is paged out (Peb.Ldr = 7ffdd00c). Type ".hh dbgerr001" for detailsBUGCHECK_STR: 0x7f_dDEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: svchost.exeCURRENT_IRQL: 0UNALIGNED_STACK_POINTER: a0a56bd5LAST_CONTROL_TRANSFER: from c823e06e to 81849a87STACK_TEXT: a0a56bed c823e06e badb0d00 00000000 20000000 nt!KiSystemFatalException+0xfWARNING: Frame IP not in any known module. Following frames may be wrong.a0a56c5d 8184603a 000000e4 0792f700 0792f6f0 0xc823e06ea0a56c5d 77cb0f34 000000e4 0792f700 0792f6f0 nt!KiFastCallEntry+0x12a0792f6d8 00000000 00000000 00000000 00000000 0x77cb0f34STACK_COMMAND: kbFOLLOWUP_IP: nt!KiSystemFatalException+f81849a87 c3 retSYMBOL_STACK_INDEX: 0SYMBOL_NAME: nt!KiSystemFatalException+fFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4a7965d1FAILURE_BUCKET_ID: 0x7f_d_nt!KiSystemFatalException+fBUCKET_ID: 0x7f_d_nt!KiSystemFatalException+fFollowup: MachineOwner----------------------FIND ntkrnlmp81800000 81b95000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\007D2674723E4F56955AE3149CC50AE22\ntkrnlmp.pdbLoaded symbol image file: ntkrnlmp.exeImage path: ntkrnlmp.exeImage name: ntkrnlmp.exeTimestamp: Wed Aug 05 06:58:25 2009 (4A7965D1)CheckSum: 00353013ImageSize: 00395000File version: 6.0.6000.16901Product version: 6.0.6000.16901File flags: 0 (Mask 3F)File OS: 40004 NT Win32File type: 1.0 AppFile date: 00000000.00000000Translations: 0409.04b0CompanyName: Microsoft CorporationProductName: Microsoft® Windows® Operating SystemInternalName: ntkrnlmp.exeOriginalFilename: ntkrnlmp.exeProductVersion: 6.0.6000.16901FileVersion: 6.0.6000.16901 (vista_gdr.090805-0102)FileDescription: NT Kernel & SystemLegalCopyright: © Microsoft Corporation. All rights reserved.MINI DUMP 1Loading Dump File [C:\Windows\Minidump\Mini011910-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatibleProduct: WinNt, suite: TerminalServer SingleUserTSBuilt by: 6000.16901.x86fre.vista_gdr.090805-0102Kernel base = 0x81800000 PsLoadedModuleList = 0x81908ad0Debug session time: Tue Jan 19 08:44:04.278 2010 (GMT-5)System Uptime: 0 days 16:54:12.403Loading Kernel Symbols............................................................................................................................................Loading User SymbolsLoading unloaded module list...................******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck 7F, {d, 0, 0, 0}Probably caused by : ntkrnlmp.exe ( nt!KiSystemFatalException+f )Followup: MachineOwner---------1: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************UNEXPECTED_KERNEL_MODE_TRAP (7f)This means a trap occurred in kernel mode, and it's a trap of a kindthat the kernel isn't allowed to have/catch (bound trap) or thatis always instant death (double fault). The first number in thebugcheck params is the number of the trap (8 = double fault, etc)Consult an Intel x86 family manual to learn more about what thesetraps are. Here is a *portion* of those codes:If kv shows a taskGateuse .tss on the part before the colon, then kv.Else if kv shows a trapframeuse .trap on that valueElse.trap on the appropriate frame will show where the trap was taken(on x86, this will be the ebp that goes with the procedure KiTrap)Endifkb will then show the corrected stack.Arguments:Arg1: 0000000d, EXCEPTION_GP_FAULTArg2: 00000000Arg3: 00000000Arg4: 00000000Debugging Details:------------------BUGCHECK_STR: 0x7f_dCUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTPROCESS_NAME: svchost.exeCURRENT_IRQL: 0UNALIGNED_STACK_POINTER: a0a56bd5LAST_CONTROL_TRANSFER: from c823e06e to 81849a87STACK_TEXT: a0a56bed c823e06e badb0d00 00000000 20000000 nt!KiSystemFatalException+0xfWARNING: Frame IP not in any known module. Following frames may be wrong.a0a56c5d 8184603a 000000e4 0792f700 0792f6f0 0xc823e06ea0a56c5d 77cb0f34 000000e4 0792f700 0792f6f0 nt!KiFastCallEntry+0x12a0792f6d8 00000000 00000000 00000000 00000000 0x77cb0f34STACK_COMMAND: kbFOLLOWUP_IP: nt!KiSystemFatalException+f81849a87 c3 retSYMBOL_STACK_INDEX: 0SYMBOL_NAME: nt!KiSystemFatalException+fFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4a7965d1FAILURE_BUCKET_ID: 0x7f_d_nt!KiSystemFatalException+fBUCKET_ID: 0x7f_d_nt!KiSystemFatalException+fFollowup: MachineOwner---------MINI DUMP 2Loading Dump File [C:\Windows\Minidump\Mini011810-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatibleProduct: WinNt, suite: TerminalServer SingleUserTSBuilt by: 6000.16901.x86fre.vista_gdr.090805-0102Kernel base = 0x81800000 PsLoadedModuleList = 0x81908ad0Debug session time: Mon Jan 18 14:39:04.406 2010 (GMT-5)System Uptime: 0 days 0:28:25.110Loading Kernel Symbols...........................................................................................................................................Loading User SymbolsLoading unloaded module list......******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck D1, {e9b66300, 2, 0, e9b66300}Unable to load image \SystemRoot\system32\DRIVERS\Rtlh86.sys, Win32 error 0n2*** WARNING: Unable to verify timestamp for Rtlh86.sys*** ERROR: Module load completed but symbols could not be loaded for Rtlh86.sysProbably caused by : tdx.sys ( tdx!TdxEventDisconnectConnection+1e9 )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If kernel debugger is available get stack backtrace.Arguments:Arg1: e9b66300, memory referencedArg2: 00000002, IRQLArg3: 00000000, value 0 = read operation, 1 = write operationArg4: e9b66300, address which referenced memoryDebugging Details:------------------READ_ADDRESS: GetPointerFromAddress: unable to read from 819275a0Unable to read MiSystemVaType memory at 819086a0e9b66300 CURRENT_IRQL: 2FAULTING_IP: +ffffffffe9b66300e9b66300 ?? ???CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xD1PROCESS_NAME: IdleTRAP_FRAME: 818e953c -- (.trap 0xffffffff818e953c)ErrCode = 00000000eax=00000000 ebx=81b98e10 ecx=84281602 edx=00000000 esi=841a1530 edi=8428168feip=e9b66300 esp=818e95b0 ebp=818e95e4 iopl=0 nv up ei ng nz na pe nccs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286e9b66300 ?? ???Resetting default scopeLAST_CONTROL_TRANSFER: from e9b66300 to 81849314FAILED_INSTRUCTION_ADDRESS: +ffffffffe9b66300e9b66300 ?? ???STACK_TEXT: 818e953c e9b66300 badb0d00 00000000 818e955c nt!KiTrap0E+0x2acWARNING: Frame IP not in any known module. Following frames may be wrong.818e95ac 8e009235 dfe8b08e 84198008 00000000 0xe9b66300818e95e4 8ef61584 e9b66300 84198008 83fa7590 tdx!TdxEventDisconnectConnection+0x1e9818e95f8 8ef5e0e4 00000002 00000001 83fa7590 tcpip!TcpNotifyDisconnectDelivery+0x25818e961c 8ef5e228 83fa7590 83fa7590 818e968c tcpip!TcpDeliverFinToClient+0x7e818e962c 8ef9d9c6 83fa7590 818e9728 83fa7590 tcpip!TcpAllowFin+0x85818e968c 8ef9a8eb dd926f0f 83fa7590 818e96b0 tcpip!TcpTcbCarefulDatagram+0x106e818e96e4 8ef978f7 85bc2a10 00fa7590 818e9728 tcpip!TcpTcbReceive+0x1a3818e971c 8ef977dd 85bc2a10 85bb8000 00000000 tcpip!TcpMatchReceive+0xff818e9764 8ef9c72d 85bc2a10 85bb8000 85bb8011 tcpip!TcpPreValidatedReceive+0x22d818e9780 8ef9c94f 85bc2a10 85bb8000 818e97bc tcpip!TcpReceive+0x2d818e9790 8ef8e3c4 818e97a4 c000023e 00000000 tcpip!TcpNlClientReceiveDatagrams+0x12818e97bc 8ef8e194 8efe1be4 818e9818 c000023e tcpip!IppDeliverListToProtocol+0x49818e97dc 8ef8e0c3 8efe1a00 00000006 818e9818 tcpip!IppProcessDeliverList+0x2a818e9830 8ef8972e 8efe1a00 00000006 00000000 tcpip!IppReceiveHeaderBatch+0x1da818e98c0 8ef8d9ea 85a48d38 00000000 8ddd5a01 tcpip!IpFlcReceivePackets+0xc06818e993c 8ef8d303 85ccc158 857e0cd8 00000000 tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x6db818e9964 899ec0b0 85ccc158 857e0cd8 00000000 tcpip!FlReceiveNetBufferListChain+0x104818e9998 899de8a2 004c5c58 857e0cd8 00000000 ndis!ndisMIndicateNetBufferListsToOpen+0xab818e99c0 899de819 00000000 00000001 85654000 ndis!ndisIndicateSortedNetBufferLists+0x4a818e9b3c 89926526 855aa0e8 00000000 00000000 ndis!ndisMDispatchReceiveNetBufferLists+0x129818e9b58 899de476 855aa0e8 857e0cd8 00000000 ndis!ndisMTopReceiveNetBufferLists+0x2c818e9b74 899264f1 855aa0e8 857e0cd8 00000000 ndis!ndisMIndicateReceiveNetBufferListsInternal+0x27818e9b90 8dde1051 855aa0e8 857e0cd8 00000000 ndis!NdisMIndicateReceiveNetBufferLists+0x20818e9c80 8ddd4bde 00654000 00000000 00000000 Rtlh86+0xf051818e9ca4 899de086 85654000 85654000 00000000 Rtlh86+0x2bde818e9cc8 89926252 858cf050 00000000 00000000 ndis!ndisMiniportDpc+0x81818e9ce8 8186af6e 858cf050 858cf008 00000000 ndis!ndisInterruptDpc+0x8b818e9d50 8183799e 00000000 0000000e 00000000 nt!KiRetireDpcList+0x147818e9d54 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x46STACK_COMMAND: kbFOLLOWUP_IP: tdx!TdxEventDisconnectConnection+1e98e009235 6806030000 push 306hSYMBOL_STACK_INDEX: 2SYMBOL_NAME: tdx!TdxEventDisconnectConnection+1e9FOLLOWUP_NAME: MachineOwnerMODULE_NAME: tdxIMAGE_NAME: tdx.sysDEBUG_FLR_IMAGE_TIMESTAMP: 4549b2feFAILURE_BUCKET_ID: 0xD1_CODE_AV_BAD_IP_tdx!TdxEventDisconnectConnection+1e9BUCKET_ID: 0xD1_CODE_AV_BAD_IP_tdx!TdxEventDisconnectConnection+1e9Followup: MachineOwner---------MINI DUMP 3Loading Dump File [C:\Windows\Minidump\Mini011710-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatibleProduct: WinNt, suite: TerminalServer SingleUserTSBuilt by: 6000.16901.x86fre.vista_gdr.090805-0102Kernel base = 0x81800000 PsLoadedModuleList = 0x81908ad0Debug session time: Sun Jan 17 07:15:01.709 2010 (GMT-5)System Uptime: 0 days 3:46:40.170Loading Kernel Symbols..........................................................................................................................................Loading User SymbolsLoading unloaded module list.......******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck A, {64000000, 2, 1, 81b98e89}Probably caused by : ntkrnlmp.exe ( nt!KiTrap0E+2ac )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************IRQL_NOT_LESS_OR_EQUAL (a)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If a kernel debugger is available get the stack backtrace.Arguments:Arg1: 64000000, memory referencedArg2: 00000002, IRQLArg3: 00000001, bitfield :bit 0 : value 0 = read operation, 1 = write operationbit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)Arg4: 81b98e89, address which referenced memoryDebugging Details:------------------WRITE_ADDRESS: GetPointerFromAddress: unable to read from 819275a0Unable to read MiSystemVaType memory at 819086a064000000 CURRENT_IRQL: 2FAULTING_IP: hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+2981b98e89 8902 mov dword ptr [edx],eaxCUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xAPROCESS_NAME: wininit.exeTRAP_FRAME: 8edd03d8 -- (.trap 0xffffffff8edd03d8)ErrCode = 00000002eax=8edd045c ebx=c00000d8 ecx=86804abc edx=64000000 esi=8912cd78 edi=86804a88eip=81b98e89 esp=8edd044c ebp=8edd0468 iopl=0 nv up ei ng nz na pe nccs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x29:81b98e89 8902 mov dword ptr [edx],eax ds:0023:64000000=????????Resetting default scopeLAST_CONTROL_TRANSFER: from 81b98e89 to 81849314STACK_TEXT: 8edd03d8 81b98e89 badb0d00 64000000 00000000 nt!KiTrap0E+0x2ac8edd0448 81863825 00000000 cc544688 c00000d8 hal!KeAcquireInStackQueuedSpinLockRaiseToSynch+0x298edd0468 89f109c3 86804a88 86804d01 8edd049c nt!ExAcquireResourceExclusiveLite+0x258edd0478 89f10884 861f8918 cc544688 86804d01 Ntfs!NtfsAcquireResourceExclusive+0x1e8edd049c 89f6a663 861f8918 cc544688 00000000 Ntfs!NtfsAcquireExclusiveFcb+0x428edd0534 89f80c3e 861f8918 8527c548 00000001 Ntfs!NtfsFlushVolume+0x1498edd05b0 89f810d5 861f8918 84d54268 8e54f587 Ntfs!NtfsCommonFlushBuffers+0x1c78edd0618 81867ab9 8527c490 84d54268 84d54268 Ntfs!NtfsFsdFlushBuffers+0xf48edd0630 89a3ea5c 85982a90 84d54268 00000000 nt!IofCallDriver+0x638edd0654 89a3ec18 8edd0674 85982a90 00000000 fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x22a8edd068c 81867ab9 85982a90 84d54268 84d54268 fltmgr!FltpDispatch+0xc28edd06a4 819c82bb 84d54268 864bfb80 8630ea20 nt!IofCallDriver+0x638edd06c4 81a09d29 85982a90 8630ea20 00000000 nt!IopSynchronousServiceTail+0x1e08edd0730 8184603a 80000a00 8edd07f0 8edd0a04 nt!NtFlushBuffersFile+0x1e68edd0730 818440e1 80000a00 8edd07f0 8edd0a04 nt!KiFastCallEntry+0x12a8edd07b0 81abd893 80000a74 8edd07f0 00000000 nt!ZwFlushBuffersFile+0x118edd0a04 81abd72a 8edd0a4c 00000004 818f3fec nt!PopFlushVolumeWorker+0x13c8edd0a68 81abddc7 00000001 8eddb0d0 8edd0ba4 nt!PopFlushVolumes+0x2df8edd0b90 8184603a 00000006 00000000 00000004 nt!NtSetSystemPowerState+0x46d8edd0b90 81844f19 00000006 00000000 00000004 nt!KiFastCallEntry+0x12a8edd0c14 81abda10 00000006 00000004 c0000004 nt!ZwSetSystemPowerState+0x118edd0d44 81a8d85b 00000006 00000004 c0000004 nt!NtSetSystemPowerState+0xc08edd0d58 8184603a 00000002 0021fe90 772d0f34 nt!NtShutdownSystem+0x328edd0d58 772d0f34 00000002 0021fe90 772d0f34 nt!KiFastCallEntry+0x12aWARNING: Frame IP not in any known module. Following frames may be wrong.0021fe90 00000000 00000000 00000000 00000000 0x772d0f34STACK_COMMAND: kbFOLLOWUP_IP: nt!KiTrap0E+2ac81849314 833d00f8918100 cmp dword ptr [nt!KiFreezeFlag (8191f800)],0SYMBOL_STACK_INDEX: 0SYMBOL_NAME: nt!KiTrap0E+2acFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 4a7965d1FAILURE_BUCKET_ID: 0xA_W_nt!KiTrap0E+2acBUCKET_ID: 0xA_W_nt!KiTrap0E+2acFollowup: MachineOwner---------MINI DUMP 4Loading Dump File [C:\Windows\Minidump\Mini110909-01.dmp]Mini Kernel Dump File: Only registers and stack trace are availableSymbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbolsExecutable search path is: Windows Vista Kernel Version 6000 MP (2 procs) Free x86 compatibleProduct: WinNt, suite: TerminalServer SingleUserTSBuilt by: 6000.16901.x86fre.vista_gdr.090805-0102Kernel base = 0x81c00000 PsLoadedModuleList = 0x81d08ad0Debug session time: Mon Nov 9 10:23:12.817 2009 (GMT-5)System Uptime: 1 days 13:35:28.432Loading Kernel Symbols........................................................................................................................................Loading User SymbolsLoading unloaded module list..................................................******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************Use !analyze -v to get detailed debugging information.BugCheck D1, {3, 2, 1, 89dfd53a}Probably caused by : NETIO.SYS ( NETIO!InvalidateFlowContextTable+c )Followup: MachineOwner---------0: kd> !analyze -v******************************************************************************** ** Bugcheck Analysis ** ********************************************************************************DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)An attempt was made to access a pageable (or completely invalid) address at aninterrupt request level (IRQL) that is too high. This is usuallycaused by drivers using improper addresses.If kernel debugger is available get stack backtrace.Arguments:Arg1: 00000003, memory referencedArg2: 00000002, IRQLArg3: 00000001, value 0 = read operation, 1 = write operationArg4: 89dfd53a, address which referenced memoryDebugging Details:------------------WRITE_ADDRESS: GetPointerFromAddress: unable to read from 81d275a0Unable to read MiSystemVaType memory at 81d086a000000003 CURRENT_IRQL: 2FAULTING_IP: NETIO!InvalidateFlowContextTable+c89dfd53a 83480401 or dword ptr [eax+4],1CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULTBUGCHECK_STR: 0xD1PROCESS_NAME: SystemTRAP_FRAME: 8a1c1bd4 -- (.trap 0xffffffff8a1c1bd4)ErrCode = 00000002eax=ffffffff ebx=842ab701 ecx=ffffffff edx=00000002 esi=00000000 edi=84095c40eip=89dfd53a esp=8a1c1c48 ebp=8a1c1c48 iopl=0 nv up ei ng nz na pe nccs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286NETIO!InvalidateFlowContextTable+0xc:89dfd53a 83480401 or dword ptr [eax+4],1 ds:0023:00000003=????????Resetting default scopeLAST_CONTROL_TRANSFER: from 89dfd53a to 81c49314STACK_TEXT: 8a1c1bd4 89dfd53a badb0d00 00000002 83a6aa14 nt!KiTrap0E+0x2ac8a1c1c48 89dec376 ffffffff 842ab74c 842ab730 NETIO!InvalidateFlowContextTable+0xc8a1c1c68 89dec407 0001e98f 00000000 842ab74c NETIO!WfpProcessFlowDelete+0x318a1c1c7c 89dec3d9 0001e98f 00000000 842ab74c NETIO!KfdNotifyFlowDeletion+0x198a1c1c94 9038440a 842ab730 903ee474 00000000 NETIO!KfdAleNotifyFlowDeletion+0x188a1c1cb4 903942f6 842ab710 8a1c1cf8 90385287 tcpip!WfpAleFreeRemoteEndpoint+0x1c8a1c1cc0 90385287 842ab750 81f98f00 903edbe0 tcpip!WfpAleDecrementWaitRef+0x658a1c1cf8 903852b4 903edbe0 903ee480 8a1c1d2c tcpip!WfpAlepDeleteDeferredEntries+0x1178a1c1d08 89dec4cd 903ee4b4 81cf563c 854cbf18 tcpip!WfpAlepDeferredCleanupWorkQueueRoutine+0x158a1c1d2c 81e190d6 854cbf18 903ee480 85dcadb0 NETIO!NetiopIoWorkItemRoutine+0x2f8a1c1d44 81c6b69a 85dcadb0 00000000 83a97828 nt!IopProcessWorkItem+0x2d8a1c1d7c 81dafc1d 85dcadb0 8a1ca680 00000000 nt!ExpWorkerThread+0xfd8a1c1dc0 81c9a31e 81c6b59d 00000001 00000000 nt!PspSystemThreadStartup+0x9d00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16STACK_COMMAND: kbFOLLOWUP_IP: NETIO!InvalidateFlowContextTable+c89dfd53a 83480401 or dword ptr [eax+4],1SYMBOL_STACK_INDEX: 1SYMBOL_NAME: NETIO!InvalidateFlowContextTable+cFOLLOWUP_NAME: MachineOwnerMODULE_NAME: NETIOIMAGE_NAME: NETIO.SYSDEBUG_FLR_IMAGE_TIMESTAMP: 4a85738fFAILURE_BUCKET_ID: 0xD1_W_NETIO!InvalidateFlowContextTable+cBUCKET_ID: 0xD1_W_NETIO!InvalidateFlowContextTable+cFollowup: MachineOwner---------0: kd> lmvm NETIOstart end module name89de7000 89e20000 NETIO (pdb symbols) c:\symbols\netio.pdb\FEC6313DC17648DCAC69527EE2EE07E02\netio.pdbLoaded symbol image file: NETIO.SYSMapped memory image file: c:\symbols\NETIO.SYS\4A85738F39000\NETIO.SYSImage path: \SystemRoot\system32\drivers\NETIO.SYSImage name: NETIO.SYSTimestamp: Fri Aug 14 10:24:15 2009 (4A85738F)CheckSum: 00037A30ImageSize: 00039000File version: 6.0.6000.16908Product version: 6.0.6000.16908File flags: 0 (Mask 3F)File OS: 40004 NT Win32File type: 3.6 DriverFile date: 00000000.00000000Translations: 0409.04b0CompanyName: Microsoft CorporationProductName: Microsoft® Windows® Operating SystemInternalName: netio.sysOriginalFilename: netio.sysProductVersion: 6.0.6000.16908FileVersion: 6.0.6000.16908 (vista_gdr.090814-0321)FileDescription: Network I/O SubsystemLegalCopyright: © Microsoft Corporation. All rights reserved.
MagicAndre1981 Posted January 27, 2010 Posted January 27, 2010 please install Sp1 and Sp2! Both SPs included a lot of fixes. Do you still get the BSODs?
cluberti Posted January 27, 2010 Posted January 27, 2010 Hard to say what is happening from that mish mash of data without being able to interrogate memory, but I would say it's likely a driver issue or a bug that's been fixed since RTM. I would agree with MagicAndre, you should install SP2 and update your drivers for starters. If the issues continue, configure the system for a complete dump (with the requisite paging file size configured on the Windows volume) to get some real data about the issues.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now