BSOD ridiculous..

Joined
Dec 19, 2010
Messages
10
Reaction score
0
same BS driver_irql_not_less_or_equal.

system info:
Asus P5NT-Deluxe
4gigs of corsair dominator 1066ddr2
intel q6600.
HDs-2 wd raptors, 2 samsung 750gbs, 1 wd 1tb.

I'm using a pretty obscure wireless device I just had laying around as I'm a little far with this box from my router to run a line currently. its an airlive wl-5480USB-50v2

I installed the drivers fine and everything worked well for.. 8 hours I'd imagine. Now I get a BSOD within the first 45 seconds of booting up.

I must say, Im a linux guy by nature and am on the box in question with absolutely zero stability issues and all hardware running fine. I'm starting to remember why vista pushed me away from windows in the first place. any help? thanks.

CM
 

Attachments

Joined
Dec 19, 2010
Messages
10
Reaction score
0
forgot to include i dropped to a single video card(nvidia 8800ultra) and also have an x-fi xtremegamer fatality edition as well.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Hello and welcome to the forums. : )

The culprit is NVIDIA nForce(TM) SATA Driver nvstor.sys. Visit both your motherboard and NVIDIA support sites to update nForce:

nvm62x64.sys Fri Oct 17 17:01:06 2008
nvstor.sys Wed May 20 02:45:37 2009

nvm62x64.sys is quite notorious and if there's no update then dowload one for a higher nForce version, extract it to a folder with 7zip, and copy nvm62x64.sys to C:\Windows\system32\drivers, overwriting the current file.


Update Creative AC3 SW Decoder Device Driver:

ctac32k.sys Wed Jul 02 04:38:22 2008


Update Atheros Extensible Wireless LAN device driver:

athrxu6.sys Fri Apr 20 09:31:41 2007







Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-23868-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a02000 PsLoadedModuleList = 0xfffff800`02c3fe50
Debug session time: Sun Dec 19 09:28:25.402 2010 (UTC - 5:00)
System Uptime: 0 days 13:32:50.681
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {424c5324968, 2, 0, fffff880011160ed}

*** WARNING: Unable to verify timestamp for nvstor.sys
*** ERROR: Module load completed but symbols could not be loaded for nvstor.sys
Probably caused by : storport.sys ( storport!StorPortNotification+3d )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000424c5324968, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880011160ed, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002caa0e0
 00000424c5324968 

CURRENT_IRQL:  2

FAULTING_IP: 
storport!StorPortNotification+3d
fffff880`011160ed 488b4268        mov     rax,qword ptr [rdx+68h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  csrss.exe

TRAP_FRAME:  fffff80000ba2b00 -- (.trap 0xfffff80000ba2b00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800a1b46b0 rbx=0000000000000000 rcx=0000000000000000
rdx=00000424c5324900 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880011160ed rsp=fffff80000ba2c90 rbp=fffffa8004634220
 r8=fffff8800a1b46b0  r9=fffff80000ba2d20 r10=fffffa80046e2008
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
storport!StorPortNotification+0x3d:
fffff880`011160ed 488b4268        mov     rax,qword ptr [rdx+68h] ds:2000:00000424`c5324968=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a73469 to fffff80002a73f00

STACK_TEXT:  
fffff800`00ba29b8 fffff800`02a73469 : 00000000`0000000a 00000424`c5324968 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00ba29c0 fffff800`02a720e0 : fffffa80`071a3000 fffffa80`046db600 fffffa80`0767f010 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba2b00 fffff880`011160ed : 00000000`00000004 00000424`c530c0ae fffffa80`046e2000 00000000`00000004 : nt!KiPageFault+0x260
fffff800`00ba2c90 fffff880`011029ed : 00000424`c5325a9a fffffa80`046e2008 fffff880`0a1b46b0 00000000`00000000 : storport!StorPortNotification+0x3d
fffff800`00ba2d10 00000424`c5325a9a : fffffa80`046e2008 fffff880`0a1b46b0 00000000`00000000 00000000`00000000 : nvstor+0x189ed
fffff800`00ba2d18 fffffa80`046e2008 : fffff880`0a1b46b0 00000000`00000000 00000000`00000000 fffff880`010f22f1 : 0x424`c5325a9a
fffff800`00ba2d20 fffff880`0a1b46b0 : 00000000`00000000 00000000`00000000 fffff880`010f22f1 fffff880`0370b380 : 0xfffffa80`046e2008
fffff800`00ba2d28 00000000`00000000 : 00000000`00000000 fffff880`010f22f1 fffff880`0370b380 00000000`00000000 : 0xfffff880`0a1b46b0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
storport!StorPortNotification+3d
fffff880`011160ed 488b4268        mov     rax,qword ptr [rdx+68h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  storport!StorPortNotification+3d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storport

IMAGE_NAME:  storport.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcace

FAILURE_BUCKET_ID:  X64_0xD1_storport!StorPortNotification+3d

BUCKET_ID:  X64_0xD1_storport!StorPortNotification+3d

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-23946-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a07000 PsLoadedModuleList = 0xfffff800`02c44e50
Debug session time: Sat Dec 18 19:27:20.896 2010 (UTC - 5:00)
System Uptime: 0 days 0:25:32.175
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : storport.sys ( storport!RaidpAdapterDpcRoutine+4d )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+6362626438326530
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  lpremove.exe

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff800054c4c88 -- (.exr 0xfffff800054c4c88)
ExceptionAddress: fffff880010028cd (storport!RaidpAdapterDpcRoutine+0x000000000000004d)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff800054c4d30 -- (.trap 0xfffff800054c4d30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800772db30 rbx=0000000000000000 rcx=fffffa800772db10
rdx=fffffa800772db10 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010028cd rsp=fffff800054c4ec0 rbp=fffffa8004936060
 r8=fffffa800772db30  r9=0000000000000000 r10=fffffa8004936290
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
storport!RaidpAdapterDpcRoutine+0x4d:
fffff880`010028cd ff9250020000    call    qword ptr [rdx+250h] ds:4ea0:fffffa80`0772dd60=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a70c2e to fffff80002a78ed0

STACK_TEXT:  
fffff800`054c3d68 fffff800`02a70c2e : fffffa80`00000000 fffffa80`06edac88 fffff800`054c44e0 fffff800`02aa5e28 : nt!KeBugCheck
fffff800`054c3d70 fffff800`02a9ebed : fffff800`02c85c24 fffff800`02bbea3c fffff800`02a07000 fffff800`054c4c88 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`054c3da0 fffff800`02aa6250 : fffff800`02bc6a88 fffff800`054c3e18 fffff800`054c4c88 fffff800`02a07000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`054c3dd0 fffff800`02ab31b5 : fffff800`054c4c88 fffff800`054c44e0 fffff800`00000000 fffffa80`049361b0 : nt!RtlDispatchException+0x410
fffff800`054c44b0 fffff800`02a78542 : fffff800`054c4c88 00000000`00000000 fffff800`054c4d30 fffff780`00000320 : nt!KiDispatchException+0x135
fffff800`054c4b50 fffff800`02a76e4a : 00000000`00000000 fffff880`011a32f1 fffff880`03709380 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff800`054c4d30 fffff880`010028cd : fffff800`02bf1e80 fffff880`011b13dd 00000000`ffffffed fffffa80`04936060 : nt!KiGeneralProtectionFault+0x10a
fffff800`054c4ec0 fffff800`02a845dc : fffff800`02bf1e80 fffffa80`00000000 fffffa80`04936128 00000000`000000a1 : storport!RaidpAdapterDpcRoutine+0x4d
fffff800`054c4f00 fffff800`02a7f065 : 00000000`00000000 fffffa80`042beb60 00000000`00000000 fffff880`01002880 : nt!KiRetireDpcList+0x1bc
fffff800`054c4fb0 fffff800`02a7ee7c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`0949b450 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue


STACK_COMMAND:  kb

FOLLOWUP_IP: 
storport!RaidpAdapterDpcRoutine+4d
fffff880`010028cd ff9250020000    call    qword ptr [rdx+250h]

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  storport!RaidpAdapterDpcRoutine+4d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storport

IMAGE_NAME:  storport.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcace

FAILURE_BUCKET_ID:  X64_0x1E_0_storport!RaidpAdapterDpcRoutine+4d

BUCKET_ID:  X64_0x1E_0_storport!RaidpAdapterDpcRoutine+4d

Followup: MachineOwner
---------





















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121810-23275-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a65000 PsLoadedModuleList = 0xfffff800`02ca2e50
Debug session time: Sat Dec 18 19:54:14.776 2010 (UTC - 5:00)
System Uptime: 0 days 0:25:31.664
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck D1, {357bff05d68, 2, 0, fffff8800106e0ed}

*** WARNING: Unable to verify timestamp for nvstor.sys
*** ERROR: Module load completed but symbols could not be loaded for nvstor.sys
Probably caused by : storport.sys ( storport!StorPortNotification+3d )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 00000357bff05d68, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800106e0ed, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0d0e0
 00000357bff05d68 

CURRENT_IRQL:  2

FAULTING_IP: 
storport!StorPortNotification+3d
fffff880`0106e0ed 488b4268        mov     rax,qword ptr [rdx+68h]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xD1

PROCESS_NAME:  System

TRAP_FRAME:  fffff88002f92b00 -- (.trap 0xfffff88002f92b00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880076286b0 rbx=0000000000000000 rcx=0000000000000000
rdx=00000357bff05d00 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800106e0ed rsp=fffff88002f92c90 rbp=fffffa8004616220
 r8=fffff880076286b0  r9=fffff88002f92d20 r10=fffffa80046c3008
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
storport!StorPortNotification+0x3d:
fffff880`0106e0ed 488b4268        mov     rax,qword ptr [rdx+68h] ds:3000:00000357`bff05d68=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ad6469 to fffff80002ad6f00

STACK_TEXT:  
fffff880`02f929b8 fffff800`02ad6469 : 00000000`0000000a 00000357`bff05d68 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f929c0 fffff800`02ad50e0 : fffffa80`04988190 fffffa80`046bd600 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02f92b00 fffff880`0106e0ed : 00000000`00000004 00000357`bfef4ead fffffa80`046c3000 00000000`00000004 : nt!KiPageFault+0x260
fffff880`02f92c90 fffff880`0105a9ed : 00000357`bff1007c fffffa80`046c3008 fffff880`076286b0 00000000`00000000 : storport!StorPortNotification+0x3d
fffff880`02f92d10 00000357`bff1007c : fffffa80`046c3008 fffff880`076286b0 00000000`00000000 00000000`00000000 : nvstor+0x189ed
fffff880`02f92d18 fffffa80`046c3008 : fffff880`076286b0 00000000`00000000 00000000`00000000 fffff880`0104a2f1 : 0x357`bff1007c
fffff880`02f92d20 fffff880`076286b0 : 00000000`00000000 00000000`00000000 fffff880`0104a2f1 fffff880`0370c380 : 0xfffffa80`046c3008
fffff880`02f92d28 00000000`00000000 : 00000000`00000000 fffff880`0104a2f1 fffff880`0370c380 00000000`00000000 : 0xfffff880`076286b0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
storport!StorPortNotification+3d
fffff880`0106e0ed 488b4268        mov     rax,qword ptr [rdx+68h]

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  storport!StorPortNotification+3d

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storport

IMAGE_NAME:  storport.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcace

FAILURE_BUCKET_ID:  X64_0xD1_storport!StorPortNotification+3d

BUCKET_ID:  X64_0xD1_storport!StorPortNotification+3d

Followup: MachineOwner
---------




















Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-27721-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a04000 PsLoadedModuleList = 0xfffff800`02c41e50
Debug session time: Sun Dec 19 14:52:50.973 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:42.252
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\nvstor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvstor.sys
*** ERROR: Module load completed but symbols could not be loaded for nvstor.sys
Probably caused by : storport.sys ( storport!StorPortNotification+46 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+6362626438326530
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  wow_helper.exe

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000ba2a58 -- (.exr 0xfffff80000ba2a58)
ExceptionAddress: fffff880010d00f6 (storport!StorPortNotification+0x0000000000000046)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000ba2b00 -- (.trap 0xfffff80000ba2b00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=02b917eb0004fe31 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80002a718e3 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010d00f6 rsp=fffff80000ba2c90 rbp=fffffa80048e1220
 r8=fffff880028eb6b0  r9=fffff80000ba2d20 r10=fffffa8004926008
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
storport!StorPortNotification+0x46:
fffff880`010d00f6 c6808d000000ab  mov     byte ptr [rax+8Dh],0ABh ds:6000:02b917eb`0004febe=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a6dc2e to fffff80002a75ed0

STACK_TEXT:  
fffff800`00ba1b38 fffff800`02a6dc2e : fffffa80`06ec34f0 fffffa80`04fb91a0 fffff800`00ba22b0 fffff800`02aa2e28 : nt!KeBugCheck
fffff800`00ba1b40 fffff800`02a9bbed : fffff800`02c82c24 fffff800`02bbba3c fffff800`02a04000 fffff800`00ba2a58 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00ba1b70 fffff800`02aa3250 : fffff800`02bc3a88 fffff800`00ba1be8 fffff800`00ba2a58 fffff800`02a04000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00ba1ba0 fffff800`02ab01b5 : fffff800`00ba2a58 fffff800`00ba22b0 fffff800`00000000 fffff880`028eb6b0 : nt!RtlDispatchException+0x410
fffff800`00ba2280 fffff800`02a75542 : fffff800`00ba2a58 fffffa80`048d81b0 fffff800`00ba2b00 fffffa80`04926008 : nt!KiDispatchException+0x135
fffff800`00ba2920 fffff800`02a73e4a : fffffa80`04bf8190 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff800`00ba2b00 fffff880`010d00f6 : 00000000`00000004 00000039`58d24133 fffffa80`04926000 00000000`00000004 : nt!KiGeneralProtectionFault+0x10a
fffff800`00ba2c90 fffff880`00c429ed : 00000039`58d3ca48 fffffa80`04926008 fffff880`028eb6b0 00000000`00000000 : storport!StorPortNotification+0x46
fffff800`00ba2d10 00000039`58d3ca48 : fffffa80`04926008 fffff880`028eb6b0 00000000`00000000 00000000`00000000 : nvstor+0x189ed
fffff800`00ba2d18 fffffa80`04926008 : fffff880`028eb6b0 00000000`00000000 00000000`00000000 fffff880`00c322f1 : 0x39`58d3ca48
fffff800`00ba2d20 fffff880`028eb6b0 : 00000000`00000000 00000000`00000000 fffff880`00c322f1 fffff880`0370c380 : 0xfffffa80`04926008
fffff800`00ba2d28 00000000`00000000 : 00000000`00000000 fffff880`00c322f1 fffff880`0370c380 00000000`00000000 : 0xfffff880`028eb6b0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
storport!StorPortNotification+46
fffff880`010d00f6 c6808d000000ab  mov     byte ptr [rax+8Dh],0ABh

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  storport!StorPortNotification+46

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storport

IMAGE_NAME:  storport.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcace

FAILURE_BUCKET_ID:  X64_0x1E_0_storport!StorPortNotification+46

BUCKET_ID:  X64_0x1E_0_storport!StorPortNotification+46

Followup: MachineOwner
---------


Drivers:

Code:
start             end                 module name
fffff880`05917000 fffff880`05955000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f17000 fffff880`00f6e000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`03e17000 fffff880`03ea1000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05800000 fffff880`05816000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`01131000 fffff880`0113c000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00de6000 fffff880`00def000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c00000 fffff880`00c2a000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01ed5000 fffff880`01fd7000   athrxu6  athrxu6.sys  Fri Apr 20 09:31:41 2007 (4628C0BD)
fffff880`0197f000 fffff880`01986000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`042ff000 fffff880`04310000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`06b59000 fffff880`06b77000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00770000 fffff960`00797000   cdd      cdd.dll      Mon Jul 13 21:25:40 2009 (4A5BDE94)
fffff880`0194c000 fffff880`01976000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00d0c000 fffff880`00dcc000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`018c6000 fffff880`018f6000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00cae000 fffff880`00d0c000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`059dd000 fffff880`059ed000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`01fd7000 fffff880`01fe5000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0425e000 fffff880`042e1000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`05dc6000 fffff880`05dfb000   CT20XUT  CT20XUT.SYS  Wed May 05 09:01:28 2010 (4BE16C28)
fffff880`05d18000 fffff880`05dc6000   ctac32k  ctac32k.sys  Wed Jul 02 04:38:22 2008 (486B3E7E)
fffff880`0434c000 fffff880`043f1700   ctaud2k  ctaud2k.sys  Wed May 05 08:59:48 2010 (4BE16BC4)
fffff880`0661d000 fffff880`0677a000   CTEXFIFX CTEXFIFX.SYS Wed May 05 09:01:21 2010 (4BE16C21)
fffff880`06400000 fffff880`0641b000   CTHWIUT  CTHWIUT.SYS  Wed May 05 09:01:32 2010 (4BE16C2C)
fffff880`058d8000 fffff880`05909000   ctoss2k  ctoss2k.sys  Wed May 05 08:57:46 2010 (4BE16B4A)
fffff880`05909000 fffff880`05911000   ctprxy2k ctprxy2k.sys Wed May 05 08:59:51 2010 (4BE16BC7)
fffff880`05ce0000 fffff880`05d18000   ctsfm2k  ctsfm2k.sys  Wed May 05 08:57:33 2010 (4BE16B3D)
fffff880`042e1000 fffff880`042ff000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`03fbb000 fffff880`03fca000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`018b0000 fffff880`018c6000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`03fca000 fffff880`03fec000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`01fe5000 fffff880`01fef000   dump_diskdump dump_diskdump.sys Mon Jul 13 20:01:00 2009 (4A5BCABC)
fffff880`01e2b000 fffff880`01e3e000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`01e00000 fffff880`01e2b000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`01e3e000 fffff880`01e4a000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0562b000 fffff880`0571f000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`0571f000 fffff880`05765000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`065aa000 fffff880`065f4000   emupia2k emupia2k.sys Wed May 05 08:57:27 2010 (4BE16B37)
fffff880`05765000 fffff880`05772000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`01188000 fffff880`0119c000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`043f2000 fffff880`043fd000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`0113c000 fffff880`01188000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01876000 fffff880`018b0000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`0148b000 fffff880`014d5000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`06429000 fffff880`065aa000   ha20x2k  ha20x2k.sys  Wed May 05 08:59:10 2010 (4BE16B9E)
fffff800`02fe1000 fffff800`0302a000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`05955000 fffff880`05979000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`0678f000 fffff880`067eb000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05c00000 fffff880`05c19000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`0641b000 fffff880`06423080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`067ed000 fffff880`067fb000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`06a91000 fffff880`06b59000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`0186d000 fffff880`01876000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`04336000 fffff880`0434c000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`053e2000 fffff880`053f1000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`01e4a000 fffff880`01e58000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bbe000 fffff800`00bc1000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`05895000 fffff880`058d8000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013d5000 fffff880`013ef000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`05911000 fffff880`05916200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`01eaa000 fffff880`01ebf000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`01e66000 fffff880`01e89000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c56000 fffff880`00c9a000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`01e58000 fffff880`01e66000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`053f1000 fffff880`05400000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05c19000 fffff880`05c26000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00dcc000 fffff880`00de6000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`06b77000 fffff880`06b8f000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06b8f000 fffff880`06bbb000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`06a00000 fffff880`06a4d000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`06a4d000 fffff880`06a70000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`019e4000 fffff880`019ef000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f77000 fffff880`00f81000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0119c000 fffff880`011fa000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`03fb0000 fffff880`03fbb000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`0185b000 fffff880`0186d000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014dc000 fffff880`015ce000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0583a000 fffff880`05846000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`01ebf000 fffff880`01ed2000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`05846000 fffff880`05875000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0677a000 fffff880`0678f000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`03f15000 fffff880`03f24000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`03ea1000 fffff880`03ee6000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`019ef000 fffff880`01a00000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`03fa4000 fffff880`03fb0000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a04000 fffff800`02fe1000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`01232000 fffff880`013d5000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`01976000 fffff880`0197f000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`053e0000 fffff880`053e1180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`04806000 fffff880`053dfa80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`05979000 fffff880`059dcd80   nvm62x64 nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
fffff880`00c2a000 fffff880`00c55000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`05c26000 fffff880`05c79000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`03eef000 fffff880`03f15000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00fc1000 fffff880`00fd6000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f81000 fffff880`00fb4000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e5c000 fffff880`00e63000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00feb000 fffff880`00ffb000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013ef000 fffff880`01400000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06ed0000 fffff880`06f76000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04200000 fffff880`0423d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c9a000 fffff880`00cae000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`05816000 fffff880`0583a000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`05875000 fffff880`05890000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0423d000 fffff880`0425e000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`05611000 fffff880`0562b000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`03f53000 fffff880`03fa4000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`059ed000 fffff880`059f8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`019c9000 fffff880`019d2000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019d2000 fffff880`019db000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`019db000 fffff880`019e4000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`01821000 fffff880`0185b000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`018f6000 fffff880`0190e000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06f76000 fffff880`06f81000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0578f000 fffff880`0579b000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05772000 fffff880`0578f000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`015de000 fffff880`015e6000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`08247000 fffff880`082df000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`06e00000 fffff880`06e69000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`06f81000 fffff880`06fae000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`010cf000 fffff880`01131000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`059f8000 fffff880`059f9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`06fae000 fffff880`06fc0000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`015e6000 fffff880`015f3000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`01800000 fffff880`0181e000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`03f3f000 fffff880`03f53000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004f0000 fffff960`004fa000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`04310000 fffff880`04336000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`03fec000 fffff880`03ffe000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06600000 fffff880`0661d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`067eb000 fffff880`067ecf00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`05600000 fffff880`05611000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05c86000 fffff880`05ce0000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`0579b000 fffff880`057a6000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`057a6000 fffff880`057fc000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00fb4000 fffff880`00fc1000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01986000 fffff880`01994000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`01994000 fffff880`019b9000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`015ce000 fffff880`015de000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fd6000 fffff880`00feb000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00e00000 fffff880`00e5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01073000 fffff880`010bf000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`03f24000 fffff880`03f3f000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`019b9000 fffff880`019c9000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e64000 fffff880`00f08000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f08000 fffff880`00f17000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03ee6000 fffff880`03eef000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`00090000 fffff960`0039f000   win32k   win32k.sys   Mon Jul 13 19:40:16 2009 (4A5BC5E0)
fffff880`00f6e000 fffff880`00f77000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01e89000 fffff880`01eaa000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`018f6000 fffff880`01904000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`01904000 fffff880`0190e000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`0190e000 fffff880`01939000   dump_nvstor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`01939000 fffff880`0194c000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
Dec 19, 2010
Messages
10
Reaction score
0
well, i downloaded the respective drivers to update in linux, rebooted into safe mode, went to update the nForce driver and got the same BSOD very quickly into the update. Any ideas? if not i'm scrapping windows back to the pit it came from.
 
Joined
Dec 19, 2010
Messages
10
Reaction score
0
i've ran memory test several times and it all passes fine. i run other operating systems on this same machine and never have any issues which makes me really doubt i have a hardware issue. and if i have a hardware issue that's so awful that $300 windows can't deal with it, but every single free version of linux can, well, that's ensured my basic windows is awful rational.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Your nForce drivers are bugging out:

Code:
BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\nvstor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvstor.sys
*** ERROR: Module load completed but symbols could not be loaded for nvstor.sys
Probably caused by : storport.sys ( storport!StorPortNotification+46 )

Atheros Extensible Wireless LAN is gone, no sign of it. But the two other drivers haven't been updated:

Creative AC3 SW Decoder Device Driver:
ctac32k.sys Wed Jul 02 04:38:22 2008

nForce Networking:
nvm62x64.sys 2008


Do update those drivers. If you can't then you may want to risk renaming them to .bak - a good chance it'll stop BSOD's but it'll also brake their functionality.


Crash Dumps:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-27721-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a04000 PsLoadedModuleList = 0xfffff800`02c41e50
Debug session time: Sun Dec 19 14:52:50.973 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:42.252
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Unable to load image \SystemRoot\system32\DRIVERS\nvstor.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvstor.sys
*** ERROR: Module load completed but symbols could not be loaded for nvstor.sys
Probably caused by : storport.sys ( storport!StorPortNotification+46 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) -                           .

FAULTING_IP: 
+6362626438326530
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  wow_helper.exe

CURRENT_IRQL:  2

EXCEPTION_RECORD:  fffff80000ba2a58 -- (.exr 0xfffff80000ba2a58)
ExceptionAddress: fffff880010d00f6 (storport!StorPortNotification+0x0000000000000046)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

TRAP_FRAME:  fffff80000ba2b00 -- (.trap 0xfffff80000ba2b00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=02b917eb0004fe31 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff80002a718e3 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880010d00f6 rsp=fffff80000ba2c90 rbp=fffffa80048e1220
 r8=fffff880028eb6b0  r9=fffff80000ba2d20 r10=fffffa8004926008
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
storport!StorPortNotification+0x46:
fffff880`010d00f6 c6808d000000ab  mov     byte ptr [rax+8Dh],0ABh ds:6000:02b917eb`0004febe=??
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a6dc2e to fffff80002a75ed0

STACK_TEXT:  
fffff800`00ba1b38 fffff800`02a6dc2e : fffffa80`06ec34f0 fffffa80`04fb91a0 fffff800`00ba22b0 fffff800`02aa2e28 : nt!KeBugCheck
fffff800`00ba1b40 fffff800`02a9bbed : fffff800`02c82c24 fffff800`02bbba3c fffff800`02a04000 fffff800`00ba2a58 : nt!KiKernelCalloutExceptionHandler+0xe
fffff800`00ba1b70 fffff800`02aa3250 : fffff800`02bc3a88 fffff800`00ba1be8 fffff800`00ba2a58 fffff800`02a04000 : nt!RtlpExecuteHandlerForException+0xd
fffff800`00ba1ba0 fffff800`02ab01b5 : fffff800`00ba2a58 fffff800`00ba22b0 fffff800`00000000 fffff880`028eb6b0 : nt!RtlDispatchException+0x410
fffff800`00ba2280 fffff800`02a75542 : fffff800`00ba2a58 fffffa80`048d81b0 fffff800`00ba2b00 fffffa80`04926008 : nt!KiDispatchException+0x135
fffff800`00ba2920 fffff800`02a73e4a : fffffa80`04bf8190 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff800`00ba2b00 fffff880`010d00f6 : 00000000`00000004 00000039`58d24133 fffffa80`04926000 00000000`00000004 : nt!KiGeneralProtectionFault+0x10a
fffff800`00ba2c90 fffff880`00c429ed : 00000039`58d3ca48 fffffa80`04926008 fffff880`028eb6b0 00000000`00000000 : storport!StorPortNotification+0x46
fffff800`00ba2d10 00000039`58d3ca48 : fffffa80`04926008 fffff880`028eb6b0 00000000`00000000 00000000`00000000 : nvstor+0x189ed
fffff800`00ba2d18 fffffa80`04926008 : fffff880`028eb6b0 00000000`00000000 00000000`00000000 fffff880`00c322f1 : 0x39`58d3ca48
fffff800`00ba2d20 fffff880`028eb6b0 : 00000000`00000000 00000000`00000000 fffff880`00c322f1 fffff880`0370c380 : 0xfffffa80`04926008
fffff800`00ba2d28 00000000`00000000 : 00000000`00000000 fffff880`00c322f1 fffff880`0370c380 00000000`00000000 : 0xfffff880`028eb6b0


STACK_COMMAND:  kb

FOLLOWUP_IP: 
storport!StorPortNotification+46
fffff880`010d00f6 c6808d000000ab  mov     byte ptr [rax+8Dh],0ABh

SYMBOL_STACK_INDEX:  7

SYMBOL_NAME:  storport!StorPortNotification+46

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storport

IMAGE_NAME:  storport.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcace

FAILURE_BUCKET_ID:  X64_0x1E_0_storport!StorPortNotification+46

BUCKET_ID:  X64_0x1E_0_storport!StorPortNotification+46

Followup: MachineOwner
---------

























Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\a\Minidump\D M P\121910-17331-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a05000 PsLoadedModuleList = 0xfffff800`02c42e50
Debug session time: Sun Dec 19 14:55:14.553 2010 (UTC - 5:00)
System Uptime: 0 days 0:01:18.441
Loading Kernel Symbols
..

Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.

.............................................................
................................................................
..........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {8, 2, 0, fffff80002a53591}

Probably caused by : storport.sys ( storport!RaidUnitCompleteRequest+1fb )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
	bit 0 : value 0 = read operation, 1 = write operation
	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002a53591, address which referenced memory

Debugging Details:
------------------


READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cad0e0
 0000000000000008 

CURRENT_IRQL:  2

FAULTING_IP: 
nt!KiInsertQueueApc+1e9
fffff800`02a53591 488b5108        mov     rdx,qword ptr [rcx+8]

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0xA

PROCESS_NAME:  System

TRAP_FRAME:  fffff80000b9c8b0 -- (.trap 0xfffff80000b9c8b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=fffffa8006cdddf8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002a53591 rsp=fffff80000b9ca40 rbp=fffff80002befe80
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!KiInsertQueueApc+0x1e9:
fffff800`02a53591 488b5108        mov     rdx,qword ptr [rcx+8] ds:d390:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a76469 to fffff80002a76f00

STACK_TEXT:  
fffff800`00b9c768 fffff800`02a76469 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c770 fffff800`02a750e0 : 00000000`00000000 fffffa80`078fa860 fffff800`02befe80 fffff800`02a7b071 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c8b0 fffff800`02a53591 : fffffa80`03d38b20 fffff880`0197f947 fffff880`0370d380 fffff880`00de09ed : nt!KiPageFault+0x260
fffff800`00b9ca40 fffff800`02a56850 : fffffa80`078fa860 00000000`00000002 00000000`00000000 fffffa80`06cdddf8 : nt!KiInsertQueueApc+0x1e9
fffff800`00b9ca70 fffff800`02a79d4b : 00000000`00000000 00000000`a000000c 00000000`00000000 00000000`00000000 : nt!KeInsertQueueApc+0x80
fffff800`00b9cad0 fffff880`010846cb : fffff880`0370d010 fffff880`0870d301 fffff880`0870d390 00000000`00000000 : nt!IopfCompleteRequest+0xbdb
fffff800`00b9cbb0 fffff880`010848d3 : fffff800`00000001 fffff880`000000f4 00000000`0023c380 fffffa80`04694060 : storport!RaidUnitCompleteRequest+0x1fb
fffff800`00b9cc90 fffff800`02a825dc : fffff800`02befe80 00000000`00000000 fffffa80`04694128 fffff800`02bfdc40 : storport!RaidpAdapterDpcRoutine+0x53
fffff800`00b9ccd0 fffff800`02a7f6fa : fffff800`02befe80 fffff800`02bfdc40 00000000`00000000 fffff880`01084880 : nt!KiRetireDpcList+0x1bc
fffff800`00b9cd80 00000000`00000000 : fffff800`00b9d000 fffff800`00b97000 fffff800`00b9cd40 00000000`00000000 : nt!KiIdleLoop+0x5a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
storport!RaidUnitCompleteRequest+1fb
fffff880`010846cb 498b5d10        mov     rbx,qword ptr [r13+10h]

SYMBOL_STACK_INDEX:  6

SYMBOL_NAME:  storport!RaidUnitCompleteRequest+1fb

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: storport

IMAGE_NAME:  storport.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4a5bcace

FAILURE_BUCKET_ID:  X64_0xA_storport!RaidUnitCompleteRequest+1fb

BUCKET_ID:  X64_0xA_storport!RaidUnitCompleteRequest+1fb

Followup: MachineOwner
---------


Drivers:

Code:
start             end                 module name
fffff880`05901000 fffff880`0593f000   1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)
fffff880`00f9e000 fffff880`00ff5000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`04018000 fffff880`040a2000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`059d7000 fffff880`059ed000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`010e4000 fffff880`010ef000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e1e000 fffff880`00e27000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00c86000 fffff880`00cb0000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`01846000 fffff880`0184d000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`042e5000 fffff880`042f6000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`062c8000 fffff880`062e6000   bowser   bowser.sys   Mon Jul 13 19:23:50 2009 (4A5BC206)
fffff960`00660000 fffff960`00687000   cdd      cdd.dll      unavailable (00000000)
fffff880`01813000 fffff880`0183d000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00e2b000 fffff880`00eeb000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`0197e000 fffff880`019ae000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d0d000 fffff880`00d6b000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`01000000 fffff880`01073000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`059c7000 fffff880`059d7000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05dc4000 fffff880`05dd2000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`04244000 fffff880`042c7000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`05d76000 fffff880`05dab000   CT20XUT  CT20XUT.SYS  Wed May 05 09:01:28 2010 (4BE16C28)
fffff880`05cc8000 fffff880`05d76000   ctac32k  ctac32k.sys  Wed Jul 02 04:38:22 2008 (486B3E7E)
fffff880`04332000 fffff880`043d7700   ctaud2k  ctaud2k.sys  Wed May 05 08:59:48 2010 (4BE16BC4)
fffff880`06621000 fffff880`0677e000   CTEXFIFX CTEXFIFX.SYS Wed May 05 09:01:21 2010 (4BE16C21)
fffff880`065d9000 fffff880`065f4000   CTHWIUT  CTHWIUT.SYS  Wed May 05 09:01:32 2010 (4BE16C2C)
fffff880`058c2000 fffff880`058f3000   ctoss2k  ctoss2k.sys  Wed May 05 08:57:46 2010 (4BE16B4A)
fffff880`058f3000 fffff880`058fb000   ctprxy2k ctprxy2k.sys Wed May 05 08:59:51 2010 (4BE16BC7)
fffff880`05c90000 fffff880`05cc8000   ctsfm2k  ctsfm2k.sys  Wed May 05 08:57:33 2010 (4BE16B3D)
fffff880`042c7000 fffff880`042e5000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`041bc000 fffff880`041cb000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`01968000 fffff880`0197e000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`043d8000 fffff880`043fa000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`05dd2000 fffff880`05ddc000   dump_diskdump dump_diskdump.sys Mon Jul 13 20:01:00 2009 (4A5BCABC)
fffff880`05ddc000 fffff880`05def000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`05c00000 fffff880`05c2b000   dump_nvstor dump_nvstor.sys Wed May 20 02:45:37 2009 (4A13A711)
fffff880`0400b000 fffff880`04017000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`0569f000 fffff880`05793000   dxgkrnl  dxgkrnl.sys  Mon Jul 13 19:38:56 2009 (4A5BC590)
fffff880`05793000 fffff880`057d9000   dxgmms1  dxgmms1.sys  Mon Jul 13 19:38:32 2009 (4A5BC578)
fffff880`0658f000 fffff880`065d9000   emupia2k emupia2k.sys Wed May 05 08:57:27 2010 (4BE16B37)
fffff880`057d9000 fffff880`057e6000   fdc      fdc.sys      Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`0113b000 fffff880`0114f000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`04000000 fffff880`0400b000   flpydisk flpydisk.sys Mon Jul 13 20:00:54 2009 (4A5BCAB6)
fffff880`010ef000 fffff880`0113b000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01200000 fffff880`0120a000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`0192e000 fffff880`01968000   fvevol   fvevol.sys   Mon Jul 13 19:22:15 2009 (4A5BC1A7)
fffff880`015b4000 fffff880`015fe000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff880`0640e000 fffff880`0658f000   ha20x2k  ha20x2k.sys  Wed May 05 08:59:10 2010 (4BE16B9E)
fffff800`02fe2000 fffff800`0302b000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`0593f000 fffff880`05963000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`06793000 fffff880`067ef000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`05dab000 fffff880`05dc4000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`065f4000 fffff880`065fc080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`067ef000 fffff880`067fd000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`06200000 fffff880`062c8000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`01925000 fffff880`0192e000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0431c000 fffff880`04332000   intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`053e0000 fffff880`053ef000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`05def000 fffff880`05dfd000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00bd0000 fffff800`00bd3000   kdcom    kdcom.dll    Tue Nov 30 09:40:39 2010 (4CF50CE7)
fffff880`0587f000 fffff880`058c2000   ks       ks.sys       Mon Jul 13 20:00:31 2009 (4A5BCA9F)
fffff880`013d1000 fffff880`013eb000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`01460000 fffff880`0148b000   ksecpkg  ksecpkg.sys  Mon Jul 13 19:50:34 2009 (4A5BC84A)
fffff880`058fb000 fffff880`05900200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`0120a000 fffff880`0121f000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`019bc000 fffff880`019df000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00cb5000 fffff880`00cf9000   mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)
fffff880`019ae000 fffff880`019bc000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`053ef000 fffff880`053fe000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`06400000 fffff880`0640d000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00c6c000 fffff880`00c86000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`06379000 fffff880`06391000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`06391000 fffff880`063bd000   mrxsmb   mrxsmb.sys   Mon Jul 13 19:23:59 2009 (4A5BC20F)
fffff880`06a18000 fffff880`06a65000   mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)
fffff880`06a65000 fffff880`06a88000   mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)
fffff880`018ab000 fffff880`018b6000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00e00000 fffff880`00e0a000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0114f000 fffff880`011ad000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`041b1000 fffff880`041bc000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`01913000 fffff880`01925000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`014c2000 fffff880`015b4000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`05824000 fffff880`05830000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`0634e000 fffff880`06361000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`05830000 fffff880`0585f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0677e000 fffff880`06793000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`04116000 fffff880`04125000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`040a2000 fffff880`040e7000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`018b6000 fffff880`018c7000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`041a5000 fffff880`041b1000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a05000 fffff800`02fe2000   nt       ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)
fffff880`0122e000 fffff880`013d1000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`0183d000 fffff880`01846000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`053de000 fffff880`053df180   nvBridge nvBridge.kmd Sat Oct 16 13:06:16 2010 (4CB9DB88)
fffff880`04804000 fffff880`053dda80   nvlddmkm nvlddmkm.sys Sat Oct 16 13:12:46 2010 (4CB9DD0E)
fffff880`05963000 fffff880`059c6d80   nvm62x64 nvm62x64.sys Fri Oct 17 17:01:06 2008 (48F8FD12)
fffff880`00dc8000 fffff880`00df3000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`062fb000 fffff880`0634e000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`040f0000 fffff880`04116000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`00d9e000 fffff880`00db3000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00d6b000 fffff880`00d9e000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00e17000 fffff880`00e1e000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00c5c000 fffff880`00c6c000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`013eb000 fffff880`013fc000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`06a88000 fffff880`06b2e000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`04200000 fffff880`0423d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00cf9000 fffff880`00d0d000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`05800000 fffff880`05824000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`0585f000 fffff880`0587a000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`041cb000 fffff880`041ec000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`057e6000 fffff880`05800000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04154000 fffff880`041a5000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`059ed000 fffff880`059f8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`01890000 fffff880`01899000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`01899000 fffff880`018a2000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`018a2000 fffff880`018ab000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`018d9000 fffff880`01913000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`06361000 fffff880`06379000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`06b2e000 fffff880`06b39000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`0561d000 fffff880`05629000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`05600000 fffff880`0561d000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`0149b000 fffff880`014a3000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`06c13000 fffff880`06cab000   srv      srv.sys      Mon Jul 13 19:25:11 2009 (4A5BC257)
fffff880`06b78000 fffff880`06be1000   srv2     srv2.sys     Mon Jul 13 19:25:02 2009 (4A5BC24E)
fffff880`06b39000 fffff880`06b66000   srvnet   srvnet.sys   Mon Jul 13 19:24:58 2009 (4A5BC24A)
fffff880`01082000 fffff880`010e4000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`059f8000 fffff880`059f9480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01602000 fffff880`017ff000   tcpip    tcpip.sys    Mon Jul 13 19:25:34 2009 (4A5BC26E)
fffff880`06b66000 fffff880`06b78000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`018c7000 fffff880`018d4000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`014a3000 fffff880`014c1000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`04140000 fffff880`04154000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004e0000 fffff960`004ea000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`042f6000 fffff880`0431c000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`041ec000 fffff880`041fe000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`06600000 fffff880`0661d000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`0661d000 fffff880`0661ef00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`0568a000 fffff880`0569b000   usbehci  usbehci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05c36000 fffff880`05c90000   usbhub   usbhub.sys   Mon Jul 13 20:07:09 2009 (4A5BCC2D)
fffff880`05629000 fffff880`05634000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`05634000 fffff880`0568a000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00e0a000 fffff880`00e17000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`0184d000 fffff880`0185b000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`0185b000 fffff880`01880000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`0148b000 fffff880`0149b000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00db3000 fffff880`00dc8000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`011ad000 fffff880`011f9000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`04125000 fffff880`04140000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01880000 fffff880`01890000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00eeb000 fffff880`00f8f000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00f8f000 fffff880`00f9e000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`040e7000 fffff880`040f0000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000c0000 fffff960`003cf000   win32k   win32k.sys   unavailable (00000000)
fffff880`00ff5000 fffff880`00ffe000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`019df000 fffff880`01a00000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)

Unloaded modules:
fffff880`019ae000 fffff880`019bc000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019bc000 fffff880`019c6000   dump_storpor
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000A000
fffff880`019c6000 fffff880`019f1000   dump_nvstor.
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0002B000
fffff880`01800000 fffff880`01813000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Last edited:
Joined
Dec 19, 2010
Messages
10
Reaction score
0
so, is your advice just to keep hammering at it until i get them updated? i just don't wanna break anything by continued bsod but like i've said, i'm not a windows guy so I really don't know.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Lol, I could hardly assume you couldn't find that - or what's the problem you haven't installed them yet?

Don't forget about Creative, see page 1 of this thread. Or tell me your SB model and I'll find it for you.
 
Joined
Dec 19, 2010
Messages
10
Reaction score
0
its the x-fi xtremegamer fatality edition. i guess i should have told you all this a while ago. basically.. i installed win7pro64. installed the newest video and sound drivers for my hardware that i found. the wifi hardware is a pos old piece but currently i don't have anything better, if that's the issue, i can just replace it, but you haven't mentioned it yet. the BSOD happened randomly after the PC was on over night.
 
Joined
Dec 19, 2010
Messages
10
Reaction score
0
ah, and i didn't notice, the driver you mentioned and linked is the one i was attempting to install during the last bsod.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
wotan813 said:
the wifi hardware is a pos old piece but currently i don't have anything better, if that's the issue, i can just replace it, but you haven't mentioned it yet.

I did, see it in my first post in this thread on page 1:


cybercore said:
Hello and welcome to the forums. : )

The culprit is NVIDIA nForce(TM) SATA Driver nvstor.sys. Visit both your motherboard and NVIDIA support sites to update nForce:

nvm62x64.sys Fri Oct 17 17:01:06 2008
nvstor.sys Wed May 20 02:45:37 2009

nvm62x64.sys is quite notorious and if there's no update then dowload one for a higher nForce version, extract it to a folder with 7zip, and copy nvm62x64.sys to C:\Windows\system32\drivers, overwriting the current file.


Update Creative AC3 SW Decoder Device Driver:

ctac32k.sys Wed Jul 02 04:38:22 2008


Update Atheros Extensible Wireless LAN device driver:

athrxu6.sys Fri Apr 20 09:31:41 2007

As you see I did tell you about old Atheros driver. If there is no newer driver available - get a new wireless with 7 support.

(http://support.atheros.com/)


Creative x-fi xtremegamer fatality edition - it's a new card and there is no good excuse why you can't update it from here:

http://support.creative.com

It's this old driver you have:

ctac32k.sys Wed Jul 02 04:38:22 2008
Creative AC3 SW Decoder[/B] Device Driver.




nForce - get it from here:

http://www.nvidia.com/object/nforce_win7_64bit_15.53.html


It's not an option to update these drivers - it's a must if you are determined to get rid of BSOD's.
 
Joined
Dec 19, 2010
Messages
10
Reaction score
0
it shall be done and i'll let you know how it turns out. your help is very appreciated.
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
1. Download all the driver updates on your PC/USB stick and have it handy.

2. Disable Atheros Wireless in Control Panel > Device Manager. Then unplug the device and reboot.

3. Uninstall all your Creative drivers and software. Use driver sweeper to clean up Creative:

http://www.guru3d.com/category/driversweeper/


4. Install the drivers updates in NORMAL MODE.


5. IF there is no newer driver for the Atheros Wireless YOU HAVE TO get a new 7 compatible wireless. Maybe borrow it from someone. But anyway do not plug it in with that old driver.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top