My turn in the box

Trouble

BSOD Kernel Dump Senior Analyst, Contributor
Joined
May 1, 2012
Posts
178
Location
N.W. Indiana
I could use some help with this one.
No particular rhyme or reason, often when system is more or less idle with only a browser page, outlook and skype open but with no actual activity going on.
Not a hair on fire kinda thing as they are reasonably rare and apparently random in cause(s) but when you guys have the time....?
Have DV running now and awaiting next one.

EDIT: Sorry forgot
Code:
OS - Windows 8 Pro Full Retail TechNet (all updates installed)
x64 (64bit)
What was original installed OS on system?  Clean install Windows 8 (only OS ever installed)

Age of system (hardware) Parts purchased and assembled on or about 01/20/2011
Age of OS installation - have you re-installed the OS?  OS installed on new Samsung 830 series 256GB SSD SATA(III) hard drive approximately 2 months ago.  Latest firmware is present on SSD as best I can determine.

CPU  AMD Phenom II X6 1090T Black Edition Thuban 3.2GHz
Video Card  Nvidia GeForce GTS 450 1Gig DDR5 DX11
MotherBoard  GIGABYTE GA-870A-UD3 AM3 AMD 870
Power Supply  Antec EarthWatts EA750 PSU

System Manufacturer  Home Built (me)
 
Crashes point to the hard disk file system. That may indicate an SSD related problem. I do note that your BIOS is not up to date. There is now a F5 BIOS version instead of the F5a version you have installed. Also, double check your firmware version for the SSD with the steps outlined by Wrench97:

Follow these steps to check which firmware revision you currently have on your drive.

1) Click on the Start menu
2) Open Control panel> System> Hardware
3) Select device manager
4) Expand disk drives
5) Right click on the drive and select properties
6) Select details tab > select hardware lds from the drop down menu and the firmware version will be displayed towards the right hand side.


Code:
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\24972\kdc\outkdOutput1.1.txt'

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_14\Trouble\Windows7_Vista_jcgriff2\031413-16645-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\symbols
Executable search path is: 
Windows 8 Kernel Version 9200 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16496.amd64fre.win8_gdr.130108-1504
Machine Name:
Kernel base = 0xfffff802`c2015000 PsLoadedModuleList = 0xfffff802`c22dea80
Debug session time: Thu Mar 14 05:57:37.985 2013 (UTC - 6:00)
System Uptime: 0 days 0:59:38.690
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c000001d, fffff880014b5386, fffff8800f3d3f60, 0}

*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption

Followup: memory_corruption
---------

5: kd> !niemiro.rawstack; q
0xfffff880`0f3d3148  0xfffff880`014b5386 fltmgr!FltpPerformFastIoCall+0xc6
0xfffff880`0f3d3160  0xfffff802`c232434c nt!BcpCursor  (nt+0x30f34c)+0x0
0xfffff880`0f3d3180  0xfffff802`c208e053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0f3d3188  0xfffff802`c208f040 nt!KeBugCheckEx+0x0
0xfffff880`0f3d3568  0xfffff802`c20dee52 nt!ExpAllocateBigPool+0xf2
0xfffff880`0f3d35d8  0xfffff802`c228313e nt!ExAllocatePoolWithTag+0xfe
0xfffff880`0f3d35e8  0xfffff802`c208e053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0f3d3628  0xfffff802`c208f144 nt!KeBugCheckEx+0x104
0xfffff880`0f3d3668  0xfffff802`c208e369 nt!KiBugCheckDispatch+0x69
0xfffff880`0f3d3680  0xfffff880`014b5386 fltmgr!FltpPerformFastIoCall+0xc6
0xfffff880`0f3d37a0  0xfffff802`c208e053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0f3d37a8  0xfffff802`c208dcbc nt!KiSystemServiceHandler+0x7c
0xfffff880`0f3d37c0  0xfffff802`c23ffeb0 nt!NtReadFile+0x3fe
0xfffff880`0f3d37e8  0xfffff802`c20efd4d nt!RtlpExecuteHandlerForException+0xd
0xfffff880`0f3d3818  0xfffff802`c20f1b03 nt!RtlDispatchException+0x44b
0xfffff880`0f3d3870  0xfffff802`c2015000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f3d3890  0xfffff802`c232434c nt!BcpCursor <PERF> (nt+0x30f34c)+0x0
0xfffff880`0f3d3898  0xfffff802`c221cb74 nt!`string'+0x18
0xfffff880`0f3d38c8  0xfffff802`c24788b2 nt!RtlpInheritAcl2+0x1a2
0xfffff880`0f3d38d0  0xfffff802`c208e053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0f3d38d8  0xfffff802`c2015000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f3d38e0  0xfffff802`c232434c nt!BcpCursor <PERF> (nt+0x30f34c)+0x0
0xfffff880`0f3d3900  0xfffff802`c208dc40 nt!KiSystemServiceHandler+0x0
0xfffff880`0f3d3908  0xfffff802`c221cb74 nt!`string'+0x18
0xfffff880`0f3d3948  0xfffff802`c228323a nt!ExAllocatePoolWithTag+0x1fa
0xfffff880`0f3d3968  0xfffff802`c2190010 nt!MiMakeOutswappedPageResident+0x504
0xfffff880`0f3d39a8  0xfffff802`c22822ba nt!ExFreePoolWithTag+0x2aa
0xfffff880`0f3d39b8  0xfffff802`c228323a nt!ExAllocatePoolWithTag+0x1fa
0xfffff880`0f3d3ad8  0xfffff802`c245ba7f nt!ObpIncrementHandleCountEx+0x27f
0xfffff880`0f3d3b08  0xfffff802`c20da08c nt!RtlpOwnerAcesPresent+0x9c
0xfffff880`0f3d3bd8  0xfffff802`c245dc48 nt!ObpCreateHandle+0x4c8
0xfffff880`0f3d3d58  0xfffff802`c2440bae nt!ObOpenObjectByPointer+0x20e
0xfffff880`0f3d3e08  0xfffff802`c208ddc0 nt!KiSystemCall64+0x0
0xfffff880`0f3d3e10  0xfffff880`014df8a0 fltmgr!FltpFastIoQueryNetworkOpenInfo+0x0
0xfffff880`0f3d3e18  0xfffff880`014b0000 fltmgr!FltpGetNormalizedFileNameCallout <PERF> (fltmgr+0x0)+0x0
0xfffff880`0f3d3e20  0xfffff880`014d82d0 fltmgr!__PchSym_ <PERF> (fltmgr+0x282d0)+0x0
0xfffff880`0f3d3e28  0xfffff880`014b0000 fltmgr!FltpGetNormalizedFileNameCallout <PERF> (fltmgr+0x0)+0x0
0xfffff880`0f3d3e30  0xfffff880`014d82e8 fltmgr!__PchSym_ <PERF> (fltmgr+0x282e8)+0x0
0xfffff880`0f3d3e38  0xfffff880`014b0000 fltmgr!FltpGetNormalizedFileNameCallout <PERF> (fltmgr+0x0)+0x0
0xfffff880`0f3d3e40  0xfffff880`014d9a58 fltmgr!__PchSym_ <PERF> (fltmgr+0x29a58)+0x0
0xfffff880`0f3d3e48  0xfffff802`c2015000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f3d3e50  0xfffff802`c233f31c nt!BcpCursor <PERF> (nt+0x32a31c)+0x0
0xfffff880`0f3d3e58  0xfffff802`c2015000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f3d3e60  0xfffff802`c232434c nt!BcpCursor <PERF> (nt+0x30f34c)+0x0
0xfffff880`0f3d3e78  0xfffff802`c20b7542 nt!KiDeferredReadyThread+0x2e2
0xfffff880`0f3d3e98  0xfffff802`c210e061 nt!KiPreprocessFault+0x91
0xfffff880`0f3d3ec0  0xfffff880`014b5386 fltmgr!FltpPerformFastIoCall+0xc6
0xfffff880`0f3d3ec8  0xfffff880`014b5389 fltmgr!FltpPerformFastIoCall+0xc9
0xfffff880`0f3d3f28  0xfffff802`c210df3e nt!KiDispatchException+0x455
0xfffff880`0f3d3f88  0xfffff802`c20760b9 nt!KiFastReadyThread+0x7d
0xfffff880`0f3d4058  0xfffff880`014b5386 fltmgr!FltpPerformFastIoCall+0xc6
0xfffff880`0f3d4288  0xfffff802`c2015000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f3d42a8  0xfffff802`c20b8cab nt!KiCommitThreadWait+0x27b
0xfffff880`0f3d42b8  0xfffff802`c20d01e0 nt!MmCheckCachedPageStates+0xc90
0xfffff880`0f3d4368  0xfffff802`c20b4f0f nt!KeWaitForSingleObject+0x1cf
0xfffff880`0f3d4388  0xfffff802`c20d1225 nt!KeExpandKernelStackAndCalloutEx+0x25
0xfffff880`0f3d4398  0xfffff802`c20e725e nt!CcSetDirtyInMask+0x4ee
0xfffff880`0f3d43c8  0xfffff802`c20d01e0 nt!MmCheckCachedPageStates+0xc90
0xfffff880`0f3d43f8  0xfffff802`c210c2ef nt!RtlGetExtendedContextLength+0x1f
0xfffff880`0f3d4538  0xfffff802`c20e7bc4 nt!CcMapAndCopyInToCache+0x2b4
0xfffff880`0f3d45e8  0xfffff802`c208e442 nt!KiExceptionDispatch+0xc2
0xfffff880`0f3d45f8  0xfffff802`c2412974 nt!CcMapAndCopyFromCache+0x124
0xfffff880`0f3d4738  0xfffff880`014b5386 fltmgr!FltpPerformFastIoCall+0xc6
0xfffff880`0f3d4758  0xfffff880`014b5386 fltmgr!FltpPerformFastIoCall+0xc6
0xfffff880`0f3d47c8  0xfffff802`c208c19f nt!KiInvalidOpcodeFault+0x11f
0xfffff880`0f3d4938  0xfffff880`014b5386 fltmgr!FltpPerformFastIoCall+0xc6
0xfffff880`0f3d49b8  0xfffff880`014b5b53 fltmgr!FltpPassThroughFastIo+0xc3
0xfffff880`0f3d4a18  0xfffff880`014df839 fltmgr!FltpFastIoRead+0x199
0xfffff880`0f3d4aa0  0xfffff880`014df6a0 fltmgr!FltpFastIoRead+0x0
0xfffff880`0f3d4ac8  0xfffff802`c23ffeb0 nt!NtReadFile+0x3fe
0xfffff880`0f3d4b68  0xfffff802`c20cdcfe nt!KeReleaseSemaphore+0x219
0xfffff880`0f3d4bc8  0xfffff802`c208e053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0f3d4c38  0xfffff802`c208e053 nt!KiSystemServiceCopyEnd+0x13
quit:

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\24972\kdc\outkdOutput2.1.txt'

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_14\Trouble\Windows7_Vista_jcgriff2\030813-27159-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\symbols
Executable search path is: 
Windows 8 Kernel Version 9200 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16496.amd64fre.win8_gdr.130108-1504
Machine Name:
Kernel base = 0xfffff802`6bc03000 PsLoadedModuleList = 0xfffff802`6becca80
Debug session time: Fri Mar  8 10:23:05.924 2013 (UTC - 6:00)
System Uptime: 0 days 0:34:42.626
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8026bc74363, fffff8800e5d4fd0, 0}

Probably caused by : ntkrnlmp.exe ( nt!EtwpFindGuidEntryByGuid+97 )

Followup: MachineOwner
---------

4: kd> !niemiro.rawstack; q
0xfffff880`0e5d4028  0xfffff802`6bd7789c nt!KiBugCheckProgress+0x0
*** ERROR: Module load completed but symbols could not be loaded for Ntfs.sys
0xfffff880`0e5d4078  0xfffff880`0171d2e3 Ntfs!+0xf22e3
0xfffff880`0e5d40e8  0xfffff802`6bcb048a nt!KeFlushMultipleRangeTb+0x22a
0xfffff880`0e5d41b8  0xfffff802`6bc74363 nt!memcmp+0x93
0xfffff880`0e5d41d0  0xfffff802`6bf1234c nt!BcpCursor <PERF> (nt+0x30f34c)+0x0
0xfffff880`0e5d41f0  0xfffff802`6bc7c053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0e5d41f8  0xfffff802`6bc7d040 nt!KeBugCheckEx+0x0
0xfffff880`0e5d45d8  0xfffff802`6be7113e nt!ExAllocatePoolWithTag+0xfe
0xfffff880`0e5d45e8  0xfffff802`6bcc8846 nt!RtlSetBits+0x86
0xfffff880`0e5d4618  0xfffff802`6bcc3427 nt!MiRebalanceNode+0x67
0xfffff880`0e5d4648  0xfffff802`6bcc8e69 nt!MiInsertNode+0xb9
0xfffff880`0e5d4658  0xfffff802`6bc7c053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0e5d4698  0xfffff802`6bc7d144 nt!KeBugCheckEx+0x104
0xfffff880`0e5d46d8  0xfffff802`6bc7c369 nt!KiBugCheckDispatch+0x69
0xfffff880`0e5d46f0  0xfffff802`6bc74363 nt!memcmp+0x93
0xfffff880`0e5d4810  0xfffff802`6bc7c053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0e5d4818  0xfffff802`6bc7bcbc nt!KiSystemServiceHandler+0x7c
0xfffff880`0e5d4828  0xfffff802`6bc40196 nt!_GSHandlerCheck_SEH+0x76
0xfffff880`0e5d4830  0xfffff802`6be374f4 nt!MiObtainSessionVa+0x294
0xfffff880`0e5d4858  0xfffff802`6bcddd4d nt!RtlpExecuteHandlerForException+0xd
0xfffff880`0e5d4888  0xfffff802`6bcdfb03 nt!RtlDispatchException+0x44b
0xfffff880`0e5d48c8  0xfffff802`6c0668b2 nt!RtlpInheritAcl2+0x1a2
0xfffff880`0e5d48e0  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d4900  0xfffff802`6bf1234c nt!BcpCursor <PERF> (nt+0x30f34c)+0x0
0xfffff880`0e5d4908  0xfffff802`6be0ab74 nt!`string'+0x18
0xfffff880`0e5d4940  0xfffff802`6bc7c053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0e5d4948  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d4950  0xfffff802`6bf1234c nt!BcpCursor <PERF> (nt+0x30f34c)+0x0
0xfffff880`0e5d4970  0xfffff802`6bc7bc40 nt!KiSystemServiceHandler+0x0
0xfffff880`0e5d4978  0xfffff802`6be0ab74 nt!`string'+0x18
0xfffff880`0e5d49b8  0xfffff880`01641243 Ntfs+0x16243
0xfffff880`0e5d49f8  0xfffff880`016f1510 Ntfs+0xc6510
0xfffff880`0e5d4af8  0xfffff802`6bcc390d nt!MiUpdateWsle+0x13d
*** ERROR: Module load completed but symbols could not be loaded for WdFilter.sys
0xfffff880`0e5d4b08  0xfffff880`0148cb25 WdFilter!+0x16b25
0xfffff880`0e5d4b58  0xfffff880`016f1646 Ntfs+0xc6646
0xfffff880`0e5d4b88  0xfffff880`01640cc9 Ntfs+0x15cc9
0xfffff880`0e5d4cf8  0xfffff880`016f6632 Ntfs+0xcb632
0xfffff880`0e5d4d78  0xfffff880`016f1646 Ntfs+0xc6646
0xfffff880`0e5d4e78  0xfffff802`6bc742d0 nt!memcmp+0x0
0xfffff880`0e5d4e80  0xfffff802`6c002c69 nt!EtwpRegisterUMGuid+0x89
0xfffff880`0e5d4e88  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d4e90  0xfffff802`6bf11fb0 nt!BcpCursor <PERF> (nt+0x30efb0)+0x0
0xfffff880`0e5d4e98  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d4ea0  0xfffff802`6bf2d8bc nt!BcpCursor <PERF> (nt+0x32a8bc)+0x0
0xfffff880`0e5d4ea8  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d4eb0  0xfffff802`6bf2d8e0 nt!BcpCursor <PERF> (nt+0x32a8e0)+0x0
0xfffff880`0e5d4eb8  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d4ec0  0xfffff802`6bf2d8a4 nt!BcpCursor <PERF> (nt+0x32a8a4)+0x0
0xfffff880`0e5d4ec8  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d4ed0  0xfffff802`6bf1234c nt!BcpCursor <PERF> (nt+0x30f34c)+0x0
0xfffff880`0e5d4ef8  0xfffff802`6be94200 nt!EtwpGuidHashTable+0x40
0xfffff880`0e5d4f08  0xfffff802`6bcfc061 nt!KiPreprocessFault+0x91
0xfffff880`0e5d4f30  0xfffff802`6bc74363 nt!memcmp+0x93
0xfffff880`0e5d4f38  0xfffff802`6bc74365 nt!memcmp+0x95
0xfffff880`0e5d4f80  0xfffff802`6be942f8 nt!EtwpGuidHashTable+0x138
0xfffff880`0e5d4f98  0xfffff802`6bcfbf3e nt!KiDispatchException+0x455
0xfffff880`0e5d4fb8  0xfffff802`6be942f8 nt!EtwpGuidHashTable+0x138
0xfffff880`0e5d4fc8  0xfffff880`01405d00 fltmgr!FltpGetStreamListCtrl+0x50
0xfffff880`0e5d4fd0  0xfffff880`01427010 fltmgr!WPP_GLOBAL_Control+0x0
0xfffff880`0e5d5078  0xfffff802`6be942d8 nt!EtwpGuidHashTable+0x118
0xfffff880`0e5d5080  0xfffff802`6be942f8 nt!EtwpGuidHashTable+0x138
0xfffff880`0e5d50c8  0xfffff802`6bc74363 nt!memcmp+0x93
0xfffff880`0e5d5128  0xfffff802`6bcc390d nt!MiUpdateWsle+0x13d
0xfffff880`0e5d5138  0xfffff880`0148cb25 WdFilter+0x16b25
0xfffff880`0e5d52b8  0xfffff802`6be7123a nt!ExAllocatePoolWithTag+0x1fa
0xfffff880`0e5d52e8  0xfffff802`6bcc71c1 nt!MiDispatchFault+0x291
0xfffff880`0e5d5318  0xfffff802`6be702ba nt!ExFreePoolWithTag+0x2aa
0xfffff880`0e5d5328  0xfffff802`6be7123a nt!ExAllocatePoolWithTag+0x1fa
0xfffff880`0e5d5388  0xfffff802`6c06df2b nt!RtlpCombineAcls+0x18b
0xfffff880`0e5d53b8  0xfffff802`6bcfa527 nt!RtlSidDominates+0xa7
0xfffff880`0e5d53f8  0xfffff802`6c065ea6 nt!RtlpNewSecurityObject+0xd56
0xfffff880`0e5d5468  0xfffff802`6bcfa2ef nt!RtlGetExtendedContextLength+0x1f
0xfffff880`0e5d5598  0xfffff802`6c04bc48 nt!ObpCreateHandle+0x4c8
0xfffff880`0e5d5640  0xfffff802`6be942d8 nt!EtwpGuidHashTable+0x118
0xfffff880`0e5d5658  0xfffff802`6bc7c442 nt!KiExceptionDispatch+0xc2
0xfffff880`0e5d5768  0xfffff802`6be942f8 nt!EtwpGuidHashTable+0x138
0xfffff880`0e5d5770  0xfffff802`6be942d8 nt!EtwpGuidHashTable+0x118
0xfffff880`0e5d57a8  0xfffff802`6bc74363 nt!memcmp+0x93
0xfffff880`0e5d5838  0xfffff802`6bc7a94a nt!KiGeneralProtectionFault+0x10a
0xfffff880`0e5d5938  0xfffff802`6bc03000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0e5d5968  0xfffff802`6c0022d2 nt!EtwpAddUmRegEntry+0x142
0xfffff880`0e5d59a8  0xfffff802`6bc74363 nt!memcmp+0x93
0xfffff880`0e5d59d8  0xfffff802`6c002b2b nt!EtwpFindGuidEntryByGuid+0x97
0xfffff880`0e5d5a18  0xfffff802`6c002c59 nt!EtwpRegisterUMGuid+0x79
0xfffff880`0e5d5b18  0xfffff802`6c002679 nt!NtTraceControl+0x1b9
0xfffff880`0e5d5bc8  0xfffff802`6bc7c053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0e5d5c38  0xfffff802`6bc7abfd nt!KiPageFault+0x27d
quit:

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\24972\kdc\outkdOutput3.1.txt'

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_14\Trouble\Windows7_Vista_jcgriff2\030413-14960-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\symbols
Executable search path is: 
Windows 8 Kernel Version 9200 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16496.amd64fre.win8_gdr.130108-1504
Machine Name:
Kernel base = 0xfffff803`5ea13000 PsLoadedModuleList = 0xfffff803`5ecdca80
Debug session time: Mon Mar  4 18:16:40.270 2013 (UTC - 6:00)
System Uptime: 0 days 1:56:17.973
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff8035ea87a35, fffff8800f61af28, fffff8800f61a760}

*** ERROR: Module load completed but symbols could not be loaded for afd.sys
Probably caused by : NETIO.SYS ( NETIO!FsbAllocateAtDpcLevel+63 )

Followup: MachineOwner
---------

5: kd> !niemiro.rawstack; q
0xfffff880`0f619ef8  0xfffff803`5eb8548b nt!KiFatalFilter+0x1f
0xfffff880`0f619f10  0xfffff803`5ea87a35 nt!ExpInterlockedPopEntrySListFault16+0x0
0xfffff880`0f619f38  0xfffff803`5ebd91c5 nt! ?? ::FNODOBFM::`string'+0x10d6
0xfffff880`0f619f78  0xfffff803`5eaeaace nt!_C_specific_handler+0x8e
0xfffff880`0f619f88  0xfffff880`01b7f2f4 tcpip!TcpCcmNotifyEvent+0xc4
0xfffff880`0f619fc0  0xfffff803`5eace415 nt!KeExpandKernelStackAndCalloutInternal+0xe5
0xfffff880`0f619fe8  0xfffff803`5eaedd4d nt!RtlpExecuteHandlerForException+0xd
0xfffff880`0f61a018  0xfffff803`5eaefb03 nt!RtlDispatchException+0x44b
0xfffff880`0f61a048  0xfffff880`01b73dc8 tcpip!TcpDequeueTcbSend+0x468
0xfffff880`0f61a070  0xfffff803`5ea13000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f61a090  0xfffff803`5ed25004 nt!BcpCursor <PERF> (nt+0x312004)+0x0
0xfffff880`0f61a098  0xfffff803`5ec1e47c nt!MmZeroPageThread+0x3a8
0xfffff880`0f61a0c8  0xfffff880`01d217fd fwpkclnt!FwppNetBufferListAssociateContext+0x1cd
0xfffff880`0f61a0d0  0xfffff803`5eace415 nt!KeExpandKernelStackAndCalloutInternal+0xe5
0xfffff880`0f61a0d8  0xfffff803`5ea13000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f61a0e0  0xfffff803`5ed25004 nt!BcpCursor <PERF> (nt+0x312004)+0x0
0xfffff880`0f61a100  0xfffff803`5eaeaa40 nt!_C_specific_handler+0x0
0xfffff880`0f61a108  0xfffff803`5ec1e47c nt!MmZeroPageThread+0x3a8
*** ERROR: Module load completed but symbols could not be loaded for Ndu.sys
0xfffff880`0f61a158  0xfffff880`0e067690 Ndu!+0x5690
0xfffff880`0f61a188  0xfffff880`0e067f8c Ndu+0x5f8c
0xfffff880`0f61a1e8  0xfffff880`018a9320 ndis!NdisAcquireRWLockRead+0x50
0xfffff880`0f61a228  0xfffff803`5eacf225 nt!KeExpandKernelStackAndCalloutEx+0x25
0xfffff880`0f61a278  0xfffff880`018ae75a ndis!ndisInvokeNextSendHandler+0x22a
*** ERROR: Module load completed but symbols could not be loaded for pacer.sys
0xfffff880`0f61a2a8  0xfffff880`07d1e170 pacer!+0x1170
0xfffff880`0f61a3d8  0xfffff803`5f161f55 hal!HalpDmaNextContiguousPiece+0x59
0xfffff880`0f61a418  0xfffff803`5f165625 hal!HalpDmaMapScatterTransferV2+0x105
Unable to load image Rt630x64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for Rt630x64.sys
*** ERROR: Module load completed but symbols could not be loaded for Rt630x64.sys
0xfffff880`0f61a448  0xfffff880`0926f221 Rt630x64!+0x24221
0xfffff880`0f61a478  0xfffff803`5f163fdb hal!HalpMapTransferV2+0x7f
0xfffff880`0f61a4b8  0xfffff880`0926d307 Rt630x64+0x22307
0xfffff880`0f61a508  0xfffff803`5f162cd5 hal!IoMapTransferInternal+0x10d
0xfffff880`0f61a548  0xfffff803`5f167534 hal!HalpAllocateAdapterCallbackV2+0x14c
0xfffff880`0f61a598  0xfffff880`0926d290 Rt630x64+0x22290
0xfffff880`0f61a5a8  0xfffff803`5f1675b4 hal!IoFreeAdapterChannelV2+0x60
0xfffff880`0f61a5d8  0xfffff803`5f163f02 hal!HalAllocateAdapterChannelV2+0x142
0xfffff880`0f61a608  0xfffff803`5ea87a10 nt!ExpInterlockedPopEntrySList+0x0
0xfffff880`0f61a610  0xfffff880`01b81340 tcpip!IpNlpFastContinueSendDatagram+0x0
0xfffff880`0f61a618  0xfffff803`5ea13000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f61a620  0xfffff803`5ed2216c nt!BcpCursor <PERF> (nt+0x30f16c)+0x0
0xfffff880`0f61a628  0xfffff880`01600000 NETIO!MatchRangeValues  (NETIO+0x0)+0x0
0xfffff880`0f61a630  0xfffff880`0165e924 NETIO!Microsoft_Windows_Networking_CorrelationTraceActivityPayload <PERF> (NETIO+0x5e924)+0x0
0xfffff880`0f61a638  0xfffff880`01ae9000 tcpip!WfpNlShimLogShimPacketDrop <PERF> (tcpip+0x0)+0x0
0xfffff880`0f61a640  0xfffff880`01c9cc74 tcpip!`IppAddressFromNextHop'::`2'::ZeroAddress <PERF> (tcpip+0x1b3c74)+0x0
0xfffff880`0f61a648  0xfffff880`01ae9000 tcpip!WfpNlShimLogShimPacketDrop <PERF> (tcpip+0x0)+0x0
0xfffff880`0f61a650  0xfffff880`01c9d340 tcpip!`IppAddressFromNextHop'::`2'::ZeroAddress <PERF> (tcpip+0x1b4340)+0x0
0xfffff880`0f61a658  0xfffff803`5ea13000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`0f61a660  0xfffff803`5ed25004 nt!BcpCursor <PERF> (nt+0x312004)+0x0
0xfffff880`0f61a698  0xfffff803`5eb0c061 nt!KiPreprocessFault+0x91
0xfffff880`0f61a6a8  0xfffff880`018af400 ndis!NdisMAllocateNetBufferSGList+0x70
0xfffff880`0f61a6c0  0xfffff803`5ea87a35 nt!ExpInterlockedPopEntrySListFault16+0x0
0xfffff880`0f61a6c8  0xfffff803`5ea87a37 nt!ExpInterlockedPopEntrySListFault16+0x2
0xfffff880`0f61a728  0xfffff803`5eb0bf3e nt!KiDispatchException+0x455
0xfffff880`0f61a758  0xfffff880`09268900 Rt630x64+0x1d900
0xfffff880`0f61a7b8  0xfffff880`01b74ba3 tcpip!TcpGetAndWriteLockPartitionAtDpcLevel+0x43
0xfffff880`0f61a858  0xfffff803`5ea87a35 nt!ExpInterlockedPopEntrySListFault16+0x0
0xfffff880`0f61a8a8  0xfffff880`018ae75a ndis!ndisInvokeNextSendHandler+0x22a
0xfffff880`0f61a8d8  0xfffff880`07d1e170 pacer+0x1170
0xfffff880`0f61aa70  0xfffff880`01c79b90 tcpip!Ipv4Global+0x0
0xfffff880`0f61aa98  0xfffff880`01b81751 tcpip!IpNlpFastContinueSendDatagram+0x411
0xfffff880`0f61ab88  0xfffff880`01b75c82 tcpip!IppSendDatagramsCommon+0x6a2
0xfffff880`0f61abf8  0xfffff803`5eb0a2ef nt!RtlGetExtendedContextLength+0x1f
0xfffff880`0f61ac08  0xfffff880`01b475f2 tcpip!IppPacketizeDatagrams+0x2c2
0xfffff880`0f61acf8  0xfffff803`5ea80e1d nt!KeSetTimerEx+0x11
0xfffff880`0f61ad20  0xfffff880`01c79b90 tcpip!Ipv4Global+0x0
0xfffff880`0f61ad48  0xfffff880`01b7c259 tcpip!IpNlpFastSendDatagram+0x2d9
0xfffff880`0f61ad58  0xfffff880`01c79b90 tcpip!Ipv4Global+0x0
0xfffff880`0f61ade8  0xfffff803`5ea8c442 nt!KiExceptionDispatch+0xc2
0xfffff880`0f61ae18  0xfffff880`01b794c4 tcpip!TcpTcbSend+0x5c4
0xfffff880`0f61af38  0xfffff803`5ea87a35 nt!ExpInterlockedPopEntrySListFault16+0x0
0xfffff880`0f61afc8  0xfffff803`5ea8a94a nt!KiGeneralProtectionFault+0x10a
0xfffff880`0f61b0b8  0xfffff880`01b74ba3 tcpip!TcpGetAndWriteLockPartitionAtDpcLevel+0x43
0xfffff880`0f61b138  0xfffff803`5ea87a35 nt!ExpInterlockedPopEntrySListFault16+0x0
0xfffff880`0f61b168  0xfffff880`0160c693 NETIO!FsbAllocateAtDpcLevel+0x63
0xfffff880`0f61b178  0xfffff880`01b7fdc1 tcpip!TcpEnqueueTcbSendOlmNotifySendComplete+0xa1
0xfffff880`0f61b1a8  0xfffff880`01b7319b tcpip!TcpEnqueueTcbSend+0x21b
0xfffff880`0f61b278  0xfffff880`01b81314 tcpip!TcpTlConnectionSendCalloutRoutine+0x24
0xfffff880`0f61b2a8  0xfffff803`5eace415 nt!KeExpandKernelStackAndCalloutInternal+0xe5
0xfffff880`0f61b2d8  0xfffff803`5f1812a1 hal!HalpApicRequestInterrupt+0x1e5
0xfffff880`0f61b368  0xfffff880`07cba8a1 afd!+0x2f8a1
0xfffff880`0f61b3a8  0xfffff803`5eacf225 nt!KeExpandKernelStackAndCalloutEx+0x25
0xfffff880`0f61b3b0  0xfffff880`01b812f0 tcpip!TcpTlConnectionSendCalloutRoutine+0x0
0xfffff880`0f61b3e8  0xfffff880`01b752d8 tcpip!TcpTlConnectionSend+0x78
0xfffff880`0f61b3f8  0xfffff880`07cd2e78 afd+0x47e78
0xfffff880`0f61b408  0xfffff880`07cba6bb afd+0x2f6bb
0xfffff880`0f61b458  0xfffff880`07cd37ee afd+0x487ee
0xfffff880`0f61b498  0xfffff803`5eac3f1d nt!IopFreeIrp+0x11d
0xfffff880`0f61b4d8  0xfffff803`5eac6d00 nt!IopCompleteRequest+0x710
0xfffff880`0f61b4f0  0xfffff880`07cd3bc0 afd+0x48bc0
0xfffff880`0f61b5a8  0xfffff803`5eac4d2a nt!IopfCompleteRequest+0xa5a
0xfffff880`0f61b618  0xfffff880`07cb93f6 afd+0x2e3f6
0xfffff880`0f61b638  0xfffff803`5ec802ba nt!ExFreePoolWithTag+0x2aa
0xfffff880`0f61b688  0xfffff880`07cd4a3d afd+0x49a3d
0xfffff880`0f61b6d8  0xfffff803`5eac3f01 nt!IopFreeIrp+0x101
0xfffff880`0f61b768  0xfffff803`5eadf771 nt!MmProbeAndLockPages+0x161
0xfffff880`0f61b7f8  0xfffff803`5eac78ae nt!ExAllocatePoolWithQuotaTag+0x5e
0xfffff880`0f61b828  0xfffff880`07ce05c0 afd+0x555c0
0xfffff880`0f61b8b8  0xfffff880`07cd52f1 afd+0x4a2f1
0xfffff880`0f61b8e8  0xfffff803`5ee5838c nt!ObReferenceObjectByHandleWithTag+0xac
0xfffff880`0f61b978  0xfffff803`5ee588f5 nt!ObReferenceObjectByHandle+0x25
0xfffff880`0f61b9c0  0xfffff880`07cb9010 afd+0x2e010
0xfffff880`0f61b9c8  0xfffff803`5ee76f5a nt!IopXxxControlFile+0x3d9
0xfffff880`0f61bad0  0xfffff803`5ed08180 nt!KiInitialPCR+0x180
0xfffff880`0f61bb58  0xfffff803`5ee77ce6 nt!NtDeviceIoControlFile+0x56
0xfffff880`0f61bb68  0xfffff803`5eacbcfe nt!KeReleaseSemaphore+0x219
0xfffff880`0f61bbc8  0xfffff803`5ea8c053 nt!KiSystemServiceCopyEnd+0x13
0xfffff880`0f61bc38  0xfffff803`5ea8c053 nt!KiSystemServiceCopyEnd+0x13
quit:

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
Opened log file 'C:\Users\WRITHZ~1\AppData\Local\Temp\SysnativeBSODApps\24972\kdc\outkdOutput4.1.txt'

Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\writh ziden\Downloads\2013_03_14\Trouble\Windows7_Vista_jcgriff2\022513-13572-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: c:\symbols
Executable search path is: 
Windows 8 Kernel Version 9200 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16496.amd64fre.win8_gdr.130108-1504
Machine Name:
Kernel base = 0xfffff802`ff407000 PsLoadedModuleList = 0xfffff802`ff6d0a80
Debug session time: Mon Feb 25 14:07:09.863 2013 (UTC - 6:00)
System Uptime: 0 days 2:12:59.566
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.......
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff88008600537, fffff88009f950a8, fffff88009f948e0}

Probably caused by : nvlddmkm.sys ( nvlddmkm+140537 )

Followup: MachineOwner
---------

4: kd> !niemiro.rawstack; q
0xfffff880`09f94050  0xfffff802`ff407000 nt!`string'  (nt+0x0)+0x0
0xfffff880`09f94060  0xfffff802`ff6088f0 nt!crc32Map32_+0x13dc
0xfffff880`09f94068  0xfffff802`ff6088fc nt!crc32Map32_+0x13e8
0xfffff880`09f94078  0xfffff802`ff481144 nt!KeBugCheckEx+0x104
0xfffff880`09f94088  0xfffff880`07bb4726 dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x66
0xfffff880`09f940b8  0xfffff802`ff5cd417 nt! ?? ::FNODOBFM::`string'+0x15f7
0xfffff880`09f940d0  0xfffff880`08600537 nvlddmkm!+0x140537
0xfffff880`09f940f8  0xfffff802`ff4deace nt!_C_specific_handler+0x8e
0xfffff880`09f94110  0xfffff880`07bdf75f dxgmms1!VIDMM_MEMORY_SEGMENT::EvictResource+0x423
0xfffff880`09f94140  0xfffff802`ff4293d5 nt!PspSystemThreadStartup+0x59
0xfffff880`09f94168  0xfffff802`ff4e1d4d nt!RtlpExecuteHandlerForException+0xd
0xfffff880`09f94198  0xfffff802`ff4e3b03 nt!RtlDispatchException+0x44b
0xfffff880`09f941d8  0xfffff880`07bafb47 dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ff
0xfffff880`09f941f0  0xfffff802`ff407000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`09f94210  0xfffff802`ff712908 nt!BcpCursor <PERF> (nt+0x30b908)+0x0
0xfffff880`09f94218  0xfffff802`ff6088f0 nt!crc32Map32_+0x13dc
0xfffff880`09f94250  0xfffff802`ff4293d5 nt!PspSystemThreadStartup+0x59
0xfffff880`09f94258  0xfffff802`ff407000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`09f94260  0xfffff802`ff712908 nt!BcpCursor <PERF> (nt+0x30b908)+0x0
0xfffff880`09f94280  0xfffff802`ff4dea40 nt!_C_specific_handler+0x0
0xfffff880`09f94288  0xfffff802`ff6088f0 nt!crc32Map32_+0x13dc
0xfffff880`09f942b0  0xfffff880`08574a8b nvlddmkm+0xb4a8b
0xfffff880`09f94318  0xfffff880`08574d2d nvlddmkm+0xb4d2d
0xfffff880`09f94388  0xfffff802`ff407000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`09f943a8  0xfffff802`ff467116 nt!KiStartSystemThread+0x16
0xfffff880`09f943d8  0xfffff880`08b55c08 nvlddmkm+0x695c08
0xfffff880`09f943e8  0xfffff880`086584cb nvlddmkm+0x1984cb
0xfffff880`09f94418  0xfffff880`086a07a8 nvlddmkm+0x1e07a8
0xfffff880`09f94438  0xfffff880`0869ca94 nvlddmkm+0x1dca94
0xfffff880`09f94468  0xfffff802`ff68a000 nt!ExNode0+0x0
0xfffff880`09f94488  0xfffff802`ffb66325 hal!HalpInterruptSendIpi+0x576
0xfffff880`09f94498  0xfffff880`07bb004e dxgmms1!VidSchiProcessIsrCompletedPacket+0x216
0xfffff880`09f94558  0xfffff802`ff68a000 nt!ExNode0+0x0
0xfffff880`09f94578  0xfffff802`ffb66325 hal!HalpInterruptSendIpi+0x576
0xfffff880`09f945a8  0xfffff802`ff538e11 nt!EtwpLogKernelEvent+0x271
0xfffff880`09f94638  0xfffff802`ff697b80 nt!EtwpGroupMasks+0x0
0xfffff880`09f94658  0xfffff802`ff539b40 nt!PerfInfoLogInterrupt+0x120
0xfffff880`09f94660  0xfffff802`ff697cc0 nt!EtwpSystemLogger+0x0
0xfffff880`09f94690  0xfffff880`07a44168 dxgkrnl!DpiFdoLineInterruptRoutine+0x0
0xfffff880`09f94698  0xfffff802`ff539c43 nt!EtwGetInterruptTimeStamp+0xd3
0xfffff880`09f946d8  0xfffff802`ff68a000 nt!ExNode0+0x0
0xfffff880`09f946f8  0xfffff802`ffb61b80 hal!HalRequestSoftwareInterrupt+0x24
0xfffff880`09f94728  0xfffff880`088c763e nvlddmkm+0x40763e
0xfffff880`09f94740  0xfffff802`ffb8d6a0 hal!HalPerformEndOfInterrupt+0x0
0xfffff880`09f94748  0xfffff802`ff479d2c nt!KiChainedDispatch+0x21c
0xfffff880`09f94768  0xfffff880`08648191 nvlddmkm+0x188191
0xfffff880`09f94788  0xfffff802`ff42937c nt!PspSystemThreadStartup+0x0
0xfffff880`09f94790  0xfffff880`08d66252 nvlddmkm+0x8a6252
0xfffff880`09f94798  0xfffff880`084c0000 nvlddmkm+0x0
0xfffff880`09f947a0  0xfffff880`08d2249c nvlddmkm+0x86249c
0xfffff880`09f947a8  0xfffff880`084c0000 nvlddmkm+0x0
0xfffff880`09f947b0  0xfffff880`08d1dc24 nvlddmkm+0x85dc24
0xfffff880`09f947b8  0xfffff880`084c0000 nvlddmkm+0x0
0xfffff880`09f947c0  0xfffff880`08d4d660 nvlddmkm+0x88d660
0xfffff880`09f947c8  0xfffff880`07a31000 dxgkrnl!DXGDEVICEACCESSLOCKSHARED::DXGDEVICEACCESSLOCKSHARED <PERF> (dxgkrnl+0x0)+0x0
0xfffff880`09f947d0  0xfffff880`07a68940 dxgkrnl!__PchSym_ <PERF> (dxgkrnl+0x37940)+0x0
0xfffff880`09f947d8  0xfffff880`07ba9000 dxgmms1!DXGADAPTER::DdiQueryAdapterInfo <PERF> (dxgmms1+0x0)+0x0
0xfffff880`09f947e0  0xfffff880`07bc2e34 dxgmms1!bTracingEnabled <PERF> (dxgmms1+0x19e34)+0x0
0xfffff880`09f947e8  0xfffff880`07ba9000 dxgmms1!DXGADAPTER::DdiQueryAdapterInfo <PERF> (dxgmms1+0x0)+0x0
0xfffff880`09f947f0  0xfffff880`07bc3458 dxgmms1!bTracingEnabled <PERF> (dxgmms1+0x1a458)+0x0
0xfffff880`09f947f8  0xfffff880`07ba9000 dxgmms1!DXGADAPTER::DdiQueryAdapterInfo <PERF> (dxgmms1+0x0)+0x0
0xfffff880`09f94800  0xfffff880`07bc2cfc dxgmms1!bTracingEnabled <PERF> (dxgmms1+0x19cfc)+0x0
0xfffff880`09f94808  0xfffff880`07ba9000 dxgmms1!DXGADAPTER::DdiQueryAdapterInfo <PERF> (dxgmms1+0x0)+0x0
0xfffff880`09f94810  0xfffff880`07bc2b34 dxgmms1!bTracingEnabled <PERF> (dxgmms1+0x19b34)+0x0
0xfffff880`09f94818  0xfffff880`07ba9000 dxgmms1!DXGADAPTER::DdiQueryAdapterInfo <PERF> (dxgmms1+0x0)+0x0
0xfffff880`09f94820  0xfffff880`07bc37d0 dxgmms1!bTracingEnabled <PERF> (dxgmms1+0x1a7d0)+0x0
0xfffff880`09f94828  0xfffff880`07ba9000 dxgmms1!DXGADAPTER::DdiQueryAdapterInfo <PERF> (dxgmms1+0x0)+0x0
0xfffff880`09f94830  0xfffff880`07bc37ac dxgmms1!bTracingEnabled <PERF> (dxgmms1+0x1a7ac)+0x0
0xfffff880`09f94838  0xfffff802`ff407000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`09f94840  0xfffff802`ff712908 nt!BcpCursor <PERF> (nt+0x30b908)+0x0
0xfffff880`09f94848  0xfffff880`0860053a nvlddmkm+0x14053a
0xfffff880`09f948a8  0xfffff802`ff4fff3e nt!KiDispatchException+0x455
0xfffff880`09f948d8  0xfffff880`086c2e00 nvlddmkm+0x202e00
0xfffff880`09f949d8  0xfffff880`08600537 nvlddmkm+0x140537
0xfffff880`09f94a08  0xfffff880`08b55c08 nvlddmkm+0x695c08
0xfffff880`09f94a18  0xfffff880`086584cb nvlddmkm+0x1984cb
0xfffff880`09f94a48  0xfffff880`086a07a8 nvlddmkm+0x1e07a8
0xfffff880`09f94a68  0xfffff880`0869ca94 nvlddmkm+0x1dca94
0xfffff880`09f94b98  0xfffff802`ff4a9542 nt!KiDeferredReadyThread+0x2e2
0xfffff880`09f94bd8  0xfffff802`ff68a000 nt!ExNode0+0x0
0xfffff880`09f94bf8  0xfffff802`ffb66325 hal!HalpInterruptSendIpi+0x576
0xfffff880`09f94c88  0xfffff880`0860b8ec nvlddmkm+0x14b8ec
0xfffff880`09f94d18  0xfffff880`0860a632 nvlddmkm+0x14a632
0xfffff880`09f94d78  0xfffff802`ff4fe2ef nt!RtlGetExtendedContextLength+0x1f
0xfffff880`09f94e48  0xfffff802`ff68a000 nt!ExNode0+0x0
0xfffff880`09f94e68  0xfffff802`ffb61bb9 hal!HalSendSoftwareInterrupt+0x29
0xfffff880`09f94eb8  0xfffff802`ff4a9542 nt!KiDeferredReadyThread+0x2e2
0xfffff880`09f94f18  0xfffff802`ff68a000 nt!ExNode0+0x0
0xfffff880`09f94f68  0xfffff802`ff480442 nt!KiExceptionDispatch+0xc2
0xfffff880`09f94f78  0xfffff880`08609482 nvlddmkm+0x149482
0xfffff880`09f95068  0xfffff802`ff4bec73 nt!ExReleaseFastMutex+0x34
0xfffff880`09f950b8  0xfffff880`08600537 nvlddmkm+0x140537
0xfffff880`09f95148  0xfffff802`ff47e94a nt!KiGeneralProtectionFault+0x10a
0xfffff880`09f95278  0xfffff880`0860a2d8 nvlddmkm+0x14a2d8
0xfffff880`09f95288  0xfffff880`08591bd3 nvlddmkm+0xd1bd3
0xfffff880`09f95298  0xfffff880`08591d9a nvlddmkm+0xd1d9a
0xfffff880`09f952b8  0xfffff880`08600537 nvlddmkm+0x140537
0xfffff880`09f95308  0xfffff880`0861349c nvlddmkm+0x15349c
0xfffff880`09f95378  0xfffff880`08612774 nvlddmkm+0x152774
0xfffff880`09f95458  0xfffff880`08591d9a nvlddmkm+0xd1d9a
0xfffff880`09f95478  0xfffff880`08591d9a nvlddmkm+0xd1d9a
0xfffff880`09f95488  0xfffff880`08591dfb nvlddmkm+0xd1dfb
0xfffff880`09f954a8  0xfffff880`08591dfb nvlddmkm+0xd1dfb
0xfffff880`09f954d8  0xfffff880`08590b65 nvlddmkm+0xd0b65
0xfffff880`09f954f8  0xfffff880`08577772 nvlddmkm+0xb7772
0xfffff880`09f95518  0xfffff880`0859166d nvlddmkm+0xd166d
0xfffff880`09f95548  0xfffff880`085a23d2 nvlddmkm+0xe23d2
0xfffff880`09f95570  0xfffff880`085a2233 nvlddmkm+0xe2233
0xfffff880`09f955f0  0xfffff880`08cfdb00 nvlddmkm+0x83db00
0xfffff880`09f95628  0xfffff880`085a550c nvlddmkm+0xe550c
0xfffff880`09f95668  0xfffff880`0858ab5e nvlddmkm+0xcab5e
0xfffff880`09f95690  0xfffff880`089d2b88 nvlddmkm+0x512b88
0xfffff880`09f956a0  0xfffff880`089dabb8 nvlddmkm+0x51abb8
0xfffff880`09f956b8  0xfffff880`08d65fc7 nvlddmkm+0x8a5fc7
0xfffff880`09f956d8  0xfffff880`08cfdb00 nvlddmkm+0x83db00
0xfffff880`09f956e0  0xfffff880`08d65f44 nvlddmkm+0x8a5f44
0xfffff880`09f95738  0xfffff880`07beea10 dxgmms1!VidSchWaitForCompletionEvent+0x428
0xfffff880`09f95750  0xfffff880`08d65f44 nvlddmkm+0x8a5f44
0xfffff880`09f95768  0xfffff880`07a338bb dxgkrnl!DXGADAPTER::AcquireDdiSync+0x3b
0xfffff880`09f957a8  0xfffff880`07ac1bfd dxgkrnl!ADAPTER_RENDER::DdiBuildPagingBuffer+0x4d
0xfffff880`09f957d8  0xfffff880`07bd17ac dxgmms1!VIDMM_GLOBAL::DiscardAllocationInternal+0xc4
0xfffff880`09f95808  0xfffff880`07a3a1c8 dxgkrnl!ADAPTER_RENDER_DdiSubmitCommand+0x138
0xfffff880`09f95958  0xfffff880`07bdf75f dxgmms1!VIDMM_MEMORY_SEGMENT::EvictResource+0x423
0xfffff880`09f95a98  0xfffff880`07be14ef dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0xa7
0xfffff880`09f95aa8  0xfffff880`07bd4f3a dxgmms1!VIDMM_GLOBAL::EndPreparation+0x126
0xfffff880`09f95ab8  0xfffff880`07bae8f2 dxgmms1!VidSchiIsMmIoFlipPending+0x66
0xfffff880`09f95ae8  0xfffff880`07be7500 dxgmms1!VIDMM_LINEAR_POOL::FindAdjacentBlocksOnFreeList+0x28
0xfffff880`09f95b18  0xfffff880`07bce928 dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x95c
0xfffff880`09f95b68  0xfffff880`07bb3c11 dxgmms1!VidSchiReadCommandFromContextQueue+0xcd
0xfffff880`09f95bd8  0xfffff880`07bb2e4b dxgmms1!VidSchiScheduleCommandToRun+0xef
0xfffff880`09f95c50  0xfffff880`07be757c dxgmms1!VidSchiWorkerThread+0x0
0xfffff880`09f95c60  0xfffff802`ff407000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`09f95c88  0xfffff880`07bc7614 dxgmms1!VidMmiProcessTerminationCommand+0x60
0xfffff880`09f95ca8  0xfffff880`07baae75 dxgmms1!operator delete+0x11
0xfffff880`09f95cd8  0xfffff880`07be7ba5 dxgmms1!VidSchiSubmitQueueCommand+0xd1
0xfffff880`09f95cf8  0xfffff802`ff407000 nt!`string' <PERF> (nt+0x0)+0x0
0xfffff880`09f95d08  0xfffff880`07be7662 dxgmms1!VidSchiWorkerThread+0xe6
0xfffff880`09f95d48  0xfffff802`ff4293d5 nt!PspSystemThreadStartup+0x59
0xfffff880`09f95d98  0xfffff802`ff467116 nt!KiStartSystemThread+0x16
quit:

¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨¨``
 
Updated BIOS (flashed firmware)
Code:
      System BIOS Date                                  08/01/11
      Award BIOS Type                                   Award Modular BIOS v6.00PG
      Award BIOS Message                                AMD 870 BIOS for GA-870A-UD3 F5
      DMI BIOS Version                                  F5
      Vendor                                            Award Software International, Inc.
      Version                                           F5
      Release Date                                      08/01/2011
      Size                                              1024 KB
Thanks for calling that to my attention.
As far as the firmware for the SSD is concerned
 

Attachments

  • SSD Firmware.JPG
    SSD Firmware.JPG
    101.5 KB · Views: 10
Do you have the latest version NVIDIA drivers installed?

NVIDIA was named in 1 dump, but with BIOS not upgraded, it may be nothing.
 
Thanks John.
Yes I am certain that I do have the latest driver from Nvidia. In fact, I am so certain that I will certainly check again right now.:smile9:
And yes, I forgot about that Beta BIOS I installed back when I first bought the board. I should have caught that one myself. But all's well that ends well so that's caught up. And driver verifier is still running. So patiently waiting at this point.

EDIT: Yep. NVIDIA DRIVERS 314.07WHQL
That's the one I have installed right now. For what that's worth.

Regards
Randy
 
Feb 2013 sure is current!

From that 1 dump -
Code:
4: kd> [B]lmvm nvlddmkm[/B]
start             end                 module name
fffff880`084c0000 fffff880`08f5e000   nvlddmkm T (no symbols)           
    Loaded symbol image file: nvlddmkm.sys
    Image path: nvlddmkm.sys
    Image name: nvlddmkm.sys
    Timestamp:        Sat [COLOR=#FF0000]Dec 29[/COLOR] 01:47:52 [COLOR=#FF0000]2012 [/COLOR](50DE9218)
    CheckSum:         00A7F96C
    ImageSize:        00A9E000
    Translations:     0000.04b0 0000.04e4 0409.04b0 0409.04e4
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top