I have had 5 blue screens in less than a month. I have tried fixing, but have had no luck. I am thinking this has something to do with my network card and perhaps power saving options. The crashes sometimes happen when going into hibernation or resuming from. The crashes have happened during normal use and once when opening MS Word. Thanks for any help!
Machine specs
Windows 7 pro 64 bit
Intel i7 processor w/ 8gb ram
What I've tried:
Eurosoft passes all tests including memory
Memfree86 does not support 64bit yet unfortunately. I am not aware of an alternative
Updated all drivers
Output from Nirsoft's BlueScreenView:
121610-25303-01.dmp 12/16/2010 8:13:14 AM IRQL_NOT_LESS_OR_EQUAL 0x0000000a 00000000`00000000 00000000`00000002 00000000`00000000 fffff800`030d58b6 ntoskrnl.exe ntoskrnl.exe+70740 NT Kernel & System Microsoft® Windows® Operating System Microsoft Corporation 6.1.7600.16617 (win7_gdr.100618-1621) x64 C:\Windows\Minidump\121610-25303-01.dmp 8 15 7600
121310-37034-01.dmp 12/13/2010 8:39:50 AM BAD_POOL_CALLER 0x000000c2 00000000`00000007 00000000`00001097 00000000`04740000 fffffa80`0b44c010 ndis.sys ndis.sys+74a2 x64 C:\Windows\Minidump\121310-37034-01.dmp 8 15 7600
120910-34491-01.dmp 12/9/2010 11:28:59 AM BAD_POOL_CALLER 0x000000c2 00000000`00000007 00000000`00001097 00000000`00000000 fffffa80`0c614f60 ndiswan.sys ndiswan.sys+12110 x64 C:\Windows\Minidump\120910-34491-01.dmp 8 15 7600
120110-25802-01.dmp 12/1/2010 11:29:53 AM IRQL_NOT_LESS_OR_EQUAL 0x0000000a 00000000`00000000 00000000`00000002 00000000`00000000 fffff800`0308c8b6 ntoskrnl.exe ntoskrnl.exe+70740 NT Kernel & System Microsoft® Windows® Operating System Microsoft Corporation 6.1.7600.16617 (win7_gdr.100618-1621) x64 C:\Windows\Minidump\120110-25802-01.dmp 8 15 7600
112310-28095-01.dmp 11/23/2010 8:56:56 AM BAD_POOL_CALLER 0x000000c2 00000000`00000007 00000000`00001097 00000000`00000000 fffffa80`0bfb0e10 ndiswan.sys ndiswan.sys+12110 x64 C:\Windows\Minidump\112310-28095-01.dmp 8 15 7600
Output from WinDbg most recent blue screen:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Charles\Desktop\dump files\121610-25303-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03061000 PsLoadedModuleList = 0xfffff800`0329ee50
Debug session time: Wed Dec 15 15:27:32.100 2010 (UTC - 5:00)
System Uptime: 2 days 1:28:47.224
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
..........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800030d58b6}
Probably caused by : ndis.sys ( ndis!ndisMQueuedFinishClose+86 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030d58b6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800033090e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSetEvent+226
fffff800`030d58b6 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88003d17ac0 -- (.trap 0xfffff88003d17ac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007d162a0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030d58b6 rsp=fffff88003d17c50 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KeSetEvent+0x226:
fffff800`030d58b6 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d0ca9 to fffff800030d1740
STACK_TEXT:
fffff880`03d17978 fffff800`030d0ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03d17980 fffff800`030cf920 : 00000000`00000000 fffffa80`07d16298 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03d17ac0 fffff800`030d58b6 : fffff880`018b2b60 00000000`00000000 fffff880`01860a00 00000000`00000000 : nt!KiPageFault+0x260
fffff880`03d17c50 fffff880`018fe986 : 00000000`00000000 fffff800`00000000 00000000`00000000 ffffffff`ff676980 : nt!KeSetEvent+0x226
fffff880`03d17cc0 fffff880`01860b5a : 00000000`00000000 00000000`00000080 fffff880`018af110 fffffa80`0ef57168 : ndis!ndisMQueuedFinishClose+0x86
fffff880`03d17d10 fffff800`03375c06 : fffffa80`08607040 fffffa80`069e7040 fffff880`03d17db0 fffffa80`08607040 : ndis!ndisWorkerThread+0xba
fffff880`03d17d40 fffff800`030afc26 : fffff880`009b2180 fffffa80`08607040 fffff880`009bd0c0 77777777`77777777 : nt!PspSystemThreadStartup+0x5a
fffff880`03d17d80 00000000`00000000 : fffff880`03d18000 fffff880`03d12000 fffff880`03d17a10 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
ndis!ndisMQueuedFinishClose+86
fffff880`018fe986 488bcf mov rcx,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: ndis!ndisMQueuedFinishClose+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
FAILURE_BUCKET_ID: X64_0xA_VRF_ndis!ndisMQueuedFinishClose+86
BUCKET_ID: X64_0xA_VRF_ndis!ndisMQueuedFinishClose+86
Followup: MachineOwner
---------
0: kd> lmvm ndis
start end module name
fffff880`0184c000 fffff880`0193e000 ndis (pdb symbols) c:\symbols\ndis.pdb\40D6C85AC9F74887A652601839A1F56D2\ndis.pdb
Loaded symbol image file: ndis.sys
Mapped memory image file: c:\symbols\ndis.sys\4A5BC184f2000\ndis.sys
Image path: \SystemRoot\system32\drivers\ndis.sys
Image name: ndis.sys
Timestamp: Mon Jul 13 19:21:40 2009 (4A5BC184)
CheckSum: 000F0209
ImageSize: 000F2000
File version: 6.1.7600.16385
Product version: 6.1.7600.16385
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: NDIS.SYS
OriginalFilename: NDIS.SYS
ProductVersion: 6.1.7600.16385
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
FileDescription: NDIS 6.20 driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
I am also posting all 5 previous dump files.
Machine specs
Windows 7 pro 64 bit
Intel i7 processor w/ 8gb ram
What I've tried:
Eurosoft passes all tests including memory
Memfree86 does not support 64bit yet unfortunately. I am not aware of an alternative
Updated all drivers
Output from Nirsoft's BlueScreenView:
121610-25303-01.dmp 12/16/2010 8:13:14 AM IRQL_NOT_LESS_OR_EQUAL 0x0000000a 00000000`00000000 00000000`00000002 00000000`00000000 fffff800`030d58b6 ntoskrnl.exe ntoskrnl.exe+70740 NT Kernel & System Microsoft® Windows® Operating System Microsoft Corporation 6.1.7600.16617 (win7_gdr.100618-1621) x64 C:\Windows\Minidump\121610-25303-01.dmp 8 15 7600
121310-37034-01.dmp 12/13/2010 8:39:50 AM BAD_POOL_CALLER 0x000000c2 00000000`00000007 00000000`00001097 00000000`04740000 fffffa80`0b44c010 ndis.sys ndis.sys+74a2 x64 C:\Windows\Minidump\121310-37034-01.dmp 8 15 7600
120910-34491-01.dmp 12/9/2010 11:28:59 AM BAD_POOL_CALLER 0x000000c2 00000000`00000007 00000000`00001097 00000000`00000000 fffffa80`0c614f60 ndiswan.sys ndiswan.sys+12110 x64 C:\Windows\Minidump\120910-34491-01.dmp 8 15 7600
120110-25802-01.dmp 12/1/2010 11:29:53 AM IRQL_NOT_LESS_OR_EQUAL 0x0000000a 00000000`00000000 00000000`00000002 00000000`00000000 fffff800`0308c8b6 ntoskrnl.exe ntoskrnl.exe+70740 NT Kernel & System Microsoft® Windows® Operating System Microsoft Corporation 6.1.7600.16617 (win7_gdr.100618-1621) x64 C:\Windows\Minidump\120110-25802-01.dmp 8 15 7600
112310-28095-01.dmp 11/23/2010 8:56:56 AM BAD_POOL_CALLER 0x000000c2 00000000`00000007 00000000`00001097 00000000`00000000 fffffa80`0bfb0e10 ndiswan.sys ndiswan.sys+12110 x64 C:\Windows\Minidump\112310-28095-01.dmp 8 15 7600
Output from WinDbg most recent blue screen:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Charles\Desktop\dump files\121610-25303-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03061000 PsLoadedModuleList = 0xfffff800`0329ee50
Debug session time: Wed Dec 15 15:27:32.100 2010 (UTC - 5:00)
System Uptime: 2 days 1:28:47.224
Loading Kernel Symbols
...............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
..........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 0, fffff800030d58b6}
Probably caused by : ndis.sys ( ndis!ndisMQueuedFinishClose+86 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030d58b6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800033090e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSetEvent+226
fffff800`030d58b6 488b09 mov rcx,qword ptr [rcx]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff88003d17ac0 -- (.trap 0xfffff88003d17ac0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007d162a0 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030d58b6 rsp=fffff88003d17c50 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po cy
nt!KeSetEvent+0x226:
fffff800`030d58b6 488b09 mov rcx,qword ptr [rcx] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d0ca9 to fffff800030d1740
STACK_TEXT:
fffff880`03d17978 fffff800`030d0ca9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`03d17980 fffff800`030cf920 : 00000000`00000000 fffffa80`07d16298 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`03d17ac0 fffff800`030d58b6 : fffff880`018b2b60 00000000`00000000 fffff880`01860a00 00000000`00000000 : nt!KiPageFault+0x260
fffff880`03d17c50 fffff880`018fe986 : 00000000`00000000 fffff800`00000000 00000000`00000000 ffffffff`ff676980 : nt!KeSetEvent+0x226
fffff880`03d17cc0 fffff880`01860b5a : 00000000`00000000 00000000`00000080 fffff880`018af110 fffffa80`0ef57168 : ndis!ndisMQueuedFinishClose+0x86
fffff880`03d17d10 fffff800`03375c06 : fffffa80`08607040 fffffa80`069e7040 fffff880`03d17db0 fffffa80`08607040 : ndis!ndisWorkerThread+0xba
fffff880`03d17d40 fffff800`030afc26 : fffff880`009b2180 fffffa80`08607040 fffff880`009bd0c0 77777777`77777777 : nt!PspSystemThreadStartup+0x5a
fffff880`03d17d80 00000000`00000000 : fffff880`03d18000 fffff880`03d12000 fffff880`03d17a10 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
ndis!ndisMQueuedFinishClose+86
fffff880`018fe986 488bcf mov rcx,rdi
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: ndis!ndisMQueuedFinishClose+86
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: ndis
IMAGE_NAME: ndis.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
FAILURE_BUCKET_ID: X64_0xA_VRF_ndis!ndisMQueuedFinishClose+86
BUCKET_ID: X64_0xA_VRF_ndis!ndisMQueuedFinishClose+86
Followup: MachineOwner
---------
0: kd> lmvm ndis
start end module name
fffff880`0184c000 fffff880`0193e000 ndis (pdb symbols) c:\symbols\ndis.pdb\40D6C85AC9F74887A652601839A1F56D2\ndis.pdb
Loaded symbol image file: ndis.sys
Mapped memory image file: c:\symbols\ndis.sys\4A5BC184f2000\ndis.sys
Image path: \SystemRoot\system32\drivers\ndis.sys
Image name: ndis.sys
Timestamp: Mon Jul 13 19:21:40 2009 (4A5BC184)
CheckSum: 000F0209
ImageSize: 000F2000
File version: 6.1.7600.16385
Product version: 6.1.7600.16385
File flags: 0 (Mask 3F)
File OS: 40004 NT Win32
File type: 3.6 Driver
File date: 00000000.00000000
Translations: 0409.04b0
CompanyName: Microsoft Corporation
ProductName: Microsoft® Windows® Operating System
InternalName: NDIS.SYS
OriginalFilename: NDIS.SYS
ProductVersion: 6.1.7600.16385
FileVersion: 6.1.7600.16385 (win7_rtm.090713-1255)
FileDescription: NDIS 6.20 driver
LegalCopyright: © Microsoft Corporation. All rights reserved.
I am also posting all 5 previous dump files.
Attachments
-
150.1 KB Views: 507